{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:08:42Z","timestamp":1763507322039,"version":"3.45.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030902377"},{"type":"electronic","value":"9783030902384"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90238-4_21","type":"book-chapter","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T07:11:14Z","timestamp":1637305874000},"page":"298-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Impact of the Cyber Hygiene Intelligence and Performance (CHIP) Interface on Cyber Situation Awareness and Cyber Hygiene"],"prefix":"10.1007","author":[{"given":"Janine D.","family":"Mator","sequence":"first","affiliation":[]},{"given":"Jeremiah D.","family":"Still","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,20]]},"reference":[{"key":"21_CR1","unstructured":"Ng, B.Y., Xu, Y.: Studying users\u2019 computer security behavior using the Health Belief Model. In: Pacific Asia Conference on Information Systems (PACIS) 2007 Proceedings, vol. 45, pp. 423\u2013437 (2007)"},{"issue":"1","key":"21_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MITP.2011.6","volume":"13","author":"MJ Assante","year":"2011","unstructured":"Assante, M.J., Tobey, D.H.: Enhancing the cybersecurity workforce. IT Prof. 13(1), 12\u201315 (2011)","journal-title":"IT Prof."},{"issue":"3","key":"21_CR3","first-page":"176","volume":"3","author":"FA Aloul","year":"2012","unstructured":"Aloul, F.A.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176\u2013183 (2012)","journal-title":"J. Adv. Inf. Technol."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Nagarajan, A., Allbeck, J.M., Sood, A., Janssen, T.L.: Exploring game design for cybersecurity training. In: 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 256\u2013262 (2012)","DOI":"10.1109\/CYBER.2012.6392562"},{"key":"21_CR5","first-page":"36","volume":"42","author":"AA Cain","year":"2018","unstructured":"Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36\u201345 (2018)","journal-title":"J. Inf. Secur. Appl."},{"key":"21_CR6","unstructured":"Carter, A.: The Department of Defense cyber strategy. The US Department of Defense, Washington, DC (2015). https:\/\/archive.defense.gov\/home\/features\/2015\/0415_cyber-strategy\/final_2015_dod_cyber_strategy_for_web.pdf. Accessed 10 June 2021"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11496137_7","volume-title":"Applied Cryptography and Network Security, ACNS 2005","author":"V Griffith","year":"2005","unstructured":"Griffith, V., Jakobsson, M.: Messin\u2019 with Texas deriving mother\u2019s maiden names using public records. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) Applied Cryptography and Network Security, ACNS 2005, vol. 3531, pp. 91\u2013103. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_7"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Rabkin, A.: Personal knowledge questions for fallback authentication: security questions in the era of Facebook. In: Proceedings of the 4th Symposium on Usable Privacy and Security, pp. 13\u201323 (2008)","DOI":"10.1145\/1408664.1408667"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 373\u2013382 (2010)","DOI":"10.1145\/1753326.1753383"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Malkin, N., Mathur, A., Harbach, M., Egelman, S.: Personalized security messaging: nudges for compliance with browser warnings. In: 2nd European Workshop on Usable Security. Internet Society (2017)","DOI":"10.14722\/eurousec.2017.23008"},{"key":"21_CR11","unstructured":"Harris, M.A., Patten, K., Regan, E.: The need for BYOD mobile device security awareness and training. In: Proceedings of the Nineteenth Americas Conference on Information Systems (2013)"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(12)70091-X","volume":"9","author":"T Caldwell","year":"2012","unstructured":"Caldwell, T.: Training\u2013the weakest link. Comput. Fraud Secur. 9, 8\u201314 (2012)","journal-title":"Comput. Fraud Secur."},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2014.06.008","volume":"46","author":"U Franke","year":"2014","unstructured":"Franke, U., Brynielsson, J.: Cyber situational awareness \u2013 a systematic review of the literature. Comput. Secur. 46, 18\u201331 (2014)","journal-title":"Comput. Secur."},{"issue":"1","key":"21_CR14","first-page":"113","volume":"1","author":"EM Hutchins","year":"2011","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues Inf. Warfare Secur. Res. 1(1), 113\u2013125 (2011)","journal-title":"Leading Issues Inf. Warfare Secur. Res."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Denis, C., Karsenty, L.: Inter-usability of multi-device systems: a conceptual framework. In: Multiple User Interfaces: Cross-Platform Applications and Context-Aware Interfaces, pp. 373\u2013384 (2004)","DOI":"10.1002\/0470091703.ch17"},{"key":"21_CR16","unstructured":"Google Chrome Developers: Extensions and apps in the chrome web store. https:\/\/developer.chrome.com\/docs\/webstore\/apps_vs_extensions\/. Accessed 9 June 2021"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Rafailidis, D., Manolopoulos, Y.: Can virtual assistants produce recommendations? In: Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, pp. 1\u20136 (2019)","DOI":"10.1145\/3326467.3326468"},{"issue":"3","key":"21_CR18","doi-asserted-by":"publisher","first-page":"109","DOI":"10.17705\/1thci.00131","volume":"12","author":"B Shneiderman","year":"2020","unstructured":"Shneiderman, B.: Human-centered artificial intelligence: three fresh ideas. AIS Trans. Hum.-Comput. Interact. 12(3), 109\u2013124 (2020)","journal-title":"AIS Trans. Hum.-Comput. Interact."},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Geiger, R.S.: Are computers merely \u201csupporting\u201d cooperative work?: towards an ethnography of bot development. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work Companion, pp. 51\u201356 (2013)","DOI":"10.1145\/2441955.2441970"},{"key":"21_CR20","unstructured":"Friedman, V.: Privacy UX: Better notifications and permission requests. https:\/\/www.smashingmagazine.com\/2019\/04\/privacy-better-notifications-ux-permission-requests\/. Accessed 9 June 2021"},{"issue":"1","key":"21_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1207\/s15327051hci0701_3","volume":"7","author":"IS MacKenzie","year":"1992","unstructured":"MacKenzie, I.S.: Fitts\u2019 law as a research and design tool in human-computer interaction. Hum.-Comput. Interact. 7(1), 91\u2013139 (1992)","journal-title":"Hum.-Comput. Interact."},{"issue":"6","key":"21_CR22","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1080\/17470218.2017.1322622","volume":"71","author":"RW Proctor","year":"2018","unstructured":"Proctor, R.W., Schneider, D.W.: Hick\u2019s law for choice reaction time: a review. Q. J. Exp. Psychol. 71(6), 1281\u20131299 (2018)","journal-title":"Q. J. Exp. Psychol."},{"issue":"1","key":"21_CR23","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1509\/jmkr.43.1.39","volume":"43","author":"R Kivetz","year":"2006","unstructured":"Kivetz, R., Urminsky, O., Zheng, Y.: The goal-gradient hypothesis resurrected: purchase acceleration, illusionary goal progress, and customer retention. J. Mark. Res. 43(1), 39\u201358 (2006)","journal-title":"J. Mark. Res."},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Endsley, M.R., Garland, D.J. (eds.): Situation Awareness Analysis and Measurement. CRC Press (2000)","DOI":"10.1201\/b12461"},{"key":"21_CR25","unstructured":"Selcon, S.J., Taylor, R.M.: Evaluation of the situation awareness rating technique (SART) as a tool for aircrew systems design. Paper Presented at the AGARD AMP Symposium \u2018Situational Awareness in Aerospace Operations\u2019, Neuilly Sur Seine, France, pp. 23\u201352 (1990)"}],"container-title":["Lecture Notes in Computer Science","HCI International 2021 - Late Breaking Papers: Design and User Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90238-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:04:56Z","timestamp":1763507096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90238-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030902377","9783030902384"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90238-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}