{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:28:54Z","timestamp":1766888934687,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T00:00:00Z","timestamp":1374624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0915775"],"award-info":[{"award-number":["IIS-0915775"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,7,24]]},"DOI":"10.1145\/2501604.2501614","type":"proceedings-article","created":{"date-parts":[[2013,7,30]],"date-time":"2013-07-30T13:40:50Z","timestamp":1375191650000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Modifying smartphone user locking behavior"],"prefix":"10.1145","author":[{"given":"Dirk","family":"Van Bruggen","sequence":"first","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Shu","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Mitch","family":"Kajzer","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Aaron","family":"Striegel","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Charles R.","family":"Crowell","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"John","family":"D'Arcy","sequence":"additional","affiliation":[{"name":"University of Delaware"}]}],"member":"320","published-online":{"date-parts":[[2013,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Wireless Quick Facts","author":"CTIA.","year":"2012","unstructured":"CTIA. U.S. Wireless Quick Facts , 2012 . CTIA. U.S. Wireless Quick Facts, 2012."},{"volume-title":"Cisco VNI Mobile Data Traffic Forecast 2012-2017. Feburary","year":"2013","key":"e_1_3_2_1_2_1","unstructured":"Cisco. Cisco VNI Mobile Data Traffic Forecast 2012-2017. Feburary 2013 . Cisco. Cisco VNI Mobile Data Traffic Forecast 2012-2017. Feburary 2013."},{"volume-title":"SURVEY: Mobile Threats are Real and Costly","year":"2012","key":"e_1_3_2_1_3_1","unstructured":"Webroot. SURVEY: Mobile Threats are Real and Costly , 2012 . Webroot. SURVEY: Mobile Threats are Real and Costly, 2012."},{"volume-title":"Implementing Your BYOD Mobility Strategy","year":"2012","key":"e_1_3_2_1_4_1","unstructured":"Enterproid. Implementing Your BYOD Mobility Strategy . 2012 . Enterproid. Implementing Your BYOD Mobility Strategy. 2012."},{"key":"e_1_3_2_1_5_1","article-title":"IBM Faces the Perils of \"Bring Your Own Device","author":"Bergstein B.","year":"2012","unstructured":"B. Bergstein . IBM Faces the Perils of \"Bring Your Own Device \" - Technology Review , 2012 . B. Bergstein. IBM Faces the Perils of \"Bring Your Own Device\" - Technology Review, 2012.","journal-title":"- Technology Review"},{"volume-title":"Cisco NAC Appliance (Clean Access)","year":"2012","key":"e_1_3_2_1_6_1","unstructured":"Cisco. Cisco NAC Appliance (Clean Access) , 2012 . Cisco. Cisco NAC Appliance (Clean Access), 2012."},{"volume-title":"Solving Android Multiple Personality Disorder: No Drugs Required","year":"2011","key":"e_1_3_2_1_7_1","unstructured":"Apperian. Solving Android Multiple Personality Disorder: No Drugs Required . 2011 . Apperian. Solving Android Multiple Personality Disorder: No Drugs Required. 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Fraunhofer. BizzTrust 2012.  Fraunhofer. BizzTrust 2012.","DOI":"10.1155\/2012\/951324"},{"key":"e_1_3_2_1_9_1","volume-title":"Estimating peer effects on health in social networks","author":"Fowler J. H.","year":"2008","unstructured":"J. H. Fowler and N. A. Christakis . Estimating peer effects on health in social networks , 2008 . J. H. Fowler and N. A. Christakis. Estimating peer effects on health in social networks, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017496.2017502"},{"volume-title":"Securing Mobile Devices on Converged Networks","year":"2006","key":"e_1_3_2_1_11_1","unstructured":"iGillottResearch. Securing Mobile Devices on Converged Networks . 2006 . iGillottResearch. Securing Mobile Devices on Converged Networks. 2006."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9909-7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_14_1","volume-title":"Sizing Up the BYOD Security Challenge","author":"Cobb S.","year":"2012","unstructured":"S. Cobb . Sizing Up the BYOD Security Challenge . 2012 . S. Cobb. Sizing Up the BYOD Security Challenge. 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"iPad, iPhone Challenge Management Orthodoxy","author":"Connolly P. J.","year":"2012","unstructured":"P. J. Connolly . iPad, iPhone Challenge Management Orthodoxy , 2012 . P. J. Connolly. iPad, iPhone Challenge Management Orthodoxy, 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017481"},{"key":"e_1_3_2_1_17_1","volume-title":"Help for Lost Cell Phones","author":"Jaroslovsky R.","year":"2012","unstructured":"R. Jaroslovsky . Help for Lost Cell Phones , 2012 . R. Jaroslovsky. Help for Lost Cell Phones, 2012."},{"volume-title":"The Divide#8482;platform enables BYOD mobility","year":"2012","key":"e_1_3_2_1_18_1","unstructured":"Enterproid. The Divide#8482;platform enables BYOD mobility , 2012 . Enterproid. The Divide#8482;platform enables BYOD mobility, 2012."},{"volume-title":"Mobile Device Management","year":"2013","key":"e_1_3_2_1_19_1","unstructured":"Samsung. Mobile Device Management , 2013 . Samsung. Mobile Device Management, 2013."},{"volume-title":"Device Administration API","year":"2012","key":"e_1_3_2_1_20_1","unstructured":"Android. Device Administration API , 2012 . Android. Device Administration API, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002175"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342468.2342475"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_25_1","volume-title":"Professional manual: revised neo personality inventory (neo-pi-r) and neo five-factor inventory (neo-ffi)","author":"Costa P. T.","year":"1992","unstructured":"P. T. Costa and R. R. McCrae . Professional manual: revised neo personality inventory (neo-pi-r) and neo five-factor inventory (neo-ffi) . Odessa, FL : Psychological Assessment Resources , 1992 . P. T. Costa and R. R. McCrae. Professional manual: revised neo personality inventory (neo-pi-r) and neo five-factor inventory (neo-ffi). Odessa, FL: Psychological Assessment Resources, 1992."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6006081"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0272-7358(82)90028-9"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/249564"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.17730\/humo.56.2.c7x0532q2u86m207"},{"key":"e_1_3_2_1_31_1","volume-title":"Love and Sharing Everything, Including a Password\"","author":"Richtel M.","year":"2012","unstructured":"M. Richtel . \"Young , in Love and Sharing Everything, Including a Password\" , 2012 . M. Richtel. \"Young, in Love and Sharing Everything, Including a Password\", 2012."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078835"},{"key":"e_1_3_2_1_34_1","volume-title":"Screening","author":"Wash R.","year":"2007","unstructured":"R. Wash and J. K. Mackie-mason . Security When People Matter: Structuring Incentives For User Behavior . Screening , 2007 . R. Wash and J. K. Mackie-mason. Security When People Matter: Structuring Incentives For User Behavior. Screening, 2007."},{"key":"e_1_3_2_1_35_1","volume-title":"Information Security","author":"Stanton J. M.","year":"2004","unstructured":"J. M. Stanton , K. R. Stam , P. R. Mastrangelo , and J. Jolton . Behavioral Information Security: Two End User Survey Studies of Motivation and Security Practices . In Information Security , 2004 . J. M. Stanton, K. R. Stam, P. R. Mastrangelo, and J. Jolton. Behavioral Information Security: Two End User Survey Studies of Motivation and Security Practices. In Information Security, 2004."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330311.1330320"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017478"},{"key":"e_1_3_2_1_38_1","volume-title":"Increasing the Persuasiveness of IT Security Communication: Effects of Fear Appeals and Self-View. Workshop on Usable IT Security","author":"Xu H.","year":"2007","unstructured":"H. Xu and M. B. Rosson . Increasing the Persuasiveness of IT Security Communication: Effects of Fear Appeals and Self-View. Workshop on Usable IT Security , 2007 . H. Xu and M. B. Rosson. Increasing the Persuasiveness of IT Security Communication: Effects of Fear Appeals and Self-View. Workshop on Usable IT Security, 2007."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.03.001"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327965pli1604_03"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(68)90004-4"},{"key":"e_1_3_2_1_42_1","first-page":"301","volume-title":"Advanced topics in information resources management","author":"Siponen M. T.","year":"2003","unstructured":"M. T. Siponen . Advanced topics in information resources management . chapter On the role of human mortality in information system security: from the problems of descriptivism to non-descriptive foundations, pages 301 -- 319 . IGI Publishing , Hershey, PA, USA , 2003 . M. T. Siponen. Advanced topics in information resources management. chapter On the role of human mortality in information system security: from the problems of descriptivism to non-descriptive foundations, pages 301--319. IGI Publishing, Hershey, PA, USA, 2003."},{"key":"e_1_3_2_1_43_1","volume-title":"Moral judgement development in higher education: Insights from the defining issues test. Journal of moral education, 31(3):247--270","author":"King P. M.","year":"2002","unstructured":"P. M. King and M. J. Mayhew . Moral judgement development in higher education: Insights from the defining issues test. Journal of moral education, 31(3):247--270 , 2002 . P. M. King and M. J. Mayhew. Moral judgement development in higher education: Insights from the defining issues test. Journal of moral education, 31(3):247--270, 2002."},{"key":"e_1_3_2_1_44_1","volume-title":"Power and practice in information systems security research","author":"Siponen M.","year":"2008","unstructured":"M. Siponen , R. Willison , and R. Baskerville . Power and practice in information systems security research . 2008 . M. Siponen, R. Willison, and R. Baskerville. Power and practice in information systems security research. 2008."},{"key":"e_1_3_2_1_45_1","volume-title":"punishment, and deterrence","author":"Gibbs J. P.","year":"1975","unstructured":"J. P. Gibbs . Crime , punishment, and deterrence . Elsevier New York , 1975 . J. P. Gibbs. Crime, punishment, and deterrence. Elsevier New York, 1975."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.206"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0568"},{"issue":"243","key":"e_1_3_2_1_48_1","first-page":"243","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"221","author":"Bulgurcu B.","year":"2010","unstructured":"B. Bulgurcu . Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness . Women , 221 ( 243 ): 243 , 2010 . B. Bulgurcu. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. Women, 221(243):243, 2010.","journal-title":"Women"},{"key":"e_1_3_2_1_49_1","first-page":"9","volume-title":"Proceedings of the 28th International Conference on Information Systems","author":"Boss SR","year":"2007","unstructured":"SR Boss and LJ Kirsch . The last line of defense: motivating employees to follow corporate security guidelines . In Proceedings of the 28th International Conference on Information Systems , pages 9 -- 12 , 2007 . SR Boss and LJ Kirsch. The last line of defense: motivating employees to follow corporate security guidelines. In Proceedings of the 28th International Conference on Information Systems, pages 9--12, 2007."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1997.11518141"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"e_1_3_2_1_53_1","volume-title":"The impact of deterrent countermeasures upon individual intent to commit misuse: a behavioral approach","author":"Foltz C. B.","year":"2000","unstructured":"C. B. Foltz and P. Adviser-Cronan . The impact of deterrent countermeasures upon individual intent to commit misuse: a behavioral approach . University of Arkansas , 2000 . C. B. Foltz and P. Adviser-Cronan. The impact of deterrent countermeasures upon individual intent to commit misuse: a behavioral approach. University of Arkansas, 2000."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.2307\/249656"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.10"},{"key":"e_1_3_2_1_57_1","unstructured":"L. Kohlberg. Stages in the development of moral thought and action 1969.  L. Kohlberg. Stages in the development of moral thought and action 1969."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2001100102"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.88.1.1"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0749-5978(02)00039-0"},{"key":"e_1_3_2_1_61_1","volume-title":"Information Security Policy","author":"Dame Notre","year":"2012","unstructured":"Notre Dame . Information Security Policy , 2012 . Notre Dame. Information Security Policy, 2012."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290701679361"}],"event":{"name":"SOUPS '13: Symposium On Usable Privacy and Security","sponsor":["Carnegie Mellon University Carnegie Mellon University","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Newcastle United Kingdom","acronym":"SOUPS '13"},"container-title":["Proceedings of the Ninth Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2501604.2501614","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2501604.2501614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:48Z","timestamp":1750231728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2501604.2501614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,24]]},"references-count":62,"alternative-id":["10.1145\/2501604.2501614","10.1145\/2501604"],"URL":"https:\/\/doi.org\/10.1145\/2501604.2501614","relation":{},"subject":[],"published":{"date-parts":[[2013,7,24]]},"assertion":[{"value":"2013-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}