{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:49:43Z","timestamp":1776084583479,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841119","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"73-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Employee Rule Breakers, Excuse Makers and Security Champions:"],"prefix":"10.1145","author":[{"given":"Odette","family":"Beris","sequence":"first","affiliation":[{"name":"University College London, Department of Computer Science, Malet Place, London, WC1E 6BT, Tel: +44 (0)20 7679 2788"}]},{"given":"Adam","family":"Beautement","sequence":"additional","affiliation":[{"name":"University College London, Department of Computer Science, Malet Place, London, WC1E 6BT, Tel: +44 (0)20 7679 0353"}]},{"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"University College London, Department of Computer Science, Malet Place, London, WC1E 6BT, Tel: +44 (0)20 7679 7212"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"Schneier B.","year":"2004","unstructured":"B. Schneier . Secrets and Lies: Digital Security in a Networked World . 1 st ed. Wiley , 2004 . B. Schneier. Secrets and Lies: Digital Security in a Networked World. 1st ed. Wiley, 2004.","edition":"1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_7"},{"key":"e_1_3_2_1_3_1","volume-title":"Information Security Inside Organizations - A Positive Model and Some Normative Arguments Based on New Institutional Economics. Social Science Research Network","author":"Pallas F.","year":"1801","unstructured":"F. Pallas . Information Security Inside Organizations - A Positive Model and Some Normative Arguments Based on New Institutional Economics. Social Science Research Network , Rochester, NY , SSRN Scholarly Paper ID 147 1801 , 2009. F. Pallas. Information Security Inside Organizations - A Positive Model and Some Normative Arguments Based on New Institutional Economics. Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 1471801, 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23007"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1515\/jhsem-2014-0035"},{"key":"e_1_3_2_1_8_1","first-page":"32","volume-title":"The Johari Window: a graphic model of awareness in interpersonal relations. NTL Reading Book for Human Relations Training","author":"Luft J.","year":"1982","unstructured":"J. Luft and H. Ingham . The Johari Window: a graphic model of awareness in interpersonal relations. NTL Reading Book for Human Relations Training . pages 32 -- 34 , 1982 . J. Luft and H. Ingham. The Johari Window: a graphic model of awareness in interpersonal relations. NTL Reading Book for Human Relations Training. pages 32--4, 1982."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.24.4.S35"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.04.006"},{"key":"e_1_3_2_1_11_1","volume-title":"Penguin Books","author":"Kahneman D.","year":"2012","unstructured":"D. Kahneman . Thinking Fast and Slow . Penguin Books , 2012 . D. Kahneman. Thinking Fast and Slow. Penguin Books, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68164-9_5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.127.2.267"},{"key":"e_1_3_2_1_15_1","first-page":"121","volume-title":"J. P. Forgas, (Ed). Handbook of affect and social cognition","author":"Clore G. L.","year":"2001","unstructured":"G. L. Clore , K. Gasper , and E. Garvin . Affect as information . In J. P. Forgas, (Ed). Handbook of affect and social cognition , pages 121 -- 144 , Mahwah, NJ , Lawrence Erlbaum Associates , 2001 . G. L. Clore, K. Gasper, and E. Garvin. Affect as information. In J. P. Forgas, (Ed). Handbook of affect and social cognition, pages 121--144, Mahwah, NJ, Lawrence Erlbaum Associates, 2001."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2012.2185801"},{"key":"e_1_3_2_1_17_1","volume-title":"Risk Acceptance Personality Paradigm: How we view what we don't know we know","author":"Massie M. J.","year":"2011","unstructured":"M. J. Massie and A. T. Morris . Risk Acceptance Personality Paradigm: How we view what we don't know we know . American Institute of Aeronautics and Astronautics , 1--18, 2011 M. J. Massie and A. T. Morris. Risk Acceptance Personality Paradigm: How we view what we don't know we know. American Institute of Aeronautics and Astronautics, 1--18, 2011"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781483384436"}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","location":"Twente Netherlands","acronym":"NSPW '15","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841119","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841119"}},"subtitle":["Mapping the risk perceptions and emotions that drive security behaviors"],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":19,"alternative-id":["10.1145\/2841113.2841119","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841119","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}