{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:07:50Z","timestamp":1776121670526,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580766","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:28:44Z","timestamp":1681964924000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5735-178X","authenticated-orcid":false,"given":"Anna-Marie","family":"Ortloff","sequence":"first","affiliation":[{"name":"University of Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2894-3751","authenticated-orcid":false,"given":"Matthias","family":"Fassl","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany and Saarland University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6119-9701","authenticated-orcid":false,"given":"Alexander","family":"Ponticello","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany and Saarland University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8483-4042","authenticated-orcid":false,"given":"Florin","family":"Martius","sequence":"additional","affiliation":[{"name":"University of Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1623-8817","authenticated-orcid":false,"given":"Anne","family":"Mertens","sequence":"additional","affiliation":[{"name":"University of Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2425-3013","authenticated-orcid":false,"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarland Informatics Campus, Germany and Saarland University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2724-1379","authenticated-orcid":false,"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Bonn, Germany and Fraunhofer FKIE, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","unstructured":"2022. MAXQDA Manual. https:\/\/www.maxqda.com\/help-mx22\/welcome."},{"key":"e_1_3_3_2_2_1","volume-title":"Security in the Software Development Lifecycle. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Assal Hala","year":"2018","unstructured":"Hala Assal and Sonia Chiasson. 2018. Security in the Software Development Lifecycle. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)(SOUPS \u201918). USENIX Association, Baltimore, MD, 281\u2013296."},{"key":"e_1_3_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.324.7348.1271"},{"key":"e_1_3_3_2_4_1","volume-title":"Current Sample Size Conventions: Flaws, Harms, and Alternatives. BMC Medicine 8, 1 (March","author":"Bacchetti Peter","year":"2010","unstructured":"Peter Bacchetti. 2010. Current Sample Size Conventions: Flaws, Harms, and Alternatives. BMC Medicine 8, 1 (March 2010), 17."},{"key":"e_1_3_3_2_5_1","volume-title":"Replication: Effects of Media on the Mental Models of Technical Users. In Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Baig Khadija","year":"2021","unstructured":"Khadija Baig, Elisa Kazan, Kalpana Hundlani, Sana Maqsood, and Sonia Chiasson. 2021. Replication: Effects of Media on the Mental Models of Technical Users. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 119\u2013138."},{"key":"e_1_3_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376800"},{"key":"e_1_3_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2596695.2596696"},{"key":"e_1_3_3_2_8_1","volume-title":"Understanding Your Users. A Practical Guide to User Research Methods","author":"Baxter Kathy","unstructured":"Kathy Baxter, Catherine Courage, and Kelly Caine. 2015. Understanding Your Users. A Practical Guide to User Research Methods (second ed.). Morgan Kaufmann Publications."},{"key":"e_1_3_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.2458\/v6i1.18772"},{"key":"e_1_3_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_2_11_1","unstructured":"Virginia Braun and Victoria Clarke. 2013. Successful Qualitative Research: A Practical Guide for Beginners. SAGE."},{"key":"e_1_3_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42466-020-00059-z"},{"key":"e_1_3_3_2_13_1","volume-title":"Proceedings of the Fifteenth symposium on usable privacy and security (SOUPS","author":"Busse Karoline","year":"2019","unstructured":"Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: No one can hack my mind revisiting a study on expert and non-expert security practices and advice. In Proceedings of the Fifteenth symposium on usable privacy and security (SOUPS 2019). USENIX Association, Santa Clara, CA."},{"key":"e_1_3_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/14780887.2014.948980"},{"key":"e_1_3_3_2_15_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Danilova Anastasia","year":"2021","unstructured":"Anastasia Danilova, Alena Naiakshina, Anna Rasgauski, and Matthew Smith. 2021. Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 397\u2013416."},{"key":"e_1_3_3_2_16_1","doi-asserted-by":"crossref","unstructured":"Anastasia Danilova Alena Naiakshina and Matthew Smith. 2020. One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types. In 2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE). 136\u2013148.","DOI":"10.1145\/3377811.3380387"},{"key":"e_1_3_3_2_17_1","unstructured":"Thorsten Dresing and Thorsten Pehl. 2017. Praxisbuch Interview Transkription & Analyse: Anleitungen und Regelsysteme f\u00fcr qualitativ Forschende(7 ed.). self-published Marburg."},{"key":"e_1_3_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/2331186X.2019.1690265"},{"key":"e_1_3_3_2_19_1","volume-title":"Critical Discourse Analysis","author":"Fairclough Norman","unstructured":"Norman Fairclough. 2013. Critical Discourse Analysis. In The Routledge Handbook of Discourse Analysis. Routledge, 9\u201334."},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794108094867"},{"key":"e_1_3_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794110366802"},{"key":"e_1_3_3_2_22_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Fulton R","year":"2021","unstructured":"Kelsey\u00a0R Fulton, Anna Chan, Daniel Votipka, Michael Hicks, and Michelle\u00a0L Mazurek. 2021. Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)(SOUPS \u201921). USENIX Association, 597\u2013616."},{"key":"e_1_3_3_2_23_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Gerlitz Eva","year":"2021","unstructured":"Eva Gerlitz, Maximilian H\u00e4ring, and Matthew Smith. 2021. Please Do Not Use !?_ or Your License Plate Number: Analyzing Password Policies in German Companies. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 17\u201336."},{"key":"e_1_3_3_2_24_1","volume-title":"Too. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Gorski Peter\u00a0Leo","year":"2018","unstructured":"Peter\u00a0Leo Gorski, Luigi\u00a0Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Moeller, Yasemin Acar, and Sascha Fahl. 2018. Developers Deserve Security Warnings, Too. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)(SOUPS \u201918). USENIX Association, Baltimore, MD, 265\u2013281."},{"key":"e_1_3_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357074"},{"key":"e_1_3_3_2_26_1","first-page":"75","article-title":"ERIC\/ECTJ Annual Review Paper","volume":"29","author":"Guba Egon","year":"1981","unstructured":"Egon Guba. 1981. ERIC\/ECTJ Annual Review Paper: Criteria for Assessing the Trustworthiness of Naturalistic Inquiries. 29, 2 (1981), 75\u201391.","journal-title":"Criteria for Assessing the Trustworthiness of Naturalistic Inquiries."},{"key":"e_1_3_3_2_27_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Haney M","year":"2018","unstructured":"Julie\u00a0M Haney, Mary\u00a0F Theofanos, Yasemin Acar, and Sandra\u00a0Spickard Prettyman. 2018. \"We Make It a Big Deal in the Company\": Security Mindsets in Organizations That Develop Cryptographic Products. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)(SOUPS \u201918). USENIX Association, Baltimore, MD, 357\u2013373."},{"key":"e_1_3_3_2_28_1","volume-title":"Site. In Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Hasegawa A.","year":"2022","unstructured":"Ayako\u00a0A. Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, and Mitsuaki Akiyama. 2022. Understanding Non-Experts\u2019 Security- and Privacy-Related Questions on a Q&A Site. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 39\u201356."},{"key":"e_1_3_3_2_29_1","doi-asserted-by":"crossref","unstructured":"Morten Hertzum and Niels\u00a0Ebbe Jacobsen. 2001. The Evaluator Effect: A Chilling Fact About Usability Evaluation Methods. International Journal of Human\u2013Computer Interaction 13 4(2001) 421\u2013443.","DOI":"10.1207\/S15327590IJHC1304_05"},{"key":"e_1_3_3_2_30_1","first-page":"4","article-title":"Researcher Positionality - A Consideration of Its Influence and Place in Qualitative Research - A New Researcher Guide","volume":"8","author":"Gary\u00a0Darwin Holmes Andrew","year":"2020","unstructured":"Andrew Gary\u00a0Darwin Holmes. 2020. Researcher Positionality - A Consideration of Its Influence and Place in Qualitative Research - A New Researcher Guide. Shanlax International Journal of Education 8, 4 (Sept. 2020), 1\u201310.","journal-title":"Shanlax International Journal of Education"},{"key":"e_1_3_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/ecin.12992"},{"key":"e_1_3_3_2_32_1","volume-title":"Proceedings of the Eleventh symposium on usable privacy and security (SOUPS","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \u201c...No one can hack my mind\u201d: Comparing expert and non-expert security practices. In Proceedings of the Eleventh symposium on usable privacy and security (SOUPS 2015). USENIX Association, Ottawa, 327\u2013346."},{"key":"e_1_3_3_2_33_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \"My Data Just Goes Everywhere:\" User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 39\u201352."},{"key":"e_1_3_3_2_34_1","volume-title":"CHI \u201901 Extended Abstracts on Human Factors in Computing Systems (Seattle, Washington) (CHI EA \u201901)","author":"Kessner Martin","unstructured":"Martin Kessner, Jo Wood, Richard\u00a0F. Dillon, and Robert\u00a0L. West. 2001. On the Reliability of Usability Testing. In CHI \u201901 Extended Abstracts on Human Factors in Computing Systems (Seattle, Washington) (CHI EA \u201901). Association for Computing Machinery, New York, NY, USA, 97\u201398."},{"key":"e_1_3_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/14780880802070559"},{"key":"e_1_3_3_2_36_1","first-page":"10","article-title":"Rigor in Qualitative Research","volume":"45","author":"Krefting Laura","year":"1991","unstructured":"Laura Krefting. 1991. Rigor in Qualitative Research: The Assessment of Trustworthiness. 45, 3 (1991), 10.","journal-title":"The Assessment of Trustworthiness."},{"key":"e_1_3_3_2_37_1","volume-title":"End User and Administrator Mental Models of HTTPS. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Krombholz Katharina","year":"2019","unstructured":"Katharina Krombholz, Karoline Busse, Katharina Pfeffer, Matthew Smith, and Emanuel von Zezschwitz. 2019. \"If HTTPS Were Secure, I Wouldn\u2019t Need 2FA\" - End User and Administrator Mental Models of HTTPS. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 246\u2013263."},{"key":"e_1_3_3_2_38_1","volume-title":"On the Usability of Deploying HTTPS. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Krombholz Katharina","year":"2017","unstructured":"Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, and Edgar Weippl. 2017. \u201cI Have No Idea What I\u2019m Doing\u201d \u2013 On the Usability of Deploying HTTPS. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, Canada, 1339\u20131356."},{"key":"e_1_3_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.4103\/2249-4863.161306"},{"key":"e_1_3_3_2_41_1","volume-title":"User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. In Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Mai Alexandra","year":"2020","unstructured":"Alexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar Weippl, and Katharina Krombholz. 2020. User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 341\u2013358."},{"key":"e_1_3_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"e_1_3_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376791"},{"key":"e_1_3_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134082"},{"key":"e_1_3_3_2_46_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Palombo Hernan","year":"2020","unstructured":"Hernan Palombo, Armin\u00a0Ziaie Tabari, Daniel Lende, Jay Ligatti, and Xinming Ou. 2020. An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)(SOUPS \u201920). USENIX Association, 17."},{"key":"e_1_3_3_2_47_1","volume-title":"Usability Smells: An Analysis of Developers\u2019 Struggle With Crypto Libraries. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Patnaik Nikhil","year":"2019","unstructured":"Nikhil Patnaik, Joseph Hallett, and Awais Rashid. 2019. Usability Smells: An Analysis of Developers\u2019 Struggle With Crypto Libraries. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)(SOUPS \u201919). USENIX Association, Santa Clara, CA, USA, 245\u2013257."},{"key":"e_1_3_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794111422107"},{"key":"e_1_3_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484780"},{"key":"e_1_3_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/0038038509357194"},{"key":"e_1_3_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555556"},{"key":"e_1_3_3_2_52_1","volume-title":"Grounded Theory in Practice","author":"Strauss Anselm","unstructured":"Anselm Strauss and Juliet\u00a0M Corbin. 1997. Grounded Theory in Practice. Sage, London."},{"key":"e_1_3_3_2_53_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Sundaramurthy Sathya\u00a0Chandran","year":"2015","unstructured":"Sathya\u00a0Chandran Sundaramurthy, Alexandru\u00a0G. Bardas, Jacob Case, Xinming Ou, Michael Wesch, John McHugh, and S.\u00a0Raj Rajagopalan. 2015. A Human Capital Model for Mitigating Security Analyst Burnout. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 347\u2013359."},{"key":"e_1_3_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994098"},{"key":"e_1_3_3_2_55_1","volume-title":"Deciding on Personalized Ads: Nudging Developers About User Privacy. In Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Tahaei Mohammad","year":"2021","unstructured":"Mohammad Tahaei, Alisa Frik, and Kami Vaniea. 2021. Deciding on Personalized Ads: Nudging Developers About User Privacy. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 573\u2013596."},{"key":"e_1_3_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376768"},{"key":"e_1_3_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2017-019993"},{"key":"e_1_3_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173882"},{"key":"e_1_3_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1177\/1098214005283748"},{"key":"e_1_3_3_2_60_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Tiefenau Christian","year":"2020","unstructured":"Christian Tiefenau, Maximilian H\u00e4ring, and Katharina Krombholz. 2020. Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)(SOUPS \u201920). USENIX Association, 239\u2013258."},{"key":"e_1_3_3_2_61_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Tuladhar Anwesh","year":"2021","unstructured":"Anwesh Tuladhar, Daniel Lende, Jay Ligatti, and Xinming Ou. 2021. An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 617\u2013632."},{"key":"e_1_3_3_2_62_1","volume-title":"Schr\u00f6dinger\u2019s Security: Opening the Box on App Developers\u2019 Security Rationale. In 2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE). 149\u2013160","author":"van der Linden Dirk","year":"2020","unstructured":"Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein\u00a0Than Tun, Marian Petre, Mark Levine, John Towse, and Awais Rashid. 2020. Schr\u00f6dinger\u2019s Security: Opening the Box on App Developers\u2019 Security Rationale. In 2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE). 149\u2013160."},{"key":"e_1_3_3_2_63_1","volume-title":"Fix It. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Votipka Daniel","year":"2020","unstructured":"Daniel Votipka, Kelsey\u00a0R Fulton, James Parker, Matthew Hou, Michelle\u00a0L Mazurek, and Michael Hicks. 2020. Understanding Security Mistakes Developers Make: Qualitative Analysis from Build It, Break It, Fix It. In 29th USENIX Security Symposium (USENIX Security 20)(USENIX Security \u201920). USENIX Association, 109\u2013126."},{"key":"e_1_3_3_2_64_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Wei Miranda","year":"2022","unstructured":"Miranda Wei, Eric Zeng, Tadayoshi Kohno, and Franziska Roesner. 2022. Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 447\u2013462."},{"key":"e_1_3_3_2_65_1","volume-title":"Grounded Theory, Discourse Analysis, Narrative Research, and Intuitive Inquiry (1 ed.)","author":"Wertz J.","unstructured":"Frederick\u00a0J. Wertz, Kathy Charmaz, Linda\u00a0M. McMullen, Ruthellen Josselson, Rosemarie Anderson, and Emalinda McSpadden. 2011. Five Ways of Doing Qualitative Analysis: Phenomenological Psychology, Grounded Theory, Discourse Analysis, Narrative Research, and Intuitive Inquiry (1 ed.). The Guilford Press, New York."},{"key":"e_1_3_3_2_66_1","volume-title":"CHI \u201911 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201911)","author":"White R","unstructured":"Gareth\u00a0R White, Pejman Mirza-babaei, Graham McAllister, and Judith Good. 2011. Weak inter-rater reliability in heuristic evaluation of video games. In CHI \u201911 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201911). Association for Computing Machinery, Vancouver, BC, Canada, 1441\u20131446."},{"key":"e_1_3_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/09518398.2010.495363"},{"key":"e_1_3_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484759"},{"key":"e_1_3_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376570"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580766","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:24Z","timestamp":1750178244000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":69,"alternative-id":["10.1145\/3544548.3580766","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580766","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}