{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:50Z","timestamp":1759092230237,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_9","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"123-142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["\u201cIf It\u2019s Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It\u201d: A Study into Home Data Security Decisions"],"prefix":"10.1007","author":[{"given":"Norbert","family":"Nthala","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Flechais","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Aytes, K., Connolly, T.: Computer security, risky computing practices: a rational choice perspective. In: Advanced Topics in End User Computing, vol. 4, p. 257 (2005)","DOI":"10.4018\/978-1-59140-474-3.ch013"},{"key":"9_CR2","unstructured":"Bryant, P., Furnell, S.M., Phippen, A.D.: Improving protection, security awareness amongst home users. In: Advances in Networks, Computing and Communications 4, p. 182 (2008)"},{"issue":"5","key":"9_CR3","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.cose.2007.03.001","volume":"26","author":"SM Furnell","year":"2007","unstructured":"Furnell, S.M., Bryant, P., Phippen, A.D.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410\u2013417 (2007)","journal-title":"Comput. Secur."},{"issue":"2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall for phish. ACM Trans. Internet Technol. (TOIT) 10(2), 7 (2010)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Herley, C.: So long, no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the Workshop on New Security Paradigms Workshop, pp. 133\u2013144. ACM (2009)","DOI":"10.1145\/1719030.1719050"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-39345-7_21","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"M Styles","year":"2013","unstructured":"Styles, M.: Constructing positive influences for user security decisions to counter corporate or state sponsored computer espionage threats. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol. 8030, pp. 197\u2013206. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39345-7_21"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Redmiles, E.M., Malone, A., Mazurek, M.L.: I Think They\u2019re Trying To Tell Me Something: Advice Sources and Selection for Digital Security (2015)","DOI":"10.1109\/SP.2016.24"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-319-07620-1_31","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"M Nouh","year":"2014","unstructured":"Nouh, M., et al.: Social information leakage: effects of awareness and peer pressure on user behavior. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 352\u2013360. Springer, Cham (2014). doi:10.1007\/978-3-319-07620-1_31"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-319-20376-8_35","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"MS Mendes","year":"2015","unstructured":"Mendes, M.S., Furtado, E., Militao, G., Castro, M.F.: Hey, I have a problem in the system: who can help me? An investigation of facebook users interaction when facing privacy problems. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 391\u2013403. Springer, Cham (2015). doi:10.1007\/978-3-319-20376-8_35"},{"key":"9_CR10","unstructured":"ITU. Itu world telecommunication\/ict indicators database (2016). http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/stat\/default.aspx. Accessed 16 Apr 2016"},{"key":"9_CR11","unstructured":"Ng, B.-Y., Rahim, M.: A socio-behavioral study of home computer users\u2019 intention to practice security. In: PACIS Proceedings, p. 20 (2005)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Rao, U.H., Pati, B.P.: Study of internet security threats among home users. In: Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp. 217\u2013221. IEEE (2012)","DOI":"10.1109\/CASoN.2012.6412405"},{"issue":"3","key":"9_CR13","doi-asserted-by":"publisher","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613\u2013643 (2010)","journal-title":"MIS Q."},{"issue":"8","key":"9_CR14","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.cose.2010.08.001","volume":"29","author":"E Kritzinger","year":"2010","unstructured":"Kritzinger, E., von Solms, S.H.: Cyber security for home users: a new way of protection through awareness enforcement. Comput. Secur. 29(8), 840\u2013847 (2010)","journal-title":"Comput. Secur."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Howe, A.E., Ray, I., Roberts, M., Urbanska, M., Byrne, Z.: The psychology of security for the home computer user. In: IEEE Symposium on Security and Privacy (SP), pp. 209\u2013223. IEEE (2012)","DOI":"10.1109\/SP.2012.23"},{"issue":"1","key":"9_CR16","first-page":"121","volume":"1","author":"E Rader","year":"2015","unstructured":"Rader, E., Wash, R.: Identifying patterns in informal sources of security information. J. Cybersecur. 1(1), 121\u2013144 (2015)","journal-title":"J. Cybersecur."},{"key":"9_CR17","unstructured":"Venkatesh, A.: A Conceptualization of the household\/technology interaction. In: NA - Advances in Consumer Research, vol. 12, pp. 189\u2013194. Association for Consumer Research, Provo (1985)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Meshkova, E., Riihijarvi, J., Mahonen, P., Kavadias, C.: Modeling the home environment using ontology with applications in software configuration management. In: International Conference on Telecommunications, ICT 2008, pp. 1\u20136. IEEE, June 2008","DOI":"10.1109\/ICTEL.2008.4652663"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1017\/S0010417500007362","volume":"16","author":"EA Hammel","year":"1974","unstructured":"Hammel, E.A., Laslett, P.: Comparing household structure over time and between cultures. Comp. Stud. Soc. Hist. 16, 73\u2013109 (1974). Cambridge University Press","journal-title":"Comp. Stud. Soc. Hist."},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.ijhcs.2007.10.002","volume":"67","author":"I Flechais","year":"2009","unstructured":"Flechais, I., Sasse, M.A.: Stakeholder involvement, motivation, responsibility, communication: how to design usable security in e-science. Int. J. Hum.-Comput. Stud. 67, 281\u2013296 (2009). Elsevier","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"9_CR21","series-title":"SSSP Springer Series in Social Psychology","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-69746-3_2","volume-title":"Action Control","author":"I Ajzen","year":"1985","unstructured":"Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Kuhl, J., Beckmann, J. (eds.) Action Control. SSSP, pp. 11\u201339. Springer, Heidelberg (1985)"},{"issue":"1","key":"9_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change1. J. Psychol. 91(1), 93\u2013114 (1975)","journal-title":"J. Psychol."},{"issue":"3","key":"9_CR23","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1111\/j.1745-6606.2009.01148.x","volume":"43","author":"GR Milne","year":"2009","unstructured":"Milne, G.R., Labrecque, L.I., Cromer, C.: Toward an understanding of the online consumer\u2019s risky behavior and protection practices. J. Consum. Aff. 43(3), 449\u2013473 (2009)","journal-title":"J. Consum. Aff."},{"key":"9_CR24","volume-title":"Research Methods in Human-Computer Interaction","author":"J Lazar","year":"2010","unstructured":"Lazar, J., Feng, J.H., Hochheiser, H.: Research Methods in Human-Computer Interaction. Wiley, Hoboken (2010)"},{"key":"9_CR25","volume-title":"Strategies for Qualitative Research","author":"BG Glaser","year":"2009","unstructured":"Glaser, B.G., Strauss, A.L.: Strategies for Qualitative Research. Transaction Publishers, Piscataway (2009)"},{"issue":"2","key":"9_CR26","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1111\/j.1365-2648.2005.03380.x","volume":"50","author":"D Walsh","year":"2005","unstructured":"Walsh, D., Downe, S.: Meta-synthesis method for qualitative research: a literature review. J. Adv. Nurs. 50(2), 204\u2013211 (2005)","journal-title":"J. Adv. Nurs."},{"issue":"4","key":"9_CR27","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1037\/0033-295X.101.4.632","volume":"101","author":"BR Schlenker","year":"1994","unstructured":"Schlenker, B.R., Britt, T.W., Pennington, J., Murphy, R., Doherty, K.: The triangle model of responsibility. Psychol. Rev. 101(4), 632 (1994)","journal-title":"Psychol. Rev."},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-319-39381-0_11","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"A Blyth","year":"2016","unstructured":"Blyth, A.: Responsibility modelling and its application trust management. In: Tryfonas, T. (ed.) HAS 2016. LNCS, vol. 9750, pp. 114\u2013127. Springer, Cham (2016). doi:10.1007\/978-3-319-39381-0_11"},{"issue":"2","key":"9_CR29","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.im.2008.01.002","volume":"45","author":"Y Lee","year":"2008","unstructured":"Lee, Y., Kozar, K.A.: An empirical investigation of anti-spyware software adoption: a multitheoretical perspective. Inf. Manag. 45(2), 109\u2013119 (2008)","journal-title":"Inf. Manag."},{"issue":"4","key":"9_CR30","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1111\/bjep.12057","volume":"84","author":"EJ Fishman","year":"2014","unstructured":"Fishman, E.J.: With great control comes great responsibility: The relationship between perceived academic control, student responsibility, and self-regulation. Br. J. Educ. Psychol. 84(4), 685\u2013702 (2014)","journal-title":"Br. J. Educ. Psychol."},{"key":"9_CR31","unstructured":"Pearman, S.: Risk compensation in home-user computer security behavior: a mixed-methods exploratory study. Poster presented at SOUPS, Colorado, USA, June 2016"},{"key":"9_CR32","series-title":"Advances in Natural and Technological Hazards Research","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-94-007-6184-1_3","volume-title":"Cities at Risk","author":"J Adams","year":"2013","unstructured":"Adams, J.: Risk compensation in cities at risk. In: Joffe, H., Rossetto, T., Adams, J. (eds.) Cities at Risk. ANTHR, pp. 25\u201344. Springer, Netherlands (2013). doi:10.1007\/978-94-007-6184-1_3"},{"key":"9_CR33","volume-title":"Risk","author":"J Adams","year":"1995","unstructured":"Adams, J.: Risk. University College Press, London (1995). ISBN 1-85728-067-9 (HB), ISBN 1-85728-068-7 (PB)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:44:59Z","timestamp":1750254299000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}