{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T23:12:06Z","timestamp":1772838726304,"version":"3.50.1"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,31]]},"DOI":"10.1109\/csr57506.2023.10224994","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:50:16Z","timestamp":1693245016000},"page":"335-340","source":"Crossref","is-referenced-by-count":2,"title":["Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study"],"prefix":"10.1109","author":[{"given":"Midori","family":"Inaba","sequence":"first","affiliation":[{"name":"Institute of Information Security,Yokohama,Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takeaki","family":"Terada","sequence":"additional","affiliation":[{"name":"Fujitsu Limited,Kawasaki,Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0501_5"},{"key":"ref56","author":"kandek","year":"2009","journal-title":"The laws of vulnerabilities 2 0 Black Hat 2009 Edition"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.39.5.806"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.68.5.804"},{"key":"ref52","first-page":"151","article-title":"Social influence: Social norms, conformity and compliance","author":"cialdini","year":"1998","journal-title":"The Handbook of Social Psychology"},{"key":"ref11","author":"thaler","year":"2009","journal-title":"Nudge Improving Decisions About Health Wealth and Happiness"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3429888"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.10.001"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.142015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-12-2012-0072"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07668-3_23"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/14792779943000116"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"ref46","article-title":"Failure to patch two-month-old bug led to massive Equifax breach: Critical Apache Struts bug was fixed in March. In May, it bit ~ 143 million US consumers","author":"goodin","year":"2017","journal-title":"ARS Technica"},{"key":"ref45","year":"2022","journal-title":"Equifax data breach settlement"},{"key":"ref48","article-title":"Unconscious on their own ignorance: Overconfidence in information security","author":"ament","year":"0","journal-title":"Proceedings Pacific Asia Conference on Information Systems (PACIS)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294283"},{"key":"ref42","author":"behavioral","year":"2019","journal-title":"Annual Report (FU2017 and FY2018)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958885"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3555087"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1207\/S15324834BASP2103_7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.57.12.1060"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1668738"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105595"},{"key":"ref6","first-page":"103","article-title":"Unpacking security policy compliance: The motivators and barriers of employees' security behaviors","author":"blythe","year":"0","journal-title":"Proceedings of the Eleventh Symposium on Usable Privacy and Security"},{"key":"ref5","article-title":"Information security awareness: its antecedents and mediating effects on security compliant behavior","author":"haeussinger","year":"0","journal-title":"Proceedings of Thirty-Fourth International Conference on Information Systems Milan 2013"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376666"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1802874115"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.09.0215"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2007.01917.x"},{"key":"ref36","article-title":"The Minnesota income tax compliance experiment","author":"coleman","year":"1996","journal-title":"Minnesota Department of Revenue"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1650676"},{"key":"ref30","article-title":"Applying nudge to organisational communications: nudge and source impact on e-learning completion","author":"chohan","year":"2019","journal-title":"Contemporary Ergononomics and Human Factors"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0304_5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-08-2019-0095"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0297.2009.02267.x"},{"key":"ref24","first-page":"377","article-title":"Format vs. content: The impact of risk and presentation on disclosure decisions","author":"samat","year":"0","journal-title":"Proceedings of the Thirteenth Symposium on Usable Privacy and Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106347"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2783446.2783588"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2021.1876167"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23008"},{"key":"ref21","first-page":"1","article-title":"Nudging whom how: IT proficiency, impulse control and secure behaviour","author":"jeske","year":"0","journal-title":"Proceedings of the CHI Workshop on Personalizing Behavior Change Technologies Toronto"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079692"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2020.04.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1111\/jofi.12258"}],"event":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Venice, Italy","start":{"date-parts":[[2023,7,31]]},"end":{"date-parts":[[2023,8,2]]}},"container-title":["2023 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10224900\/10224823\/10224994.pdf?arnumber=10224994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:51:40Z","timestamp":1695664300000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10224994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,31]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/csr57506.2023.10224994","relation":{},"subject":[],"published":{"date-parts":[[2023,7,31]]}}}