{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:13:22Z","timestamp":1743149602205,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319315096"},{"type":"electronic","value":"9783319315102"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31510-2_29","type":"book-chapter","created":{"date-parts":[[2016,3,10]],"date-time":"2016-03-10T10:20:08Z","timestamp":1457605208000},"page":"339-351","source":"Crossref","is-referenced-by-count":4,"title":["Persuasive Information Security: Techniques to Help Employees Protect Organizational Information Security"],"prefix":"10.1007","author":[{"given":"Marc","family":"Busch","sequence":"first","affiliation":[]},{"given":"Sameer","family":"Patil","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Regal","sequence":"additional","affiliation":[]},{"given":"Christina","family":"Hochleitner","sequence":"additional","affiliation":[]},{"given":"Manfred","family":"Tscheligi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,11]]},"reference":[{"issue":"3","key":"29_CR1","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523\u2013548 (2010)","journal-title":"MIS Q."},{"key":"29_CR2","unstructured":"Busch, M., Wolkerstorfer, P., Hochleitner, C., Regal, G., Tscheligi, M.: Designing a persuasive application to improve organizational information security policy awareness, attitudes and behavior. In: Poster Abstract, 10th Symposium on Usable Privacy and Security, SOUPS 2014 (2014)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: Influencing users towards better passwords: Persuasive cued click-points. In: Proceedings of the 22nd British HCI Group Annual Conference, BCS-HCI 2008, pp. 121\u2013130, British Computer Society, Swinton, UK (2008)","DOI":"10.14236\/ewic\/HCI2008.12"},{"issue":"2","key":"29_CR4","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TDSC.2011.55","volume":"9","author":"S Chiasson","year":"2012","unstructured":"Chiasson, S., Stobert, E., Forget, A., Biddle, R., Van Oorschot, P.: Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Trans. Dependable Secur. Comput. 9(2), 222\u2013235 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"29_CR5","unstructured":"Department for Business, Innovation & Skills: Information security breaches survey (2013). http:\/\/www.pwc.co.uk\/assets\/pdf\/cyber-security-2013-exec-summary.pdf"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/978-3-642-31037-9_14","volume-title":"Persuasive Technology","author":"F Drozd","year":"2012","unstructured":"Drozd, F., Lehto, T., Oinas-Kukkonen, H.: Exploring perceived persuasiveness of a behavior change support system: a structural model. In: Bang, M., Ragnemalm, E.L. (eds.) PERSUASIVE 2012. LNCS, vol. 7284, pp. 157\u2013168. Springer, Heidelberg (2012)"},{"key":"29_CR7","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Persuasion as education for computer security. In: Bastiaens, T., Carliner, S. (eds.) Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007, pp. 822\u2013829. AACE, Quebec City, Canada, October 2007"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Lessons from brain age on persuasion for computer security. In: CHI 2009 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2009, pp. 4435\u20134440. ACM, NY, USA, New York (2009)","DOI":"10.1145\/1520340.1520679"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-540-68504-3_13","volume-title":"Persuasive Technology","author":"A Forget","year":"2008","unstructured":"Forget, A., Chiasson, S., van Oorschot, P.C., Biddle, R.: Persuasion for stronger passwords: Motivation and pilot study. In: Oinas-Kukkonen, H., Hasle, P., Harjumaa, M., Segerst\u00e5hl, K., \u00d8hrstr\u00f8m, P. (eds.) PERSUASIVE 2008. LNCS, vol. 5033, pp. 140\u2013150. Springer, Heidelberg (2008)"},{"key":"29_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-23141-4_1","volume-title":"Information Security and Assurance","author":"B Khan","year":"2011","unstructured":"Khan, B., Alghathbar, K.S., Khan, M.K.: Information security awareness campaign: An alternate approach. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) ISA 2011. CCIS, vol. 200, pp. 1\u201310. Springer, Heidelberg (2011)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Mangold, L.V.: Using ontologies for adaptive information security training. In: Proceedings of the 2012 Seventh International Conference on Availability, Reliability and Security, ARES 2012, pp. 522\u2013524. IEEE Computer Society (2012)","DOI":"10.1109\/ARES.2012.52"},{"key":"29_CR12","unstructured":"Merhi, M.I., Midha, V.: The impact of training and social norms on information security compliance: A pilot study. In: International Conference on Information Systems: Research in Progress, ICIS 2012 (2012)"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-540-68504-3_15","volume-title":"Persuasive Technology","author":"H Oinas-Kukkonen","year":"2008","unstructured":"Oinas-Kukkonen, H., Harjumaa, M.: A systematic framework for designing and evaluating persuasive systems. In: Oinas-Kukkonen, H., Hasle, P., Harjumaa, M., Segerst\u00e5hl, K., \u00d8hrstr\u00f8m, P. (eds.) PERSUASIVE 2008. LNCS, vol. 5033, pp. 164\u2013176. Springer, Heidelberg (2008)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Anti-phishing Phil: The design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 88\u201399. ACM, NY, USA, New York (2007)","DOI":"10.1145\/1280680.1280692"},{"issue":"1","key":"29_CR15","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"MT Siponen","year":"2000","unstructured":"Siponen, M.T.: A conceptual foundation for organizational information security awareness. Inf. Manage. Comput. Secur. 8(1), 31\u201341 (2000)","journal-title":"Inf. Manage. Comput. Secur."},{"key":"29_CR16","first-page":"101","volume":"2","author":"A Strauss","year":"1990","unstructured":"Strauss, A., Corbin, J.: Open coding. Basics Qual. Res.: Grounded Theor. Proc. Tech. 2, 101\u2013121 (1990)","journal-title":"Basics Qual. Res.: Grounded Theor. Proc. Tech."},{"issue":"4","key":"29_CR17","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1108\/09685229810227649","volume":"6","author":"ME Thomson","year":"1998","unstructured":"Thomson, M.E., von Solms, R.: Information security awareness: Educating your users effectively. Inf. Manage. Comput. Secur. 6(4), 167\u2013173 (1998)","journal-title":"Inf. Manage. Comput. Secur."},{"issue":"2","key":"29_CR18","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39(2), 273\u2013315 (2008)","journal-title":"Decis. Sci."},{"issue":"1","key":"29_CR19","first-page":"48","volume":"1","author":"AC Yeo","year":"2009","unstructured":"Yeo, A.C., Rahim, M.M., Ren, Y.Y.: Use of persuasive technology to change end users\u2019 IT security aware behavior: a pilot study. Int. J. Psychol. Behav. Sci. 1(1), 48\u201354 (2009)","journal-title":"Int. J. Psychol. Behav. Sci."}],"container-title":["Lecture Notes in Computer Science","Persuasive Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31510-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T23:31:57Z","timestamp":1600299117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31510-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319315096","9783319315102"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31510-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}