{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:41:33Z","timestamp":1751568093648,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031579158"},{"type":"electronic","value":"9783031579165"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57916-5_17","type":"book-chapter","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T03:10:10Z","timestamp":1712545810000},"page":"187-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Messages and Incentives to Promote Updating of Software on Smartphones"],"prefix":"10.1007","author":[{"given":"Ayane","family":"Sano","sequence":"first","affiliation":[]},{"given":"Yukiko","family":"Sawaya","sequence":"additional","affiliation":[]},{"given":"Takamasa","family":"Isohara","sequence":"additional","affiliation":[]},{"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,9]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Sano, A., Sawaya, Y., et al.: SeBeST: security behavior stage model and its application to OS update. In: Proceedings of the 35th International Conference on Advanced Information Networking and Applications, AINA, vol. 2, pp. 552\u2013566 (2021)","DOI":"10.1007\/978-3-030-75075-6_45"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Sano, A., Sawaya, Y., et al.: Proposal for approaches to updating software on android smartphone. In: Proceedings of the 18th International Conference on Broad-Band and Wireless Computing, Communication and Applications, BWCCA, pp. 94\u2013108 (2023)","DOI":"10.1007\/978-3-031-46784-4_9"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Sano, A., Sawaya, Y., et al.: Designing personalized OS update message based on security behavior stage model. In: Proceedings of the 18th Annual International Conference on Privacy, Security and Trust, PST (2021)","DOI":"10.1109\/PST52912.2021.9647792"},{"key":"17_CR4","unstructured":"Weinschenk, S.: 100 Things Every Designer Needs to Know About People, 2nd edn. O\u2019Reilly, Japan (2021)"},{"key":"17_CR5","unstructured":"Weinschenk, S.: 100 MORE Things Every Designer Needs to Know About People. O\u2019Reilly, Japan (2016)"},{"key":"17_CR6","volume-title":"Designing with the mind in mind: simple guide to understanding user interface design guidelines","author":"J Johnson","year":"2014","unstructured":"Johnson, J.: Designing with the mind in mind: simple guide to understanding user interface design guidelines, 2nd edn. Elsevier Inc. Impress Corporation (2014)","edition":"2"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Goel, S., Williams, K., et al.: Understanding the role of incentives in security behavior. In: Proceedings of the 53rd Hawaii International Conference on System Sciences, pp. 4241\u20134246 (2020)","DOI":"10.24251\/HICSS.2020.519"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Goel, S., Williams, K., et al.: Can financial incentives help with the struggle for security policy compliance? In: Information and Management, vol. 58, no. 2 (2021)","DOI":"10.1016\/j.im.2021.103447"},{"key":"17_CR9","unstructured":"Mathur, A., Engel, J., et al.: \u201cThey keep coming back like zombies\u201d: improving software updating interfaces. In: Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security, SOUPS, pp. 43\u201358 (2016)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Sankarapandian, K., Little, T., Edwards, W.K.: TALC: using desktop graffiti to fight software vulnerability. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI, pp. 1055\u20131064 (2008)","DOI":"10.1145\/1357054.1357218"},{"key":"17_CR11","first-page":"773","volume":"27","author":"JD Ndibwile","year":"2019","unstructured":"Ndibwile, J.D., Luhanga, E.T., et al.: A demographic perspective of smartphone security and its redesigned notifications. J. Inf. Process. 27, 773\u2013786 (2019)","journal-title":"J. Inf. Process."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Tian, Y., Liu, B., et al.: Supporting privacy-conscious app update decisions with user reviews. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM, pp. 51\u201361 (2015)","DOI":"10.1145\/2808117.2808124"},{"key":"17_CR13","unstructured":"Google Play. https:\/\/play.google.com\/store\/games?hl=en-JP. Accessed 20 Nov 2023"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Bravo-Lillo, C., Cranor, L.F., et al.: Your attention please: designing security-decision UIs to make genuine risks harder to ignore. In: Proceedings of the Ninth USENIX Conference on Usable Privacy and Security, SOUPS, pp. 1\u201312 (2013)","DOI":"10.1145\/2501604.2501610"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ainslie, A., et al.: Improving SSL warnings: comprehension and adherence. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI, pp. 2893\u20132902 (2015)","DOI":"10.1145\/2702123.2702442"},{"key":"17_CR16","unstructured":"Felt, A.P., Reeder, R.W., et al.: Rethinking connection security indicators. In: Proceedings of the Twelfth Symposium on Usable Privacy and Security, SOUPS, pp. 1\u201314 (2016)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Turland, J., Coventry, L., et al.: Nudging towards security: developing an application for wireless network selection for android phones. In: Proceedings of the 2015 British HCI Conference, pp. 193\u2013201 (2015)","DOI":"10.1145\/2783446.2783588"},{"key":"17_CR18","unstructured":"Golla, M., Ho, G., et al.: Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns, SOUPS, pp. 109\u2013126 (2021)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Stokes, J., August, T., et al.: How language formality in security and privacy interfaces impacts intended compliance. In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI, pp. 1\u201312 (2023)","DOI":"10.1145\/3544548.3581275"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Olwal, A., Lachanas, D., Zacharouli, E.: OldGen: mobile phone personalization for older adults. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3393\u20133396 (2011)","DOI":"10.1145\/1978942.1979447"},{"key":"17_CR21","unstructured":"Material Design: https:\/\/m2.material.io\/design\/guidelines-overview. Accessed 20 Nov 2023"},{"key":"17_CR22","unstructured":"Cross Marketing Inc. https:\/\/www.cross-m.co.jp\/en\/. Accessed 22 Nov 2023"},{"key":"17_CR23","unstructured":"Shimizu, H.: An introduction to the statistical free software HAD: Suggestions to improve teaching, learning and practice data analysis. J. Media Inf. Commun. 59\u201373 (2016)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57916-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T03:22:25Z","timestamp":1712546545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57916-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031579158","9783031579165"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57916-5_17","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"9 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}