{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:00:46Z","timestamp":1776099646157,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA ? 390781972"],"award-info":[{"award-number":["EXC 2092 CASA ? 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581410","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:28:44Z","timestamp":1681964924000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0842-9632","authenticated-orcid":false,"given":"Franziska","family":"Herbert","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7526-5597","authenticated-orcid":false,"given":"Steffen","family":"Becker","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany and Max Planck Institute for Security and Privacy, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4339-501X","authenticated-orcid":false,"given":"Leonie","family":"Schaewitz","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5159-3868","authenticated-orcid":false,"given":"Jonas","family":"Hielscher","sequence":"additional","affiliation":[{"name":"Human-Centred Security, Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6929-3679","authenticated-orcid":false,"given":"Marvin","family":"Kowalewski","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1823-5505","authenticated-orcid":false,"given":"Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"Human-Centred Security, Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7167-7383","authenticated-orcid":false,"given":"Yasemin","family":"Acar","sequence":"additional","affiliation":[{"name":"George Washington University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5048-3723","authenticated-orcid":false,"given":"Markus","family":"D\u00fcrmuth","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/0163660X.2017.1328928"},{"key":"e_1_3_3_3_3_1","volume-title":"End User and Expert Perceptions of Threats and Potential Countermeasures. In IEEE European Symposium on Security and Privacy Workshops(EuroS&PW\u00a0\u201920)","author":"Anell Simon","year":"2020","unstructured":"Simon Anell, Lea Gr\u00f6ber, and Katharina Krombholz. 2020. End User and Expert Perceptions of Threats and Potential Countermeasures. In IEEE European Symposium on Security and Privacy Workshops(EuroS&PW\u00a0\u201920). IEEE, Genoa, Italy, 230\u2013239."},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.314.7080.572"},{"key":"e_1_3_3_3_5_1","first-page":"1","article-title":"A Cross-Cultural and Gender-Based Perspective for Online Security: Exploring Knowledge, Skills and Attitudes of Higher Education Students","volume":"13","author":"Chaudhary Sunil","year":"2015","unstructured":"Sunil Chaudhary, Yan Zhao, Eleni Berki, Juri Valtanen, Linfeng Li, Marko Helenius, and Stylianos Mystakidis. 2015. A Cross-Cultural and Gender-Based Perspective for Online Security: Exploring Knowledge, Skills and Attitudes of Higher Education Students. International Journal on WWW\/Internet 13, 1 (Dec. 2015), 57\u201371.","journal-title":"International Journal on WWW\/Internet"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0071-9"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/1040-3590.7.3.309"},{"key":"e_1_3_3_3_8_1","volume-title":"Modelling User-Phishing Interaction. In Conference on Human System Interactions(HSI\u00a0\u201908)","author":"Dong Xun","year":"2008","unstructured":"Xun Dong, John\u00a0A. Clark, and Jeremy Jacob. 2008. Modelling User-Phishing Interaction. In Conference on Human System Interactions(HSI\u00a0\u201908). IEEE, Krakow, Poland, 627\u2013632."},{"key":"e_1_3_3_3_9_1","volume-title":"ENISA Threat Landscape 15 Top Threats","author":"European Union Agency for Cybersecurity. 2020.","year":"2020","unstructured":"European Union Agency for Cybersecurity. 2020. ENISA Threat Landscape 15 Top Threats in 2020. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2020-list-of-top-15-threats, as of September 15, 2022."},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463176"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"crossref","unstructured":"Paul\u00a0A. Grassi James\u00a0L. Fenton and William\u00a0E. Burr. 2017. Digital Identity Guidelines \u2013 Authentication and Lifecycle Management: NIST Special Publication 800-63B.","DOI":"10.6028\/NIST.SP.800-63b"},{"key":"e_1_3_3_3_12_1","volume-title":"User Behaviors and Attitudes Under Password Expiration Policies. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201918)","author":"Habib Hana","year":"2018","unstructured":"Hana Habib, Pardis\u00a0Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2018. User Behaviors and Attitudes Under Password Expiration Policies. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201918). USENIX, Baltimore, Maryland, USA, 13\u201330."},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"e_1_3_3_3_14_1","volume-title":"The Clash of Civilizations and the Remaking of World Order (1 ed.)","author":"Huntington P.","unstructured":"Samuel\u00a0P. Huntington. 1996. The Clash of Civilizations and the Remaking of World Order (1 ed.). Simon & Schuster, New York City, New York, USA."},{"key":"e_1_3_3_3_15_1","volume-title":"International Code on Market and Social Research. https:\/\/iccwbo.org\/publication\/iccesomar-international-code-on-market-and-social-research\/, as of","author":"International Chamber of Commerce and European Society for Opinion and Marketing Research. 2007.","year":"2022","unstructured":"International Chamber of Commerce and European Society for Opinion and Marketing Research. 2007. International Code on Market and Social Research. https:\/\/iccwbo.org\/publication\/iccesomar-international-code-on-market-and-social-research\/, as of September 15, 2022."},{"key":"e_1_3_3_3_16_1","volume-title":"User Mental Models of the Internet and Implications for Privacy and Security. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201915)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara\u00a0B. Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201915). USENIX, Ottawa, Canada, 39\u201352."},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554208"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.179"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77392-2_20"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188409"},{"key":"e_1_3_3_3_22_1","volume-title":"End User and Administrator Mental Models of HTTPS. In IEEE Symposium on Security and Privacy(SP\u00a0\u201919)","author":"Krombholz Katharina","year":"2019","unstructured":"Katharina Krombholz, Karoline Busse, Katharina Pfeffer, Matthew Smith, and Emanuel von Zezschwitz. 2019. \u201cIf HTTPS Were Secure, I Wouldn\u2019t Need 2FA\u201d \u2013 End User and Administrator Mental Models of HTTPS. In IEEE Symposium on Security and Privacy(SP\u00a0\u201919). IEEE, San Francisco, California, USA, 246\u2013263."},{"key":"e_1_3_3_3_23_1","volume-title":"R f\u00fcr Einsteiger Einf\u00fchrung in die Statistiksoftware f\u00fcr die Sozialwissenschaften (4ed.)","author":"Luhmann Maike","unstructured":"Maike Luhmann. 2015. R f\u00fcr Einsteiger Einf\u00fchrung in die Statistiksoftware f\u00fcr die Sozialwissenschaften (4ed.). Beltz, Basel, Switzerland."},{"key":"e_1_3_3_3_24_1","volume-title":"Hide and Seek: Tracking NSO Group\u2019s Pegasus Spyware to Operations in 45 Countries. https:\/\/citizenlab.ca\/2018\/09\/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-countries\/, as of","author":"Marczak Bill","year":"2022","unstructured":"Bill Marczak, John Scott-Railton, Sarah McKune, Bahr Abdul\u00a0Razzak, and Ron Deibert. 2018. Hide and Seek: Tracking NSO Group\u2019s Pegasus Spyware to Operations in 45 Countries. https:\/\/citizenlab.ca\/2018\/09\/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-countries\/, as of September 15, 2022."},{"key":"e_1_3_3_3_25_1","volume-title":"Workshop on Socio-Technical Aspects in Security and Trust(STAST\u00a0\u201917)","author":"Mayer Peter","year":"2017","unstructured":"Peter Mayer and Melanie Volkamer. 2017. Addressing Misconceptions about Password Security Effectively. In Workshop on Socio-Technical Aspects in Security and Trust(STAST\u00a0\u201917). ACM, Orlando, Florida, USA, 16\u201327."},{"key":"e_1_3_3_3_26_1","volume-title":"Testtheorie und Fragebogenkonstruktion(2 ed.)","author":"Moosbrugger Helfried","unstructured":"Helfried Moosbrugger and Augustin Kelava. 2012. Testtheorie und Fragebogenkonstruktion(2 ed.). Springer, Berlin, Germany."},{"key":"e_1_3_3_3_27_1","volume-title":"Standardizing Reporting of Participant Compensation in HCI: A Systematic Literature Review and Recommendations for the Field. In ACM Conference on Human Factors in Computing Systems","author":"Pater Jessica","year":"2021","unstructured":"Jessica Pater, Amanda Coupe, Rachel Pfafman, Chanda Phelan, Tammy Toscos, and Maia\u00a0L. Jacobs. 2021. Standardizing Reporting of Participant Compensation in HCI: A Systematic Literature Review and Recommendations for the Field. In ACM Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI\u00a0\u201921). Association for Computing Machinery, New York, NY, USA, Article 141, 16\u00a0pages."},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_3_3_30_1","volume-title":"Tell Me Something: Advice Sources and Selection for Digital Security. In IEEE Symposium on Security and Privacy(SP\u00a0\u201916)","author":"Redmiles M.","year":"2016","unstructured":"Elissa\u00a0M. Redmiles, Amelia\u00a0R. Malone, and Michelle\u00a0L. Mazurek. 2016. I Think They\u2019re Trying to Tell Me Something: Advice Sources and Selection for Digital Security. In IEEE Symposium on Security and Privacy(SP\u00a0\u201916). IEEE, San Jose, California, USA, 272\u2013288."},{"key":"e_1_3_3_3_31_1","volume-title":"USENIX Security Symposium(SSYM\u00a0\u201920)","author":"Redmiles M.","year":"2020","unstructured":"Elissa\u00a0M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle\u00a0L. Mazurek. 2020. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. In USENIX Security Symposium(SSYM\u00a0\u201920). USENIX, Virtual Conference, 89\u2013108."},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681050"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481521"},{"key":"e_1_3_3_3_36_1","volume-title":"Security Report","year":"2016","unstructured":"Serianu, Limited. 2016. Africa Cyber Security Report 2016. https:\/\/www.serianu.com\/downloads\/AfricaCyberSecurityReport2016.pdf, as of September 15, 2022."},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.15575\/join.v3i2.205"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0049"},{"key":"e_1_3_3_3_39_1","volume-title":"The External Validity of Online Privacy and Security Surveys. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201922)","author":"Tang Jenny","year":"2022","unstructured":"Jenny Tang, Eleanor Birrell, and Ada Lerner. 2022. Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201922). USENIX, Boston, Massachusetts, USA, 367\u2013385."},{"key":"e_1_3_3_3_40_1","volume-title":"Digital Divide in Latin America and Europe: Main Characteristics in Selected Countries. In Iberian Conference on Information Systems and Technologies(CISTI\u00a0\u201919)","author":"Tomczyk \u0141ukasz","year":"2019","unstructured":"\u0141ukasz Tomczyk, Maria\u00a0Amelia Eliseo, Vladimir Costas, Gloria S\u00e1nchez, Ismar\u00a0Frango Silveira, Maria-Jose Barros, H\u00e9ctor\u00a0R. Amado-Salvatierra, and Solomon\u00a0Sunday Oyelere. 2019. Digital Divide in Latin America and Europe: Main Characteristics in Selected Countries. In Iberian Conference on Information Systems and Technologies(CISTI\u00a0\u201919). IEEE, Coimbra, Portugal, 1\u20136."},{"key":"e_1_3_3_3_41_1","volume-title":"International Standard Classification of Education: ISCED 2011","author":"UNESCO Institute for Statistics.","year":"2012","unstructured":"UNESCO Institute for Statistics. 2012. International Standard Classification of Education: ISCED 2011. http:\/\/uis.unesco.org\/sites\/default\/files\/documents\/international-standard-classification-of-education-isced-2011-en.pdf, as of September 15, 2022."},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488037"},{"key":"e_1_3_3_3_43_1","volume-title":"The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. https:\/\/www.caida.org\/publications\/papers\/2012\/menlo_report_actual_formatted\/, as of","author":"U.S. Department of Homeland Security. 2012.","year":"2022","unstructured":"U.S. Department of Homeland Security. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. https:\/\/www.caida.org\/publications\/papers\/2012\/menlo_report_actual_formatted\/, as of September 15, 2022."},{"key":"e_1_3_3_3_44_1","volume-title":"Chinese and Indian Users\u2019 Privacy Concerns on Social Network Sites. In International Conference on Trust and Trustworthy Computing(TRUST\u00a0\u201911)","author":"Wang Yang","year":"2011","unstructured":"Yang Wang, Gregory Norcie, and Lorrie\u00a0Faith Cranor. 2011. Who Is Concerned about What? A Study of American, Chinese and Indian Users\u2019 Privacy Concerns on Social Network Sites. In International Conference on Trust and Trustworthy Computing(TRUST\u00a0\u201911). Springer, Pittsburgh, Pennsylvania, USA, 46\u2013153."},{"key":"e_1_3_3_3_45_1","volume-title":"Springer International Publishing","author":"Willems Eddy","unstructured":"Eddy Willems. 2019. Malware Myths (1ed.). Springer International Publishing, Basel, Switzerland, Chapter\u00a07, 111\u2013121."},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186088"},{"key":"e_1_3_3_3_47_1","volume-title":"Digitalbarometer 2020: B\u00fcrgerbefragung zur Cyber-Sicherheit. https:\/\/www.allianz-fuer-cybersicherheit.de\/SharedDocs\/Downloads\/DE\/BSI\/Digitalbarometer\/Digitalbarometer-ProPK-BSI_2020.html, as of","author":"Zindler Armgard","year":"2022","unstructured":"Armgard Zindler and Carolin Bolz. 2020. Digitalbarometer 2020: B\u00fcrgerbefragung zur Cyber-Sicherheit. https:\/\/www.allianz-fuer-cybersicherheit.de\/SharedDocs\/Downloads\/DE\/BSI\/Digitalbarometer\/Digitalbarometer-ProPK-BSI_2020.html, as of September 15, 2022."}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581410","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:54Z","timestamp":1750178814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":45,"alternative-id":["10.1145\/3544548.3581410","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581410","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}