Publikationen
2024
4810656
F66NCR9R
1
apa
50
default
3587
https://cyrenzh.ch/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A0%2C%22request_next%22%3A0%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%227NNVWZWL%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A10287379%2C%22username%22%3A%22ThierryS.%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Fthierrys.%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Schaltegger%20et%20al.%22%2C%22parsedDate%22%3A%222024%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ESchaltegger%2C%20T.%20A.%2C%20Ambuehl%2C%20B.%2C%20Ackermann%2C%20K.%20A.%2C%20%26amp%3B%20Ebert%2C%20N.%20%282024%29.%20Re-thinking%20Decision-Making%20in%20Cybersecurity%3A%20Leveraging%20Cognitive%20Heuristics%20in%20Situations%20of%20Uncertainty.%20%3Ci%3EProceedings%20of%20the%2057th%20Hawaii%20International%20Conference%20on%20System%20Sciences%3C%5C%2Fi%3E.%20HICSS.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Re-thinking%20Decision-Making%20in%20Cybersecurity%3A%20Leveraging%20Cognitive%20Heuristics%20in%20Situations%20of%20Uncertainty%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thierry%20A.%22%2C%22lastName%22%3A%22Schaltegger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Benjamin%22%2C%22lastName%22%3A%22Ambuehl%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kurt%20A.%22%2C%22lastName%22%3A%22Ackermann%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222024%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%2057th%20Hawaii%20International%20Conference%20on%20System%20Sciences%22%2C%22conferenceName%22%3A%22HICSS%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22PPCE9EGI%22%2C%22F66NCR9R%22%5D%2C%22dateModified%22%3A%222024-07-08T07%3A56%3A35Z%22%7D%7D%2C%7B%22key%22%3A%224QDH4CUJ%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ebert%20et%20al.%22%2C%22parsedDate%22%3A%222024-06-14%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EEbert%2C%20N.%2C%20Geppert%2C%20T.%2C%20Knieps%2C%20M.%2C%20Zarouali%2C%20B.%2C%20Schaltegger%2C%20T.%2C%20Wiedemann%2C%20A.%2C%20%26amp%3B%20Ambuehl%2C%20B.%20%282024%2C%20June%2014%29.%20Reflective%20Data%20Sharing%20On%20TikTok%3A%26%23xA0%3B%20Encouraging%20Adolescents%20To%20Engage%20with%20Privacy%20Settings.%20%3Ci%3EECIS%202024%20Proceedings%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Faisel.aisnet.org%5C%2Fecis2024%5C%2Ftrack24_socialmedia%5C%2Ftrack24_socialmedia%5C%2F5%27%3Ehttps%3A%5C%2F%5C%2Faisel.aisnet.org%5C%2Fecis2024%5C%2Ftrack24_socialmedia%5C%2Ftrack24_socialmedia%5C%2F5%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Reflective%20Data%20Sharing%20On%20TikTok%3A%20%20Encouraging%20Adolescents%20To%20Engage%20with%20Privacy%20Settings%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tim%22%2C%22lastName%22%3A%22Geppert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Melanie%22%2C%22lastName%22%3A%22Knieps%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Brahim%22%2C%22lastName%22%3A%22Zarouali%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thierry%22%2C%22lastName%22%3A%22Schaltegger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anna%22%2C%22lastName%22%3A%22Wiedemann%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Benjamin%22%2C%22lastName%22%3A%22Ambuehl%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222024-06-14%22%2C%22proceedingsTitle%22%3A%22ECIS%202024%20Proceedings%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Faisel.aisnet.org%5C%2Fecis2024%5C%2Ftrack24_socialmedia%5C%2Ftrack24_socialmedia%5C%2F5%22%2C%22collections%22%3A%5B%22F66NCR9R%22%5D%2C%22dateModified%22%3A%222024-05-21T14%3A09%3A30Z%22%7D%7D%5D%7D
Schaltegger, T. A., Ambuehl, B., Ackermann, K. A., & Ebert, N. (2024). Re-thinking Decision-Making in Cybersecurity: Leveraging Cognitive Heuristics in Situations of Uncertainty. Proceedings of the 57th Hawaii International Conference on System Sciences. HICSS.
Ebert, N., Geppert, T., Knieps, M., Zarouali, B., Schaltegger, T., Wiedemann, A., & Ambuehl, B. (2024, June 14). Reflective Data Sharing On TikTok: Encouraging Adolescents To Engage with Privacy Settings. ECIS 2024 Proceedings. https://aisel.aisnet.org/ecis2024/track24_socialmedia/track24_socialmedia/5
2023
4810656
2X8AVRAZ
1
apa
50
default
3587
https://cyrenzh.ch/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A0%2C%22request_next%22%3A0%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22CVBI8AUZ%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A10839177%2C%22username%22%3A%22ciragan%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Fciragan%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Geppert%20et%20al.%22%2C%22parsedDate%22%3A%222023-10-09%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EGeppert%2C%20T.%2C%20Fuoco%2C%20A.%20D.%2C%20Leikert-Boehm%2C%20N.%2C%20Deml%2C%20S.%2C%20Sturzenegger%2C%20D.%2C%20%26amp%3B%20Ebert%2C%20N.%20%282023%29.%20The%20Data%20Collaboration%20Canvas%3A%20A%20Visual%20Framework%20For%20Systematically%20Identifying%20And%20Evaluating%20Organizational%20Data%20Collaboration%20Opportunities.%20%3Ci%3EWirtschaftsinformatik%202023%20Proceedings%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Faisel.aisnet.org%5C%2Fwi2023%5C%2F1%27%3Ehttps%3A%5C%2F%5C%2Faisel.aisnet.org%5C%2Fwi2023%5C%2F1%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20Data%20Collaboration%20Canvas%3A%20A%20Visual%20Framework%20For%20Systematically%20Identifying%20And%20Evaluating%20Organizational%20Data%20Collaboration%20Opportunities%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tim%22%2C%22lastName%22%3A%22Geppert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alice%20Dal%22%2C%22lastName%22%3A%22Fuoco%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ninja%22%2C%22lastName%22%3A%22Leikert-Boehm%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stefan%22%2C%22lastName%22%3A%22Deml%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Sturzenegger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222023-10-09%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Faisel.aisnet.org%5C%2Fwi2023%5C%2F1%22%2C%22collections%22%3A%5B%222X8AVRAZ%22%5D%2C%22dateModified%22%3A%222023-10-10T07%3A47%3A37Z%22%7D%7D%2C%7B%22key%22%3A%225R9ICETK%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A10287379%2C%22username%22%3A%22ThierryS.%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Fthierrys.%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Ebert%20et%20al.%22%2C%22parsedDate%22%3A%222023-11-01%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EEbert%2C%20N.%2C%20Schaltegger%2C%20T.%2C%20Ambuehl%2C%20B.%2C%20Sch%26%23xF6%3Bni%2C%20L.%2C%20Zimmermann%2C%20V.%2C%20%26amp%3B%20Knieps%2C%20M.%20%282023%29.%20Learning%20from%20safety%20science%3A%20A%20way%20forward%20for%20studying%20cybersecurity%20incidents%20in%20organizations.%20%3Ci%3EComputers%20%26amp%3B%20Security%3C%5C%2Fi%3E%2C%20%3Ci%3E134%3C%5C%2Fi%3E%2C%20103435.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.cose.2023.103435%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.cose.2023.103435%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Learning%20from%20safety%20science%3A%20A%20way%20forward%20for%20studying%20cybersecurity%20incidents%20in%20organizations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thierry%22%2C%22lastName%22%3A%22Schaltegger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Benjamin%22%2C%22lastName%22%3A%22Ambuehl%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lorin%22%2C%22lastName%22%3A%22Sch%5Cu00f6ni%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Verena%22%2C%22lastName%22%3A%22Zimmermann%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Melanie%22%2C%22lastName%22%3A%22Knieps%22%7D%5D%2C%22abstractNote%22%3A%22In%20the%20aftermath%20of%20cybersecurity%20incidents%20within%20organizations%2C%20explanations%20of%20their%20causes%20often%20revolve%20around%20isolated%20technical%20or%20human%20events%20such%20as%20an%20Advanced%20Persistent%20Threat%20or%20a%20%5Cu201cbad%20click%20by%20an%20employee.%5Cu201d%20These%20explanations%20serve%20to%20identify%20the%20responsible%20parties%20and%20inform%20efforts%20to%20improve%20security%20measures.%20However%2C%20safety%20science%20researchers%20have%20long%20been%20aware%20that%20explaining%20incidents%20in%20socio-technical%20systems%20and%20determining%20the%20role%20of%20humans%20and%20technology%20in%20incidents%20is%20not%20an%20objective%20procedure%20but%20rather%20an%20act%20of%20social%20constructivism%3A%20what%20you%20look%20for%20is%20what%20you%20find%2C%20and%20what%20you%20find%20is%20what%20you%20fix.%20For%20example%2C%20the%20search%20for%20a%20technical%20%5Cu201croot%20cause%5Cu201d%20of%20an%20incident%20might%20likely%20result%20in%20a%20technical%20fix%2C%20while%20from%20a%20sociological%20perspective%2C%20cultural%20issues%20might%20be%20blamed%20for%20the%20same%20incident%20and%20subsequently%20lead%20to%20the%20improvement%20of%20the%20security%20culture.%20Starting%20from%20the%20insights%20of%20safety%20science%2C%20this%20paper%20aims%20to%20extract%20lessons%20on%20what%20general%20explanations%20for%20cybersecurity%20incidents%20can%20be%20identified%20and%20what%20methods%20can%20be%20used%20to%20study%20causes%20of%20cybersecurity%20incidents%20in%20organizations.%20We%20provide%20a%20framework%20that%20allows%20researchers%20and%20practitioners%20to%20proactively%20select%20models%20and%20methods%20for%20the%20investigation%20of%20cybersecurity%20incidents.%22%2C%22date%22%3A%222023-11-01%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.cose.2023.103435%22%2C%22ISSN%22%3A%220167-4048%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.sciencedirect.com%5C%2Fscience%5C%2Farticle%5C%2Fpii%5C%2FS0167404823003450%22%2C%22collections%22%3A%5B%222X8AVRAZ%22%2C%22VHRSNKRS%22%5D%2C%22dateModified%22%3A%222023-08-25T05%3A27%3A24Z%22%7D%7D%2C%7B%22key%22%3A%22R4XMSPKC%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A3751512%2C%22username%22%3A%22ebertolino%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Febertolino%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Horn%20et%20al.%22%2C%22parsedDate%22%3A%222023-01-28%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHorn%2C%20S.%20S.%2C%20Schaltegger%2C%20T.%2C%20Best%2C%20R.%2C%20%26amp%3B%20Freund%2C%20A.%20M.%20%282023%29.%20Pay%20One%20or%20Pay%20All%3F%20The%20Role%20of%20Incentive%20Schemes%20in%20Decision%20Making%20Across%20Adulthood.%20%3Ci%3EThe%20Journals%20of%20Gerontology%3A%20Series%20B%3C%5C%2Fi%3E%2C%20%3Ci%3E78%3C%5C%2Fi%3E%281%29%2C%2051%26%23×2013%3B61.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fgeronb%5C%2Fgbac108%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fgeronb%5C%2Fgbac108%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Pay%20One%20or%20Pay%20All%3F%20The%20Role%20of%20Incentive%20Schemes%20in%20Decision%20Making%20Across%20Adulthood%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sebastian%20S%22%2C%22lastName%22%3A%22Horn%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thierry%22%2C%22lastName%22%3A%22Schaltegger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ryan%22%2C%22lastName%22%3A%22Best%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alexandra%20M%22%2C%22lastName%22%3A%22Freund%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Anne%22%2C%22lastName%22%3A%22Krendl%22%7D%5D%2C%22abstractNote%22%3A%22Abstract%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Objectives%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20This%20research%20addresses%20how%20younger%20and%20older%20adults%5Cu2019%20decisions%20and%20evaluations%20of%20gains%20and%20losses%20are%20affected%20by%20the%20way%20in%20which%20monetary%20incentives%20are%20provided.%20We%20compared%202%20common%20incentive%20schemes%20in%20decision%20making%3A%20pay%20one%20%28only%20a%20single%20decision%20is%20incentivized%29%20and%20pay%20all%20%28incentives%20across%20all%20decisions%20are%20accumulated%29.%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Method%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Younger%20adults%20%2818%5Cu201336%20years%3B%20n%20%3D%20147%29%20and%20older%20adults%20%2860%5Cu201389%20years%3B%20n%20%3D%20139%29%20participated%20in%20either%20a%20pay-one%20or%20pay-all%20condition%20and%20made%20binary%20choices%20between%20two-outcome%20monetary%20lotteries%20in%20gain%2C%20loss%2C%20and%20mixed%20domains.%20We%20analyzed%20participants%5Cu2019%20decision%20quality%2C%20risk%20taking%2C%20and%20psychometric%20test%20scores.%20Computational%20modeling%20of%20cumulative%20prospect%20theory%20served%20to%20measure%20sensitivity%20to%20outcomes%20and%20probabilities%2C%20loss%20aversion%2C%20and%20choice%20sensitivity.%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Results%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Decision%20quality%20and%20risk%20aversion%20were%20higher%20in%20the%20gain%20than%20mixed%20or%20loss%20domain%2C%20but%20unaffected%20by%20age.%20Loss%20aversion%20was%20higher%2C%20and%20choice%20sensitivity%20was%20lower%20in%20older%20than%20younger%20adults.%20In%20the%20pay-one%20condition%2C%20the%20value%20functions%20were%20more%20strongly%20curved%2C%20and%20choice%20sensitivity%20was%20higher%20than%20in%20the%20pay-all%20condition.%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Discussion%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20An%20opportunity%20of%20accumulating%20incentives%20has%20similar%20portfolio%20effects%20on%20younger%20and%20older%20adults%5Cu2019%20decisions.%20In%20general%2C%20people%20appear%20to%20decide%20less%20cautiously%20in%20pay-all%20than%20pay-one%20scenarios.%20The%20impact%20of%20different%20incentive%20schemes%20should%20be%20carefully%20considered%20in%20aging%20and%20decision%20research.%22%2C%22date%22%3A%222023-01-28%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1093%5C%2Fgeronb%5C%2Fgbac108%22%2C%22ISSN%22%3A%221079-5014%2C%201758-5368%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Facademic.oup.com%5C%2Fpsychsocgerontology%5C%2Farticle%5C%2F78%5C%2F1%5C%2F51%5C%2F6668534%22%2C%22collections%22%3A%5B%222X8AVRAZ%22%5D%2C%22dateModified%22%3A%222023-06-16T08%3A41%3A06Z%22%7D%7D%2C%7B%22key%22%3A%22NYM3IRCR%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A10839177%2C%22username%22%3A%22ciragan%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Fciragan%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Ebert%20et%20al.%22%2C%22parsedDate%22%3A%222023-04-19%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EEbert%2C%20N.%2C%20Scheppler%2C%20B.%2C%20Ackermann%2C%20K.%20A.%2C%20%26amp%3B%20Geppert%2C%20T.%20%282023%29.%20QButterfly%3A%20Lightweight%20Survey%20Extension%20for%20Online%20User%20Interaction%20Studies%20for%20Non-Tech-Savvy%20Researchers.%20%3Ci%3EProceedings%20of%20the%202023%20CHI%20Conference%20on%20Human%20Factors%20in%20Computing%20Systems%3C%5C%2Fi%3E%2C%201%26%23×2013%3B8.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F3544548.3580780%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F3544548.3580780%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22QButterfly%3A%20Lightweight%20Survey%20Extension%20for%20Online%20User%20Interaction%20Studies%20for%20Non-Tech-Savvy%20Researchers%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Bj%5Cu00f6rn%22%2C%22lastName%22%3A%22Scheppler%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kurt%20Alexander%22%2C%22lastName%22%3A%22Ackermann%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tim%22%2C%22lastName%22%3A%22Geppert%22%7D%5D%2C%22abstractNote%22%3A%22We%20provide%20a%20user-friendly%2C%20flexible%2C%20and%20lightweight%20open-source%20HCI%20toolkit%20%28github.com%5C%2FQButterfly%29%20that%20allows%20non-tech-savvy%20researchers%20to%20conduct%20online%20user%20interaction%20studies%20using%20the%20widespread%20Qualtrics%20and%20LimeSurvey%20platforms.%20These%20platforms%20already%20provide%20rich%20functionality%20%28e.g.%2C%20for%20experiments%20or%20usability%20tests%29%20and%20therefore%20lend%20themselves%20to%20an%20extension%20to%20display%20stimulus%20web%20pages%20and%20record%20clickstreams.%20The%20toolkit%20consists%20of%20a%20survey%20template%20with%20embedded%20JavaScript%2C%20a%20JavaScript%20library%20embedded%20in%20the%20HTML%20web%20pages%2C%20and%20scripts%20to%20analyze%20the%20collected%20data.%20No%20special%20programming%20skills%20are%20required%20to%20set%20up%20a%20study%20or%20match%20survey%20data%20and%20user%20interaction%20data%20after%20data%20collection.%20We%20empirically%20validated%20the%20software%20in%20a%20laboratory%20and%20a%20field%20study.%20We%20conclude%20that%20this%20extension%2C%20even%20in%20its%20preliminary%20version%2C%20has%20the%20potential%20to%20make%20online%20user%20interaction%20studies%20%28e.g.%2C%20with%20crowdsourced%20participants%29%20accessible%20to%20a%20broader%20range%20of%20researchers.%22%2C%22date%22%3A%22April%2019%2C%202023%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%202023%20CHI%20Conference%20on%20Human%20Factors%20in%20Computing%20Systems%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1145%5C%2F3544548.3580780%22%2C%22ISBN%22%3A%22978-1-4503-9421-5%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdl.acm.org%5C%2Fdoi%5C%2F10.1145%5C%2F3544548.3580780%22%2C%22collections%22%3A%5B%222X8AVRAZ%22%5D%2C%22dateModified%22%3A%222023-05-23T11%3A03%3A32Z%22%7D%7D%2C%7B%22key%22%3A%22S2J3C3K2%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A10839177%2C%22username%22%3A%22ciragan%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Fciragan%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Ebert%20et%20al.%22%2C%22parsedDate%22%3A%222023-03-04%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EEbert%2C%20N.%2C%20Ackermann%2C%20K.%20A.%2C%20%26amp%3B%20Bearth%2C%20A.%20%282023%29.%20When%20information%20security%20depends%20on%20font%20size%3A%20how%20the%20saliency%20of%20warnings%20affects%20protection%20behavior.%20%3Ci%3EJournal%20of%20Risk%20Research%3C%5C%2Fi%3E%2C%20%3Ci%3E26%3C%5C%2Fi%3E%283%29%2C%20233%26%23×2013%3B255.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F13669877.2022.2142952%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F13669877.2022.2142952%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22When%20information%20security%20depends%20on%20font%20size%3A%20how%20the%20saliency%20of%20warnings%20affects%20protection%20behavior%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kurt%20A.%22%2C%22lastName%22%3A%22Ackermann%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angela%22%2C%22lastName%22%3A%22Bearth%22%7D%5D%2C%22abstractNote%22%3A%22Prior%20research%20on%20how%20to%20improve%20the%20effectiveness%20of%20information%20security%20warnings%20has%20predominantly%20focused%20on%20either%20the%20informational%20content%20of%20warnings%20or%20their%20visual%20saliency.%20In%20an%20online%20experiment%20%28N%20%3D%201%5Cu2019486%29%2C%20we%20disentangle%20the%20effect%20of%20both%20manipulations%20and%20demonstrate%20that%20both%20factors%20simultaneously%20influence%20decision%20making.%20Our%20data%20indicate%20that%20the%20proportion%20of%20people%20who%20engage%20in%20protection%20behavior%20can%20be%20increased%20by%20roughly%2065%25%20by%20making%20a%20particular%20warning%20message%20more%20visually%20salient%20%28i.e.%20a%20more%20conspicuous%20visual%20design%20is%20used%29.%20We%20also%20show%20that%20varying%20the%20message%5Cu2019s%20saliency%20can%20make%20people%20behave%20very%20differently%20when%20confronted%20with%20the%20same%20threat%20or%20behave%20very%20similarly%20when%20confronted%20with%20threats%20that%20differ%20widely%20in%20terms%20of%20severity%20of%20outcomes.%20Our%20results%20suggest%20that%20the%20visual%20design%20of%20a%20warning%20may%20warrant%20at%20least%20as%20much%20attention%20as%20the%20informational%20content%20that%20the%20warning%20message%20conveys.%22%2C%22date%22%3A%222023-03-04%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1080%5C%2F13669877.2022.2142952%22%2C%22ISSN%22%3A%221366-9877%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F13669877.2022.2142952%22%2C%22collections%22%3A%5B%222X8AVRAZ%22%5D%2C%22dateModified%22%3A%222023-05-23T10%3A20%3A06Z%22%7D%7D%2C%7B%22key%22%3A%22NPYZW7ET%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ebert%20et%20al.%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EEbert%2C%20N.%2C%20Geppert%2C%20T.%2C%20Strycharz%2C%20J.%2C%20Knieps%2C%20M.%2C%20H%26%23xF6%3Bnig%2C%20M.%2C%20%26amp%3B%20Brucker-Kley%2C%20E.%20%282023%29.%20Creative%20beyond%20TikToks%3A%20Investigating%20Adolescents%26%23×2019%3B%20Social%20Privacy%20Management%20on%20TikTok.%20%3Ci%3EProceedings%20on%20Privacy%20Enhancing%20Technologies%3C%5C%2Fi%3E%2C%20%3Ci%3E2023%3C%5C%2Fi%3E%282%29%2C%20221%26%23×2013%3B235.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.56553%5C%2Fpopets-2023-0049%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.56553%5C%2Fpopets-2023-0049%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Creative%20beyond%20TikToks%3A%20Investigating%20Adolescents%27%20Social%20Privacy%20Management%20on%20TikTok%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tim%22%2C%22lastName%22%3A%22Geppert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Joanna%22%2C%22lastName%22%3A%22Strycharz%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Melanie%22%2C%22lastName%22%3A%22Knieps%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22H%5Cu00f6nig%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Elke%22%2C%22lastName%22%3A%22Brucker-Kley%22%7D%5D%2C%22abstractNote%22%3A%22TikTok%20has%20been%20criticized%20for%20its%20low%20privacy%20standards%2C%20but%20little%20is%20known%20about%20how%20its%20adolescent%20users%20protect%20their%20privacy.%20Based%20on%20interviews%20with%2054%20adolescents%20in%20Switzerland%2C%20this%20study%20provides%20a%20comprehensive%20understanding%20of%20young%20TikTok%20users%27%20privacy%20management%20practices%20related%20to%20the%20creation%20of%20videos.%20The%20data%20were%20explored%20using%20the%20COM-B%20model%2C%20an%20established%20behavioral%20analysis%20framework%20adapted%20for%20sociotechnical%20privacy%20research.%20Our%20overall%20findings%20are%20in%20line%20with%20previous%20research%20on%20other%20social%20networks%3A%20adolescents%20are%20aware%20of%20privacy%20related%20to%20their%20online%20social%20connections%20%28social%20privacy%29%20and%20perform%20conscious%20privacy%20management.%20However%2C%20we%20also%20identified%20new%20patterns%20related%20to%20the%20central%20role%20of%20algorithmic%20recommendations%20potentially%20relevant%20for%20other%20social%20networks.%20Adolescents%20are%20aware%20that%20TikTok%27s%20special%20algorithm%2C%20combined%20with%20the%20app%27s%20high%20prevalence%20among%20their%20peers%2C%20could%20easily%20put%20them%20in%20the%20spotlight.%20Some%20adolescents%20also%20reduce%20TikTok%2C%20which%20was%20originally%20conceived%20as%20a%20social%20network%2C%20to%20its%20extensive%20audio-visual%20capabilities%20and%20share%20TikToks%20via%20more%20private%20channels%20%28e.g.%2C%20Snapchat%29%20to%20manage%20audiences%20and%20avoid%20identification%20by%20peers.%20Young%20users%20also%20find%20other%20creative%20ways%20to%20protect%20their%20privacy%20such%20as%20identifying%20stalkers%20or%20maintaining%20multiple%20user%20accounts%20with%20different%20privacy%20settings%20to%20establish%20granular%20audience%20management.%20Based%20on%20our%20findings%2C%20we%20propose%20various%20concrete%20measures%20to%20develop%20interventions%20that%20protect%20the%20privacy%20of%20adolescents%20on%20TikTok.%22%2C%22date%22%3A%224%5C%2F2023%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.56553%5C%2Fpopets-2023-0049%22%2C%22ISSN%22%3A%222299-0984%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fpetsymposium.org%5C%2Fpopets%5C%2F2023%5C%2Fpopets-2023-0049.php%22%2C%22collections%22%3A%5B%222X8AVRAZ%22%5D%2C%22dateModified%22%3A%222023-05-23T08%3A54%3A50Z%22%7D%7D%5D%7D
Geppert, T., Fuoco, A. D., Leikert-Boehm, N., Deml, S., Sturzenegger, D., & Ebert, N. (2023). The Data Collaboration Canvas: A Visual Framework For Systematically Identifying And Evaluating Organizational Data Collaboration Opportunities. Wirtschaftsinformatik 2023 Proceedings. https://aisel.aisnet.org/wi2023/1
Ebert, N., Schaltegger, T., Ambuehl, B., Schöni, L., Zimmermann, V., & Knieps, M. (2023). Learning from safety science: A way forward for studying cybersecurity incidents in organizations. Computers & Security, 134, 103435. https://doi.org/10.1016/j.cose.2023.103435
Horn, S. S., Schaltegger, T., Best, R., & Freund, A. M. (2023). Pay One or Pay All? The Role of Incentive Schemes in Decision Making Across Adulthood. The Journals of Gerontology: Series B, 78(1), 51–61. https://doi.org/10.1093/geronb/gbac108
Ebert, N., Scheppler, B., Ackermann, K. A., & Geppert, T. (2023). QButterfly: Lightweight Survey Extension for Online User Interaction Studies for Non-Tech-Savvy Researchers. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 1–8. https://doi.org/10.1145/3544548.3580780
Ebert, N., Ackermann, K. A., & Bearth, A. (2023). When information security depends on font size: how the saliency of warnings affects protection behavior. Journal of Risk Research, 26(3), 233–255. https://doi.org/10.1080/13669877.2022.2142952
Ebert, N., Geppert, T., Strycharz, J., Knieps, M., Hönig, M., & Brucker-Kley, E. (2023). Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok. Proceedings on Privacy Enhancing Technologies, 2023(2), 221–235. https://doi.org/10.56553/popets-2023-0049
2022
4810656
ZUUVCL58
1
apa
50
default
3587
https://cyrenzh.ch/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A0%2C%22request_next%22%3A0%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%226G4XQIFT%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Geppert%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EGeppert%2C%20T.%2C%20Anderegg%2C%20J.%2C%20Frei%2C%20L.%2C%20Moeller%2C%20S.%2C%20Deml%2C%20S.%2C%20Sturzenegger%2C%20D.%2C%20%26amp%3B%20Ebert%2C%20N.%20%282022%29.%20Overcoming%20cloud%20concerns%20with%20trusted%20execution%20environments%3F%3A%20exploring%20the%20organizational%20perception%20of%20a%20novel%20security%20technology%20in%20regulated%20Swiss%20companies.%20%3Ci%3E55th%20Hawaii%20International%20Conference%20on%20System%20Sciences%20%28HICSS%29%2C%20Virtual%2C%203-7%20January%202022%3C%5C%2Fi%3E%2C%206822%26%23×2013%3B6829.%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Overcoming%20cloud%20concerns%20with%20trusted%20execution%20environments%3F%3A%20exploring%20the%20organizational%20perception%20of%20a%20novel%20security%20technology%20in%20regulated%20Swiss%20companies%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tim%22%2C%22lastName%22%3A%22Geppert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jan%22%2C%22lastName%22%3A%22Anderegg%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Leoncio%22%2C%22lastName%22%3A%22Frei%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Simon%22%2C%22lastName%22%3A%22Moeller%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stefan%22%2C%22lastName%22%3A%22Deml%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Sturzenegger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22proceedingsTitle%22%3A%2255th%20hawaii%20international%20conference%20on%20system%20sciences%20%28HICSS%29%2C%20virtual%2C%203-7%20january%202022%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22ZUUVCL58%22%5D%2C%22dateModified%22%3A%222023-09-01T10%3A12%3A39Z%22%7D%7D%2C%7B%22key%22%3A%22K9MJ95VV%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Geppert%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EGeppert%2C%20T.%2C%20Deml%2C%20S.%2C%20Sturzenegger%2C%20D.%2C%20%26amp%3B%20Ebert%2C%20N.%20%282022%29.%20Trusted%20Execution%20Environments%3A%20Applications%20and%20Organizational%20Challenges.%20%3Ci%3EFrontiers%20in%20Computer%20Science%3C%5C%2Fi%3E%2C%20%3Ci%3E4%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.frontiersin.org%5C%2Farticles%5C%2F10.3389%5C%2Ffcomp.2022.930741%27%3Ehttps%3A%5C%2F%5C%2Fwww.frontiersin.org%5C%2Farticles%5C%2F10.3389%5C%2Ffcomp.2022.930741%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Trusted%20Execution%20Environments%3A%20Applications%20and%20Organizational%20Challenges%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tim%22%2C%22lastName%22%3A%22Geppert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stefan%22%2C%22lastName%22%3A%22Deml%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Sturzenegger%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nico%22%2C%22lastName%22%3A%22Ebert%22%7D%5D%2C%22abstractNote%22%3A%22A%20lack%20of%20trust%20in%20the%20providers%20is%20still%20a%20major%20barrier%20to%20cloud%20computing%20adoption%20%5Cu2013%20especially%20when%20sensitive%20data%20is%20involved.%20While%20current%20privacy-enhancing%20technologies%2C%20such%20as%20homomorphic%20encryption%2C%20can%20increase%20security%2C%20they%20come%20with%20a%20considerable%20performance%20overhead.%20As%20an%20alternative%20Trusted%20Executing%20Environment%20%28TEE%29%20provides%20trust%20guarantees%20for%20code%20execution%20in%20the%20cloud%20similar%20to%20transport%20layer%20security%20for%20data%20transport%20or%20advanced%20encryption%20standard%20algorithms%20for%20data%20storage.%20Cloud%20infrastructure%20providers%20like%20Amazon%2C%20Google%2C%20and%20Microsoft%20introduced%20TEEs%20as%20part%20of%20their%20infrastructure%20offerings.%20This%20review%20will%20shed%20light%20on%20the%20different%20technological%20options%20of%20TEEs%2C%20as%20well%20as%20give%20insight%20into%20organizational%20issues%20regarding%20their%20usage.%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%222624-9898%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.frontiersin.org%5C%2Farticles%5C%2F10.3389%5C%2Ffcomp.2022.930741%22%2C%22collections%22%3A%5B%22ZUUVCL58%22%5D%2C%22dateModified%22%3A%222023-09-01T10%3A11%3A24Z%22%7D%7D%2C%7B%22key%22%3A%2242QGT9KD%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A3751512%2C%22username%22%3A%22ebertolino%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Febertolino%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Ambuehl%20and%20Inauen%22%2C%22parsedDate%22%3A%222022-10-06%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EAmbuehl%2C%20B.%2C%20%26amp%3B%20Inauen%2C%20J.%20%282022%29.%20Contextualized%20Measurement%20Scale%20Adaptation%3A%20A%204-Step%20Tutorial%20for%20Health%20Psychology%20Research.%20%3Ci%3EInternational%20Journal%20of%20Environmental%20Research%20and%20Public%20Health%3C%5C%2Fi%3E%2C%20%3Ci%3E19%3C%5C%2Fi%3E%2819%29%2C%2012775.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3390%5C%2Fijerph191912775%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3390%5C%2Fijerph191912775%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Contextualized%20Measurement%20Scale%20Adaptation%3A%20A%204-Step%20Tutorial%20for%20Health%20Psychology%20Research%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Benjamin%22%2C%22lastName%22%3A%22Ambuehl%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jennifer%22%2C%22lastName%22%3A%22Inauen%22%7D%5D%2C%22abstractNote%22%3A%22Health%20psychology%20research%20is%20inherently%20context%20specific%3A%20Different%20health%20behaviors%20are%20executed%20by%20different%20target%20groups%20%28e.g.%2C%20gender%2C%20age%29%20in%20different%20social%20structures%2C%20cultures%2C%20and%20environments.%20This%20asks%20for%20the%20adaptation%20of%20research%20instruments%20to%20enhance%20specificity.%20For%20example%2C%20when%20using%20measurement%20scales%20in%20new%20contexts%2C%20translation%20and%20psychometric%20validation%20of%20the%20instruments%20are%20necessary%20but%20not%20sufficient%20if%20the%20validity%20of%20the%20psychological%20concept%20behind%20a%20measurement%20scale%20has%20not%20been%20researched.%20In%20this%20study%2C%20we%20build%20on%20existing%20guidelines%20of%20translation%20as%20well%20as%20psychometric%20validation%20and%20present%20four%20steps%20on%20how%20to%20adapt%20measurement%20scales%20to%20a%20new%20context%3A%20Step%201%20asks%20whether%20the%20psychological%20concept%20is%20found%20in%20the%20new%20context.%20Step%202%20asks%20whether%20the%20measurement%20scale%20and%20its%20items%20are%20understood%20in%20the%20new%20context.%20Step%203%20asks%20whether%20a%20measurement%20scale%20is%20valid%20and%20reliable.%20Step%204%20asks%20how%20the%20items%20of%20the%20measurement%20scale%20perform%20individually.%20Following%20these%20four%20steps%2C%20measurement%20scales%20are%20carefully%20translated%2C%20adapted%2C%20and%20validated%20and%20can%20therefore%20be%20transferred%20to%20very%20different%20contexts.%22%2C%22date%22%3A%222022-10-06%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.3390%5C%2Fijerph191912775%22%2C%22ISSN%22%3A%221660-4601%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.mdpi.com%5C%2F1660-4601%5C%2F19%5C%2F19%5C%2F12775%22%2C%22collections%22%3A%5B%22ZUUVCL58%22%5D%2C%22dateModified%22%3A%222023-06-14T09%3A47%3A50Z%22%7D%7D%2C%7B%22key%22%3A%224AFLLKM9%22%2C%22library%22%3A%7B%22id%22%3A4810656%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A3751512%2C%22username%22%3A%22ebertolino%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Febertolino%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Ambuehl%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EAmbuehl%2C%20B.%2C%20Kunwar%2C%20B.%20M.%2C%20Schertenleib%2C%20A.%2C%20Marks%2C%20S.%20J.%2C%20%26amp%3B%20Inauen%2C%20J.%20%282022%29.%20Can%20participation%20promote%20psychological%20ownership%20of%20a%20shared%20resource%3F%20An%20intervention%20study%20of%20community-based%20safe%20water%20infrastructure.%20%3Ci%3EJournal%20of%20Environmental%20Psychology%3C%5C%2Fi%3E%2C%20%3Ci%3E81%3C%5C%2Fi%3E%2C%20101818.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.jenvp.2022.101818%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.jenvp.2022.101818%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Can%20participation%20promote%20psychological%20ownership%20of%20a%20shared%20resource%3F%20An%20intervention%20study%20of%20community-based%20safe%20water%20infrastructure%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Benjamin%22%2C%22lastName%22%3A%22Ambuehl%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Bal%20Mukunda%22%2C%22lastName%22%3A%22Kunwar%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ariane%22%2C%22lastName%22%3A%22Schertenleib%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sara%20J.%22%2C%22lastName%22%3A%22Marks%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jennifer%22%2C%22lastName%22%3A%22Inauen%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%2206%5C%2F2022%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.jenvp.2022.101818%22%2C%22ISSN%22%3A%2202724944%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flinkinghub.elsevier.com%5C%2Fretrieve%5C%2Fpii%5C%2FS0272494422000639%22%2C%22collections%22%3A%5B%22ZUUVCL58%22%5D%2C%22dateModified%22%3A%222023-06-14T09%3A47%3A06Z%22%7D%7D%5D%7D
Geppert, T., Anderegg, J., Frei, L., Moeller, S., Deml, S., Sturzenegger, D., & Ebert, N. (2022). Overcoming cloud concerns with trusted execution environments?: exploring the organizational perception of a novel security technology in regulated Swiss companies. 55th Hawaii International Conference on System Sciences (HICSS), Virtual, 3-7 January 2022, 6822–6829.
Geppert, T., Deml, S., Sturzenegger, D., & Ebert, N. (2022). Trusted Execution Environments: Applications and Organizational Challenges. Frontiers in Computer Science, 4. https://www.frontiersin.org/articles/10.3389/fcomp.2022.930741
Ambuehl, B., & Inauen, J. (2022). Contextualized Measurement Scale Adaptation: A 4-Step Tutorial for Health Psychology Research. International Journal of Environmental Research and Public Health, 19(19), 12775. https://doi.org/10.3390/ijerph191912775
Ambuehl, B., Kunwar, B. M., Schertenleib, A., Marks, S. J., & Inauen, J. (2022). Can participation promote psychological ownership of a shared resource? An intervention study of community-based safe water infrastructure. Journal of Environmental Psychology, 81, 101818. https://doi.org/10.1016/j.jenvp.2022.101818