<callout type="info" icon="true" title="Extended version of preivously published paper">
+
This is an extended version of the [[https://crocs.fi.muni.cz/public/papers/acsac2019|paper previously published]] at the Annual Computer Security Applications Conference (ACSAC) 2019.
+
</callout>
<panel type="default" title="Abstract">
<panel type="default" title="Abstract">
Line 86:
Line 90:
The collected data is presented in a single dataset (SPSS format; you can use PSPP as a free alternative). It includes the analysis syntax files to obtain the numerical results presented in the paper. For each participant, the dataset contains: 1) pre-task questionnaire answers, 2) reported trust ratings, 3) sub-task timing, 4) information on whether they browsed the Internet and 5) the interview codes assigned. Note that we do not publish the interview transcripts to preserve participant privacy.
The collected data is presented in a single dataset (SPSS format; you can use PSPP as a free alternative). It includes the analysis syntax files to obtain the numerical results presented in the paper. For each participant, the dataset contains: 1) pre-task questionnaire answers, 2) reported trust ratings, 3) sub-task timing, 4) information on whether they browsed the Internet and 5) the interview codes assigned. Note that we do not publish the interview transcripts to preserve participant privacy.
-
<button type="primary" icon="fa fa-fw fa-database">[[https://drive.google.com/drive/folders/1zzGZ0h-tBrntBPvW5qek2wRehWnIwrx-?usp=sharing|Go to artifacts repository (gDrive)]]</button>
+
<button type="primary" icon="fa fa-fw fa-database">[[https://zenodo.org/record/8242000|Go to artifacts repository (Zenodo)]]</button>