{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:59:36Z","timestamp":1767319176019,"version":"3.48.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032128003","type":"print"},{"value":"9783032128010","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-12801-0_25","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:55:39Z","timestamp":1767318939000},"page":"375-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Security Support Tool for Help Recipients"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6938-2970","authenticated-orcid":false,"given":"Ayane","family":"Sano","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0432-2256","authenticated-orcid":false,"given":"Yukiko","family":"Sawaya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2371-3698","authenticated-orcid":false,"given":"Takamasa","family":"Isohara","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6048-3495","authenticated-orcid":false,"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Sano, A. Sawaya, Y, Isohara, T, Nishigaki, M.: Human factors impacting the security actions of help recipients. In: Proceedings of the BWCCA 2023, pp. 81\u201393 (2023)","DOI":"10.1007\/978-3-031-46784-4_8"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Kropczynski, J., Anaraky, R.G., et al.: Examining collaborative support for privacy and security in the broader context of tech caregiving. In: Proceedings of the CSCW 2021, pp. 1\u201323 (2021)","DOI":"10.1145\/3479540"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Mendel, T., Toch, E.: My mom was getting this popup: understanding motivations and processes in helping older relatives with mobile security and privacy. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, pp. 1\u201320 (2020)","DOI":"10.1145\/3369821"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Mendel, T., Gao, D., et al.: An exploratory study of social support systems to help older adults in managing mobile safety. In: Proceedings of the MobileHCI 2021, pp.1\u201313 (2021)","DOI":"10.1145\/3447526.3472047"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Chouhan, C., LaPerriere, C.M., et al.: Co-designing for community oversight: helping people make privacy and security decisions together. In: Proceedings of the CSCW 2019, pp.1\u201331 (2019)","DOI":"10.1145\/3359248"},{"key":"25_CR6","unstructured":"Ministry of Internal Affairs and Communications: WHITE PAPER information and Communications in Japan. https:\/\/www.soumu.go.jp\/johotsusintokei\/whitepaper\/eng\/WP2021\/chapter-3.pdf. Accessed 16 Apr 2025"},{"key":"25_CR7","unstructured":"KDDI: Awareness Raising and Education (Connecting Hearts and Minds). https:\/\/www.kddi.com\/english\/corporate\/sustainability\/educate\/. Accessed 16 Apr 2025"},{"key":"25_CR8","unstructured":"The Mainichi: Smartphone classes taught by teens attract flood of elderly applicants in central Japan. https:\/\/mainichi.jp\/english\/articles\/20220816\/p2a\/00m\/0na\/020000c. Accessed 16 Apr 2025"},{"key":"25_CR9","unstructured":"Kyodo News: FEATURE: Japan local gov\u2019ts helping aged people learn how to use smartphone. https:\/\/english.kyodonews.net\/news\/2021\/11\/a52b5f784700-feature-local-govts-helping-aged-people-learn-how-to-use-smartphone.html. Accessed 16 Apr 2025"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Mendel, T.: Social help: developing methods to support older adults in mobile privacy and security. In: Proceedings of the UbiComp\/ISWC 2019, pp. 383\u2013387 (2019)","DOI":"10.1145\/3341162.3349311"},{"issue":"17","key":"25_CR11","first-page":"107","volume":"7","author":"E Pacheco","year":"2024","unstructured":"Pacheco, E.: Older adult\u2019s safety and security online: a post-pandemic exploration of attitudes and behaviors. J. Digit. Media Interact. 7(17), 107\u2013126 (2024)","journal-title":"J. Digit. Media Interact."},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Salman, H.M., Ahmad, W.F.W., Sulaiman, S.: Usability evaluation of the smartphone user interface in supporting elderly users from expert\u2019s perspective. IEEE Access 6, 22578\u201322591 (2018)","DOI":"10.1109\/ACCESS.2018.2827358"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Olwal, A., Lachanas, D., Zacharouli, E.: OldGen: mobile phone personalization for older adults. In: Proceedings of the SIGCHI 2011, pp. 3393\u20133396 (2011)","DOI":"10.1145\/1978942.1979447"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Zajicek, M.: Interface design for older adults. In: Proceedings of the WUAUC 2001, pp. 60\u201365 (2001)","DOI":"10.1145\/564526.564543"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Chaudry, B.M., Connelly, K.H., Welch, J.L.: Mobile interface design for low-literacy populations. In: Proceedings of the IHI 2012, pp. 91\u2013100 (2012)","DOI":"10.1145\/2110363.2110377"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Medhi, I., Patnaik, S., et al.: Designing mobile interfaces for novice and low-literacy users. In: Proceedings of the TOCHI, vol. 18, no. 2, pp. 1\u201328 (2011)","DOI":"10.1145\/1959022.1959024"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Kodagoda, N., William Wong, B.L., et al.: Interactive visualization for low literacy users: from lessons learnt to design. In: Proceedings of the CHI 2012, pp. 1159\u20131168 (2012)","DOI":"10.1145\/2207676.2208565"},{"key":"25_CR18","unstructured":"Ministry of Internal Affairs and Communications Usage Trend Survey of 2022. https:\/\/www.soumu.go.jp\/johotsusintokei\/statistics\/statistics05b1.html. Accessed 18 Apr 2025. (in Japanese)"},{"key":"25_CR19","unstructured":"Brooke, J.: SUS: A Quick and Dirty Usability Scale, Usability Evaluation in Industry, pp. 189\u2013194. Taylor and Francis (1996)"},{"key":"25_CR20","unstructured":"Nakagawa, K., Suda, T., Zempo, H., Matsumoto, K.: The development of questionnaire for evaluating web usability. J. Tenth Hum. Interface, pp. 421\u2013424. (in Japanese)"},{"issue":"12","key":"25_CR21","first-page":"46","volume":"81","author":"FF Reichheld","year":"2004","unstructured":"Reichheld, F.F.: The one number you need to grow. Harv. Bus. Rev. 81(12), 46\u201354 (2004)","journal-title":"Harv. Bus. Rev."},{"key":"25_CR22","unstructured":"Shimizu, H.: An introduction to the statistical free software HAD: suggestions to improve teaching, learning and practice data analysis. J. Media Inf. Commun., 59\u201373 (2016)"},{"key":"25_CR23","unstructured":"BellCurve for Excel. https:\/\/bellcurve.jp\/ex\/?srsltid=AfmBOopqF_BYkM9emK8fAhf7W9rNegki1CwolNQB6t4I7Ev83RFE_bYF. Accessed 23 Apr 2025. (in Japanese)"},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis, J.R., Koch, G.G.: The measurement of observer agreement for categorical data. Biometrics 33, 159\u2013174 (1977)","journal-title":"Biometrics"},{"key":"25_CR25","unstructured":"Nielsen Norman Group: Beyond the NPS: measuring perceived usability with the SUS, NASA-TLX, and the single ease question after tasks and usability tests. https:\/\/www.nngroup.com\/articles\/measuring-perceived-usability\/. Accessed 24 Apr 2025"}],"container-title":["Lecture Notes in Computer Science","HCI International 2025 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12801-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T01:55:41Z","timestamp":1767318941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-12801-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032128003","9783032128010"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-12801-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}