{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:11:42Z","timestamp":1774631502874,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Profess. Commun."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tpc.2021.3110545","type":"journal-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T18:10:55Z","timestamp":1634753455000},"page":"374-389","source":"Crossref","is-referenced-by-count":11,"title":["User Perception of Data Breaches"],"prefix":"10.1109","volume":"64","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5501-7972","authenticated-orcid":false,"given":"Zahra","family":"Hassanzadeh","sequence":"first","affiliation":[{"name":"Public Services and Procurement Canada, Ottawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5971-2705","authenticated-orcid":false,"given":"Robert","family":"Biddle","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carleton University, Ottawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7277-7386","authenticated-orcid":false,"given":"Sky","family":"Marsen","sequence":"additional","affiliation":[{"name":"Arts and Social Sciences, Flinders University College of Humanities, Adelaide, Australia"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-981-287-158-9_5","article-title":"Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey","volume":"306","author":"sumra","year":"2014","journal-title":"Vehicular Ad-hoc Networks for Smart Cities"},{"key":"ref10","first-page":"236","article-title":"We're here to help: Crisis communication and user perception of data breaches","author":"hassanzadeh","year":"2020","journal-title":"Proc Graphic Interface"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1075\/aicr.12.09dij"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814679"},{"key":"ref13","author":"johnson-laird","year":"1990","journal-title":"Mental models Towards a cognitive science of language inference and consciousness"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2009.934142"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1012933107"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511816796.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-76898-4_7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5751\/ES-03802-160146"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0502_2"},{"key":"ref28","article-title":"The SAGE handbook of qualitative data analysis","author":"flick","year":"2014","journal-title":"Research Methods in Education"},{"key":"ref4","article-title":"Data protection: Actions taken by equifax and federal agencies in response to the 2017 breach GAO-18-559","year":"0"},{"key":"ref27","article-title":"Qualitative data analysis","author":"check","year":"2012","journal-title":"Research Methods in Education"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_2"},{"key":"ref6","article-title":"Data breaches keep happening. So why don't you do something?","author":"mele","year":"2018"},{"key":"ref29","article-title":"Everything you need to know about GDPR compliance","author":"koch","year":"0"},{"key":"ref5","author":"swinhoe","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"ref2","year":"2019"},{"key":"ref9","first-page":"57","article-title":"Influencing mental models of security: A research agenda","author":"wash","year":"2011","journal-title":"Proceedings New Security Paradigms Workshop"},{"key":"ref1","article-title":"Risk based security. 2020 q1 report data breach quick view","author":"goddijn","year":"0"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"233","DOI":"10.2190\/P2FT-X9HE-6UD5-DYNJ","article-title":"Computers as mindtools for schools: Engaging critical thinking","volume":"23","author":"jonassen","year":"2000","journal-title":"J Educ Comput Res"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572534"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-006-8253-9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"ref23","first-page":"395","article-title":"When is a tree really a truck? Exploring mental models of encryption","author":"wu","year":"2018","journal-title":"Proc 14th Symp Usable Privacy Secur"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4135\/9781483384436.n1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"}],"container-title":["IEEE Transactions on Professional Communication"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/47\/9626066\/09580451.pdf?arnumber=9580451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T18:19:54Z","timestamp":1682705994000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9580451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tpc.2021.3110545","relation":{},"ISSN":["0361-1434","1558-1500"],"issn-type":[{"value":"0361-1434","type":"print"},{"value":"1558-1500","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}