{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T22:09:00Z","timestamp":1758924540269,"version":"3.41.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_23","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"353-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Understanding the Last Line of Defense: Human Response to Cybersecurity Events"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1095-3433","authenticated-orcid":false,"given":"Summer","family":"Rebensky","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0859-4785","authenticated-orcid":false,"given":"Meredith","family":"Carroll","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0887-0265","authenticated-orcid":false,"given":"Andrew","family":"Nakushian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4338-7052","authenticated-orcid":false,"given":"Maria","family":"Chaparro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3186-0594","authenticated-orcid":false,"given":"Tricia","family":"Prior","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"23_CR1","unstructured":"GAO, Cybersecurity: Actions needed to strengthen U.S. Capabilities, GAO-17-440T, Washington, D.C., 14 February 2017"},{"key":"23_CR2","unstructured":"Chief of Naval Personnel Public Affairs: Security Breach Notification of Sailors\u2019 PII FAQ (2016). https:\/\/www.public.navy.mil\/bupers-npc\/Documents\/PII_Data_Breach_FAQ.pdf"},{"key":"23_CR3","unstructured":"Morgan, S.: 2017 cybercrime report. Cybersecurity Ventures (2017)"},{"key":"23_CR4","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1089\/cyber.2014.1502","volume":"17","author":"BK Wiederhold","year":"2014","unstructured":"Wiederhold, B.K.: The role of psychology in enhancing cybersecurity. Cyberpsychology Behav. Soc. Netw. 17, 131\u2013132 (2014)","journal-title":"Cyberpsychology Behav. Soc. Netw."},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Suresh, P., Daniel, J.V., Parthasarathy, V., Aswathy, R.H.: A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment. In: 2014 International Conference on Science Engineering and Management Research (ICSEMR), pp. 1\u20138 (2014). https:\/\/doi.org\/10.1109\/ICSEMR.2014.7043637","DOI":"10.1109\/ICSEMR.2014.7043637"},{"key":"23_CR6","unstructured":"Covington, H.: Smart homes: IoT security and ethical concerns. In: Proceedings for the Northeast Region Decision Sciences Institute (NEDSI), pp. 531\u2013547 (2019)"},{"key":"23_CR7","doi-asserted-by":"publisher","unstructured":"Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. In: Proceedings of the ACM on Human-Computer Interaction (2018). https:\/\/doi.org\/10.1145\/3274469","DOI":"10.1145\/3274469"},{"key":"23_CR8","doi-asserted-by":"publisher","unstructured":"Breitinger, F., Tully-Doyle, R., Hassenfeldt, C.: A survey on smartphone user\u2019s security choices, awareness and education. Comput. Secur. 88  (2020). https:\/\/doi-org.portal.lib.fit.edu. https:\/\/doi.org\/10.1016\/j.cose.2019.101647","DOI":"10.1016\/j.cose.2019.101647"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.chb.2017.12.001","volume":"81","author":"H Choi","year":"2018","unstructured":"Choi, H., Park, J., Jung, Y.: The role of privacy fatigue in online privacy behavior. Comput. Hum. Behav. 81, 42\u201351 (2018). https:\/\/doi.org\/10.1016\/j.chb.2017.12.001","journal-title":"Comput. Hum. Behav."},{"key":"23_CR10","unstructured":"Pienta, D., Sun, H., Thatcher, J.: Habitual and misplaced trust: the role of the dark side of trust between individual users and cybersecurity systems. In: 2016 International Conference on Information Systems (2016)"},{"issue":"1","key":"23_CR11","first-page":"141","volume":"34","author":"S Mittal","year":"2017","unstructured":"Mittal, S.: Understanding the human dimension of cyber security. Indian J. Criminol. Criminalistics 34(1), 141\u2013152 (2017)","journal-title":"Indian J. Criminol. Criminalistics"},{"issue":"2","key":"23_CR12","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.cose.2011.12.001","volume":"31","author":"H Rhee","year":"2012","unstructured":"Rhee, H., Ryu, Y., Kim, C.: Unrealistic optimism on information security management. Comput. Secur. 31(2), 221\u2013232 (2012)","journal-title":"Comput. Secur."},{"issue":"4","key":"23_CR13","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.cose.2011.12.010","volume":"31","author":"SL Pfleeger","year":"2012","unstructured":"Pfleeger, S.L., Caputo, D.D.: Leveraging behavioral science to mitigate cybersecurity risk. Comput. Secur. 31(4), 597\u2013611 (2012)","journal-title":"Comput. Secur."},{"key":"23_CR14","unstructured":"Coovert, M.D., Dreibelbis, R., Borum, R.: Factors influencing the human-technology interface for effective cyber security performance. In: Zaccaro, S.J., Dalal, R.S., Tetrick, L.E., Steinke, J.A. (eds.) Psychosocial Dynamics of Cyber Security, pp. 267\u2013290. Routledge (2016)"},{"issue":"3","key":"23_CR15","first-page":"41","volume":"10","author":"LJ Albert","year":"2019","unstructured":"Albert, L.J., Rodan, S., Aggarwal, N., Hill, T.R.: Gender and generational differences in consumers\u2019 perceptions of internet of things (IoT) devices. E-J. Soc. Behav. Res. Bus. 10(3), 41\u201353 (2019)","journal-title":"E-J. Soc. Behav. Res. Bus."},{"volume-title":"Psychosocial Dynamics of Cyber Security","year":"2016","key":"23_CR16","unstructured":"Zaccaro, S.J., Dalal, R.S., Tetrick, L.E., Steinke, J.A. (eds.): Psychosocial Dynamics of Cyber Security. Routledge, Milton Park (2016)"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Burns, A., Roberts, T., Posey, C., Bennett, R., Courtney, J.: Assessing the role of security education, training, and awareness on \u2018insiders\u2019 security-related behavior: an expectancy theory approach. In: 2015 48th Hawaii International Conference on System Sciences (2015)","DOI":"10.1109\/HICSS.2015.471"},{"issue":"6","key":"23_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MIS.2009.124","volume":"24","author":"RR Hoffman","year":"2009","unstructured":"Hoffman, R.R., Lee, J.D., Woods, D.D., Shadbolt, N., Miller, J., Bradshaw, J.M.: The dynamics of trust in cyberdomains. IEEE Intell. Syst. 24(6), 5\u201311 (2009)","journal-title":"IEEE Intell. Syst."},{"issue":"1","key":"23_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1518\/hfes.46.1.50_30392","volume":"46","author":"JD Lee","year":"2004","unstructured":"Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors 46(1), 50\u201380 (2004). https:\/\/doi.org\/10.1518\/hfes.46.1.50_30392","journal-title":"Hum. Factors"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Conti, G., Ahamad, M., Stasko, J.: Attacking information visualization system usability overloading and deceiving the human. In: Proceedings SOUPS\u2019 2005 (2005)","DOI":"10.1145\/1073001.1073010"},{"issue":"3","key":"23_CR21","doi-asserted-by":"publisher","first-page":"64","DOI":"10.3390\/technologies6030064","volume":"6","author":"A AlHogail","year":"2018","unstructured":"AlHogail, A.: Improving IoT technology adoption through improving consumer trust. Technologies 6(3), 64 (2018). https:\/\/doi.org\/10.3390\/technologies6030064","journal-title":"Technologies"},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1002\/sec.787","volume":"7","author":"Y Jang","year":"2014","unstructured":"Jang, Y., Chang, S., Tsai, Y.: Smartphone security: understanding smartphone \u2019users\u2019 trust in information security management. Secur. Commun. Netw. 7, 1313\u20131321 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"23_CR23","doi-asserted-by":"publisher","unstructured":"Daubert, J., Wiesmaier, A., Kikiras, P.: A view on privacy & trust in IoT. In: 2015 IEEE International Conference on Communication Workshop, ICCW 2015, pp. 2665\u20132670 (2015). https:\/\/doi.org\/10.1109\/ICCW.2015.7247581","DOI":"10.1109\/ICCW.2015.7247581"},{"issue":"2","key":"23_CR24","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s10796-010-9253-1","volume":"14","author":"M Lee","year":"2010","unstructured":"Lee, M., Lee, J.: The impact of information security failure on customer behaviors: a study on a large-scale hacking incident on internet. Inf. Syst. Front. 14(2), 375\u2013393 (2010)","journal-title":"Inf. Syst. Front."},{"issue":"2","key":"23_CR25","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2011.180","volume":"10","author":"S Furman","year":"2012","unstructured":"Furman, S., Theofanos, M., Choong, Y., Stanton, B.: Basing cybersecurity training on user perceptions. IEEE Secur. Priv. 10(2), 40\u201349 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.chb.2015.01.039","volume":"48","author":"N Ben-Asher","year":"2015","unstructured":"Ben-Asher, N., Gonzalez, C.: Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 48, 51\u201361 (2015). https:\/\/doi.org\/10.1016\/j.chb.2015.01.039","journal-title":"Comput. Hum. Behav."},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1023\/B:GRUP.0000021839.04093.5d","volume":"13","author":"S Grazioli","year":"2004","unstructured":"Grazioli, S.: Where did they go wrong? An analysis of the failure of knowledgeable Internet consumers to detect deception over the Internet. Group Decis. Negot. 13, 149\u2013172 (2004)","journal-title":"Group Decis. Negot."},{"issue":"5","key":"23_CR28","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1177\/0018720815585906","volume":"57","author":"RW Proctor","year":"2015","unstructured":"Proctor, R.W., Chen, J.: The role of human factors\/ergonomics in the science of security: decision making and action selection in cyberspace. Hum. Factors 57(5), 721\u2013727 (2015)","journal-title":"Hum. Factors"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Legg, P.A.: Enhancing cyber situation awareness for Non-Expert Users using visual analytics. In: 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (2016)","DOI":"10.1109\/CyberSA.2016.7503278"},{"issue":"3","key":"23_CR30","doi-asserted-by":"publisher","first-page":"28","DOI":"10.4018\/IJCWT.2015070103","volume":"5","author":"L Hirshfield","year":"2015","unstructured":"Hirshfield, L., et al.: The role of the device users\u2019 suspicion in the detection of cyber attacks. Int. J. Cyber Warfare Terrorism 5(3), 28\u201344 (2015)","journal-title":"Int. J. Cyber Warfare Terrorism"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Mahoney, S., Rothe, E., Steinke, K., Pfautz, J., Wu, C., Farry, M.: A cognitive task analysis for cyber situational awareness. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 54, no. 4 (2010)","DOI":"10.1177\/154193121005400403"},{"issue":"7","key":"23_CR32","first-page":"394","volume":"11","author":"L Huigang","year":"2010","unstructured":"Huigang, L., Yaijong, X.: Understanding security behaviors in personal computer usage: a threat avoidance perspective. J. Assoc. Inf. Syst. 11(7), 394\u2013413 (2010)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"6221","key":"23_CR33","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"},{"key":"23_CR34","doi-asserted-by":"publisher","unstructured":"Brough, A.R., Martin, K.D.: Critical roles of knowledge and motivation in privacy research. Curr. Opinion Psychol. 31, 11\u201315 (2020). https:\/\/doi-org.portal.lib.fit.edu. https:\/\/doi.org\/10.1016\/j.copsyc.2019.06.021","DOI":"10.1016\/j.copsyc.2019.06.021"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Kelley, T., Bertenthal, B.: Real-world decision making: logging into vs. insecure website. In: USEC 2016 (2016)","DOI":"10.14722\/usec.2016.23023"},{"issue":"4","key":"23_CR36","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/s10669-013-9473-2","volume":"33","author":"H Rosoff","year":"2013","unstructured":"Rosoff, H., Cui, J., John, R.: Heuristics and biases in cyber security dilemmas. Environ. Syst. Decis. 33(4), 517\u2013529 (2013)","journal-title":"Environ. Syst. Decis."},{"issue":"7","key":"23_CR37","first-page":"394","volume":"11","author":"H Liang","year":"2010","unstructured":"Liang, H., Xue, Y.: Understanding security behaviors in personal computer usage: a threat avoidance perspective. J. Assoc. Inf. Syst. 11(7), 394 (2010)","journal-title":"J. Assoc. Inf. Syst."},{"key":"23_CR38","unstructured":"Sharma, K.: Impact of framing and priming on \u2018users\u2019 behavior in cybersecurity. Masters thesis (2017)"},{"key":"23_CR39","doi-asserted-by":"publisher","unstructured":"Lee, H., Kobsa, A.: Understanding user privacy in Internet of Things environments. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 407\u2013412 (2016). https:\/\/doi.org\/10.1109\/wf-iot.2016.7845392","DOI":"10.1109\/wf-iot.2016.7845392"},{"key":"23_CR40","doi-asserted-by":"crossref","unstructured":"Jia, Y.J., et al.: ContexloT: towards providing contextual integrity to appified IoT platforms. In: NDSS, vol. 2, no. 2, p. 2 (2017)","DOI":"10.14722\/ndss.2017.23051"},{"key":"23_CR41","doi-asserted-by":"publisher","unstructured":"Emami-Naeini, P., Agarwal, Y., Faith Cranor, L., Hibshi, H.: Ask the experts: what should be on an IoT privacy and security label? In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 447\u2013464 (2020). https:\/\/doi-org.portal.lib.fit.edu. https:\/\/doi.org\/10.1109\/SP40000.2020.00043","DOI":"10.1109\/SP40000.2020.00043"},{"key":"23_CR42","doi-asserted-by":"crossref","unstructured":"Bowen, B.M., Devarajan, R., Stolfo, S.: Measuring the human factor of cyber security. In: 2011 IEEE International Conference Technologies for Homeland Security (HST), pp. 230\u2013235. IEEE (2011)","DOI":"10.1109\/THS.2011.6107876"},{"key":"23_CR43","doi-asserted-by":"crossref","unstructured":"Fagan, M., Fagan, M., Megas, K.N., Scarfone, K., Smith, M.: Foundational cybersecurity activities for IOT device manufacturers. US Department of Commerce, National Institute of Standards and Technology (2020)","DOI":"10.6028\/NIST.IR.8259"},{"key":"23_CR44","doi-asserted-by":"publisher","unstructured":"Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6(5), 8182\u20138201 (2019). https:\/\/doi-org.portal.lib.fit.edu. https:\/\/doi.org\/10.1109\/JIOT.2019.2935189","DOI":"10.1109\/JIOT.2019.2935189"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:26:41Z","timestamp":1751495201000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}