{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:41:27Z","timestamp":1751568087517,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750749"},{"type":"electronic","value":"9783030750756"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75075-6_45","type":"book-chapter","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T07:06:40Z","timestamp":1619420800000},"page":"552-566","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["SeBeST: Security Behavior Stage Model and Its Application to OS Update"],"prefix":"10.1007","author":[{"given":"Ayane","family":"Sano","sequence":"first","affiliation":[]},{"given":"Yukiko","family":"Sawaya","sequence":"additional","affiliation":[]},{"given":"Akira","family":"Yamada","sequence":"additional","affiliation":[]},{"given":"Ayumu","family":"Kubota","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"key":"45_CR1","unstructured":"Wash, R., Rader, E.: Too much knowledge? Security beliefs and protective behaviors among United States internet users. In: Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, SOUPS, pp. 309\u2013325 (2015)"},{"key":"45_CR2","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4278\/0890-1171-12.1.38","volume":"12","author":"JO Prochaska","year":"1997","unstructured":"Prochaska, J.O., Velicer, W.F.: The transtheoretical model of health behavior. Am. J. Health Promot. 12, 38\u201348 (1997)","journal-title":"Am. J. Health Promot."},{"key":"45_CR3","first-page":"174","volume":"40","author":"WF Velicer","year":"2012","unstructured":"Velicer, W.F., Prochaska, J.O., et al.: Using the transtheoretical model for population-based approaches to health promotion and disease prevention. Homeost. Health Dis. 40, 174\u2013195 (2012)","journal-title":"Homeost. Health Dis."},{"key":"45_CR4","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","volume":"84","author":"A Bandura","year":"1977","unstructured":"Bandura, A.: Self-efficacy: toward a unifying theory of behavior change. Psychol. Rev. 84, 191\u2013215 (1977)","journal-title":"Psychol. Rev."},{"key":"45_CR5","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1126\/science.7455683","volume":"211","author":"A Tversky","year":"1981","unstructured":"Tversky, A., Kahneman, D.: The framing of decisions and the psychology of choice. Science 211, 453\u2013458 (1981)","journal-title":"Science"},{"key":"45_CR6","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1348\/135910707X246186","volume":"13","author":"A Latimer","year":"2007","unstructured":"Latimer, A., Rench, T., et al.: Promoting participation in physical activity using framed messages: an application of prospect theory. Br. J. Health. Psychol. 13, 659\u2013681 (2007)","journal-title":"Br. J. Health. Psychol."},{"key":"45_CR7","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1056\/NEJM198205273062103","volume":"306","author":"BJ McNeil","year":"1982","unstructured":"McNeil, B.J., Pauker, S.G., et al.: On the elicitation of preferences for alternative therapies. N. Engl. J. Med. 306, 1254\u20131262 (1982)","journal-title":"N. Engl. J. Med."},{"key":"45_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1080\/00223980.1994.9712709","volume":"128","author":"K Takemura","year":"1994","unstructured":"Takemura, K.: The influence of elaboration on the framing of decision. J. Psychol. 128, 33\u201339 (1994)","journal-title":"J. Psychol."},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Metalidou, E., Marinagi, C.C., et al.: The Human Factor of Information Security: Unintentional Damage Perspective, Social and Behavioral Sciences, pp. 424\u2013428 (2014)","DOI":"10.1016\/j.sbspro.2014.07.133"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Glaspie, H., Karwowski, W.: Human factors in information security culture: a literature review. In: Proceedings of the Advances in Human Factors in Cybersecurity, AHFE, pp. 269\u2013280 (2017)","DOI":"10.1007\/978-3-319-60585-2_25"},{"key":"45_CR11","unstructured":"Das, S., Kim, T.H., et al.: The effect of social influence on security sensitivity. In: Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, SOUPS, pp. 143\u2013157 (2014)"},{"key":"45_CR12","doi-asserted-by":"crossref","unstructured":"Inglesant, P.G., Sasse, M.A.: The true cost of unusable password policies: password use in the wild. In: Proceedings of the SIGCHI Conference on Human Factors in Computer Systems, CHI, pp. 383\u2013392 (2010)","DOI":"10.1145\/1753326.1753384"},{"key":"45_CR13","unstructured":"Macromill: https:\/\/www.macromill.com\/service\/. Accessed 21 Dec 2020"},{"key":"45_CR14","unstructured":"Shimizu, H.: An introduction to the statistical free software HAD: suggestions to improve teaching, learning and practice data analysis. J. Med. Inf. Commun. 1, 59\u201373 (2016)"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Sawaya, Y., Sharif, M., et al.: Self-confidence trumps knowledge: a cross-cultural study of security behaviour. In: Proceedings of the CHI Conference on Human Factors in Computer Systems, CHI, pp. 2202\u20132214 (2017)","DOI":"10.1145\/3025453.3025926"},{"key":"45_CR16","doi-asserted-by":"crossref","unstructured":"Egleman, S., Peer, E.: Scaling the security wall: developing a security behavior intentions scale (SeBIS). In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computer, CHI, pp. 2873\u20132882 (2015)","DOI":"10.1145\/2702123.2702249"},{"key":"45_CR17","first-page":"773","volume":"27","author":"JD Ndibwile","year":"2019","unstructured":"Ndibwile, J.D., Luhanga, E.T., et al.: A demographic perspective of smartphone security and its redesigned notifications. J. Inf. Process. 27, 773\u2013786 (2019)","journal-title":"J. Inf. Process."},{"key":"45_CR18","unstructured":"Mathur, A., Chetty, M.: Impact of user characteristics on attitudes towards automatic mobile application updates. In: Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security, SOUPS, pp. 175\u2013193 (2017)"},{"key":"45_CR19","unstructured":"Statcounter Global Stats: https:\/\/gs.statcounter.com\/os-market-share\/desktop\/japan. Accessed 23 Dec 2020"},{"key":"45_CR20","unstructured":"Johnson, J.: Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Guidelines Second Edition, Elsevier Inc., Impress Corporation (2014)"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75075-6_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T07:30:45Z","timestamp":1619422245000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75075-6_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750749","9783030750756"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75075-6_45","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}