{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:48Z","timestamp":1751602308185,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_24","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:33:26Z","timestamp":1745307206000},"page":"282-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Do Regularly Personalized Security Messages Cause Habituation?"],"prefix":"10.1007","author":[{"given":"Ayane","family":"Sano","sequence":"first","affiliation":[]},{"given":"Yukiko","family":"Sawaya","sequence":"additional","affiliation":[]},{"given":"Takamasa","family":"Isohara","sequence":"additional","affiliation":[]},{"given":"Vanessa","family":"Bracamonte","sequence":"additional","affiliation":[]},{"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Sano, A., Sawaya, Y., et al.: SeBeST: security behavior stage model and its application to OS update. In: Proceeding of 35th International Conference on Advanced Information Networking and Applications, AINA, vol. 2, pp. 552\u2013566 (2021)","DOI":"10.1007\/978-3-030-75075-6_45"},{"key":"24_CR2","unstructured":"Statcounter GlobalStats mobile operating system market share worldwide: https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Accessed 17 Jan 2025"},{"key":"24_CR3","unstructured":"Statcounter GlobalStats mobile & tablet android version market share worldwide: https:\/\/gs.statcounter.com\/os-version-market-share\/android\/mobile-tablet\/worldwide. Accessed 17 Jan 2025"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Sano, A., Sawaya, Y., et al.: Proposal for approaches to updating software on android smartphone. In: Proceeding of 18th International Conference on Broad-Band and Wireless Computing, Communication and Applications, BWCCA, pp. 94\u2013108 (2023)","DOI":"10.1007\/978-3-031-46784-4_9"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Sano, A., Sawaya, Y., et al.: Messages and incentives to promote updating of software on smartphones. In: Proceeding of 38th International Conference on Advanced Information Networking and Applications, AINA, vol. 4, pp. 187\u2013200 (2024)","DOI":"10.1007\/978-3-031-57916-5_17"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Krol, K., Moroz, M., Sasse, M.A.: Don\u2019t work. Can\u2019t work? Why it\u2019s time to rethink security warnings. In: Proceeding of 7th International Conference on Risks and Security of Internet and Systems, CRiSIS, pp. 1\u20138 (2012)","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Anderson, B.B., Kirwan, C.B., et al.: How polymorphic warnings reduce habituation in the brain: Insights from an FMRI study. In: Proceeding of 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI, pp. 2883\u20132892 (2015)","DOI":"10.1145\/2702123.2702322"},{"key":"24_CR8","unstructured":"Vance, A., Eargle, D., et al.: The fog of warnings: how non-essential messages blur with security warnings. In: Proceeding of Fifteenth Symposium on Usable Privacy and Security, SOUPS, pp. 407\u2013420 (2019)"},{"key":"24_CR9","unstructured":"Ebbinghaus, H.: Memory; A Contribution to Experimental Psychology, Martino Fine Books (2011)"},{"key":"24_CR10","unstructured":"Sunshine, J., Egelman, S., et al.: Crying wolf: an empirical study for ssl warning effectiveness. In: Proceeding of Eighteenth Symposium on Usenix Security Symposium, SSYM, pp. 399\u2013416 (2009)"},{"issue":"44","key":"24_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3054926","volume":"50","author":"A Acquisti","year":"2018","unstructured":"Acquisti, A., Adjerid, I., et al.: Nudges for privacy and security: understanding and assisting user\u2019s choices online. ACM Comput. Surv. 50(44), 1\u201341 (2018)","journal-title":"ACM Comput. Surv."},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Egelman, S., Tsai, J., et al.: Timing is everything? : the effects of timing and placement of online privacy indicators. In: Proceeding of SIGCHI Conference on Human Factors in Computing Systems, CHI, pp. 319\u2013328 (2009)","DOI":"10.1145\/1518701.1518752"},{"key":"24_CR13","first-page":"773","volume":"27","author":"JD Ndibwile","year":"2019","unstructured":"Ndibwile, J.D., Luhanga, E.T., Fall, D., Kadobayashi, Y.: A demographic perspective of smartphone security and its redesigned notifications. J. Inf. Process. 27, 773\u2013786 (2019)","journal-title":"J. Inf. Process."},{"key":"24_CR14","unstructured":"Mathur, A., Engel, J., Sobti, S., Chang, V., Chetty, M.: They keep coming back like zombies\u201d: improving software updating interfaces. In: Proceeding of the Twelfth USENIX Conference on Usable Privacy and Security, SOUPS, pp. 43\u201358 (2016)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Sankarapandian, K., Little, T., Edwards, W.K.: TALC: using desktop graffiti to fight software vulnerability. In: Proceeding of SIGCHI Conference on Human Factors in Computing Systems, CHI, pp. 1055\u20131064 (2008)","DOI":"10.1145\/1357054.1357218"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Tian, Y., Liu, B., et al.: Supporting privacy-conscious app update decisions with user reviews. In: Proceeding of 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM, pp. 51\u201361 (2015)","DOI":"10.1145\/2808117.2808124"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Wogalter, M.S.: Communication-human information processing (C-HIP) model. In: Forensic Human Factors and Ergonomics. CRC Press, pp. 33\u201349 (2018)","DOI":"10.1201\/9780429462269-3"},{"key":"24_CR18","unstructured":"Cranor, L.F., A framework for reasoning about the human in the loop. In: Proceeding of 1st Conference on Usability, Psychology, and Security, UPSEC, pp. 1\u201315 (2008)"},{"key":"24_CR19","unstructured":"Ministry of Internal Affairs and Communications Communications Usage Trend Survey of 2022: https:\/\/www.soumu.go.jp\/johotsusintokei\/statistics\/statistics05b1.html. Accessed 17 Jan 2025. (in Japanese)"},{"key":"24_CR20","unstructured":"Ministry of Internal Affairs and Communications WHITE PAPER information and Communications in Japan: https:\/\/www.soumu.go.jp\/johotsusintokei\/whitepaper\/eng\/WP2021\/chapter-1.pdf. Accessed 17 Jan 2025"},{"key":"24_CR21","unstructured":"Google Play: https:\/\/play.google.com\/store\/games?hl=en-JP. Accessed 17 Jan 2025"},{"key":"24_CR22","unstructured":"Android Help: Set, cancel or snooze alarms, https:\/\/support.google.com\/android\/answer\/2840926?hl=en&sjid=2125957577374273356-AP. Accessed 17 Jan 2025"},{"key":"24_CR23","unstructured":"Shimizu, H.: An introduction to the statistical free software HAD: Suggestions to improve teaching, learning and practice data analysis. J. Media Inf. Commun. 59\u201373 (2016)"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Goel, S., Williams, K., et al.: Understanding the role of incentives in security behavior. In: Proceeding of 53rd Hawaii International Conference on System Sciences, pp. 4241\u20134246 (2020)","DOI":"10.24251\/HICSS.2020.519"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Goel, S., Williams, K., et al., Can financial incentives help with the struggle for security policy compliance? Inf. Manage. 58(2) (2021)","DOI":"10.1016\/j.im.2021.103447"},{"key":"24_CR26","unstructured":"Jayakrishnan, G.C., Sirigireddy, G.R., et al.: Passworld: a serious game to promote password awareness and diversity in an enterprise. In: Proceeding of the Sixteenth Symposium on Usable Privacy and Security, SOUPS, pp. 1\u201318 (2020)"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Ganesh, A., Ndulue, C., Orji, R.: Tailoring a persuasive game to promote secure smartphone behavior. In: Proceeding of 2023 CHI Conference on Human Factors in Computing Systems, CHI, pp. 1\u201318 (2023)","DOI":"10.1145\/3544548.3581038"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:37:58Z","timestamp":1751567878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_24","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}