{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:27:18Z","timestamp":1732040838991,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471860","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"324-339","source":"Crossref","is-referenced-by-count":11,"title":["Designing Media Provenance Indicators to Combat Fake Media"],"prefix":"10.1145","author":[{"given":"Imani N.","family":"Sherman","sequence":"first","affiliation":[{"name":"University of Florida, US"}]},{"given":"Jack W.","family":"Stokes","sequence":"additional","affiliation":[{"name":"Microsoft Research, US"}]},{"given":"Elissa M.","family":"Redmiles","sequence":"additional","affiliation":[{"name":"Microsoft Research & Max Planck Institute for Software Systems, US, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65"},{"key":"e_1_3_2_1_2_1","unstructured":"Adobe. 2019. Introducing the Content Authenticity Initiative. https:\/\/theblog.adobe.com\/content-authenticity-initiative\/. Adobe. 2019. Introducing the Content Authenticity Initiative. https:\/\/theblog.adobe.com\/content-authenticity-initiative\/."},{"key":"e_1_3_2_1_3_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Akhawe Devdatta","year":"2013","unstructured":"Devdatta Akhawe and Adrienne\u00a0Porter Felt . 2013 . Alice in warningland: A large-scale field study of browser security warning effectiveness . In 22nd USENIX Security Symposium (USENIX Security 13) . 257\u2013272. Devdatta Akhawe and Adrienne\u00a0Porter Felt. 2013. Alice in warningland: A large-scale field study of browser security warning effectiveness. In 22nd USENIX Security Symposium (USENIX Security 13). 257\u2013272."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637751.2018.1521984"},{"key":"e_1_3_2_1_6_1","unstructured":"Amber. 2019. Instilling Trust into Video. https:\/\/app.ambervideo.co\/. Amber. 2019. Instilling Trust into Video. https:\/\/app.ambervideo.co\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Janna Anderson and Lee Rainie. 2017. The Future of Truth and Misinformation Online. Janna Anderson and Lee Rainie. 2017. The Future of Truth and Misinformation Online."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/opo.12131"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the International Broadcasting Convention (IBC).","author":"Aythora J.","year":"2020","unstructured":"J. Aythora , Rebecca Burke-Ag\u00fcero , Amaury Chamayou , Sylvan Clebsch , Manuel Costa , John Deutscher , N. Earnshaw , L. Ellis , Paul England , Cedric Fournet , Matt Gaylor , C. Halford , Eric Horvitz , Andrew Jenks , Kevin Kane , M. Lavallee , S. Lowenstein , B. MacCormack , Henrique\u00a0 S. Malvar , S. O\u2019Brien , J. Parnall , Elissa\u00a0 M. Redmiles , Alex Shamis , Isha Sharma , Jack\u00a0 W. Stokes , Sam Wenker , , and Anika Zaman . 2020 . Multi-Stakeholder Media Provenance Management to Counter Synthetic Media Risks in News Publishing . In Proceedings of the International Broadcasting Convention (IBC). J. Aythora, Rebecca Burke-Ag\u00fcero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, N. Earnshaw, L. Ellis, Paul England, Cedric Fournet, Matt Gaylor, C. Halford, Eric Horvitz, Andrew Jenks, Kevin Kane, M. Lavallee, S. Lowenstein, B. MacCormack, Henrique\u00a0S. Malvar, S. O\u2019Brien, J. Parnall, Elissa\u00a0M. Redmiles, Alex Shamis, Isha Sharma, Jack\u00a0W. Stokes, Sam Wenker, , and Anika Zaman. 2020. Multi-Stakeholder Media Provenance Management to Counter Synthetic Media Risks in News Publishing. In Proceedings of the International Broadcasting Convention (IBC)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287581"},{"key":"e_1_3_2_1_11_1","volume-title":"Trusted News Initiative (TNI) steps up global fight against disinformation with new focus on US presidential election. https:\/\/www.bbc.co.uk\/mediacentre\/latestnews\/2020\/trusted-news-initiative. BBC","author":"BBC.","year":"2020","unstructured":"BBC. 2020. Trusted News Initiative (TNI) steps up global fight against disinformation with new focus on US presidential election. https:\/\/www.bbc.co.uk\/mediacentre\/latestnews\/2020\/trusted-news-initiative. BBC ( 2020 ). ( Accessed on 09\/13\/2020). BBC. 2020. Trusted News Initiative (TNI) steps up global fight against disinformation with new focus on US presidential election. https:\/\/www.bbc.co.uk\/mediacentre\/latestnews\/2020\/trusted-news-initiative. BBC (2020). (Accessed on 09\/13\/2020)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3185370"},{"key":"e_1_3_2_1_13_1","volume-title":"See something, say something: Correction of global health misinformation on social media. Health communication 33, 9","author":"Bode Leticia","year":"2018","unstructured":"Leticia Bode and Emily\u00a0 K Vraga . 2018. See something, say something: Correction of global health misinformation on social media. Health communication 33, 9 ( 2018 ), 1131\u20131140. Leticia Bode and Emily\u00a0K Vraga. 2018. See something, say something: Correction of global health misinformation on social media. Health communication 33, 9 (2018), 1131\u20131140."},{"key":"e_1_3_2_1_14_1","volume-title":"A method of analysing interview transcripts in qualitative research. Nurse education today 11, 6","author":"Burnard Philip","year":"1991","unstructured":"Philip Burnard . 1991. A method of analysing interview transcripts in qualitative research. Nurse education today 11, 6 ( 1991 ), 461\u2013466. Philip Burnard. 1991. A method of analysing interview transcripts in qualitative research. Nurse education today 11, 6 (1991), 461\u2013466."},{"key":"e_1_3_2_1_15_1","volume-title":"Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. https:\/\/ssrn.com\/abstract=3213954. 107 California Law Review 1753(2019).","author":"Chesney Robert","year":"2019","unstructured":"Robert Chesney and Danielle\u00a0Keats Citron . 2019 . Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. https:\/\/ssrn.com\/abstract=3213954. 107 California Law Review 1753(2019). Robert Chesney and Danielle\u00a0Keats Citron. 2019. Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. https:\/\/ssrn.com\/abstract=3213954. 107 California Law Review 1753(2019)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-019-09533-0"},{"key":"e_1_3_2_1_18_1","article-title":"Emphasizing publishers does not effectively reduce susceptibility to misinformation on social media","volume":"1","author":"Dias Nicholas","year":"2020","unstructured":"Nicholas Dias , Gordon Pennycook , and David\u00a0 G Rand . 2020 . Emphasizing publishers does not effectively reduce susceptibility to misinformation on social media . Harvard Kennedy School Misinformation Review 1 , 1 (2020). Nicholas Dias, Gordon Pennycook, and David\u00a0G Rand. 2020. Emphasizing publishers does not effectively reduce susceptibility to misinformation on social media. Harvard Kennedy School Misinformation Review 1, 1 (2020).","journal-title":"Harvard Kennedy School Misinformation Review"},{"key":"e_1_3_2_1_19_1","unstructured":"Brian Dolhansky Joanna Bitton Ben Pflaum Jikuo Lu Russ Howes Menglin Wang and Cristian\u00a0Canton Ferrer. 2020. The DeepFake Detection Challenge Dataset. arxiv:2006.07397\u00a0[cs.CV] Brian Dolhansky Joanna Bitton Ben Pflaum Jikuo Lu Russ Howes Menglin Wang and Cristian\u00a0Canton Ferrer. 2020. The DeepFake Detection Challenge Dataset. arxiv:2006.07397\u00a0[cs.CV]"},{"key":"e_1_3_2_1_20_1","volume-title":"Too good to be true, too good not to share: the social utility of fake news. Information","author":"Duffy Andrew","year":"2019","unstructured":"Andrew Duffy , Edson Tandoc , and Rich Ling . 2019. Too good to be true, too good not to share: the social utility of fake news. Information , Communication & Society( 2019 ), 1\u201315. Andrew Duffy, Edson Tandoc, and Rich Ling. 2019. Too good to be true, too good not to share: the social utility of fake news. Information, Communication & Society(2019), 1\u201315."},{"key":"e_1_3_2_1_21_1","volume-title":"Explicit warnings reduce but do not eliminate the continued influence of misinformation. Memory & cognition 38, 8","author":"Ecker KH","year":"2010","unstructured":"Ullrich\u00a0 KH Ecker , Stephan Lewandowsky , and David\u00a0 TW Tang . 2010. Explicit warnings reduce but do not eliminate the continued influence of misinformation. Memory & cognition 38, 8 ( 2010 ), 1087\u20131100. Ullrich\u00a0KH Ecker, Stephan Lewandowsky, and David\u00a0TW Tang. 2010. Explicit warnings reduce but do not eliminate the continued influence of misinformation. Memory & cognition 38, 8 (2010), 1087\u20131100."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077699019864680"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_24_1","volume-title":"AMP: Authentication of Media via Provenance. arxiv:2001.07886\u00a0[cs.MM]","author":"England Paul","year":"2020","unstructured":"Paul England , Henrique\u00a0 S. Malvar , Eric Horvitz , Jack\u00a0 W. Stokes , C\u00e9dric Fournet , Rebecca Burke-Aguero , Amaury Chamayou , Sylvan Clebsch , Manuel Costa , John Deutscher , Shabnam Erfani , Matt Gaylor , Andrew Jenks , Kevin Kane , Elissa Redmiles , Alex Shamis , Isha Sharma , Sam Wenker , and Anika Zaman . 2020 . AMP: Authentication of Media via Provenance. arxiv:2001.07886\u00a0[cs.MM] Paul England, Henrique\u00a0S. Malvar, Eric Horvitz, Jack\u00a0W. Stokes, C\u00e9dric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa Redmiles, Alex Shamis, Isha Sharma, Sam Wenker, and Anika Zaman. 2020. AMP: Authentication of Media via Provenance. arxiv:2001.07886\u00a0[cs.MM]"},{"key":"e_1_3_2_1_25_1","unstructured":"Excalidraw. 2020. Excalidraw. https:\/\/github.com\/excalidraw\/excalidraw Excalidraw. 2020. Excalidraw. https:\/\/github.com\/excalidraw\/excalidraw"},{"key":"e_1_3_2_1_26_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Felt Adrienne\u00a0Porter","year":"2016","unstructured":"Adrienne\u00a0Porter Felt , Robert\u00a0 W Reeder , Alex Ainslie , Helen Harris , Max Walker , Christopher Thompson , Mustafa\u00a0Embre Acer , Elisabeth Morant , and Sunny Consolvo . 2016 . Rethinking connection security indicators . In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 1\u201314. Adrienne\u00a0Porter Felt, Robert\u00a0W Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa\u00a0Embre Acer, Elisabeth Morant, and Sunny Consolvo. 2016. Rethinking connection security indicators. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 1\u201314."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557292"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173950"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/997078.997097"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441895"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376784"},{"key":"e_1_3_2_1_32_1","volume-title":"Generative Adversarial Nets. In Conference on Neural Information Processing Systems (NIPS).","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , , and Aaron Courville\u00a0Yoshua Bengio . 2014 . Generative Adversarial Nets. In Conference on Neural Information Processing Systems (NIPS). Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, , and Aaron Courville\u00a0Yoshua Bengio. 2014. Generative Adversarial Nets. In Conference on Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3299046"},{"key":"e_1_3_2_1_34_1","unstructured":"Andrew Guess and Alexander Coppock. 2018. Does counter-attitudinal information cause backlash? Results from three large survey experiments. British Journal of Political Science(2018) 1\u201319. Andrew Guess and Alexander Coppock. 2018. Does counter-attitudinal information cause backlash? Results from three large survey experiments. British Journal of Political Science(2018) 1\u201319."},{"key":"e_1_3_2_1_35_1","volume-title":"Less than you think: Prevalence and predictors of fake news dissemination on Facebook. Science Advances 5, 1","author":"Guess Andrew","year":"2019","unstructured":"Andrew Guess , Jonathan Nagler , and Joshua Tucker . 2019. Less than you think: Prevalence and predictors of fake news dissemination on Facebook. Science Advances 5, 1 ( 2019 ), eaau4586. Andrew Guess, Jonathan Nagler, and Joshua Tucker. 2019. Less than you think: Prevalence and predictors of fake news dissemination on Facebook. Science Advances 5, 1 (2019), eaau4586."},{"key":"e_1_3_2_1_36_1","volume-title":"Disputed by multiple fact-checkers\u2019: Facebook rolls out new alert to combat fake news. The Guardian","author":"Hunt Elle","year":"2017","unstructured":"Elle Hunt . 2017. Disputed by multiple fact-checkers\u2019: Facebook rolls out new alert to combat fake news. The Guardian ( 2017 ). Elle Hunt. 2017. Disputed by multiple fact-checkers\u2019: Facebook rolls out new alert to combat fake news. The Guardian (2017)."},{"key":"e_1_3_2_1_37_1","volume-title":"FADE: Detecting Fake News Articles on the Web.","author":"Jabiyev Bahruz","year":"2021","unstructured":"Bahruz Jabiyev , Sinan Pehlivanoglu , Kaan Onarlioglu , and Engin Kirda . 2021 . FADE: Detecting Fake News Articles on the Web. (2021). Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, and Engin Kirda. 2021. FADE: Detecting Fake News Articles on the Web. (2021)."},{"key":"e_1_3_2_1_38_1","unstructured":"Dia Kayyali. 2017. ProofMode - Verified Visuals Enabled!https:\/\/blog.witness.org\/2017\/04\/proofmode-helping-prove-human-rights-abuses-world\/. Dia Kayyali. 2017. ProofMode - Verified Visuals Enabled!https:\/\/blog.witness.org\/2017\/04\/proofmode-helping-prove-human-rights-abuses-world\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Sasha Koren. 2019. Introducing the News Provenance Project. Times Open July 23(2019). Sasha Koren. 2019. Introducing the News Provenance Project. Times Open July 23(2019)."},{"key":"e_1_3_2_1_40_1","volume-title":"An application of hierarchical kappa-type statistics in the assessment of majority agreement among multiple observers. Biometrics","author":"Landis J\u00a0Richard","year":"1977","unstructured":"J\u00a0Richard Landis and Gary\u00a0 G Koch . 1977. An application of hierarchical kappa-type statistics in the assessment of majority agreement among multiple observers. Biometrics ( 1977 ), 363\u2013374. J\u00a0Richard Landis and Gary\u00a0G Koch. 1977. An application of hierarchical kappa-type statistics in the assessment of majority agreement among multiple observers. Biometrics (1977), 363\u2013374."},{"key":"e_1_3_2_1_41_1","volume-title":"The science of fake news. Science 359, 6380","author":"Lazer MJ","year":"2018","unstructured":"David\u00a0 MJ Lazer , Matthew\u00a0 A Baum , Yochai Benkler , Adam\u00a0 J Berinsky , Kelly\u00a0 M Greenhill , Filippo Menczer , Miriam\u00a0 J Metzger , Brendan Nyhan , Gordon Pennycook , David Rothschild , 2018. The science of fake news. Science 359, 6380 ( 2018 ), 1094\u20131096. David\u00a0MJ Lazer, Matthew\u00a0A Baum, Yochai Benkler, Adam\u00a0J Berinsky, Kelly\u00a0M Greenhill, Filippo Menczer, Miriam\u00a0J Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, 2018. The science of fake news. Science 359, 6380 (2018), 1094\u20131096."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/10410236.2012.700391"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/1529100612451018"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"e_1_3_2_1_45_1","volume-title":"Content analysis in mass communication: Assessment and reporting of intercoder reliability. Human communication research 28, 4","author":"Lombard Matthew","year":"2002","unstructured":"Matthew Lombard , Jennifer Snyder-Duch , and Cheryl\u00a0Campanella Bracken . 2002. Content analysis in mass communication: Assessment and reporting of intercoder reliability. Human communication research 28, 4 ( 2002 ), 587\u2013604. Matthew Lombard, Jennifer Snyder-Duch, and Cheryl\u00a0Campanella Bracken. 2002. Content analysis in mass communication: Assessment and reporting of intercoder reliability. Human communication research 28, 4 (2002), 587\u2013604."},{"key":"e_1_3_2_1_46_1","volume-title":"Replacing Disputed Flags With Related Articles. Facebook Blog","author":"Lyons Tessa","year":"2017","unstructured":"Tessa Lyons . 2017. Replacing Disputed Flags With Related Articles. Facebook Blog ( 2017 ). Tessa Lyons. 2017. Replacing Disputed Flags With Related Articles. Facebook Blog (2017)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Alice Marwick Claire Fontaine and Danah Boyd. 2017. \u201cNobody sees it nobody gets mad\u201d: Social media privacy and personal responsibility among low-SES youth. Social Media+ Society 3 2 (2017) 2056305117710455. Alice Marwick Claire Fontaine and Danah Boyd. 2017. \u201cNobody sees it nobody gets mad\u201d: Social media privacy and personal responsibility among low-SES youth. Social Media+ Society 3 2 (2017) 2056305117710455.","DOI":"10.1177\/2056305117710455"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_1_49_1","unstructured":"Sarah Mervosh. 2019. Distorted Videos of Nancy Pelosi Spread on Facebook and Twitter Helped by Trump. https:\/\/www.nytimes.com\/2019\/05\/24\/us\/politics\/pelosi-doctored-video.html. Sarah Mervosh. 2019. Distorted Videos of Nancy Pelosi Spread on Facebook and Twitter Helped by Trump. https:\/\/www.nytimes.com\/2019\/05\/24\/us\/politics\/pelosi-doctored-video.html."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2010.01488.x"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145274"},{"key":"e_1_3_2_1_52_1","unstructured":"Lily\u00a0Hay Newman. 2019. A New Tool Protects Videos from Deepfakes and Tampering. https:\/\/www.wired.com\/story\/amber-authenticate-video-validation-blockchain-tampering-deepfakes\/. Lily\u00a0Hay Newman. 2019. A New Tool Protects Videos from Deepfakes and Tampering. https:\/\/www.wired.com\/story\/amber-authenticate-video-validation-blockchain-tampering-deepfakes\/."},{"key":"e_1_3_2_1_53_1","unstructured":"Chris Nodder. 2005. Users and trust: A microsoft case study. Security and Usability(2005) 589\u2013606. Chris Nodder. 2005. Users and trust: A microsoft case study. Security and Usability(2005) 589\u2013606."},{"key":"e_1_3_2_1_54_1","volume-title":"Taking fact-checks literally but not seriously? The effects of journalistic fact-checking on factual beliefs and candidate favorability. Political Behavior","author":"Nyhan Brendan","year":"2019","unstructured":"Brendan Nyhan , Ethan Porter , Jason Reifler , and Thomas\u00a0 J Wood . 2019. Taking fact-checks literally but not seriously? The effects of journalistic fact-checking on factual beliefs and candidate favorability. Political Behavior ( 2019 ), 1\u201322. Brendan Nyhan, Ethan Porter, Jason Reifler, and Thomas\u00a0J Wood. 2019. Taking fact-checks literally but not seriously? The effects of journalistic fact-checking on factual beliefs and candidate favorability. Political Behavior (2019), 1\u201322."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.288"},{"key":"e_1_3_2_1_56_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer , Joachim Vosgerau , and Alessandro Acquisti . 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 ( 2014 ), 1023\u20131031. Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023\u20131031."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1017\/XPS.2017.32"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649\u20131658","author":"Portnoff S","year":"2015","unstructured":"Rebecca\u00a0 S Portnoff , Linda\u00a0 N Lee , Serge Egelman , Pratyush Mishra , Derek Leung , and David Wagner . 2015 . Somebody\u2019s watching me? assessing the effectiveness of webcam indicator lights . In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649\u20131658 . Rebecca\u00a0S Portnoff, Linda\u00a0N Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody\u2019s watching me? assessing the effectiveness of webcam indicator lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649\u20131658."},{"key":"e_1_3_2_1_59_1","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2013","unstructured":"R Core Team . 2013 . R: A Language and Environment for Statistical Computing . R Foundation for Statistical Computing , Vienna, Austria . http:\/\/www.R-project.org\/ R Core Team. 2013. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. http:\/\/www.R-project.org\/"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_61_1","unstructured":"Elissa\u00a0M Redmiles Everest Liu and Michelle\u00a0L Mazurek. 2017. You Want Me To Do What? A Design Study of Two-Factor Authentication Messages.. In SOUPS. Elissa\u00a0M Redmiles Everest Liu and Michelle\u00a0L Mazurek. 2017. You Want Me To Do What? A Design Study of Two-Factor Authentication Messages.. In SOUPS."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363188"},{"key":"e_1_3_2_1_64_1","unstructured":"Bj\u00f6rn Ross Anna Jung Jennifer Heisel and Stefan Stieglitz. 2018. Fake news on social media: The (in) effectiveness of warning messages. (2018). Bj\u00f6rn Ross Anna Jung Jennifer Heisel and Stefan Stieglitz. 2018. Fake news on social media: The (in) effectiveness of warning messages. (2018)."},{"key":"e_1_3_2_1_65_1","volume-title":"Updating our approach to misleading information. Twitter Blog","author":"Roth Yoel","year":"2020","unstructured":"Yoel Roth and Nick Pickles . 2020. Updating our approach to misleading information. Twitter Blog ( 2020 ). Yoel Roth and Nick Pickles. 2020. Updating our approach to misleading information. Twitter Blog (2020)."},{"key":"e_1_3_2_1_66_1","volume-title":"Real qualitative researchers do not count: The use of numbers in qualitative research. Research in nursing & health 24, 3","author":"Sandelowski Margarete","year":"2001","unstructured":"Margarete Sandelowski . 2001. Real qualitative researchers do not count: The use of numbers in qualitative research. Research in nursing & health 24, 3 ( 2001 ), 230\u2013240. Margarete Sandelowski. 2001. Real qualitative researchers do not count: The use of numbers in qualitative research. Research in nursing & health 24, 3 (2001), 230\u2013240."},{"key":"e_1_3_2_1_67_1","first-page":"7","article-title":"Multiple views of participatory design","volume":"8","author":"Sanoff Henry","year":"2011","unstructured":"Henry Sanoff . 2011 . Multiple views of participatory design . Focus 8 , 1 (2011), 7 . Henry Sanoff. 2011. Multiple views of participatory design. Focus 8, 1 (2011), 7.","journal-title":"Focus"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00077"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326012"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24286"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.017"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"D Sterret Dan Malato Jennifer Benz Liz Kantor Trevor Tompson Tom Rosenstiel Jeff Sonderman Kevin Loker and Emily Swanson. 2018. Who shared it?: How Americans decide what news to trust on social media. D Sterret Dan Malato Jennifer Benz Liz Kantor Trevor Tompson Tom Rosenstiel Jeff Sonderman Kevin Loker and Emily Swanson. 2018. Who shared it?: How Americans decide what news to trust on social media.","DOI":"10.1080\/21670811.2019.1623702"},{"key":"e_1_3_2_1_75_1","volume-title":"Adventures in Authentication Workshop.","author":"Stojmenovi\u0107 Milica","year":"2018","unstructured":"Milica Stojmenovi\u0107 and Robert Biddle . 2018 . Who are They? Website Authentication: Certificates and Identity. In Who are you? Adventures in Authentication Workshop. Milica Stojmenovi\u0107 and Robert Biddle. 2018. Who are They? Website Authentication: Certificates and Identity. In Who are you? Adventures in Authentication Workshop."},{"volume-title":"The MAIN model: A heuristic approach to understanding technology effects on credibility","author":"Sundar S\u00a0Shyam","key":"e_1_3_2_1_76_1","unstructured":"S\u00a0Shyam Sundar . 2008. The MAIN model: A heuristic approach to understanding technology effects on credibility . MacArthur Foundation Digital Media and Learning Initiative . S\u00a0Shyam Sundar. 2008. The MAIN model: A heuristic approach to understanding technology effects on credibility. MacArthur Foundation Digital Media and Learning Initiative."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2017.1423237"},{"volume-title":"Proc. Computer Vision and Pattern Recognition (CVPR), IEEE.","author":"Thies J.","key":"e_1_3_2_1_78_1","unstructured":"J. Thies , M. Zollh\u00f6fer , M. Stamminger , C. Theobalt , and M. Nie\u00dfner . 2016. Face2Face: Real-time Face Capture and Reenactment of RGB Videos . In Proc. Computer Vision and Pattern Recognition (CVPR), IEEE. J. Thies, M. Zollh\u00f6fer, M. Stamminger, C. Theobalt, and M. Nie\u00dfner. 2016. Face2Face: Real-time Face Capture and Reenactment of RGB Videos. In Proc. Computer Vision and Pattern Recognition (CVPR), IEEE."},{"key":"e_1_3_2_1_79_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Thompson Christopher","year":"2019","unstructured":"Christopher Thompson , Martin Shelton , Emily Stark , Maximilian Walker , Emily Schechter , and Adrienne\u00a0Porter Felt . 2019 . The web\u2019s identity crisis: understanding the effectiveness of website identity indicators . In 28th USENIX Security Symposium (USENIX Security 19) . 1715\u20131732. Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne\u00a0Porter Felt. 2019. The web\u2019s identity crisis: understanding the effectiveness of website identity indicators. In 28th USENIX Security Symposium (USENIX Security 19). 1715\u20131732."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2019.1623701"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2019.1653208"},{"key":"e_1_3_2_1_82_1","volume-title":"Slate\u2019s Chrome extension helps identify fake news on Facebook \u2014 and lets readers flag it themselves. Nieman Lab","author":"Wang Shan","year":"2016","unstructured":"Shan Wang . 2016. Slate\u2019s Chrome extension helps identify fake news on Facebook \u2014 and lets readers flag it themselves. Nieman Lab ( 2016 ). Shan Wang. 2016. Slate\u2019s Chrome extension helps identify fake news on Facebook \u2014 and lets readers flag it themselves. Nieman Lab (2016)."},{"key":"e_1_3_2_1_83_1","unstructured":"H Wasserman and D Madrid-Morales. 2018. New data suggests African audiences see significantly more misinformation than Americans do. H Wasserman and D Madrid-Morales. 2018. New data suggests African audiences see significantly more misinformation than Americans do."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1080\/23743670.2019.1627230"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1282"},{"key":"e_1_3_2_1_86_1","volume-title":"Research-based guidelines for warning design and evaluation. Applied ergonomics 33, 3","author":"Wogalter S","year":"2002","unstructured":"Michael\u00a0 S Wogalter , Vincent\u00a0 C Conzola , and Tonya\u00a0 L Smith-Jackson . 2002. Research-based guidelines for warning design and evaluation. Applied ergonomics 33, 3 ( 2002 ), 219\u2013230. Michael\u00a0S Wogalter, Vincent\u00a0C Conzola, and Tonya\u00a0L Smith-Jackson. 2002. Research-based guidelines for warning design and evaluation. Applied ergonomics 33, 3 (2002), 219\u2013230."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-018-9443-y"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186088"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376213"},{"key":"e_1_3_2_1_90_1","unstructured":"Der-Yeuan Yu Elizabeth Stobert David Basin and Srdjan Capkun. 2016. Exploring website location as a security indicator. arXiv preprint arXiv:1610.03647(2016). Der-Yeuan Yu Elizabeth Stobert David Basin and Srdjan Capkun. 2016. Exploring website location as a security indicator. arXiv preprint arXiv:1610.03647(2016)."},{"key":"e_1_3_2_1_91_1","unstructured":"Stella Zaryan. 2017. Truth and Trust: How audiences are making sense of Fake News. (2017). Stella Zaryan. 2017. Truth and Trust: How audiences are making sense of Fake News. (2017)."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188731"}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '21","location":"San Sebastian Spain"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T11:32:28Z","timestamp":1665055948000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":92,"alternative-id":["10.1145\/3471621.3471860","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471860","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}