{"id":"https://openalex.org/W4210487178","doi":"https://doi.org/10.1007/978-3-030-95484-0_21","title":"Transferring Update Behavior from Smartphones to Smart Consumer Devices","display_name":"Transferring Update Behavior from Smartphones to Smart Consumer Devices","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4210487178","doi":"https://doi.org/10.1007/978-3-030-95484-0_21"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-95484-0_21","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-95484-0_21","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-95484-0_21.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-95484-0_21.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006176699","display_name":"Matthias Fassl","orcid":"https://orcid.org/0000-0002-2894-3751"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]},{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Matthias Fassl","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","Saarland University, Saarbr\u00fccken, Germany"],"raw_orcid":"https://orcid.org/0000-0002-2894-3751","affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]},{"raw_affiliation_string":"Saarland University, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I91712215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016597202","display_name":"Michaela Neumayr","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michaela Neumayr","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064915415","display_name":"Oliver Schedler","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Oliver Schedler","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072958313","display_name":"Katharina Krombholz","orcid":"https://orcid.org/0000-0003-2425-3013"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Katharina Krombholz","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"raw_orcid":"https://orcid.org/0000-0003-2425-3013","affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006176699"],"corresponding_institution_ids":["https://openalex.org/I4210128801","https://openalex.org/I91712215"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":4.5327,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.92784667,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"357","last_page":"383"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8024852275848389},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.49626022577285767},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.41947007179260254},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4138026237487793},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33556199073791504}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8024852275848389},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.49626022577285767},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.41947007179260254},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4138026237487793},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33556199073791504}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-030-95484-0_21","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-95484-0_21","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-95484-0_21.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:figshare.com:article/24613740","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Transferring_Update_Behavior_from_Smartphones_to_Smart_Consumer_Devices/24613740","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"doi:10.60882/cispa.24613740.v1","is_oa":true,"landing_page_url":"https://doi.org/10.60882/cispa.24613740.v1","pdf_url":null,"source":{"id":"https://openalex.org/S7407050916","display_name":"CISPA Helmholtz Center","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/978-3-030-95484-0_21","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-95484-0_21","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-030-95484-0_21.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4210487178.pdf","grobid_xml":"https://content.openalex.org/works/W4210487178.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W584850946","https://openalex.org/W1979290264","https://openalex.org/W2028974852","https://openalex.org/W2069080128","https://openalex.org/W2129670271","https://openalex.org/W2149556457","https://openalex.org/W2163908784","https://openalex.org/W2169371034","https://openalex.org/W2338846068","https://openalex.org/W2411354024","https://openalex.org/W2508433864","https://openalex.org/W2611145822","https://openalex.org/W2624735790","https://openalex.org/W2770273620","https://openalex.org/W2794740256","https://openalex.org/W2801062299","https://openalex.org/W2914982603","https://openalex.org/W2931556662"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3209574120","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"Abstract":[0],"Automatic":[1],"updates":[2,22,31,79,85,192],"are":[3],"becoming":[4],"increasingly":[5],"common,":[6],"which":[7,42],"minimizes":[8],"the":[9,34,127],"amount":[10],"of":[11,161],"update":[12,115,152,167],"decisions":[13,168],"that":[14,60,166],"users":[15,82,150],"have":[16,23],"to":[17,37,66,78,112,147,177,197,204],"make.":[18],"Rapidly":[19],"deployed":[20],"important":[21],"a":[24,95],"major":[25],"impact":[26],"on":[27,46,117,126,170],"security.":[28],"However,":[29],"automatic":[30,51,84],"also":[32],"reduce":[33],"users\u2019":[35,114,199],"opportunities":[36],"build":[38],"useful":[39],"mental":[40],"models":[41],"makes":[43],"decision-making":[44],"harder":[45],"other":[47],"consumer":[48,158],"devices":[49,179,195],"without":[50],"updates.":[52,92],"Users":[53],"generally":[54],"transfer":[55,73],"their":[56,123],"understanding":[57],"from":[58,201],"domains":[59],"they":[61],"know":[62],"well":[63,71,176],"(i.e.":[64],"smartphones)":[65],"others.":[67],"We":[68,93,189],"investigate":[69],"how":[70,149],"this":[72],"process":[74],"works":[75],"with":[76,83,90],"respect":[77],"and":[80,119,156,186],"if":[81],"fare":[86],"worse":[87],"than":[88],"those":[89],"manual":[91],"conducted":[94,130],"formative":[96],"field":[97],"study":[98],"(":[99,134],"$$N":[100,135],"=":[101,136],"52$$":[102],"<mml:math":[103,138],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[104,139],"<mml:mrow>":[105,140],"<mml:mi>N</mml:mi>":[106,141],"<mml:mo>=</mml:mo>":[107,142],"<mml:mn>52</mml:mn>":[108],"</mml:mrow>":[109,144],"</mml:math>":[110,145],")":[111,146],"observe":[113],"settings":[116],"smartphones":[118,155],"examine":[120],"reasons":[121],"for":[122,154,193],"(de-)activation.":[124],"Based":[125],"results,":[128],"we":[129],"an":[131],"online":[132],"survey":[133],"91$$":[137],"<mml:mn>91</mml:mn>":[143],"compare":[148],"perceive":[151],"notifications":[153],"smart":[157],"devices.":[159],"One":[160],"our":[162],"main":[163],"findings":[164],"is":[165],"based":[169],"expected":[171],"changes":[172],"do":[173,182],"not":[174,183],"apply":[175],"these":[178],"since":[180],"participants":[181],"expect":[184],"meaningful":[185],"visual":[187],"changes.":[188],"suggest":[190],"naming":[191],"such":[194],"\u2018maintenance\u2019":[196],"move":[198],"expectations":[200],"\u2018new":[202],"features\u2019":[203],"\u2018ensuring":[205],"future":[206],"functionality\u2019.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
