{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:19:38Z","timestamp":1776107978820,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":108,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"Institute for Advanced Studies of the University of Luxembourg","award":["Young Academic Grant 2021"],"award-info":[{"award-number":["Young Academic Grant 2021"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3641943","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:39:12Z","timestamp":1715416752000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0794-1551","authenticated-orcid":false,"given":"Xiaowei","family":"Chen","sequence":"first","affiliation":[{"name":"Institute for Advanced Studies, University of Luxembourg, Luxembourg and Department of Behavioural and Cognitive Sciences, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-7916","authenticated-orcid":false,"given":"Margault","family":"Sacr\u00e9","sequence":"additional","affiliation":[{"name":"Media Center, Universit\u00e9 du Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8229-3270","authenticated-orcid":false,"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[{"name":"SnT\/Interdisciplinary Research Group in Socio-technical Cybersecurity, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2900-3734","authenticated-orcid":false,"given":"Samuel","family":"Greiff","sequence":"additional","affiliation":[{"name":"Department of Behavioural and Cognitive Sciences, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4461-0551","authenticated-orcid":false,"given":"Verena","family":"Distler","sequence":"additional","affiliation":[{"name":"Usable Security and Privacy Group, Bundeswehr University Muncih, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3701-3123","authenticated-orcid":false,"given":"Anastasia","family":"Sergeeva","sequence":"additional","affiliation":[{"name":"Department of Behavioural and Cognitive Sciences, University of Luxembourg, Luxembourg and SnT\/Interdisciplinary Research Group in Socio-technical Cybersecurity, University of Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.006"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476079"},{"key":"e_1_3_3_3_4_1","volume-title":"Retrieved","author":"APWG.","year":"2023","unstructured":"APWG. 2023. Phishing activity trends report. Retrieved July 30, 2023 from https:\/\/apwg.org\/trendsreports\/"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2016.7487946"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-02-2021-0021"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.39"},{"key":"e_1_3_3_3_8_1","volume-title":"A Decade of Dividedness: A Preregistered Systematic Review of the Cybersecurity Self-Efficacy Methods. preprint submitted to Elsevier","author":"Borgert Nele","year":"2023","unstructured":"Nele Borgert, Luisa Jansen, Imke B\u00f6se, Jennifer Friedauer, M\u00a0Angela Sasse, and Malte Elson. 2023. A Decade of Dividedness: A Preregistered Systematic Review of the Cybersecurity Self-Efficacy Methods. preprint submitted to Elsevier (2023), 1\u201321."},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580860"},{"key":"e_1_3_3_3_10_1","volume-title":"The Hidden Costs of Introducing Simulated Phishing Campaigns. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Brunken Lina","year":"2023","unstructured":"Lina Brunken, Annalina Buckmann, Jonas Hielscher, and M\u00a0Angela Sasse. 2023. \u201cTo Do This Properly, You Need More Resources\u201d: The Hidden Costs of Introducing Simulated Phishing Campaigns. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, USA, 4105\u20134122."},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2023.102996"},{"key":"e_1_3_3_3_12_1","volume-title":"Structural equation modeling with Mplus: Basic concepts, applications, and programming. routledge","author":"Byrne M","unstructured":"Barbara\u00a0M Byrne. 2013. Structural equation modeling with Mplus: Basic concepts, applications, and programming. routledge, New York."},{"key":"e_1_3_3_3_13_1","volume-title":"Retrieved","author":"David","year":"2022","unstructured":"David C. 2022. Telling users to \u2018avoid clicking bad links\u2019 still isn\u2019t working. Retrieved November 18, 2023 from https:\/\/www.ncsc.gov.uk\/blog-post\/telling-users-to-avoid-clicking-bad-links-still-isnt-working"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258485"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2011.08.009"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyac006"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3270316.3273042"},{"key":"e_1_3_3_3_18_1","volume-title":"Thematic analysis. The journal of positive psychology 12, 3","author":"Clarke Victoria","year":"2017","unstructured":"Victoria Clarke and Virginia Braun. 2017. Thematic analysis. The journal of positive psychology 12, 3 (2017), 297\u2013298."},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235934"},{"key":"e_1_3_3_3_20_1","unstructured":"Gregory\u00a0W Corder and Dale\u00a0I Foreman. 2011. Nonparametric statistics for non-statisticians."},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2020-0200"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361476.3361484"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2020-0204"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409179"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581170"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469845"},{"key":"e_1_3_3_3_27_1","volume-title":"Phishing for user security awareness. computers & security 26, 1","author":"Dodge\u00a0Jr C","year":"2007","unstructured":"Ronald\u00a0C Dodge\u00a0Jr, Curtis Carver, and Aaron\u00a0J Ferguson. 2007. Phishing for user security awareness. computers & security 26, 1 (2007), 73\u201380."},{"key":"e_1_3_3_3_28_1","first-page":"71","article-title":"To improve cybersecurity, think like a hacker","volume":"53","author":"Esteves Jose","year":"2017","unstructured":"Jose Esteves, Elisabete Ramalho, and Guillermo De\u00a0Haro. 2017. To improve cybersecurity, think like a hacker. MIT Sloan Management Review 53, 3 (2017), 71\u201377.","journal-title":"MIT Sloan Management Review"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-181253"},{"key":"e_1_3_3_3_30_1","volume-title":"Retrieved","author":"FBI.","year":"2023","unstructured":"FBI. 2023. Business Email Compromise: The $50 Billion Scam. Retrieved July 30, 2023 from https:\/\/www.ic3.gov\/Media\/Y2023\/PSA230609"},{"key":"e_1_3_3_3_31_1","volume-title":"Retrieved","author":"FBI.","year":"2023","unstructured":"FBI. 2023. IC3Report 2023. Retrieved July 30, 2023 from https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf"},{"key":"e_1_3_3_3_32_1","volume-title":"Restoring executive confidence: Red Team operations. Network security","author":"Fenton Mike","year":"2016","unstructured":"Mike Fenton. 2016. Restoring executive confidence: Red Team operations. Network security 2016, 11 (2016), 5\u20137."},{"key":"e_1_3_3_3_33_1","volume-title":"HAS 2015, Held as Part of HCI International 2015, August 2-7, 2015. Proceedings 3. Springer","author":"Ferreira Ana","year":"2015","unstructured":"Ana Ferreira, Lynne Coventry, and Gabriele Lenzini. 2015. Principles of persuasion in social engineering and their use in phishing. In Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, August 2-7, 2015. Proceedings 3. Springer, Los Angeles, CA, USA, 36\u201347."},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2015.10"},{"key":"e_1_3_3_3_35_1","volume-title":"Discovering statistics using IBM SPSS statistics. sage","author":"Field Andy","unstructured":"Andy Field. 2013. Discovering statistics using IBM SPSS statistics. sage, Los Angeles."},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2022.113818"},{"key":"e_1_3_3_3_37_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. { SoK} : Still Plenty of Phish in the Sea\u2014A Taxonomy of { User-Oriented} Phishing Interventions and Avenues for Future Research. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, Virtual Event, 339\u2013358."},{"key":"e_1_3_3_3_38_1","volume-title":"Mobile phishing attacks and defence mechanisms: State of art and open research challenges. computers & security 73","author":"Goel Diksha","year":"2018","unstructured":"Diksha Goel and Ankit\u00a0Kumar Jain. 2018. Mobile phishing attacks and defence mechanisms: State of art and open research challenges. computers & security 73 (2018), 519\u2013544."},{"key":"e_1_3_3_3_39_1","volume-title":"Proceedings of the Workshop on Usable Security and Privacy (USEC). Internet Society","author":"Gopavaram Shakthidhar","year":"2021","unstructured":"Shakthidhar Gopavaram, Jayati Dev, Marthie Grobler, DongInn Kim, Sanchari Das, and L\u00a0Jean Camp. 2021. Cross-national study on phishing resilience. In Proceedings of the Workshop on Usable Security and Privacy (USEC). Internet Society, Auckland, New Zealand, 1\u201311."},{"key":"e_1_3_3_3_40_1","volume-title":"20th international conference of the stress and anxiety research society (STAR), Vol.\u00a012","author":"Greenglass Esther","year":"1999","unstructured":"Esther Greenglass, Ralf Schwarzer, Dagmara Jakubiec, Lisa Fiksenbaum, and Steffen Taubert. 1999. The proactive coping inventory (PCI): A multidimensional research instrument. In 20th international conference of the stress and anxiety research society (STAR), Vol.\u00a012. FPUW, Cracow, Poland, 14."},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461672"},{"key":"e_1_3_3_3_42_1","volume-title":"Self-efficacy in organizations cybersecurity training. Master\u2019s thesis","author":"Gundersen Erik\u00a0Urdal","unstructured":"Erik\u00a0Urdal Gundersen. 2022. Self-efficacy in organizations cybersecurity training. Master\u2019s thesis. University of Agder."},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510456.3514139"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462766.3462770"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101827"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.008"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"e_1_3_3_3_48_1","volume-title":"Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of information systems 18","author":"Herath Tejaswini","year":"2009","unstructured":"Tejaswini Herath and H\u00a0Raghav Rao. 2009. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of information systems 18 (2009), 106\u2013125."},{"key":"e_1_3_3_3_49_1","volume-title":"The CISO View of Human-Centred Security. In 32st USENIX Security Symposium (USENIX Security 23)","author":"Hielscher Jonas","year":"2023","unstructured":"Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, and M\u00a0Angela Sasse. 2023. \u201cEmployees Who Don\u2019t Accept the Time Security Takes Are Not Aware Enough\u201d: The CISO View of Human-Centred Security. In 32st USENIX Security Symposium (USENIX Security 23). USENIX Association, Boston, MA, 2311\u20132328."},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103364"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103252"},{"key":"e_1_3_3_3_52_1","volume-title":"Retrieved","author":"Intelligence Microsoft\u00a0Threat","year":"2023","unstructured":"Microsoft\u00a0Threat Intelligence. 2023. Midnight Blizzard conducts targeted social engineering over Microsoft Teams. Retrieved August 18, 2023 from https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/08\/02\/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams\/"},{"key":"e_1_3_3_3_53_1","volume-title":"when and how to adjust your P values?Cell Journal (Yakhteh) 20, 4","author":"Jafari Mohieddin","year":"2019","unstructured":"Mohieddin Jafari and Naser Ansari-Pour. 2019. Why, when and how to adjust your P values?Cell Journal (Yakhteh) 20, 4 (2019), 604."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-00237-7"},{"key":"e_1_3_3_3_55_1","volume-title":"Phishing for phishing awareness. Behaviour & information technology 32, 6","author":"Jansson K","year":"2013","unstructured":"K Jansson and Rossouw von Solms. 2013. Phishing for phishing awareness. Behaviour & information technology 32, 6 (2013), 584\u2013593."},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.520"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/31726.31751"},{"key":"e_1_3_3_3_58_1","unstructured":"Karl\u00a0G J\u00f6reskog and Dag S\u00f6rbom. 1993. LISREL 8: Structural equation modeling with the SIMPLIS command language. Scientific software international Skokie USA."},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103049"},{"key":"e_1_3_3_3_60_1","first-page":"1497","article-title":"Principles and practice of structural equation modeling (3. Bask\u0131). New York","volume":"14","author":"Kline B","year":"2011","unstructured":"Rex\u00a0B Kline. 2011. Principles and practice of structural equation modeling (3. Bask\u0131). New York, NY: Guilford 14 (2011), 1497\u20131513.","journal-title":"NY: Guilford"},{"key":"e_1_3_3_3_61_1","volume-title":"Analyzing qualitative data with MAXQDA","author":"Kuckartz Udo","unstructured":"Udo Kuckartz and Stefan R\u00e4diker. 2019. Analyzing qualitative data with MAXQDA. Springer, Switzerland."},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"key":"e_1_3_3_3_63_1","volume-title":"Lessons from a real world evaluation of anti-phishing training. In 2008 eCrime Researchers Summit","author":"Kumaraguru Ponnurangam","unstructured":"Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie\u00a0Faith Cranor, and Jason Hong. 2008. Lessons from a real world evaluation of anti-phishing training. In 2008 eCrime Researchers Summit. IEEE, Atlanta, USA, 1\u201312."},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_3_3_65_1","volume-title":"Why do users not report spear phishing emails?Telematics and Informatics 48","author":"Kwak Youngsun","year":"2020","unstructured":"Youngsun Kwak, Seyoung Lee, Amanda Damiano, and Arun Vishwanath. 2020. Why do users not report spear phishing emails?Telematics and Informatics 48 (2020), 101343."},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.017"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(17)30082-9"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580985"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3381435"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"e_1_3_3_3_73_1","volume-title":"Retrieved","author":"NIST.","year":"2023","unstructured":"NIST. 2023. Phishing. Retrieved July 30, 2023 from https:\/\/www.nist.gov\/itl\/smallbusinesscyber\/guidance-topic\/phishing"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_3_3_75_1","first-page":"13","article-title":"Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses","volume":"22","author":"Raineri M","year":"2020","unstructured":"Ellen\u00a0M Raineri and Jessica Resig. 2020. Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses. Journal of Applied Business & Economics 22, 12 (2020), 13\u201323.","journal-title":"Journal of Applied Business & Economics"},{"key":"e_1_3_3_3_76_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Reinheimer Benjamin","year":"2020","unstructured":"Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana Von\u00a0Landesberger, and Melanie Volkamer. 2020. An investigation of phishing awareness and education over time: When and how to best remind users. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, Virtual Event, USA, 259\u2013284."},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498891.3498896"},{"key":"e_1_3_3_3_78_1","volume-title":"Ethics and phishing experiments. Science and engineering ethics 24","author":"Resnik B","year":"2018","unstructured":"David\u00a0B Resnik and Peter\u00a0R Finn. 2018. Ethics and phishing experiments. Science and engineering ethics 24 (2018), 1241\u20131252."},{"key":"e_1_3_3_3_79_1","volume-title":"Self-efficacy in information security: Its influence on end users","author":"Rhee Hyeun-Suk","year":"2009","unstructured":"Hyeun-Suk Rhee, Cheongtag Kim, and Young\u00a0U Ryu. 2009. Self-efficacy in information security: Its influence on end users\u2019 information security practice behavior. Computers & security 28, 8 (2009), 816\u2013826."},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/20552076221081716"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(16)30017-3"},{"key":"e_1_3_3_3_82_1","volume-title":"European Symposium on Research in Computer Security. Springer","author":"Sasse M\u00a0Angela","year":"2022","unstructured":"M\u00a0Angela Sasse, Jonas Hielscher, Jennifer Friedauer, and Annalina Buckmann. 2022. Rebooting IT Security Awareness\u2013How Organisations Can Encourage and Sustain Secure Behaviours. In European Symposium on Research in Computer Security. Springer, Copenhagen, Denmark, 248\u2013265."},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223891.2018.1449116"},{"key":"e_1_3_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581163"},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2019.1705512"},{"key":"e_1_3_3_3_87_1","unstructured":"VERBI Software. 2022. MAXQDA."},{"key":"e_1_3_3_3_88_1","unstructured":"IBM\u00a0SPSS Statistics. 2020. Transforming different Likert scales to a common scale."},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa009"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_10"},{"key":"e_1_3_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2021.1955638"},{"key":"e_1_3_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580650"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.010"},{"key":"e_1_3_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"e_1_3_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.07.034"},{"key":"e_1_3_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66504-3_19"},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174066"},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073283"},{"key":"e_1_3_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.62915\/2472-2707.1040"},{"key":"e_1_3_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.06.004"},{"key":"e_1_3_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa001"},{"key":"e_1_3_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/1274892.1274904"},{"key":"e_1_3_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2021.1919941"},{"key":"e_1_3_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427920"},{"key":"e_1_3_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617072.3617121"},{"key":"e_1_3_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.05.005"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3641943","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3641943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:28Z","timestamp":1750291048000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3641943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":108,"alternative-id":["10.1145\/3613904.3641943","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3641943","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}