{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:45:39Z","timestamp":1725745539325},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647792","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Designing Personalized OS Update Message based on Security Behavior Stage Model"],"prefix":"10.1109","author":[{"given":"Ayane","family":"Sano","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yukiko","family":"Sawaya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Akira","family":"Yamada","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ayumu","family":"Kubota","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takamasa","family":"Isohara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243740"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"ref11","first-page":"153","article-title":"Cognitive and Physiological Processes in Fear Appeals and Attitude Change A Revised Theory of Protection Motivation","author":"rogers","year":"1983","journal-title":"Social Psychophysiology"},{"key":"ref12","first-page":"97","article-title":"A Typology of Perceived Triggers for End-User Security and Privacy Behaviors","author":"das","year":"2019","journal-title":"Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security (SOUPS2019)"},{"key":"ref13","first-page":"175","article-title":"Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates","author":"mathur","year":"2017","journal-title":"Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security(SOUPS2017)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858303"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1126\/science.7455683"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.07.133"},{"key":"ref17","first-page":"269","article-title":"Human Factors in Information Security Culture: A Literature Review","author":"glaspie","year":"2017","journal-title":"Proceedings of the Advances in Human Factors in Cybersecurity (AHFE2017)"},{"key":"ref18","first-page":"143","article-title":"The Effect of Social Influence on Security Sensitivity","author":"das","year":"2014","journal-title":"Proceedings of the Tenth USENIX Conference on Usable Privacy and Security(SOUPS2014)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"journal-title":"Ministry of Internal Affairs and Communications Communications Usage Trend Survey of 2019","year":"2021","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"journal-title":"Ministry of Internal Affairs and Communications Communications Usage Trend Survey of 2018","year":"2021","key":"ref27"},{"journal-title":"Designing with the Mind in Mind Simple Guide to Understanding User Interface Design Guidelines Second Edition Elsevier Inc Impress Corporation","year":"2014","author":"johnson","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"journal-title":"StatCounter Global Stats","year":"2021","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858265"},{"key":"ref8","article-title":"Information Security Behavior: Towards MultiStage Models","author":"pahnila","year":"2013","journal-title":"Proceedings of the Pacific Asia Conference on Information Systems(PACIS2013)"},{"key":"ref7","first-page":"61","article-title":"A Self-Report Measure of End-User Security Attitudes(SA-6)","author":"faklaris","year":"2019","journal-title":"Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security(SOUPS2019)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4278\/0890-1171-12.1.38"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.09.013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75075-6_45"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"ref22","first-page":"1","article-title":"A Design Space for Effective Privacy Notices","author":"schaub","year":"2015","journal-title":"Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security(SOUPS2015)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025896"},{"key":"ref24","first-page":"43","article-title":"They Keep Coming Back Like Zombies Improving Software Updating Interfaces","author":"mathur","year":"2016","journal-title":"Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security(SOUPS2016)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_5"},{"key":"ref26","first-page":"59","article-title":"An introduction to the statistical free software HAD: Suggestions to improve teaching, learning and practice data analysis","author":"shimizu","year":"2016","journal-title":"Mediation information and communication"},{"key":"ref25","article-title":"Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias","author":"frik","year":"2018","journal-title":"17th Annual Workshop on the Economics of Information Security"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647792.pdf?arnumber=9647792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:50Z","timestamp":1652201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647792\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647792","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}