{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:13:01Z","timestamp":1729631581018,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1704087"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","award":["1212897202397420"],"id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,29]]},"DOI":"10.1145\/3491102.3502009","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T16:34:58Z","timestamp":1651163698000},"page":"1-17","source":"Crossref","is-referenced-by-count":9,"title":["To Self-Persuade or be Persuaded: Examining Interventions for Users\u2019 Privacy Setting Selection"],"prefix":"10.1145","author":[{"given":"Isadora","family":"Krsek","sequence":"first","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]},{"given":"Kimi","family":"Wenzel","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]},{"given":"Sauvik","family":"Das","sequence":"additional","affiliation":[{"name":"School of Interactive Computing, Georgia Institute of Technology, United States"}]},{"given":"Jason I.","family":"Hong","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]},{"given":"Laura","family":"Dabbish","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"volume-title":"Privacy and human behavior in the age of information. Science 347, 6221","year":"2015","author":"Acquisti Alessandro","key":"e_1_3_2_1_2_1","unstructured":"Alessandro Acquisti , Laura Brandimarte , and George Loewenstein . 2015. Privacy and human behavior in the age of information. Science 347, 6221 ( 2015 ), 509\u2013514. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509\u2013514."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"volume-title":"The power of self-persuasion.American Psychologist 54, 11","year":"1999","author":"Aronson Elliot","key":"e_1_3_2_1_4_1","unstructured":"Elliot Aronson . 1999. The power of self-persuasion.American Psychologist 54, 11 ( 1999 ), 875. Elliot Aronson. 1999. The power of self-persuasion.American Psychologist 54, 11 (1999), 875."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1097\/SLA.0b013e318207a789"},{"volume-title":"Examining causal components and a mediating process underlying self-generated health arguments for exercise and smoking cessation.Health Psychology 32, 12","year":"2013","author":"Baldwin S","key":"e_1_3_2_1_6_1","unstructured":"Austin\u00a0 S Baldwin , Alexander\u00a0 J Rothman , Mark\u00a0 W Vander\u00a0Weg , and Alan\u00a0 J Christensen . 2013. Examining causal components and a mediating process underlying self-generated health arguments for exercise and smoking cessation.Health Psychology 32, 12 ( 2013 ), 1209. Austin\u00a0S Baldwin, Alexander\u00a0J Rothman, Mark\u00a0W Vander\u00a0Weg, and Alan\u00a0J Christensen. 2013. Examining causal components and a mediating process underlying self-generated health arguments for exercise and smoking cessation.Health Psychology 32, 12 (2013), 1209."},{"key":"e_1_3_2_1_7_1","unstructured":"Heenkenda Mudiyanselage Ruwan\u00a0Jayawickrama Bandara Mario Fernando and Md\u00a0Shahriar Akter. 2018. Is the privacy paradox a matter of psychological distance? An exploratory study of the privacy paradox from a construal level theory perspective. (2018). Heenkenda Mudiyanselage Ruwan\u00a0Jayawickrama Bandara Mario Fernando and Md\u00a0Shahriar Akter. 2018. Is the privacy paradox a matter of psychological distance? An exploratory study of the privacy paradox from a construal level theory perspective. (2018)."},{"volume-title":"You Should Go Check Facebook\u2019s New Privacy Settings. Wired","year":"2016","author":"Barrett Brian","key":"e_1_3_2_1_8_1","unstructured":"Brian Barrett . 2016. You Should Go Check Facebook\u2019s New Privacy Settings. Wired ( 2016 ). https:\/\/www.wired.com\/2016\/06\/go-check-facebooks-new-privacy-settings\/ Brian Barrett. 2016. You Should Go Check Facebook\u2019s New Privacy Settings. Wired (2016). https:\/\/www.wired.com\/2016\/06\/go-check-facebooks-new-privacy-settings\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i01"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"volume-title":"Self-persuasion as marketing technique: the role of consumers","year":"2017","author":"Bernritter F","key":"e_1_3_2_1_11_1","unstructured":"Stefan\u00a0 F Bernritter , Iris van Ooijen , and Barbara\u00a0 CN M\u00fcller . 2017. Self-persuasion as marketing technique: the role of consumers \u2019 involvement. European Journal of Marketing( 2017 ). Stefan\u00a0F Bernritter, Iris van Ooijen, and Barbara\u00a0CN M\u00fcller. 2017. Self-persuasion as marketing technique: the role of consumers\u2019 involvement. European Journal of Marketing(2017)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"volume-title":"Price of Facebook Privacy? Start Clicking. New York Times CLIX, 55039","year":"2010","author":"Bilton Nick","key":"e_1_3_2_1_13_1","unstructured":"Nick Bilton . 2010. Price of Facebook Privacy? Start Clicking. New York Times CLIX, 55039 ( 2010 ), B8 N. https:\/\/www.nytimes.com\/2010\/05\/13\/technology\/personaltech\/13basics.html?referer= Nick Bilton. 2010. Price of Facebook Privacy? Start Clicking. New York Times CLIX, 55039 (2010), B8 N. https:\/\/www.nytimes.com\/2010\/05\/13\/technology\/personaltech\/13basics.html?referer="},{"volume-title":"A 61-Million-Person Experiment in Social Influence and Political Mobilization. Nature 489 (09","year":"2012","author":"Bond Robert","key":"e_1_3_2_1_14_1","unstructured":"Robert Bond , Christopher Fariss , Jason Jones , Adam Kramer , Cameron Marlow , Jaime Settle , and James Fowler . 2012. A 61-Million-Person Experiment in Social Influence and Political Mobilization. Nature 489 (09 2012 ), 295\u20138. https:\/\/doi.org\/10.1038\/nature11421 Robert Bond, Christopher Fariss, Jason Jones, Adam Kramer, Cameron Marlow, Jaime Settle, and James Fowler. 2012. A 61-Million-Person Experiment in Social Influence and Political Mobilization. Nature 489 (09 2012), 295\u20138. https:\/\/doi.org\/10.1038\/nature11421"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0749-5978(02)00010-9"},{"volume-title":"133","year":"2007","author":"Brewer B","key":"e_1_3_2_1_16_1","unstructured":"Marilynn\u00a0 B Brewer and Ya-Ru Chen . 2007. Where (who) are collectives in collectivism? Toward conceptual clarification of individualism and collectivism.Psychological review 114, 1 ( 2007 ), 133 . Marilynn\u00a0B Brewer and Ya-Ru Chen. 2007. Where (who) are collectives in collectivism? Toward conceptual clarification of individualism and collectivism.Psychological review 114, 1 (2007), 133."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"332","DOI":"10.69554\/RMVG1722","article-title":"Facebook, trust and privacy in an election year: Balancing politics and advertising","volume":"8","author":"Bright F","year":"2021","unstructured":"Laura\u00a0 F Bright , Kristen\u00a0Leah Sussman , and Gary\u00a0 B Wilcox . 2021 . Facebook, trust and privacy in an election year: Balancing politics and advertising . Journal of Digital & Social Media Marketing 8 , 4 (2021), 332 \u2013 346 . Laura\u00a0F Bright, Kristen\u00a0Leah Sussman, and Gary\u00a0B Wilcox. 2021. Facebook, trust and privacy in an election year: Balancing politics and advertising. Journal of Digital & Social Media Marketing 8, 4 (2021), 332\u2013346.","journal-title":"Journal of Digital & Social Media Marketing"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"177","DOI":"10.69554\/VBUX7404","article-title":"# DeleteFacebook and the consumer backlash of 2018: How social media fatigue, consumer (mis) trust and privacy concerns shape the new social media reality for consumers","volume":"7","author":"Bright F","year":"2019","unstructured":"Laura\u00a0 F Bright , Gary\u00a0 B Wilcox , and Hayley Rodriguez . 2019 . # DeleteFacebook and the consumer backlash of 2018: How social media fatigue, consumer (mis) trust and privacy concerns shape the new social media reality for consumers . Journal of Digital & Social Media Marketing 7 , 2 (2019), 177 \u2013 188 . Laura\u00a0F Bright, Gary\u00a0B Wilcox, and Hayley Rodriguez. 2019. # DeleteFacebook and the consumer backlash of 2018: How social media fatigue, consumer (mis) trust and privacy concerns shape the new social media reality for consumers. Journal of Digital & Social Media Marketing 7, 2 (2019), 177\u2013188.","journal-title":"Journal of Digital & Social Media Marketing"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518847"},{"volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","year":"2019","author":"Busse Karoline","key":"e_1_3_2_1_20_1","unstructured":"Karoline Busse , Julia Sch\u00e4fer , and Matthew Smith . 2019 . Replication: No one can hack my mind revisiting a study on expert and non-expert security practices and advice . In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). 117\u2013136. Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: No one can hack my mind revisiting a study on expert and non-expert security practices and advice. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). 117\u2013136."},{"volume-title":"Performance improvements from imagery: evidence that internal visual imagery is superior to external visual imagery for slalom performance. Frontiers in human neuroscience 7","year":"2013","author":"Callow Nichola","key":"e_1_3_2_1_21_1","unstructured":"Nichola Callow , Ross Roberts , Lew Hardy , Dan Jiang , and Martin\u00a0 G Edwards . 2013. Performance improvements from imagery: evidence that internal visual imagery is superior to external visual imagery for slalom performance. Frontiers in human neuroscience 7 ( 2013 ), 697. Nichola Callow, Ross Roberts, Lew Hardy, Dan Jiang, and Martin\u00a0G Edwards. 2013. Performance improvements from imagery: evidence that internal visual imagery is superior to external visual imagery for slalom performance. Frontiers in human neuroscience 7 (2013), 697."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.45.3.320"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.06.013"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0361-3682(99)00022-7"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.142015"},{"volume-title":"Influence: Science and practice. Vol.\u00a04. Pearson education Boston, MA.","year":"2009","author":"Cialdini B","key":"e_1_3_2_1_26_1","unstructured":"Robert\u00a0 B Cialdini and Lloyd James . 2009 . Influence: Science and practice. Vol.\u00a04. Pearson education Boston, MA. Robert\u00a0B Cialdini and Lloyd James. 2009. Influence: Science and practice. Vol.\u00a04. Pearson education Boston, MA."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167299258006"},{"key":"e_1_3_2_1_28_1","unstructured":"Scott\u00a0N Cole Debbie\u00a0M Smith Kathryn Ragan Robert Suurmond and Christopher\u00a0J Armitage. 2021. Synthesizing the effects of mental simulation on behavior change: Systematic review and multilevel meta-analysis. Psychonomic Bulletin & Review(2021) 1\u201324. Scott\u00a0N Cole Debbie\u00a0M Smith Kathryn Ragan Robert Suurmond and Christopher\u00a0J Armitage. 2021. Synthesizing the effects of mental simulation on behavior change: Systematic review and multilevel meta-analysis. Psychonomic Bulletin & Review(2021) 1\u201324."},{"volume-title":"Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior. Ph.\u00a0D. Dissertation","year":"2017","author":"Das Sauvik","key":"e_1_3_2_1_29_1","unstructured":"Sauvik Das . 2017 . Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior. Ph.\u00a0D. Dissertation . Carnegie Mellon University . Sauvik Das. 2017. Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior. Ph.\u00a0D. Dissertation. Carnegie Mellon University."},{"volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","year":"2014","author":"Das Sauvik","key":"e_1_3_2_1_30_1","unstructured":"Sauvik Das , Tiffany Hyun-Jin Kim , Laura\u00a0 A Dabbish , and Jason\u00a0 I Hong . 2014 . The effect of social influence on security sensitivity . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 143\u2013157. Sauvik Das, Tiffany Hyun-Jin Kim, Laura\u00a0A Dabbish, and Jason\u00a0I Hong. 2014. The effect of social influence on security sensitivity. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 143\u2013157."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675225"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Morton Deutsch and Harold\u00a0B Gerard. 1955. A study of normative and informational social influences upon individual judgment.The journal of abnormal and social psychology 51 3(1955) 629. Morton Deutsch and Harold\u00a0B Gerard. 1955. A study of normative and informational social influences upon individual judgment.The journal of abnormal and social psychology 51 3(1955) 629.","DOI":"10.1037\/h0046408"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274317"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376435"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2004.10639163"},{"volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","year":"2019","author":"Faklaris Cori","key":"e_1_3_2_1_39_1","unstructured":"Cori Faklaris , Laura\u00a0 A. Dabbish , and Jason\u00a0 I. Hong . 2019 . A Self-Report Measure of End-User Security Attitudes (SA-6) . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 ). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/soups 2019\/presentation\/faklaris Cori Faklaris, Laura\u00a0A. Dabbish, and Jason\u00a0I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/faklaris"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1257\/089533005775196732"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755205"},{"key":"e_1_3_2_1_42_1","unstructured":"Hana Habib and Lorrie Cranor. 2019. Website privacy options aren\u2019t much of a choice since they\u2019re hard to find and use. https:\/\/theconversation.com\/website-privacy-options-arent-much-of-a-choice-since-theyre-hard-to-find-and-use-124631. Accessed: 2020-09-30. Hana Habib and Lorrie Cranor. 2019. Website privacy options aren\u2019t much of a choice since they\u2019re hard to find and use. https:\/\/theconversation.com\/website-privacy-options-arent-much-of-a-choice-since-theyre-hard-to-find-and-use-124631. Accessed: 2020-09-30."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.033"},{"key":"e_1_3_2_1_44_1","unstructured":"Geert Hofstede and Gerard\u00a0Hendrik Hofstede. 1984. Culture\u2019s consequences: International differences in work-related values. Vol.\u00a05. sage. Geert Hofstede and Gerard\u00a0Hendrik Hofstede. 1984. Culture\u2019s consequences: International differences in work-related values. Vol.\u00a05. sage."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2010.10722168"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"volume-title":"Incognito Online: Why and How People Hide Their Information. unpublished doctoral dissertation","year":"2015","author":"Kang Ruogu","key":"e_1_3_2_1_47_1","unstructured":"Ruogu Kang . 2015 . Incognito Online: Why and How People Hide Their Information. unpublished doctoral dissertation , Carnegie Mellon University ( 2015). Ruogu Kang. 2015. Incognito Online: Why and How People Hide Their Information. unpublished doctoral dissertation, Carnegie Mellon University (2015)."},{"volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","year":"2014","author":"Kang Ruogu","key":"e_1_3_2_1_48_1","unstructured":"Ruogu Kang , Stephanie Brown , Laura Dabbish , and Sara Kiesler . 2014 . Privacy attitudes of mechanical turk workers and the us public . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 37\u201349. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 37\u201349."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-018-0318-1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207787"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.03.017"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.01.049"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2018.0235"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.057"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Albert\u00a0E Mannes Jack\u00a0B Soll and Richard\u00a0P Larrick. 2014. The wisdom of select crowds.Journal of personality and social psychology 107 2(2014) 276. Albert\u00a0E Mannes Jack\u00a0B Soll and Richard\u00a0P Larrick. 2014. The wisdom of select crowds.Journal of personality and social psychology 107 2(2014) 276.","DOI":"10.1037\/a0036677"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998323"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1602666"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354202"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-010-9112-2"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0771(200004\/06)13:2<233::AID-BDM325>3.0.CO;2-U"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Hyun\u00a0Jung Oh and Robert LaRose. 2015. Tell me a story about healthy snacking and I will follow: Comparing the effectiveness of self-generated versus message-aided implementation intentions on promoting healthy snacking habits among college students. Health communication 30 10 (2015) 962\u2013974. Hyun\u00a0Jung Oh and Robert LaRose. 2015. Tell me a story about healthy snacking and I will follow: Comparing the effectiveness of self-generated versus message-aided implementation intentions on promoting healthy snacking habits among college students. Health communication 30 10 (2015) 962\u2013974.","DOI":"10.1080\/10410236.2014.910289"},{"key":"e_1_3_2_1_65_1","first-page":"311","article-title":"Americans and cybersecurity","volume":"26","author":"Olmstead Kenneth","year":"2017","unstructured":"Kenneth Olmstead and Aaron Smith . 2017 . Americans and cybersecurity . Pew Research Center 26 (2017), 311 \u2013 327 . Kenneth Olmstead and Aaron Smith. 2017. Americans and cybersecurity. Pew Research Center 26(2017), 311\u2013327.","journal-title":"Pew Research Center"},{"volume-title":"What the public knows about cybersecurity","year":"2017","author":"Olmstead Kenneth","key":"e_1_3_2_1_66_1","unstructured":"Kenneth Olmstead and Aaron Smith . 2017. What the public knows about cybersecurity . Pew Research Center 22( 2017 ). Kenneth Olmstead and Aaron Smith. 2017. What the public knows about cybersecurity. Pew Research Center 22(2017)."},{"volume-title":"Facebook\u2019s Big Privacy Changes: An Overview. Mashable","year":"2011","author":"Parr Ben","key":"e_1_3_2_1_67_1","unstructured":"Ben Parr . 2011. Facebook\u2019s Big Privacy Changes: An Overview. Mashable ( 2011 ). https:\/\/mashable.com\/archive\/facebook-privacy-changes-guide#TMdc0NovxZqX Ben Parr. 2011. Facebook\u2019s Big Privacy Changes: An Overview. Mashable (2011). https:\/\/mashable.com\/archive\/facebook-privacy-changes-guide#TMdc0NovxZqX"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2017.01.006"},{"volume-title":"Americans are changing their relationship with Facebook","year":"2018","author":"Perrin Andrew","key":"e_1_3_2_1_69_1","unstructured":"Andrew Perrin . 2018. Americans are changing their relationship with Facebook . Pew Research Center 5( 2018 ). Andrew Perrin. 2018. Americans are changing their relationship with Facebook. Pew Research Center 5(2018)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"volume-title":"Human Factors in Cybersecurity: A Scoping Review. In The 12th International Conference on Advances in Information Technology. 1\u201311","year":"2021","author":"Rahman Tashfiq","key":"e_1_3_2_1_71_1","unstructured":"Tashfiq Rahman , Rohani Rohan , Debajyoti Pal , and Prasert Kanthamanon . 2021 . Human Factors in Cybersecurity: A Scoping Review. In The 12th International Conference on Advances in Information Technology. 1\u201311 . Tashfiq Rahman, Rohani Rohan, Debajyoti Pal, and Prasert Kanthamanon. 2021. Human Factors in Cybersecurity: A Scoping Review. In The 12th International Conference on Advances in Information Technology. 1\u201311."},{"volume-title":"Americans","year":"2018","author":"Rainie Lee","key":"e_1_3_2_1_72_1","unstructured":"Lee Rainie . 2018. Americans \u2019 complicated feelings about social media in an era of privacy concerns. Pew Research Center ( 2018 ). Lee Rainie. 2018. Americans\u2019 complicated feelings about social media in an era of privacy concerns. Pew Research Center (2018)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"volume-title":"Facebook Plans New Privacy Controls. New York Times CLVII, 54254","year":"2008","key":"e_1_3_2_1_76_1","unstructured":"Reuters. 2008. Facebook Plans New Privacy Controls. New York Times CLVII, 54254 ( 2008 ), C3 N. https:\/\/www.nytimes.com\/2008\/03\/19\/technology\/19facebook.html?fta=y&referer= Reuters. 2008. Facebook Plans New Privacy Controls. New York Times CLVII, 54254 (2008), C3 N. https:\/\/www.nytimes.com\/2008\/03\/19\/technology\/19facebook.html?fta=y&referer="},{"volume-title":"The constructive, destructive, and reconstructive power of social norms. Psychological science 18, 5","year":"2007","author":"Schultz P\u00a0Wesley","key":"e_1_3_2_1_77_1","unstructured":"P\u00a0Wesley Schultz , Jessica\u00a0 M Nolan , Robert\u00a0 B Cialdini , Noah\u00a0 J Goldstein , and Vladas Griskevicius . 2007. The constructive, destructive, and reconstructive power of social norms. Psychological science 18, 5 ( 2007 ), 429\u2013434. P\u00a0Wesley Schultz, Jessica\u00a0M Nolan, Robert\u00a0B Cialdini, Noah\u00a0J Goldstein, and Vladas Griskevicius. 2007. The constructive, destructive, and reconstructive power of social norms. Psychological science 18, 5 (2007), 429\u2013434."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.10.059"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441865"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2018.0079"},{"key":"e_1_3_2_1_81_1","first-page":"111","article-title":"Strategies and struggles with privacy in an online social networking community. People and Computers XXII Culture, Creativity","volume":"22","author":"Strater Katherine","year":"2008","unstructured":"Katherine Strater and Heather\u00a0Richter Lipford . 2008 . Strategies and struggles with privacy in an online social networking community. People and Computers XXII Culture, Creativity , Interaction 22 (2008), 111 \u2013 119 . Katherine Strater and Heather\u00a0Richter Lipford. 2008. Strategies and struggles with privacy in an online social networking community. People and Computers XXII Culture, Creativity, Interaction 22 (2008), 111\u2013119.","journal-title":"Interaction"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"volume-title":"Coping and the simulation of events. Social cognition 7, 2","year":"1989","author":"Taylor E","key":"e_1_3_2_1_83_1","unstructured":"Shelley\u00a0 E Taylor and Sherry\u00a0 K Schneider . 1989. Coping and the simulation of events. Social cognition 7, 2 ( 1989 ), 174\u2013194. Shelley\u00a0E Taylor and Sherry\u00a0K Schneider. 1989. Coping and the simulation of events. Social cognition 7, 2 (1989), 174\u2013194."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208394"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167204271186"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1086\/599325"},{"volume-title":"Construal-level theory of psychological distance.Psychological review 117, 2","year":"2010","author":"Trope Yaacov","key":"e_1_3_2_1_87_1","unstructured":"Yaacov Trope and Nira Liberman . 2010. Construal-level theory of psychological distance.Psychological review 117, 2 ( 2010 ), 440. Yaacov Trope and Nira Liberman. 2010. Construal-level theory of psychological distance.Psychological review 117, 2 (2010), 440."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.08.003"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"crossref","unstructured":"Aggeliki Tsohou Maria Karyda and Spyros Kokolakis. 2015. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Computers & security 52(2015) 128\u2013141. Aggeliki Tsohou Maria Karyda and Spyros Kokolakis. 2015. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Computers & security 52(2015) 128\u2013141.","DOI":"10.1016\/j.cose.2015.04.006"},{"volume-title":"Vogel and Monica Anderson","year":"2019","author":"A.","key":"e_1_3_2_1_90_1","unstructured":"Emily\u00a0 A. Vogel and Monica Anderson . 2019 . Americans and Digital Knowledge. Pew Research Center ( 2019). Emily\u00a0A. Vogel and Monica Anderson. 2019. Americans and Digital Knowledge. Pew Research Center (2019)."},{"volume-title":"EXPRESS: Trust Propensity across Cultures: The Role of Collectivism. Journal of International Marketing(2021), 1069031X211036688.","year":"2021","author":"Westjohn A","key":"e_1_3_2_1_91_1","unstructured":"Stanford\u00a0 A Westjohn , Peter Magnusson , George\u00a0 R Franke , and Yi Peng . 2021 . EXPRESS: Trust Propensity across Cultures: The Role of Collectivism. Journal of International Marketing(2021), 1069031X211036688. Stanford\u00a0A Westjohn, Peter Magnusson, George\u00a0R Franke, and Yi Peng. 2021. EXPRESS: Trust Propensity across Cultures: The Role of Collectivism. Journal of International Marketing(2021), 1069031X211036688."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-016-9412-3"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1017\/jmo.2017.57"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.44.3.379"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"New Orleans LA USA","acronym":"CHI '22"},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3502009","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3502009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T06:36:27Z","timestamp":1727073387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3502009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":94,"alternative-id":["10.1145\/3491102.3502009","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3502009","relation":{},"subject":[],"published":{"date-parts":[[2022,4,29]]}}}