{"id":"https://openalex.org/W3032785516","doi":"https://doi.org/10.1145/3374135.3385314","title":"Do You See the Warning?","display_name":"Do You See the Warning?","publication_year":2020,"publication_date":"2020-04-02","ids":{"openalex":"https://openalex.org/W3032785516","doi":"https://doi.org/10.1145/3374135.3385314","mag":"3032785516"},"language":"en","primary_location":{"id":"doi:10.1145/3374135.3385314","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374135.3385314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM Southeast Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079521165","display_name":"Nisheeth Agrawal","orcid":null},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nisheeth Agrawal","raw_affiliation_strings":["Computer Science and Information Technology, Athens, AL, USA and Computer Science, University of Alabama Huntsville, Huntsville, AL, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Information Technology, Athens, AL, USA and Computer Science, University of Alabama Huntsville, Huntsville, AL, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066727108","display_name":"Feng Zhu","orcid":"https://orcid.org/0000-0003-3542-3989"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Feng Zhu","raw_affiliation_strings":["Computer Science, University of Alabama Huntsville, Huntsville, AL, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science, University of Alabama Huntsville, Huntsville, AL, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008283506","display_name":"Sandra Carpenter","orcid":"https://orcid.org/0000-0002-4627-9831"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sandra Carpenter","raw_affiliation_strings":["Psychology University of Alabama Huntsville, Huntsville, AL, USA"],"affiliations":[{"raw_affiliation_string":"Psychology University of Alabama Huntsville, Huntsville, AL, USA","institution_ids":["https://openalex.org/I82495205"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079521165"],"corresponding_institution_ids":["https://openalex.org/I82495205"],"apc_list":null,"apc_paid":null,"fwci":1.0775,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79232026,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"260","last_page":"263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14056","display_name":"Safety Warnings and Signage","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14056","display_name":"Safety Warnings and Signage","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interrupt","display_name":"Interrupt","score":0.9373313188552856},{"id":"https://openalex.org/keywords/subliminal-stimuli","display_name":"Subliminal stimuli","score":0.8940140604972839},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7176817059516907},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.7101883888244629},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.6499013304710388},{"id":"https://openalex.org/keywords/information-processing","display_name":"Information processing","score":0.452427476644516},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4188610315322876},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33459413051605225},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.19589421153068542},{"id":"https://openalex.org/keywords/cognitive-psychology","display_name":"Cognitive psychology","score":0.14056798815727234},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.11595571041107178},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10647526383399963}],"concepts":[{"id":"https://openalex.org/C41661131","wikidata":"https://www.wikidata.org/wiki/Q220764","display_name":"Interrupt","level":3,"score":0.9373313188552856},{"id":"https://openalex.org/C151496658","wikidata":"https://www.wikidata.org/wiki/Q310661","display_name":"Subliminal stimuli","level":2,"score":0.8940140604972839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7176817059516907},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.7101883888244629},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.6499013304710388},{"id":"https://openalex.org/C87868495","wikidata":"https://www.wikidata.org/wiki/Q750843","display_name":"Information processing","level":2,"score":0.452427476644516},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4188610315322876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33459413051605225},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.19589421153068542},{"id":"https://openalex.org/C180747234","wikidata":"https://www.wikidata.org/wiki/Q23373","display_name":"Cognitive psychology","level":1,"score":0.14056798815727234},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.11595571041107178},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10647526383399963},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3374135.3385314","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374135.3385314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM Southeast Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W15466915","https://openalex.org/W572688520","https://openalex.org/W1482504155","https://openalex.org/W1604970029","https://openalex.org/W1978427518","https://openalex.org/W1984906108","https://openalex.org/W2039986066","https://openalex.org/W2040881756","https://openalex.org/W2046234515","https://openalex.org/W2079479176","https://openalex.org/W2125104880","https://openalex.org/W2128551894","https://openalex.org/W2135110393","https://openalex.org/W2153746754"],"related_works":["https://openalex.org/W2065233730","https://openalex.org/W2677317338","https://openalex.org/W4288898221","https://openalex.org/W2358308054","https://openalex.org/W2109690896","https://openalex.org/W4283749653","https://openalex.org/W2391783641","https://openalex.org/W2340305899","https://openalex.org/W4231875098","https://openalex.org/W2052360580"],"abstract_inverted_index":{"Computer":[0],"warnings":[1],"are":[2,73,121,131],"often":[3],"ignored":[4],"or":[5],"dismissed":[6],"because":[7,79],"they":[8,46],"interrupt":[9,29],"people's":[10,49],"current":[11],"workflow.":[12,31],"We":[13,98],"test":[14],"a":[15],"different":[16,80,132,134],"perception":[17],"channel,":[18],"via":[19,76],"nonconscious":[20,77,126],"processing,":[21,127],"to":[22,55,94],"display":[23,61],"warning":[24,71,96,107],"and":[25,104,109],"thus":[26],"do":[27],"not":[28],"users'":[30,85,92],"Specifically,":[32],"we":[33,90],"used":[34],"subliminal":[35],"messages":[36,72],"displayed":[37],"for":[38,133],"50":[39,119],"milliseconds.":[40],"Our":[41],"previous":[42],"studies":[43],"show":[44,117],"that":[45,118],"significantly":[47],"reduce":[48],"disclosure":[50],"of":[51,125],"personal":[52],"information.":[53],"Compared":[54],"typical":[56],"cognitive":[57],"science":[58],"studies,":[59],"this":[60,88],"duration":[62],"is":[63,68],"long.":[64],"An":[65],"essential":[66],"question":[67],"whether":[69],"our":[70],"really":[74],"delivered":[75],"processing":[78],"design":[81],"elements":[82],"may":[83],"affect":[84],"perception.":[86],"In":[87],"project,":[89],"tested":[91],"reactions":[93],"three":[95,100],"message.":[97],"evaluated":[99],"important":[101],"components:":[102],"background":[103],"foreground":[105],"colors,":[106],"words,":[108],"text":[110],"format":[111],"inside":[112],"the":[113,123,129],"message":[114],"box.":[115],"Results":[116],"milliseconds":[120],"at":[122],"threshold":[124],"but":[128],"visibilities":[130],"designs.":[135]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
