{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:58:31Z","timestamp":1772121511312,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"CASA - Cyber Security in the Age of Large-Scale Adversaries"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642823","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:39:12Z","timestamp":1715416752000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Understanding Users' Interaction with Login Notifications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9232-4496","authenticated-orcid":false,"given":"Philipp","family":"Markert","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8309-3211","authenticated-orcid":false,"given":"Leona","family":"Lassak","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2204-2132","authenticated-orcid":false,"given":"Maximilian","family":"Golla","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5048-3723","authenticated-orcid":false,"given":"Markus","family":"D\u00fcrmuth","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_2_1_1","unstructured":"1Password Community Member. 2022. 1Password \u201cNew Login\u201d E-Mail Notification. https:\/\/1password.community\/discussion\/comment\/643758\/ as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_2_1","volume-title":"Chromium Blog: An Update on the Lock Icon. https:\/\/blog.chromium.org\/2023\/05\/an-update-on-lock-icon.html, as of 2024\/03\/06 12:34:11.","author":"Adrian David","year":"2023","unstructured":"David Adrian, Serena Chen, Joe DeBlasio, Emily Stark, and Emanuel von Zezschwitz. 2023. Chromium Blog: An Update on the Lock Icon. https:\/\/blog.chromium.org\/2023\/05\/an-update-on-lock-icon.html, as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_3_1","volume-title":"Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In USENIX Security Symposium(SSYM\u00a0\u201913)","author":"Akhawe Devdatta","year":"2013","unstructured":"Devdatta Akhawe and Adrienne\u00a0Porter Felt. 2013. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In USENIX Security Symposium(SSYM\u00a0\u201913). USENIX, Washington, District of Columbia, USA, 257\u2013272."},{"key":"e_1_3_3_2_4_1","volume-title":"Symposium on Usable Privacy and Security(SOUPS\u00a0\u201914)","author":"Almuhimedi Hazim","year":"2014","unstructured":"Hazim Almuhimedi, Adrienne\u00a0Porter Felt, Robert\u00a0W. Reeder, and Sunny Consolvo. 2014. Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201914). USENIX, Menlo Park, California, USA, 113\u2013128."},{"key":"e_1_3_3_2_5_1","volume-title":"Security Alerts: When You\u2019ll Get an Alert. https:\/\/support.google.com\/accounts\/answer\/2590353, as of 2024\/03\/06 12:34:11.","author":"Alphabet","year":"2024","unstructured":"Alphabet, Inc.2024. Respond to Security Alerts: When You\u2019ll Get an Alert. https:\/\/support.google.com\/accounts\/answer\/2590353, as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_6_1","unstructured":"Amazon.com Inc.2024. If You Get a Security Alert about Activity You Don\u2019t Recognize. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=GLXNK37D6R3WGXKW as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2018.1448492"},{"key":"e_1_3_3_2_8_1","unstructured":"Francesca Angelini. 2023. Do You Know Who\u2019s Logging into Your Netflix Account?https:\/\/www.thetimes.co.uk\/article\/do-you-know-whos-logging-into-your-netflix-account-m728z3678 as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_9_1","unstructured":"Apple Inc.2022. Apple Support Community: Notification of Sign In with Apple ID. https:\/\/discussions.apple.com\/thread\/253581666 as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_10_1","unstructured":"Apple Inc.2024. Signs That Your Apple ID Has Been Compromised. https:\/\/support.apple.com\/en-us\/102560 as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_12_1","volume-title":"Grounded Theory: A Practical Guide (3 ed.)","author":"Birks Melanie","year":"2022","unstructured":"Melanie Birks and Jane Mills. 2022. Grounded Theory: A Practical Guide (3 ed.). SAGE Publications, Ltd., Thousand Oaks, California, USA."},{"key":"e_1_3_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0011"},{"key":"e_1_3_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313481"},{"key":"e_1_3_3_2_15_1","volume-title":"You\u2019ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201908)","author":"Egelman Serge","year":"2008","unstructured":"Serge Egelman, Lorrie\u00a0Faith Cranor, and Jason Hong. 2008. You\u2019ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201908). ACM, Florence, Italy, 1065\u20131074."},{"key":"e_1_3_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_3_3_2_17_1","volume-title":"USENIX Security Symposium(SSYM\u00a0\u201923)","author":"Gavazzi Anthony","year":"2023","unstructured":"Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, and Tim Leek. 2023. A Study of Multi-Factor and Risk-Based Authentication Availability. In USENIX Security Symposium(SSYM\u00a0\u201923). USENIX, Anaheim, California, USA, 2043\u20132060."},{"key":"e_1_3_3_2_18_1","volume-title":"USENIX Security Symposium(SSYM\u00a0\u201921)","author":"Golla Maximilian","year":"2021","unstructured":"Maximilian Golla, Grant Ho, Marika Lohmus, Monica Pulluri, and Elissa\u00a0M. Redmiles. 2021. Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns. In USENIX Security Symposium(SSYM\u00a0\u201921). USENIX, Virtual Conference, 109\u2013126."},{"key":"e_1_3_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243767"},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376142"},{"key":"e_1_3_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025788"},{"key":"e_1_3_3_2_23_1","volume-title":"USENIX Security Symposium(SSYM\u00a0\u201921)","author":"Kaiser Ben","year":"2021","unstructured":"Ben Kaiser, Jerry Wei, Elena Lucherini, Kevin Lee, J.\u00a0Nathan Matias, and Jonathan Mayer. 2021. Adapting Security Warnings to Counter Online Disinformation. In USENIX Security Symposium(SSYM\u00a0\u201921). USENIX, Virtual Conference, 1163\u20131180."},{"key":"e_1_3_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481516"},{"key":"e_1_3_3_2_25_1","volume-title":"Biometric WebAuthn. In USENIX Security Symposium(SSYM\u00a0\u201921)","author":"Lassak Leona","year":"2021","unstructured":"Leona Lassak, Annika Hildebrandt, Maximilian Golla, and Blase Ur. 2021. \u201cIt\u2019s Stored, Hopefully, on an Encrypted Server\u201d: Mitigating Users\u2019 Misconceptions About FIDO2 Biometric WebAuthn. In USENIX Security Symposium(SSYM\u00a0\u201921). USENIX, Virtual Conference, 91\u2013108."},{"key":"e_1_3_3_2_26_1","volume-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Symposium on Network and Distributed System Security(NDSS\u00a0\u201919)","author":"Pochat Victor Le","year":"2019","unstructured":"Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Symposium on Network and Distributed System Security(NDSS\u00a0\u201919). ISOC, San Diego, California, USA."},{"key":"e_1_3_3_2_27_1","volume-title":"Phish in Sheep\u2019s Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. In USENIX Security Symposium(SSYM\u00a0\u201922)","author":"Lin Xu","year":"2022","unstructured":"Xu Lin, Panagiotis Ilia, Saumya Solanki, and Jason Polakis. 2022. Phish in Sheep\u2019s Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. In USENIX Security Symposium(SSYM\u00a0\u201922). USENIX, Boston, Massachusetts, USA, 1651\u20131668."},{"key":"e_1_3_3_2_28_1","unstructured":"LinkedIn Inc.2023. Security Footer Message in LinkedIn Emails. https:\/\/www.linkedin.com\/help\/linkedin\/answer\/a1339250 as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473040"},{"key":"e_1_3_3_2_30_1","volume-title":"How Administrators Configure Risk-based Authentication. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201922)","author":"Markert Philipp","year":"2022","unstructured":"Philipp Markert, Theodor Schnitzler, Maximilian Golla, and Markus D\u00fcrmuth. 2022. \u201cAs soon as it\u2019s a risk, I want to require MFA\u201d: How Administrators Configure Risk-based Authentication. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201922). USENIX, Boston, Massachusetts, USA, 483\u2013501."},{"key":"e_1_3_3_2_31_1","unstructured":"Meta Platforms Inc.2024. Get Alerts about Unrecognized Logins to Facebook. https:\/\/www.facebook.com\/help\/162968940433354 as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_32_1","unstructured":"Microsoft Corporation. 2024. What Happens If There\u2019s an Unusual Sign-in to Your Account. https:\/\/support.microsoft.com\/en-us\/account-billing\/what-happens-if-there-s-an-unusual-sign-in-to-your-account-eba43e04-d348-b914-1e95-fb5052d3d8f0 as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_33_1","volume-title":"Investigating Web Service Account Remediation Advice. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921)","author":"Neil Lorenzo","year":"2021","unstructured":"Lorenzo Neil, Elijah Bouma-Sims, Evan Lafontaine, Yasemin Acar, and Bradley Reaves. 2021. Investigating Web Service Account Remediation Advice. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921). USENIX, Virtual Conference, 359\u2013376."},{"key":"e_1_3_3_2_34_1","unstructured":"Netflix Inc.2023. I Received an Email Stating There Was a New Sign-in to My Account. https:\/\/help.netflix.com\/en\/node\/100775 as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_3_2_36_1","volume-title":"The Burden of Ending Online Account Sharing. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201920)","author":"Obada-Obieh Borke","year":"2020","unstructured":"Borke Obada-Obieh, Yue Huang, and Konstantin Beznosov. 2020. The Burden of Ending Online Account Sharing. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201920). ACM, Honolulu, Hawaii, USA, 503:1\u2013503:13."},{"key":"e_1_3_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00056"},{"key":"e_1_3_3_2_38_1","unstructured":"PayPal Inc.2023. PayPal Security Center: How to Identify Fake Messages. https:\/\/www.paypal.com\/us\/security\/learn-about-fake-messages as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300748"},{"key":"e_1_3_3_2_40_1","unstructured":"RedFox Community Member. 2022. Netflix Email Message: \u201cA new device is using your account\u201d. https:\/\/forum.redfox.bz\/threads\/netflix-email-message-a-new-device-is-using-your-account.86205\/ as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_41_1","volume-title":"Cross-Cultural Examination of Account Security Incident Response. In IEEE Symposium on Security and Privacy(SP\u00a0\u201919)","author":"Redmiles M.","year":"2019","unstructured":"Elissa\u00a0M. Redmiles. 2019. \u201cShould I Worry?\u201d A Cross-Cultural Examination of Account Security Incident Response. In IEEE Symposium on Security and Privacy(SP\u00a0\u201919). IEEE, San Francisco, California, USA, 920\u2013934."},{"key":"e_1_3_3_2_42_1","volume-title":"Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201917). USENIX","author":"Redmiles M.","unstructured":"Elissa\u00a0M. Redmiles, Everest Liu, and Michelle\u00a0L. Mazurek. 2017. You Want Me To Do What? A Design Study of Two-Factor Authentication Messages. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201917). USENIX, Santa Clara, California, USA, 1\u20135."},{"key":"e_1_3_3_2_43_1","volume-title":"USENIX Security Symposium(SSYM\u00a0\u201920)","author":"Redmiles M.","year":"2020","unstructured":"Elissa\u00a0M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle\u00a0L. Mazurek. 2020. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. In USENIX Security Symposium(SSYM\u00a0\u201920). USENIX, Virtual Conference, 89\u2013108."},{"key":"e_1_3_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_3_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681050"},{"key":"e_1_3_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.65"},{"key":"e_1_3_3_2_47_1","unstructured":"SECUSO Research Group KIT. 2022. How to Detect Fraudulent and Phishing Messages. https:\/\/secuso.aifb.kit.edu\/betr-nachrichten-flyer2EN as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.171.3972.701"},{"key":"e_1_3_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359185"},{"key":"e_1_3_3_2_50_1","volume-title":"Desktop Browser Market Share Worldwide \u2013","year":"2023","unstructured":"StatCounter. 2023. Desktop Browser Market Share Worldwide \u2013 June 2023. https:\/\/gs.statcounter.com\/browser-market-share\/desktop\/worldwide, as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_51_1","volume-title":"Desktop Operating System Market Share Worldwide \u2013","year":"2023","unstructured":"StatCounter. 2023. Desktop Operating System Market Share Worldwide \u2013 June 2023. https:\/\/gs.statcounter.com\/os-market-share\/desktop\/worldwide, as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_52_1","volume-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX Security Symposium(SSYM\u00a0\u201909)","author":"Sunshine Joshua","year":"2009","unstructured":"Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie\u00a0Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX Security Symposium(SSYM\u00a0\u201909). USENIX, San Diego, California, USA, 399\u2013416."},{"key":"e_1_3_3_2_53_1","volume-title":"USENIX Security Symposium(SSYM\u00a0\u201919)","author":"Thomas Kurt","year":"2019","unstructured":"Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick\u00a0Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, and Elie Bursztein. 2019. Protecting Accounts from Credential Stuffing with Password Breach Alerting. In USENIX Security Symposium(SSYM\u00a0\u201919). USENIX, Santa Clara, California, USA, 1556\u20131571."},{"key":"e_1_3_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022022106297301"},{"key":"e_1_3_3_2_55_1","volume-title":"Grounded Theory for Qualitative Research: A Practical Guide (1 ed.)","author":"Urquhart Cathy","unstructured":"Cathy Urquhart. 2013. Grounded Theory for Qualitative Research: A Practical Guide (1 ed.). SAGE Publications, Ltd., Thousand Oaks, California, USA."},{"key":"e_1_3_3_2_56_1","unstructured":"U.S. Census Bureau. 2023. U.S. and World Population Clock. https:\/\/www.census.gov\/popclock\/ as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.2466\/pms.1978.47.2.599"},{"key":"e_1_3_3_2_59_1","unstructured":"Meridel Walkington. 2019. Designing Better Security Warnings. https:\/\/blog.mozilla.org\/ux\/2019\/03\/designing-better-security-warnings\/ as of 2024\/03\/06 12:34:11."},{"key":"e_1_3_3_2_60_1","volume-title":"Workshop on Inclusive Privacy and Security(WIPS\u00a0\u201921)","author":"Walsh Kathryn","year":"2021","unstructured":"Kathryn Walsh, Faiza Tazi, Philipp Markert, and Sanchari Das. 2021. My Account Is Compromised \u2013 What Do I Do? Towards an Intercultural Analysis of Account Remediation for Websites. In Workshop on Inclusive Privacy and Security(WIPS\u00a0\u201921). SSRN Electronic Journal, Virtual Conference, 1\u20136."},{"key":"e_1_3_3_2_61_1","volume-title":"echnical Report RHUL\u2013ISG\u20132019\u20134","author":"Wardle David","unstructured":"David Wardle. 2019. How Long Does It Take To Get Owned?Technical Report RHUL\u2013ISG\u20132019\u20134. Royal Holloway University of London."},{"key":"e_1_3_3_2_62_1","volume-title":"An Empirical Study on Risk-Based Authentication Applied in the Wild. In International Conference on ICT Systems Security and Privacy Protection(IFIP\u00a0SEC\u00a0\u201919)","author":"Wiefling Stephan","year":"2019","unstructured":"Stephan Wiefling, Luigi\u00a0Lo Iacono, and Markus D\u00fcrmuth. 2019. Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. In International Conference on ICT Systems Security and Privacy Protection(IFIP\u00a0SEC\u00a0\u201919). IFIP, Lisbon, Portugal, 134\u2013148."},{"key":"e_1_3_3_2_63_1","volume-title":"Evaluation of Risk-based Re-Authentication Methods. In International Conference on ICT Systems Security and Privacy Protection(IFIP\u00a0SEC\u00a0\u201920)","author":"Wiefling Stephan","year":"2020","unstructured":"Stephan Wiefling, Tanvi Patil, Markus D\u00fcrmuth, and Luigi Lo\u00a0Iacono. 2020. Evaluation of Risk-based Re-Authentication Methods. In International Conference on ICT Systems Security and Privacy Protection(IFIP\u00a0SEC\u00a0\u201920). IFIP, Virtual Conference, 280\u2013294."},{"key":"e_1_3_3_2_64_1","volume-title":"Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201919)","author":"Zou Yixin","year":"2019","unstructured":"Yixin Zou, Shawn Danino, Kaiwen Sun, and Florian Schaub. 2019. You \u2018Might\u2019 Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201919). ACM, Glasgow, Scotland, United Kingdom, 194:1\u2013194:14."}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:30Z","timestamp":1750290270000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":63,"alternative-id":["10.1145\/3613904.3642823","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642823","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}