{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T11:07:13Z","timestamp":1776424033397,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3791287","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T05:33:23Z","timestamp":1776058403000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Who am I Talking to? A Large-Scale Measurement of Surface Attribution Across Real-World Security and Privacy Interfaces"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8677-811X","authenticated-orcid":false,"given":"Marian","family":"Harbach","sequence":"first","affiliation":[{"name":"Google, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2132-7739","authenticated-orcid":false,"given":"Jessica","family":"Johnson","sequence":"additional","affiliation":[{"name":"Google, Mountain View, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","unstructured":"Douglas Bates Martin M\u00e4chler Ben Bolker and Steve Walker. 2015. Fitting Linear Mixed-Effects Models Using lme4. Journal of Statistical Software 67 1 (2015) 1\u201348. 10.18637\/jss.v067.i01","DOI":"10.18637\/jss.v067.i01"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-70536-5.50007-5"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860643-2\/50011-1"},{"key":"e_1_3_3_3_6_2","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. SoK: Still Plenty of Phish in the Sea \u2014 A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/franz"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_27"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/0470086106"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"crossref","unstructured":"Michal Kakol Radoslaw Nielek and Adam Wierzbicki. 2017. Understanding and predicting Web content credibility using the Content Credibility Corpus. Information Processing & Management 53 5 (2017). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306457316306471","DOI":"10.1016\/j.ipm.2017.04.003"},{"key":"e_1_3_3_3_10_2","unstructured":"Eric Lawrence. 2017. The Line of Death. https:\/\/textslashplain.com\/2017\/01\/14\/the-line-of-death\/. Last accessed: 2025-06-30."},{"key":"e_1_3_3_3_11_2","unstructured":"Jakob Nielsen. 1994. 10 Usability Heuristics for User Interface Design. https:\/\/www.nngroup.com\/articles\/ten-usability-heuristics\/. Last accessed: 2025-06-30."},{"key":"e_1_3_3_3_12_2","volume-title":"Mental Models","author":"Norman Donald\u00a0A.","year":"1983","unstructured":"Donald\u00a0A. Norman. 1983. Some Observations on Mental Models. In Mental Models, Dedre Gentner and Albert\u00a0L. Stevens (Eds.). Lawrence Erlbaum Associates."},{"key":"e_1_3_3_3_13_2","unstructured":"Michael\u00a0JD Powell et\u00a0al. 2009. The BOBYQA algorithm for bound constrained optimization without derivatives. Cambridge NA Report NA2009\/06 University of Cambridge Cambridge 26 (2009) 26\u201346."},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_27"},{"key":"e_1_3_3_3_15_2","unstructured":"Emily Stark. 2022. The death of the line of death. https:\/\/emilymstark.com\/2022\/12\/18\/death-to-the-line-of-death.html. Last accessed: 2025-06-30."},{"key":"e_1_3_3_3_16_2","unstructured":"Chromium Team. [n. d.]. Security Considerations for Browser UI. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/refs\/heads\/main\/docs\/security\/security-considerations-for-browser-ui.md. Last accessed: 2025-07-01."},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833869"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_3_3_19_2","series-title":"(GI \u201905)","volume-title":"Proceedings of the Graphics Interface Conference","author":"Whalen Tara","year":"2005","unstructured":"Tara Whalen and Kori\u00a0M. Inkpen. 2005. Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proceedings of the Graphics Interface Conference(GI \u201905)."},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","unstructured":"Maximiliane Windl Magdalena Schlegel and Sven Mayer. 2024. Exploring Users\u2019 Mental Models and Privacy Concerns During Interconnected Interactions. Proc. ACM Hum.-Comput. Interact. 8 MHCI Article 259 (Sept. 2024). 10.1145\/3676504","DOI":"10.1145\/3676504"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","unstructured":"Zishuang\u00a0(Eileen) Ye Sean Smith and Denise Anthony. 2005. Trusted paths for browsers. ACM Trans. Inf. Syst. Secur. 8 2 (May 2005) 153\u2013186. 10.1145\/1065545.1065546","DOI":"10.1145\/1065545.1065546"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3791287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T10:09:59Z","timestamp":1776420599000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3791287"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":21,"alternative-id":["10.1145\/3772318.3791287","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3791287","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}