Risk Cues for Supporting Online Self-Disclosure De-
cisions. Information, 11(8):399.
Egelman, S., Sotirakopoulos, A., Muslukhov, I., Beznosov,
K., and Herley, C. (2013). Does my password go up
to eleven? The impact of password meters on pass-
word selection. In Proceedings of the SIGCHI Confer-
ence on Human Factors in Computing Systems, pages
2379–2388.
Fischer, A. R. H. (2017). Perception of Product Risks.
In Emilien, G., Weitkunat, R., and L
¨
udicke, F., edi-
tors, Consumer Perception of Product Risks and Ben-
efits, pages 175–190. Springer International Publish-
ing, Cham.
Garigliano, R. and Mich, L. (2019). Looking Inside the
Black Box: Core Semantics Towards Accountability
of Artificial Intelligence. In From Software Engineer-
ing to Formal Methods and Tools, and Back, pages
250–266. Springer.
Hage, H., A
¨
ımeur, E., and Guedidi, A. (2020). Understand-
ing the landscape of online deception. In Navigating
Fake News, Alternative Facts, and Misinformation in
a Post-Truth World, pages 290–317. IGI Global.
Hamari, J. and Koivisto, J. (2013). Social Motivations To
Use Gamification: An Empirical Study Of Gamifying
Exercise. In Proceedings of the 21st European Con-
ference on Information Systems (ECIS).
Howah, K. and Chugh, R. (2019). Do We Trust the Inter-
net?: Ignorance and Overconfidence in Downloading
and Installing Potentially Spyware-Infected Software.
Journal of Global Information Management (JGIM),
27(3):87–100.
Kim, H. K. (2017). Risk Communication. In Emilien,
G., Weitkunat, R., and L
¨
udicke, F., editors, Consumer
Perception of Product Risks and Benefits, pages 125–
149. Springer International Publishing, Cham.
Knijnenburg, B. P. (2014). Information Disclosure Profiles
for Segmentation and Recommendation. In Sympo-
sium on Usable Privacy and Security (SOUPS).
Kr
¨
amer, N. C. and Sch
¨
awel, J. (2020). Mastering the chal-
lenge of balancing self-disclosure and privacy in so-
cial media. Current Opinion in Psychology, 31.
Krombholz, K., Hobel, H., Huber, M., and Weippl, E.
(2015). Advanced social engineering attacks. Jour-
nal of Information Security and applications, 22:113–
122.
Marmion, V., Bishop, F., Millard, D. E., and Stevenage,
S. V. (2017). The Cognitive Heuristics Behind Disclo-
sure Decisions. In International Conference on Social
Informatics, pages 591–607. Springer.
Masur, P. K. (2019). Privacy and self-disclosure in the
age of information. In Situational Privacy and Self-
Disclosure, pages 105–129. Springer.
M
¨
uller, V. C. (2020). Ethics of Artificial Intelligence and
Robotics. In Zalta, E. N., editor, The Stanford En-
cyclopedia of Philosophy. Metaphysics Research Lab,
Stanford University, fall 2020 edition.
Peer, E., Egelman, S., Harbach, M., Malkin, N., Mathur, A.,
and Frik, A. (2020). Nudge Me Right: Personalizing
Online Nudges to People’s Decision-Making Styles.
Computers in Human Behavior, 109:106347.
Penni, J. (2017). The Future of Online Social Networks
(OSN): A Measurement Analysis Using Social Media
Tools and Application. Telematics and Informatics,
34(5):498–517.
Petkos, G., Papadopoulos, S., and Kompatsiaris, Y. (2015).
PScore: A Framework for Enhancing Privacy Aware-
ness in Online Social Networks. In 2015 10th Interna-
tional Conference on Availability, Reliability and Se-
curity, pages 592–600. IEEE.
Renaud, K. and Zimmermann, V. (2018). Ethical guide-
lines for nudging in information security & privacy.
International Journal of Human-Computer Studies,
120:22–35.
Sanchez, D. and Viejo, A. (2015). Privacy Risk Assessment
of Textual Publications in Social Networks. In Pro-
ceedings of the International Conference on Agents
and Artificial Intelligence - Volume 1, ICAART 2015,
pages 236–241, Setubal, PRT. SCITEPRESS - Sci-
ence and Technology Publications, Lda.
Susser, D. (2019). Invisible Influence: Artificial Intelli-
gence and the Ethics of Adaptive Choice Architec-
tures. In Proceedings of the 2019 AAAI/ACM Con-
ference on AI, Ethics, and Society, pages 403–408.
Tsikerdekis, M. and Zeadally, S. (2014). Online Decep-
tion in Social Media. Communications of the ACM,
57(9):72.
Turland, J., Coventry, L., Jeske, D., Briggs, P., and van
Moorsel, A. (2015). Nudging towards Security: De-
veloping an Application for Wireless Network Selec-
tion for Android Phones. In Proceedings of the 2015
British HCI Conference, British HCI ’15, pages 193–
201, New York, NY, USA. Association for Computing
Machinery.
Vassileva, J. (2012). Motivating participation in social
computing applications: a user modeling perspective.
User Modeling and User-Adapted Interaction, 22(1-
2):177–201.
Wang, Y., Leon, P. G., Scott, K., Chen, X., Acquisti, A., and
Cranor, L. F. (2013). Privacy Nudges for Social Me-
dia: An Exploratory Facebook Study. In Proceedings
of the 22nd International Conference on World Wide
Web, pages 763–770.
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon,
P. G., and Cranor, L. F. (2011). “I regretted the minute
I pressed share”: A Qualitative Study of Regrets on
Facebook. In Proceedings of the 7th Symposium on
Usable Privacy and Security, SOUPS 2011, pages 1–
16. ACM.
Warberg, L., Acquisti, A., and Sicker, D. (2019). Can
Privacy Nudges be Tailored to Individuals’ Decision
Making and Personality Traits? In Proceedings of the
18th ACM Workshop on Privacy in the Electronic So-
ciety, WPES’19, pages 175–197. ACM.
Weinmann, M., Schneider, C., and vom Brocke, J. (2016).
Digital Nudging. Business & Information Systems En-
gineering, 58(6):433–436.
Williams, D. J. and Noyes, J. M. (2007). How does our
perception of risk influence decision-making? Impli-
cations for the design of risk information. Theoretical
Issues in Ergonomics Science, 8(1):1–35.
Persuasion Meets AI: Ethical Considerations for the Design of Social Engineering Countermeasures
211