{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:57:57Z","timestamp":1732039077603},"reference-count":59,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,3,28]],"date-time":"2021-03-28T00:00:00Z","timestamp":1616889600000},"content-version":"am","delay-in-days":239,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001742","name":"United States-Israel Binational Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001742","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1016\/j.chb.2020.106347","type":"journal-article","created":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T01:22:31Z","timestamp":1585012951000},"page":"106347","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":62,"special_numbering":"C","title":["Nudge me right: Personalizing online security nudges to people's decision-making styles"],"prefix":"10.1016","volume":"109","author":[{"given":"Eyal","family":"Peer","sequence":"first","affiliation":[]},{"given":"Serge","family":"Egelman","sequence":"additional","affiliation":[]},{"given":"Marian","family":"Harbach","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Malkin","sequence":"additional","affiliation":[]},{"given":"Arunesh","family":"Mathur","sequence":"additional","affiliation":[]},{"given":"Alisa","family":"Frik","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.chb.2020.106347_bib1","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/3054926","article-title":"Nudges for privacy and security: Understanding and assisting users' choices online","volume":"50","author":"Acquisti","year":"2017","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.chb.2020.106347_bib2","series-title":"Presented as part of the 22nd {USENIX} security symposium ({USENIX} security 13)","first-page":"257","article-title":"Alice in warningland: A large-scale field study of browser security warning effectiveness","author":"Akhawe","year":"2013"},{"issue":"3","key":"10.1016\/j.chb.2020.106347_bib3","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1017\/S1930297500001455","article-title":"The decision making individual differences inventory and guidelines for the study of individual differences in judgment and decision-making research","volume":"6","author":"Appelt","year":"2011","journal-title":"Judgment and Decision Making"},{"key":"10.1016\/j.chb.2020.106347_bib4","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1146\/annurev-lawsocsci-102811-173815","article-title":"Behavioral ethics: Toward a deeper understanding of moral judgment and dishonesty","volume":"8","author":"Bazerman","year":"2012","journal-title":"Annual Review of Law and Social Science"},{"issue":"11\u201312","key":"10.1016\/j.chb.2020.106347_bib5","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.1016\/j.jpubeco.2011.05.004","article-title":"Give more tomorrow: Two field experiments on altruism and intertemporal choice","volume":"95","author":"Breman","year":"2011","journal-title":"Journal of Public Economics"},{"issue":"3","key":"10.1016\/j.chb.2020.106347_bib6","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1207\/s15327752jpa4803_13","article-title":"The efficient assessment of need for cognition","volume":"48","author":"Cacioppo","year":"1984","journal-title":"Journal of Personality Assessment"},{"issue":"4","key":"10.1016\/j.chb.2020.106347_bib7","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1037\/0022-3514.45.4.805","article-title":"Effects of need for cognition on message evaluation, recall, and persuasion","volume":"45","author":"Cacioppo","year":"1983","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.chb.2020.106347_bib8","series-title":"Nudging the financial market? A review of the nudge theory","author":"Cai","year":"2019"},{"issue":"1","key":"10.1016\/j.chb.2020.106347_bib9","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1509\/jppm.12.151","article-title":"Metric and scale design as choice architecture tools","volume":"33","author":"Camilleri","year":"2014","journal-title":"Journal of Public Policy and Marketing"},{"issue":"4","key":"10.1016\/j.chb.2020.106347_bib10","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1162\/qjec.2009.124.4.1639","article-title":"Optimal defaults and active decisions","volume":"124","author":"Carroll","year":"2009","journal-title":"Quarterly Journal of Economics"},{"issue":"2\u20133","key":"10.1016\/j.chb.2020.106347_bib11","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","article-title":"Personalization versus privacy: An empirical examination of the online consumer's dilemma","volume":"6","author":"Chellappa","year":"2005","journal-title":"Information Technology and Management"},{"key":"10.1016\/j.chb.2020.106347_bib12","first-page":"18642","article-title":"July). Nudge theory in information systems research A comprehensive systematic review of the literature","volume":"Vol. 2018","author":"Collier","year":"2018"},{"issue":"3","key":"10.1016\/j.chb.2020.106347_bib13","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1111\/jeea.12011","article-title":"Energy conservation \u201cnudges\u201d and environmentalist ideology: Evidence from a randomized residential electricity field experiment","volume":"11","author":"Costa","year":"2013","journal-title":"Journal of the European Economic Association"},{"issue":"1","key":"10.1016\/j.chb.2020.106347_bib14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.obhdp.2009.11.007","article-title":"What types of advice do decision-makers prefer?","volume":"112","author":"Dalal","year":"2010","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"10.1016\/j.chb.2020.106347_bib15","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.econedurev.2018.03.008","article-title":"Nudging in education","volume":"64","author":"Damgaard","year":"2018","journal-title":"Economics of Education Review"},{"key":"10.1016\/j.chb.2020.106347_bib16","series-title":"In Proc. 2015 new security paradigms workshop","article-title":"The myth of the average user: Improving privacy and security systems through individualization","author":"Egelman","year":"2015"},{"key":"10.1016\/j.chb.2020.106347_bib17","series-title":"Proc. SIGCHI conf. Human factors in computing systems","first-page":"2379","article-title":"Does my password go up to eleven?: The impact of password meters on password selection","author":"Egelman","year":"2013"},{"key":"10.1016\/j.chb.2020.106347_bib18","series-title":"Proceedings of the ninth symposium on useable privacy and security","first-page":"13","article-title":"On the ecological validity of a password study","author":"Fahl","year":"2013"},{"key":"10.1016\/j.chb.2020.106347_bib19","series-title":"Proceeding of the 2018 CHI confernece human factors in computing systems","first-page":"512","article-title":"An experience sampling study of user reactions to browser warnings in the field","author":"R","year":"2018"},{"key":"10.1016\/j.chb.2020.106347_bib20","series-title":"Proceedings of the 4th symposium on useable privacy and security","first-page":"1","article-title":"Improving text passwords through persuasion","author":"Forget","year":"2008"},{"issue":"12","key":"10.1016\/j.chb.2020.106347_bib21","first-page":"99","article-title":"Nudge your customers toward better choices","volume":"86","author":"Goldstein","year":"2008","journal-title":"Harvard Business Review"},{"issue":"1","key":"10.1016\/j.chb.2020.106347_bib22","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/joca.12114","article-title":"Behavioral interventions to increase tax\u2010time saving: Evidence from a national randomized trial","volume":"51","author":"Grinstein Weiss","year":"2017","journal-title":"Journal of Consumer Affairs"},{"key":"10.1016\/j.chb.2020.106347_bib23","series-title":"Inside the nudge unit: How small changes can make a big difference","author":"Halpern","year":"2016"},{"issue":"1","key":"10.1016\/j.chb.2020.106347_bib24","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1017\/S1867299X00005468","article-title":"The definition of nudge and libertarian paternalism: Does the hand fit the glove?","volume":"7","author":"Hansen","year":"2016","journal-title":"European Journal of Risk Regulation"},{"issue":"2","key":"10.1016\/j.chb.2020.106347_bib25","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1287\/mksc.1080.0459","article-title":"Website morphing","volume":"28","author":"Hauser","year":"2009","journal-title":"Marketing Science"},{"issue":"6","key":"10.1016\/j.chb.2020.106347_bib26","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1177\/0956797611436349","article-title":"Personalized persuasion: Tailoring persuasive appeals to recipients' personality traits","volume":"23","author":"Hirsh","year":"2012","journal-title":"Psychological Science"},{"key":"10.1016\/j.chb.2020.106347_bib27","series-title":"Nudging whom how: IT proficiency, impulse control and secure behavior. Personalizing behavior change technologies workshop, toronto, Canada","author":"Jeske","year":"2014"},{"key":"10.1016\/j.chb.2020.106347_bib28","unstructured":"Johnson, E. J., & Goldstein, D (2003). Do defaults save lives? Science, 302(5649), 1338-1339."},{"issue":"12","key":"10.1016\/j.chb.2020.106347_bib29","doi-asserted-by":"crossref","first-page":"3393","DOI":"10.1287\/mnsc.2015.2296","article-title":"Getting to the top of mind: How reminders increase saving","volume":"62","author":"Karlan","year":"2016","journal-title":"Management Science"},{"key":"10.1016\/j.chb.2020.106347_bib30","series-title":"Proceedings of the SIGCHI conference on human factors in computing systems","first-page":"2595","article-title":"Of passwords and people: Measuring the effect of password-composition policies","author":"Komanduri","year":"2011"},{"issue":"15","key":"10.1016\/j.chb.2020.106347_bib31","doi-asserted-by":"crossref","first-page":"5802","DOI":"10.1073\/pnas.1218772110","article-title":"Private traits and attributes are predictable from digital records of human behavior","volume":"110","author":"Kosinski","year":"2013","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"10.1016\/j.chb.2020.106347_bib32","series-title":"Personalized security messaging: Nudges for compliance with browser warnings","author":"Malkin","year":"2017"},{"issue":"48","key":"10.1016\/j.chb.2020.106347_bib33","doi-asserted-by":"crossref","first-page":"12714","DOI":"10.1073\/pnas.1710966114","article-title":"Psychological targeting as an effective approach to digital mass persuasion","volume":"114","author":"Matz","year":"2017","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"10.1016\/j.chb.2020.106347_bib34","series-title":"USENIX security symposium","first-page":"175","article-title":"Fast, lean, and accurate: Modeling password guessability using neural networks","author":"Melicher","year":"2016"},{"issue":"26","key":"10.1016\/j.chb.2020.106347_bib35","doi-asserted-by":"crossref","first-page":"10415","DOI":"10.1073\/pnas.1103170108","article-title":"Using implementation intentions prompts to enhance influenza vaccination rates","volume":"108","author":"Milkman","year":"2011","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"10.1016\/j.chb.2020.106347_bib36","series-title":"Scarcity: Why having too little means so much","author":"Mullainathan","year":"2013"},{"key":"10.1016\/j.chb.2020.106347_bib37","series-title":"Behavioural Insights and public policy: Lessons from around the world","author":"Organisation de Coop\u00e9ration","year":"2017"},{"issue":"4","key":"10.1016\/j.chb.2020.106347_bib38","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.3758\/s13428-013-0434-y","article-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk","volume":"46","author":"Peer","year":"2014","journal-title":"Behavior Research Methods"},{"issue":"5","key":"10.1016\/j.chb.2020.106347_bib39","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1467-9280.2006.01720.x","article-title":"Numeracy and decision making","volume":"17","author":"Peters","year":"2006","journal-title":"Psychological Science"},{"issue":"4","key":"10.1016\/j.chb.2020.106347_bib40","doi-asserted-by":"crossref","first-page":"437","DOI":"10.3102\/10769986031004437","article-title":"Computational tools for probing interactions in multiple linear regression, multilevel modeling, and latent curve analysis","volume":"31","author":"Preacher","year":"2006","journal-title":"Journal of Educational and Behavioral Statistics"},{"issue":"4","key":"10.1016\/j.chb.2020.106347_bib41","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1093\/medlaw\/fwt022","article-title":"Nudging for health: On public policy and designing choice architecture","volume":"21","author":"Quigley","year":"2013","journal-title":"Medical Law Review"},{"issue":"4","key":"10.1016\/j.chb.2020.106347_bib42","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1017\/S1930297500003740","article-title":"Do Europeans like nudges?","volume":"11","author":"Reisch","year":"2016","journal-title":"Judgment and Decision making"},{"issue":"2","key":"10.1016\/j.chb.2020.106347_bib43","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1017\/bpp.2018.3","article-title":"Nudging folks towards stronger password choices: Providing certainty is the key","volume":"3","author":"Renaud","year":"2019","journal-title":"Behavioural Public Policy"},{"issue":"6","key":"10.1016\/j.chb.2020.106347_bib44","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1037\/a0017327","article-title":"How numeracy influences risk comprehension and medical decision making","volume":"135","author":"Reyna","year":"2009","journal-title":"Psychological Bulletin"},{"issue":"5","key":"10.1016\/j.chb.2020.106347_bib45","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1177\/0013164495055005017","article-title":"Decision-making style: The development and assessment of a new measure","volume":"55","author":"Scott","year":"1995","journal-title":"Educational and Psychological Measurement"},{"key":"10.1016\/j.chb.2020.106347_bib46","series-title":"Proceedings of the eighth symposium on useable privacy and security","first-page":"7","article-title":"July). Correct horse battery staple: Exploring the usability of system-assigned passphrases","author":"Shay","year":"2012"},{"key":"10.1016\/j.chb.2020.106347_bib47","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.chb.2015.01.046","article-title":"Online safety begins with you and me: Convincing Internet users to protect themselves","volume":"48","author":"Shillair","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"10.1016\/j.chb.2020.106347_bib48","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1002\/(SICI)1099-0771(199612)9:4<283::AID-BDM241>3.0.CO;2-7","article-title":"Need for cognition and choice framing effects","volume":"9","author":"Smith","year":"1996","journal-title":"Journal of Behavioral Decision Making"},{"issue":"4","key":"10.1016\/j.chb.2020.106347_bib49","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1037\/0022-3514.66.4.742","article-title":"The consideration of future consequences: Weighing immediate and distant outcomes of behavior","volume":"66","author":"Strathman","year":"1994","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.chb.2020.106347_bib50","author":"Sunstein"},{"issue":"3","key":"10.1016\/j.chb.2020.106347_bib51","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1002\/bdm.2035","article-title":"A systematic scoping review of the choice architecture movement: Toward understanding when and why nudges work","volume":"31","author":"Szaszi","year":"2018","journal-title":"Journal of Behavioral Decision Making"},{"issue":"S1","key":"10.1016\/j.chb.2020.106347_bib52","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1086\/380085","article-title":"Save more tomorrow\u2122: Using behavioral economics to increase employee saving","volume":"112","author":"Thaler","year":"2004","journal-title":"Journal of Political Economy"},{"key":"10.1016\/j.chb.2020.106347_bib53","series-title":"Nudge: Improving Decisions about health, wealth and happiness","author":"Thaler","year":"2008"},{"key":"10.1016\/j.chb.2020.106347_bib55","series-title":"USENIX security symposium","first-page":"65","article-title":"How does your password measure up? The effect of strength meters on password creation","author":"Ur","year":"2012"},{"key":"10.1016\/j.chb.2020.106347_bib56","series-title":"2013 46th Hawaii international conference on system sciences","first-page":"2988","article-title":"Enhancing password security through interactive fear appeals: A web-based field experiment","author":"Vance","year":"2013"},{"issue":"1","key":"10.1016\/j.chb.2020.106347_bib57","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1509\/jppm.14.112","article-title":"Calorie label formats: Using numeric and traffic light calorie labels to reduce lunch calories","volume":"35","author":"VanEpps","year":"2016","journal-title":"Journal of Public Policy and Marketing"},{"issue":"5\/6","key":"10.1016\/j.chb.2020.106347_bib58","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1108\/03090560710737534","article-title":"What is personalization? A conceptual framework","volume":"41","author":"Vesanen","year":"2007","journal-title":"European Journal of Marketing"},{"key":"10.1016\/j.chb.2020.106347_bib59","series-title":"USENIX security symposium","first-page":"157","article-title":"zxcvbn: Low-Budget password strength estimation","author":"Wheeler","year":"2016"},{"issue":"6","key":"10.1016\/j.chb.2020.106347_bib60","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1016\/S0191-8869(97)00113-X","article-title":"Present time perspective as a predictor of risky driving","volume":"23","author":"Zimbardo","year":"1997","journal-title":"Personality and Individual Differences"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S074756322030100X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S074756322030100X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:45:43Z","timestamp":1695948343000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S074756322030100X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":59,"alternative-id":["S074756322030100X"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2020.106347","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2020,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Nudge me right: Personalizing online security nudges to people's decision-making styles","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2020.106347","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"106347"}}