{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:08:08Z","timestamp":1766268488917,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025926","type":"proceedings-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T18:37:22Z","timestamp":1493750242000},"page":"2202-2214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Self-Confidence Trumps Knowledge"],"prefix":"10.1145","author":[{"given":"Yukiko","family":"Sawaya","sequence":"first","affiliation":[{"name":"KDDI Research, Inc., Saitama, Japan"}]},{"given":"Mahmood","family":"Sharif","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Nicolas","family":"Christin","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Ayumu","family":"Kubota","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc., Saitama, Japan"}]},{"given":"Akihiro","family":"Nakarai","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc., Saitama, Japan"}]},{"given":"Akira","family":"Yamada","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc., Saitama, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.2008.34421995"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.38"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"e_1_3_2_2_5_1","article-title":"A cross-cultural and gender-based perspective for online security: Exploring knowledge, skills and attitudes of higher education students","volume":"13","author":"Chaudhary Sunil","year":"2015","unstructured":"Sunil Chaudhary , Yan Zhao , Eleni Berki , Juri Valtanen , Linfeng Li , Marko Helenius , and Stylianos Mystakidis . 2015 . A cross-cultural and gender-based perspective for online security: Exploring knowledge, skills and attitudes of higher education students . IADIS International Journal on WWW\/Internet 13 , 1 (2015). Sunil Chaudhary, Yan Zhao, Eleni Berki, Juri Valtanen, Linfeng Li, Marko Helenius, and Stylianos Mystakidis. 2015. A cross-cultural and gender-based perspective for online security: Exploring knowledge, skills and attitudes of higher education students. IADIS International Journal on WWW\/Internet 13, 1 (2015).","journal-title":"IADIS International Journal on WWW\/Internet"},{"key":"e_1_3_2_2_6_1","unstructured":"China Internet Network Information Center. 2014. Statistical Survey on Internet Developmentin China2015.12. http:\/\/www.internetstatistik.se\/ wordpress\/wp-content\/uploads\/2014\/07\/CNNIC_report.pdf. (2014). [Online; accessed 9\/5\/2016].  China Internet Network Information Center. 2014. Statistical Survey on Internet Developmentin China2015.12. http:\/\/www.internetstatistik.se\/ wordpress\/wp-content\/uploads\/2014\/07\/CNNIC_report.pdf. (2014). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808101618"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the Survey Research Methods Section, American Statistical Association (2005)","author":"Colosi Robert","year":"2005","unstructured":"Robert Colosi . 2005 . Negatively worded questions cause respondent confusion . Proceedings of the Survey Research Methods Section, American Statistical Association (2005) (2005), 2896--2903. Robert Colosi. 2005. Negatively worded questions cause respondent confusion. Proceedings of the Survey Research Methods Section, American Statistical Association (2005) (2005), 2896--2903."},{"key":"e_1_3_2_2_9_1","unstructured":"ComScore Inc. 2015. 2015 Japan Digital Audience Report. https:\/\/www.comscore.com\/layout\/set\/popup\/ Request\/Presentations\/2015\/ 2015-Japan-Digital-Audience-Report?req=slides&pre= 2015+Japan+Digital+Audience+Report. (2015). [Online; accessed 9\/5\/2016].  ComScore Inc. 2015. 2015 Japan Digital Audience Report. https:\/\/www.comscore.com\/layout\/set\/popup\/ Request\/Presentations\/2015\/ 2015-Japan-Digital-Audience-Report?req=slides&pre= 2015+Japan+Digital+Audience+Report. (2015). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_10_1","volume-title":"La diffusion des technologies de l'information et de la communication dans la soci\u00e9t\u00e9 fran\u00e7aise","author":"R\u00c9DOC.","year":"2014","unstructured":"C R\u00c9DOC. 2014. La diffusion des technologies de l'information et de la communication dans la soci\u00e9t\u00e9 fran\u00e7aise ( 2014 ). http:\/\/www.arcep.fr\/uploads\/tx_ gspublication\/etude-CREDOC-diffusion-TIC-2014.pdf. (2014). [Online; accessed 9\/5\/2016]. CR\u00c9DOC. 2014. La diffusion des technologies de l'information et de la communication dans la soci\u00e9t\u00e9 fran\u00e7aise (2014). http:\/\/www.arcep.fr\/uploads\/tx_ gspublication\/etude-CREDOC-diffusion-TIC-2014.pdf. (2014). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_11_1","volume-title":"Online Research. http: \/\/global.cross-m.co.jp\/solution\/online\/index.html. (2015). [Online","author":"Cross Marketing Inc. 2015.","year":"2016","unstructured":"Cross Marketing Inc. 2015. Online Research. http: \/\/global.cross-m.co.jp\/solution\/online\/index.html. (2015). [Online ; accessed 9\/5\/ 2016 ]. Cross Marketing Inc. 2015. Online Research. http: \/\/global.cross-m.co.jp\/solution\/online\/index.html. (2015). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179621"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/10696679.1997.11501750"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858265"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841115"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of SOUPS.","author":"Forget Alain","year":"2016","unstructured":"Alain Forget , Sarah Pearman , Jeremy Thomas , Alessandro Acquisti , Nicolas Christin , Lorrie Faith Cranor , Serge Egelman , Marian Harbach , and Rahul Telang . 2016 . Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes . In Proceedings of SOUPS. Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, and Rahul Telang. 2016. Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. In Proceedings of SOUPS."},{"key":"e_1_3_2_2_18_1","unstructured":"Tsutomu Fujinami and Christine Nanz. 2013. The 101 translation problems between Japanese and German\/English. (2013).  Tsutomu Fujinami and Christine Nanz. 2013. The 101 translation problems between Japanese and German\/English. (2013)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0191-8869(86)90014-0"},{"key":"e_1_3_2_2_20_1","unstructured":"Gengo Inc. 2016. Gengo. https:\/\/www.gengo.com. (2016). [Online; accessed 09\/20\/2016].  Gengo Inc. 2016. Gengo. https:\/\/www.gengo.com. (2016). [Online; accessed 09\/20\/2016]."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4870(95)00035-6"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"volume-title":"Culture's consequences: International differences in work-related values","author":"Hofstede Geert","key":"e_1_3_2_2_23_1","unstructured":"Geert Hofstede . 1984. Culture's consequences: International differences in work-related values . Vol. 5 . Sage . Geert Hofstede. 1984. Culture's consequences: International differences in work-related values. Vol. 5. Sage."},{"volume-title":"Culture's consequences: Comparing values, behaviors, institutions and organizations across nations","author":"Hofstede Geert","key":"e_1_3_2_2_24_1","unstructured":"Geert Hofstede . 2001. Culture's consequences: Comparing values, behaviors, institutions and organizations across nations . Sage . Geert Hofstede. 2001. Culture's consequences: Comparing values, behaviors, institutions and organizations across nations. Sage."},{"key":"e_1_3_2_2_25_1","volume-title":"Bentler","author":"Hu Li-Tze","year":"1999","unstructured":"Li-Tze Hu and Peter M . Bentler . 1999 . Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal 6, 1 (1999), 1--55. Li-Tze Hu and Peter M. Bentler. 1999. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal 6, 1 (1999), 1--55."},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of SOUPS.","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion , Rob Reeder , and Sunny Consolvo . 2015 . \"... no one can hack my mind\": Comparing Expert and Non-Expert Security Practices . In Proceedings of SOUPS. Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \"... no one can hack my mind\": Comparing Expert and Non-Expert Security Practices. In Proceedings of SOUPS."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078845"},{"key":"e_1_3_2_2_28_1","unstructured":"Ipsos. 2014. Ipsos Online Audience Measurement in The Arab World. http:\/\/fac.ksu.edu.sa\/sites\/default\/files\/ online-audience-measurement.pdf. (2014). [Online; accessed 9\/5\/2016].  Ipsos. 2014. Ipsos Online Audience Measurement in The Arab World. http:\/\/fac.ksu.edu.sa\/sites\/default\/files\/ online-audience-measurement.pdf. (2014). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of SOUPS.","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang , Stephanie Brown , Laura Dabbish , and Sara B Kiesler . 2014 . Privacy Attitudes of Mechanical Turk Workers and the US Public . In Proceedings of SOUPS. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara B Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the US Public. In Proceedings of SOUPS."},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the nordic workshop on secure IT systems.","author":"Karvonen Kristiina","year":"2000","unstructured":"Kristiina Karvonen , Lucas Cardholm , and Stefan Karlsson . 2000 . Cultures of trust: A cross-cultural study on the formation of trust in an electronic environment . In Proceedings of the nordic workshop on secure IT systems. Kristiina Karvonen, Lucas Cardholm, and Stefan Karlsson. 2000. Cultures of trust: A cross-cultural study on the formation of trust in an electronic environment. In Proceedings of the nordic workshop on secure IT systems."},{"key":"e_1_3_2_2_31_1","unstructured":"Korean Internet & Security Agency. 2016. 2015 Survey on the Internet Usage Executive Summary. http:\/\/isis.kisa.or.kr\/board\/fileDown.jsp&pageId=060300&bbsId=10&itemId=345&athSeq=1. (2016). [Online; accessed 9\/5\/2016].  Korean Internet & Security Agency. 2016. 2015 Survey on the Internet Usage Executive Summary. http:\/\/isis.kisa.or.kr\/board\/fileDown.jsp&pageId=060300&bbsId=10&itemId=345&athSeq=1. (2016). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.307"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of PPS.","author":"Kraus Lydia","year":"2014","unstructured":"Lydia Kraus , Ina Wechsung , and Sebastian M\u00f6ller . 2014 . A comparison of privacy and security knowledge and privacy concern as influencing factors for mobile protection behavior . In Proceedings of PPS. Lydia Kraus, Ina Wechsung, and Sebastian M\u00f6ller. 2014. A comparison of privacy and security knowledge and privacy concern as influencing factors for mobile protection behavior. In Proceedings of PPS."},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of TPRC.","author":"Kumaraguru Ponnurangam","year":"2005","unstructured":"Ponnurangam Kumaraguru , Lorrie Faith Cranor , and Elaine Newton . 2005 . Privacy perceptions in india and the USA: An interview study . In Proceedings of TPRC. Ponnurangam Kumaraguru, Lorrie Faith Cranor, and Elaine Newton. 2005. Privacy perceptions in india and the USA: An interview study. In Proceedings of TPRC."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0610-6"},{"key":"e_1_3_2_2_36_1","unstructured":"Macromill Inc. 2015. Macromill. http:\/\/www.macromill.com\/global\/index.html. (2015). [Online; accessed 9\/5\/2016].  Macromill Inc. 2015. Macromill. http:\/\/www.macromill.com\/global\/index.html. (2015). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018726702551004"},{"key":"e_1_3_2_2_38_1","volume-title":"Small is beautiful. The use and interpretation of R2 in social research. Review of Sociology","author":"Moksony Ferenc","year":"1999","unstructured":"Ferenc Moksony . 1999. Small is beautiful. The use and interpretation of R2 in social research. Review of Sociology ( 1999 ), 130--138. Ferenc Moksony. 1999. Small is beautiful. The use and interpretation of R2 in social research. Review of Sociology (1999), 130--138."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2009.02.001"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985772"},{"volume-title":"Gross national income per capita","year":"2015","key":"e_1_3_2_2_41_1","unstructured":"Ofcom. 2015a. Gross national income per capita 2015 , Atlas method and PPP. http:\/\/databank.worldbank.org\/data\/download\/GNIPC.pdf. (2015). [Online; accessed 9\/5\/2016]. Ofcom. 2015a. Gross national income per capita 2015, Atlas method and PPP. http:\/\/databank.worldbank.org\/data\/download\/GNIPC.pdf. (2015). [Online; accessed 9\/5\/2016]."},{"volume-title":"Market Report","year":"2015","key":"e_1_3_2_2_42_1","unstructured":"Ofcom. 2015b. International Communications Market Report 2015 . http:\/\/stakeholders.ofcom.org.uk\/ binaries\/research\/cmr\/cmr15\/icmr15\/icmr_2015.pdf. (2015). [Online; accessed 9\/5\/2016]. Ofcom. 2015b. International Communications Market Report 2015. http:\/\/stakeholders.ofcom.org.uk\/ binaries\/research\/cmr\/cmr15\/icmr15\/icmr_2015.pdf. (2015). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Mehrbod Shari Eugene Fink and Jaime G Carbonell. 2010. Learning of personalized security settings. (2010).  Mehrbod Shari Eugene Fink and Jaime G Carbonell. 2010. Learning of personalized security settings. (2010).","DOI":"10.1109\/ICSMC.2010.5642461"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610289"},{"key":"e_1_3_2_2_45_1","volume-title":"Developing comparable questions in cross-national surveys. Cross-cultural survey methods","author":"Smith Tom W","year":"2003","unstructured":"Tom W Smith . 2003. Developing comparable questions in cross-national surveys. Cross-cultural survey methods ( 2003 ), 69--92. Tom W Smith. 2003. Developing comparable questions in cross-national surveys. Cross-cultural survey methods (2003), 69--92."},{"key":"e_1_3_2_2_46_1","unstructured":"Statistics Bureau. 2011. 2010 National Census in Japan (in Japanese). http:\/\/www.stat.go.jp\/data\/kokusei\/2010\/index.htm. (2011). [Online; accessed 5\/10\/2016].  Statistics Bureau. 2011. 2010 National Census in Japan (in Japanese). http:\/\/www.stat.go.jp\/data\/kokusei\/2010\/index.htm. (2011). [Online; accessed 5\/10\/2016]."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"e_1_3_2_2_48_1","first-page":"3","article-title":"Enhancing online performance through website content and personalization","volume":"52","author":"Thongpapanl Narongsak","year":"2011","unstructured":"Narongsak Thongpapanl and Abdul Rehman Ashraf . 2011 . Enhancing online performance through website content and personalization . Journal of computer information systems 52 , 1 (2011), 3 -- 13 . Narongsak Thongpapanl and Abdul Rehman Ashraf. 2011. Enhancing online performance through website content and personalization. Journal of computer information systems 52, 1 (2011), 3--13.","journal-title":"Journal of computer information systems"},{"key":"e_1_3_2_2_49_1","volume-title":"http:\/\/tns-global.ru\/ services\/media\/media-audience\/internet\/information\/. (2015). [Online","author":"Russia TNS","year":"2016","unstructured":"TNS Russia . 2015. Web Index . http:\/\/tns-global.ru\/ services\/media\/media-audience\/internet\/information\/. (2015). [Online ; accessed 9\/5\/ 2016 ]. TNS Russia. 2015. Web Index. http:\/\/tns-global.ru\/ services\/media\/media-audience\/internet\/information\/. (2015). [Online; accessed 9\/5\/2016]."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488037"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0068967"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_11"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819941"},{"key":"e_1_3_2_2_54_1","volume-title":"Proceedings of SOUPS.","author":"Wash Rick","year":"2015","unstructured":"Rick Wash and Emilee Rader . 2015 . Too much knowledge? security beliefs and protective behaviors among USA internet users . In Proceedings of SOUPS. Rick Wash and Emilee Rader. 2015. Too much knowledge? security beliefs and protective behaviors among USA internet users. In Proceedings of SOUPS."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1086\/374697"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"World Bank. 2016. World Bank Atlas Method. (2016). http:\/\/go.worldbank.org\/IEH2RL06U0 [Online; accessed 12\/31\/2016].  World Bank. 2016. World Bank Atlas Method. (2016). http:\/\/go.worldbank.org\/IEH2RL06U0 [Online; accessed 12\/31\/2016].","DOI":"10.1093\/wbro\/lkv025"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145219"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Denver Colorado USA","acronym":"CHI '17"},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:15Z","timestamp":1750215795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025926"}},"subtitle":["A Cross-Cultural Study of Security Behavior"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":56,"alternative-id":["10.1145\/3025453.3025926","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025926","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}