{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:05:08Z","timestamp":1776121508094,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"ERC Grant: Frontiers of Usable Security","award":["678341"],"award-info":[{"award-number":["678341"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510223","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"2080-2090","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Testing time limits in screener questions for online surveys with programmers"],"prefix":"10.1145","author":[{"given":"Anastasia","family":"Danilova","sequence":"first","affiliation":[{"name":"University of Bonn"}]},{"given":"Stefan","family":"Horstmann","sequence":"additional","affiliation":[{"name":"University of Bonn"}]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Bonn"}]},{"given":"Alena","family":"Naiakshina","sequence":"additional","affiliation":[{"name":"University of Bonn"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.52"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"e_1_3_2_1_3_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Acar Yasemin","year":"2017","unstructured":"Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L Mazurek, and Sascha Fahl. 2017. Security developer studies with github users: Exploring a convenience sample. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, USA, 81--95."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300519"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Rebecca Balebako Abigail Marsh Jialiu Lin Jason I Hong and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. (2014).","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962628"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2348997"},{"key":"e_1_3_2_1_9_1","volume-title":"2021 from https:\/\/www.clickworker.com\/ https:\/\/www.clickworker.com\/","author":"Retrieved August","year":"2020","unstructured":"Clickworker. 2021. Retrieved August 16, 2021 from https:\/\/www.clickworker.com\/ https:\/\/www.clickworker.com\/, Accessed: September 2020."},{"key":"e_1_3_2_1_10_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020","author":"Danilova Anastasia","year":"2020","unstructured":"Anastasia Danilova, Alena Naiakshina, Johanna Deuter, and Matthew Smith. 2020. Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, Boston, MA, USA, 165--183. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/danilova"},{"key":"e_1_3_2_1_11_1","volume-title":"Designing and Evaluating Screening Questions for Online Surveys with Programmers. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). IEEE","author":"Danilova Anastasia","year":"2021","unstructured":"Anastasia Danilova, Alena Naiakshina, Stefan Horstmann, and Matthew Smith. 2021. Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). IEEE, Madrid, Spain, 537--548."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380387"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240511"},{"key":"e_1_3_2_1_14_1","volume-title":"2021 from https:\/\/www.freelancer.com\/freelancer.com","author":"Retrieved August","year":"2020","unstructured":"Freelancer. 2021. Retrieved August 16, 2021 from https:\/\/www.freelancer.com\/freelancer.com, Accessed: September 2020."},{"key":"e_1_3_2_1_15_1","unstructured":"GHTorrent. 2021. Retrieved August 16 2021 from https:\/\/ghtorrent.org\/"},{"key":"e_1_3_2_1_16_1","unstructured":"GitHub. 2021. Retrieved August 16 2021 from https:\/\/github.com\/"},{"key":"e_1_3_2_1_17_1","unstructured":"GooglePlay. 2021. Retrieved August 16 2021 from https:\/\/play.google.com"},{"key":"e_1_3_2_1_18_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Gorski Peter Leo","year":"2018","unstructured":"Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian M\u00f6ller, Yasemin Acar, and Sascha Fahl. 2018. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic {API} Misuse. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). USENIX Association, Baltimore, MD, USA, 265--281."},{"key":"e_1_3_2_1_19_1","unstructured":"G*Power. 2021. Retrieved August 16 2021 from gpower.hhu.de"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.104"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/apps.12108"},{"key":"e_1_3_2_1_22_1","volume-title":"Today was a good day: The daily life of software developers","author":"Meyer Andre","year":"2019","unstructured":"Andre Meyer, Earl T Barr, Christian Bird, and Thomas Zimmermann. 2019. Today was a good day: The daily life of software developers. IEEE Transactions on Software Engineering (2019)."},{"key":"e_1_3_2_1_23_1","volume-title":"Edward K. Smith, and Matthew A. Jorde.","author":"Murphy-Hill Emerson","year":"2019","unstructured":"Emerson Murphy-Hill, Ciera Jaspan, Caitlin Sadowski, David C. Shepherd, Michael Phillips, Collin Winter, Andrea Knight Dolan, Edward K. Smith, and Matthew A. Jorde. 2019. What Predicts Software Developers' Productivity? Transactions on Software Engineering (2019)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376791"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300370"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300370"},{"key":"e_1_3_2_1_27_1","volume-title":"24th ACM Conference on Computer and Communications Security - ACM CCS","author":"Naiakshina Alena","year":"2017","unstructured":"Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, and Matthew Smith. 2017. Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study. In 24th ACM Conference on Computer and Communications Security - ACM CCS 2017. ACM, Dallas, Texas, USA, 311--328."},{"key":"e_1_3_2_1_28_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS","author":"Naiakshina Alena","year":"2018","unstructured":"Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, and Matthew Smith. 2018. Deception Task Design in Developer Password Studies: Exploring a Student Sample. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, USA, 297--313."},{"key":"e_1_3_2_1_29_1","unstructured":"Qualtrics. 2021. Retrieved August 16 2021 from https:\/\/www.qualtrics.com"},{"key":"e_1_3_2_1_30_1","unstructured":"Amazon Mechanical Turk. 2018. Retrieved August 16 2021 from www.mturk.com"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering","author":"Wijayarathna Chamila","year":"2018","unstructured":"Chamila Wijayarathna and Nalin AG Arachchilage. 2018. Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncycastle Password Hashing. In Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018. ACM, Christchurch, New Zealand, 205--210."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671299"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/USER.2013.6603077"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510223","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:24Z","timestamp":1750191144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510223"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":32,"alternative-id":["10.1145\/3510003.3510223","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510223","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}