{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:26Z","timestamp":1750220366824,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CaSa ? 390781972"],"award-info":[{"award-number":["EXC 2092 CaSa ? 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3481357.3481526","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:05:52Z","timestamp":1639256752000},"page":"76-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Vision: Developing a Broad Usable Security &amp; Privacy Questionnaire"],"prefix":"10.1145","author":[{"given":"Franziska","family":"Herbert","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Florian M.","family":"Farke","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Marvin","family":"Kowalewski","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Markus","family":"D\u00fcrmuth","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_2_1_2_1","unstructured":"I. Ajzen D. Albarracin and R. Hornik. 2007. Predicting and changing behavior: A reasoned action approach. Lawrence Erlbaum Associates 3\u201321.  I. Ajzen D. Albarracin and R. Hornik. 2007. Predicting and changing behavior: A reasoned action approach. Lawrence Erlbaum Associates 3\u201321."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146621603257518"},{"volume-title":"Manual for the Beck Depression Inventory-II","author":"Beck T.","key":"e_1_3_2_1_4_1","unstructured":"Aaron\u00a0 T. Beck , Robert\u00a0 A. Steer , and Gregory\u00a0 K. Brown . 1996. Manual for the Beck Depression Inventory-II . Psychological Corporation , San Antonio, TX . Aaron\u00a0T. Beck, Robert\u00a0A. Steer, and Gregory\u00a0K. Brown. 1996. Manual for the Beck Depression Inventory-II. Psychological Corporation, San Antonio, TX."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1190275.1190279"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/1040-3590.7.3.309"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_8_1","volume-title":"Symposium on Usable Privacy and Security(SOUPS\u00a0\u201919)","author":"Faklaris Cori","year":"2019","unstructured":"Cori Faklaris , Laura\u00a0 A. Dabbish , and Jason\u00a0 I. Hong . 2019 . A Self-Report Measure of End-User Security Attitudes (SA-6) . In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201919) . USENIX, Santa Clara, CA, 61\u201377. https:\/\/www.usenix.org\/conference\/soups 2019\/presentation\/faklaris Cori Faklaris, Laura\u00a0A. Dabbish, and Jason\u00a0I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201919). USENIX, Santa Clara, CA, 61\u201377. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/faklaris"},{"key":"e_1_3_2_1_9_1","unstructured":"Bundesamt f\u00fcr Sicherheit in\u00a0der Informationstechnik. 2019. Surfen aber sicher! Basisschutz leicht gemacht 10 Tips f\u00fcr ungetr\u00fcbtes Surf-Vergn\u00fcgen.  Bundesamt f\u00fcr Sicherheit in\u00a0der Informationstechnik. 2019. Surfen aber sicher! Basisschutz leicht gemacht 10 Tips f\u00fcr ungetr\u00fcbtes Surf-Vergn\u00fcgen."},{"key":"e_1_3_2_1_10_1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik und Polizeiliche Kriminalpr\u00e4vention der L\u00e4nder und\u00a0des Bundes. 2020. Digitalbarometer:B\u00fcrgerbefragung zur Cyber-Sicherheit.  Bundesamt f\u00fcr Sicherheit in der Informationstechnik und Polizeiliche Kriminalpr\u00e4vention der L\u00e4nder und\u00a0des Bundes. 2020. Digitalbarometer:B\u00fcrgerbefragung zur Cyber-Sicherheit."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0026"},{"key":"e_1_3_2_1_12_1","volume-title":"Educational Measurement: Issues and Practice 12 (10","author":"Hambleton R.","year":"1993","unstructured":"R. Hambleton and R. Jones . 1993 . An NCME Instructional Module on: Comparison of Classical Test Theory and Item Response Theory and Their Applications to Test Development . Educational Measurement: Issues and Practice 12 (10 1993), 38\u201347. R. Hambleton and R. Jones. 1993. An NCME Instructional Module on: Comparison of Classical Test Theory and Item Response Theory and Their Applications to Test Development. Educational Measurement: Issues and Practice 12 (10 1993), 38\u201347."},{"key":"e_1_3_2_1_13_1","volume-title":"User Mental Models of the Internet and Implications for Privacy and Security. In Symposium On Usable Privacy and Security(SOUPS\u00a0\u201915)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang , Laura Dabbish , Nathaniel Fruchter , and Sara Kiesler . 2015 . \u201c My Data Just Goes Everywhere :\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Symposium On Usable Privacy and Security(SOUPS\u00a0\u201915) . USENIX, Ottawa, 39\u201352. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/kang Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Symposium On Usable Privacy and Security(SOUPS\u00a0\u201915). USENIX, Ottawa, 39\u201352. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/kang"},{"key":"e_1_3_2_1_14_1","unstructured":"Naresh Malhotra. 2006. Questionnaire Design and Scale Development. The handbook of marketing research: Uses misuses and future advances 176\u2013202.  Naresh Malhotra. 2006. Questionnaire Design and Scale Development. The handbook of marketing research: Uses misuses and future advances 176\u2013202."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0002-9343(97)00467-1"},{"key":"e_1_3_2_1_17_1","volume-title":"Testtheorie und Fragebogenkonstruktion","author":"Moosbrugger Helfried","unstructured":"Helfried Moosbrugger and Augustin Kelava . 2012. Testtheorie und Fragebogenkonstruktion 2 . Auflage. Springer . Helfried Moosbrugger and Augustin Kelava. 2012. Testtheorie und Fragebogenkonstruktion 2. Auflage. Springer.","edition":"2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.011"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_3_2_1_20_1","volume-title":"Australasian Conference on Information Systems(ACIS\u00a0\u201913)","author":"Parsons Kathryn","year":"2013","unstructured":"Kathryn Parsons , Agata McCormac , Marcus Butavicius , Malcolm Pattinson , and Cate Jerram . 2013 . The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q) . In Australasian Conference on Information Systems(ACIS\u00a0\u201913) . RMIT University, Melbourne,Australia. https:\/\/aisel.aisnet.org\/acis 2013\/31 Kathryn Parsons, Agata McCormac, Marcus Butavicius, Malcolm Pattinson, and Cate Jerram. 2013. The Development of the Human Aspects of Information Security Questionnaire (HAIS-Q). In Australasian Conference on Information Systems(ACIS\u00a0\u201913). RMIT University, Melbourne,Australia. https:\/\/aisel.aisnet.org\/acis2013\/31"},{"key":"e_1_3_2_1_21_1","volume-title":"Tell Me Something: Advice Sources and Selection for Digital Security. In IEEE Symposium on Security and Privacy(SP\u00a0\u201916)","author":"Redmiles M.","year":"2016","unstructured":"Elissa\u00a0 M. Redmiles , Amelia\u00a0 R. Malone , and Michelle\u00a0 L. Mazurek . 2016 . I Think They\u2019re Trying to Tell Me Something: Advice Sources and Selection for Digital Security. In IEEE Symposium on Security and Privacy(SP\u00a0\u201916) . 272\u2013288. Elissa\u00a0M. Redmiles, Amelia\u00a0R. Malone, and Michelle\u00a0L. Mazurek. 2016. I Think They\u2019re Trying to Tell Me Something: Advice Sources and Selection for Digital Security. In IEEE Symposium on Security and Privacy(SP\u00a0\u201916). 272\u2013288."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681050"},{"key":"e_1_3_2_1_23_1","volume-title":"Empirische Studien zur Entwicklung von Antwortskalen f\u00fcr die sozialwissenschaftliche Forschung.Zeitschrift f\u00fcr Sozialpsychologie 9","author":"Rohrmann Bernd","year":"1978","unstructured":"Bernd Rohrmann . 1978. Empirische Studien zur Entwicklung von Antwortskalen f\u00fcr die sozialwissenschaftliche Forschung.Zeitschrift f\u00fcr Sozialpsychologie 9 ( 1978 ), 222\u2013245. Bernd Rohrmann. 1978. Empirische Studien zur Entwicklung von Antwortskalen f\u00fcr die sozialwissenschaftliche Forschung.Zeitschrift f\u00fcr Sozialpsychologie 9 (1978), 222\u2013245."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"e_1_3_2_1_27_1","volume-title":"An Evaluation of Identity-Sharing Behavior in Social Network Communities.iDMAa Journal 3, 1","author":"Stutzman Frederic","year":"2006","unstructured":"Frederic Stutzman . 2006. An Evaluation of Identity-Sharing Behavior in Social Network Communities.iDMAa Journal 3, 1 ( 2006 ). Frederic Stutzman. 2006. An Evaluation of Identity-Sharing Behavior in Social Network Communities.iDMAa Journal 3, 1 (2006)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1078834"},{"volume-title":"International Convention on Information and Communication Technology, Electronics and Microelectronics(MIPRO\u00a0\u201914)","author":"Velki T.","key":"e_1_3_2_1_29_1","unstructured":"T. Velki , K. Solic , and H. Ocevcic . 2014. Development of Users\u2019 Information Security Awareness Questionnaire (UISAQ) \u2014 Ongoing work . In International Convention on Information and Communication Technology, Electronics and Microelectronics(MIPRO\u00a0\u201914) . 1417\u20131421. T. Velki, K. Solic, and H. Ocevcic. 2014. Development of Users\u2019 Information Security Awareness Questionnaire (UISAQ) \u2014 Ongoing work. In International Convention on Information and Communication Technology, Electronics and Microelectronics(MIPRO\u00a0\u201914). 1417\u20131421."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"W. Xu G. Sun Z. Lin M. Chen B. Yang H. Chen and K. Cao. 2010. Knowledge Attitude and Behavior in Patients with Atrial Fibrillation Undergoing Radiofrequency Catheter Ablation. Journal of interventional cardiac electrophysiology : an international journal of arrhythmias and pacing 28 (09 2010) 199\u2013207.  W. Xu G. Sun Z. Lin M. Chen B. Yang H. Chen and K. Cao. 2010. Knowledge Attitude and Behavior in Patients with Atrial Fibrillation Undergoing Radiofrequency Catheter Ablation. Journal of interventional cardiac electrophysiology : an international journal of arrhythmias and pacing 28 (09 2010) 199\u2013207.","DOI":"10.1007\/s10840-010-9496-2"},{"volume-title":"Information Revelation and Internet Privacy Concerns on Social Network Sites: A Case Study of Facebook. In International Conference on Communities and Technologies","author":"L.","key":"e_1_3_2_1_31_1","unstructured":"Alyson\u00a0 L. Young and Anabel Quan-Haase. 2009 . Information Revelation and Internet Privacy Concerns on Social Network Sites: A Case Study of Facebook. In International Conference on Communities and Technologies ( University Park, PA, USA) (C&T \u201909). ACM, New York, NY, USA, 265\u2013274. https:\/\/doi.org\/10.1145\/1556460.1556499 10.1145\/1556460.1556499 Alyson\u00a0L. Young and Anabel Quan-Haase. 2009. Information Revelation and Internet Privacy Concerns on Social Network Sites: A Case Study of Facebook. In International Conference on Communities and Technologies (University Park, PA, USA) (C&T \u201909). ACM, New York, NY, USA, 265\u2013274. https:\/\/doi.org\/10.1145\/1556460.1556499"}],"event":{"name":"EuroUSEC '21: European Symposium on Usable Security 2021","acronym":"EuroUSEC '21","location":"Karlsruhe Germany"},"container-title":["Proceedings of the 2021 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481526","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481357.3481526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:32Z","timestamp":1750191452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481526"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":29,"alternative-id":["10.1145\/3481357.3481526","10.1145\/3481357"],"URL":"https:\/\/doi.org\/10.1145\/3481357.3481526","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}