{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:13:56Z","timestamp":1769746436240,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3283458.3283486","type":"proceedings-article","created":{"date-parts":[[2019,1,23]],"date-time":"2019-01-23T13:10:20Z","timestamp":1548249020000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A comparative study of smartphone-user security perception and preference towards redesigned security notifications"],"prefix":"10.1145","author":[{"given":"Jema David","family":"Ndibwile","sequence":"first","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"given":"Edith Talina","family":"Luhanga","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"given":"Doudou","family":"Fall","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"given":"Daisuke","family":"Miyamoto","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(09)70088-0"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"African Union Commission and Symantec.","year":"2016","unstructured":"African Union Commission and Symantec. 2016 . Cybersecurity and Cybercrime Trends in Africa. (November 2016) . Retrieved March 25, 2018 from https:\/\/www.thegfce.com\/binaries\/gfce\/documents\/publications\/2017\/03\/10\/report-cyber-trends-in-africa\/Cyber_security_trends_report_Africa-en.pdf African Union Commission and Symantec. 2016. Cybersecurity and Cybercrime Trends in Africa. (November 2016). Retrieved March 25, 2018 from https:\/\/www.thegfce.com\/binaries\/gfce\/documents\/publications\/2017\/03\/10\/report-cyber-trends-in-africa\/Cyber_security_trends_report_Africa-en.pdf"},{"key":"e_1_3_2_1_4_1","volume-title":"A framework for reasoning about the human in the loop. UPSEC (August","author":"Cranor Lorrie Faith","year":"2008","unstructured":"Lorrie Faith Cranor . 2008. A framework for reasoning about the human in the loop. UPSEC (August 2008 ), 1--15. Lorrie Faith Cranor. 2008. A framework for reasoning about the human in the loop. UPSEC (August 2008), 1--15."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2017.1027"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841115"},{"key":"e_1_3_2_1_8_1","volume-title":"Foreigner's Long-term Stay in Japan and Household Electronic Appliances. (May","author":"Estate Tokyo Real","year":"2016","unstructured":"Tokyo Real Estate . 2016. Foreigner's Long-term Stay in Japan and Household Electronic Appliances. (May 2016 ). Retrieved March 2018 from http:\/\/www.realestate-tokyo.com\/news\/electronic-appliances-japan\/ Tokyo Real Estate. 2016. Foreigner's Long-term Stay in Japan and Household Electronic Appliances. (May 2016). Retrieved March 2018 from http:\/\/www.realestate-tokyo.com\/news\/electronic-appliances-japan\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.075"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70120-9"},{"key":"e_1_3_2_1_11_1","volume-title":"Demographics of Tanzania. (2018). Retrieved","author":"Government Tanzanian","year":"2018","unstructured":"Tanzanian Government . 2018. Demographics of Tanzania. (2018). Retrieved January 2018 from https:\/\/en.wikipedia.org\/wiki\/Demographics_of_Tanzania Tanzanian Government. 2018. Demographics of Tanzania. (2018). Retrieved January 2018 from https:\/\/en.wikipedia.org\/wiki\/Demographics_of_Tanzania"},{"key":"e_1_3_2_1_12_1","volume-title":"Accelerating affordable smartphone ownership in emerging markets. (2017). Retrieved","author":"GSMA.","year":"2018","unstructured":"GSMA. 2017. Accelerating affordable smartphone ownership in emerging markets. (2017). Retrieved April 2018 from https:\/\/www.gsma.com\/mobilefordevelopment\/wp-content\/uploads\/2017\/07\/accelerating-affordable-smartphone-ownership-emerging-markets-2017.pdf GSMA. 2017. Accelerating affordable smartphone ownership in emerging markets. (2017). Retrieved April 2018 from https:\/\/www.gsma.com\/mobilefordevelopment\/wp-content\/uploads\/2017\/07\/accelerating-affordable-smartphone-ownership-emerging-markets-2017.pdf"},{"key":"e_1_3_2_1_13_1","volume-title":"Top 11 Most Spoken Languages in Africa. (October","year":"2017","unstructured":"Hausaman, Zabalaza, Themba, and Dememelashi. 2017. Top 11 Most Spoken Languages in Africa. (October 2017 ). Retrieved June 2018 from https:\/\/africa-facts.org\/top-10-most-spoken-languages-in-africa\/ Hausaman, Zabalaza, Themba, and Dememelashi. 2017. Top 11 Most Spoken Languages in Africa. (October 2017). Retrieved June 2018 from https:\/\/africa-facts.org\/top-10-most-spoken-languages-in-africa\/"},{"key":"e_1_3_2_1_14_1","volume-title":"Patrick","author":"Herley Cormac","year":"2009","unstructured":"Cormac Herley , P.C. Van Oorschot , and Andrew S . Patrick . 2009 . Passwords : If We're So Smart, Why Are We Still Using Them? Financial Cryptography and Data Security Lecture Notes in Computer Science ( 2009), 230--237. Cormac Herley, P.C.Van Oorschot, and Andrew S. Patrick. 2009. Passwords: If We're So Smart, Why Are We Still Using Them? Financial Cryptography and Data Security Lecture Notes in Computer Science (2009), 230--237."},{"key":"e_1_3_2_1_15_1","volume-title":"Japans approach towards international strategy on cyber security cooperation. 2013 World Cyberspace Cooperation Summit IV (WCC4)","author":"IPSC.","year":"2013","unstructured":"IPSC. 2013. Japans approach towards international strategy on cyber security cooperation. 2013 World Cyberspace Cooperation Summit IV (WCC4) ( 2013 ). IPSC. 2013. Japans approach towards international strategy on cyber security cooperation. 2013 World Cyberspace Cooperation Summit IV (WCC4) (2013)."},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"ISPC.","year":"2006","unstructured":"ISPC. 2006 . The First National Strategy on Information Security. (February 2006) . Retrieved March 23, 2018 from http:\/\/www.nisc.go.jp\/eng\/pdf\/national_strategy_001_eng.pdf ISPC. 2006. The First National Strategy on Information Security. (February 2006). Retrieved March 23, 2018 from http:\/\/www.nisc.go.jp\/eng\/pdf\/national_strategy_001_eng.pdf"},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"IPSC.","year":"2010","unstructured":"IPSC. 2010 . Information Security Strategy for Protecting the Nation. (May 2010) . Retrieved March 23, 2018 from http:\/\/www.nisc.go.jp\/eng\/pdf\/New_Strategy_English.pdf IPSC. 2010. Information Security Strategy for Protecting the Nation. (May 2010). Retrieved March 23, 2018 from http:\/\/www.nisc.go.jp\/eng\/pdf\/New_Strategy_English.pdf"},{"key":"e_1_3_2_1_18_1","first-page":"2017","volume-title":"Global cybersecurity index. (2017). Retrieved","author":"ITU.","year":"2018","unstructured":"ITU. 2017. Global cybersecurity index. (2017). Retrieved April 2018 from https:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/GCI- 2017 .aspx ITU. 2017. Global cybersecurity index. (2017). Retrieved April 2018 from https:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/GCI-2017.aspx"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357084"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"e_1_3_2_1_21_1","volume-title":"A conceptual framework for cyber security awareness and education in SA. South African Computer Journal 52","author":"Kortjan Noluxolo","year":"2014","unstructured":"Noluxolo Kortjan and Rossouw Von Solms . 2014. A conceptual framework for cyber security awareness and education in SA. South African Computer Journal 52 ( 2014 ). Noluxolo Kortjan and Rossouw Von Solms. 2014. A conceptual framework for cyber security awareness and education in SA. South African Computer Journal 52 (2014)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102217"},{"key":"e_1_3_2_1_23_1","volume-title":"A Framework for Cyber Security in Africa. Journal of Information Assurance & Cybersecurity","author":"Kritzinger Elmarie","year":"2013","unstructured":"Elmarie Kritzinger and Sh Von Solms . 2013. A Framework for Cyber Security in Africa. Journal of Information Assurance & Cybersecurity ( 2013 ), 1--10. Elmarie Kritzinger and Sh Von Solms. 2013. A Framework for Cyber Security in Africa. Journal of Information Assurance & Cybersecurity (2013), 1--10."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 13th annual conference on World Wide Web applications (August","author":"Lange Mariska De","year":"2011","unstructured":"Mariska De Lange and Rossouw Von Solms . 2011 . The importance of raising e-safety awareness amongst children . Proceedings of the 13th annual conference on World Wide Web applications (August 2011), 14. Mariska De Lange and Rossouw Von Solms. 2011. The importance of raising e-safety awareness amongst children. Proceedings of the 13th annual conference on World Wide Web applications (August 2011), 14."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2013.051608"},{"key":"e_1_3_2_1_26_1","volume-title":"Emerging Asian countries among most exposed to malware. (August","year":"2017","unstructured":"Microsoft. 2017. Emerging Asian countries among most exposed to malware. (August 2017 ). Retrieved April 2018 from https:\/\/news.microsoft.com\/apac\/2017\/08\/24\/emerging-asian-countries-among-exposed-malware\/ Microsoft. 2017. Emerging Asian countries among most exposed to malware. (August 2017). Retrieved April 2018 from https:\/\/news.microsoft.com\/apac\/2017\/08\/24\/emerging-asian-countries-among-exposed-malware\/"},{"key":"e_1_3_2_1_27_1","volume-title":"Microsoft Security Intelligence Report","unstructured":"Microsoft. 2017. Microsoft Security Intelligence Report Volume 22 is now available. (September 2017). Retrieved April 2018 from https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/08\/17\/microsoft-security-intelligence-report-volume-22-is-now-available\/ Microsoft. 2017. Microsoft Security Intelligence Report Volume 22 is now available. (September 2017). Retrieved April 2018 from https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/08\/17\/microsoft-security-intelligence-report-volume-22-is-now-available\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1862758.1862770"},{"key":"e_1_3_2_1_30_1","volume-title":"Social Media Use Continues to Rise in Developing Countries. (June","author":"Poushter Jacob","year":"2018","unstructured":"Jacob Poushter , Caldwell Bishop , and Hanyu Chwe . 2018. Social Media Use Continues to Rise in Developing Countries. (June 2018 ). Retrieved June 2018 from http:\/\/www.pewglobal.org\/2018\/06\/19\/2-smartphone-ownership-on-the-rise-in-emerging-economies\/ Jacob Poushter, Caldwell Bishop, and Hanyu Chwe. 2018. Social Media Use Continues to Rise in Developing Countries. (June 2018). Retrieved June 2018 from http:\/\/www.pewglobal.org\/2018\/06\/19\/2-smartphone-ownership-on-the-rise-in-emerging-economies\/"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETC.2010.5529269"},{"key":"e_1_3_2_1_32_1","volume-title":"Connecting to Unfamiliar Wi-Fi Hotspots-A Risk Taking Perspective. A Risk Calculus for Unfamiliar Wi-Fi Connections","author":"Seok Choi Hoon","year":"2013","unstructured":"Choi Hoon Seok and Darrell Carpenter . 2013. Connecting to Unfamiliar Wi-Fi Hotspots-A Risk Taking Perspective. A Risk Calculus for Unfamiliar Wi-Fi Connections ( 2013 ). Choi Hoon Seok and Darrell Carpenter. 2013. Connecting to Unfamiliar Wi-Fi Hotspots-A Risk Taking Perspective. A Risk Calculus for Unfamiliar Wi-Fi Connections (2013)."},{"key":"e_1_3_2_1_33_1","volume-title":"Singer and Allan Friedman","author":"Peter","year":"2014","unstructured":"Peter W. Singer and Allan Friedman . 2014 . Cybersecurity and cyberwar: what everyone needs to know, Oxford : Oxford University Press . Peter W. Singer and Allan Friedman. 2014. Cybersecurity and cyberwar: what everyone needs to know, Oxford: Oxford University Press."},{"key":"e_1_3_2_1_34_1","volume-title":"Na\u00efve Security in a Wi-Fi World. IFIP Advances in Information and Communication Technology Trust Management IV","author":"Swanson Colleen","year":"2010","unstructured":"Colleen Swanson , Ruth Urner , and Edward Lank . 2010. Na\u00efve Security in a Wi-Fi World. IFIP Advances in Information and Communication Technology Trust Management IV ( 2010 ), 32--47. Colleen Swanson, Ruth Urner, and Edward Lank. 2010. Na\u00efve Security in a Wi-Fi World. IFIP Advances in Information and Communication Technology Trust Management IV (2010), 32--47."},{"key":"e_1_3_2_1_35_1","volume-title":"Retrieved","author":"Taniwaki Yasuhiko","year":"2018","unstructured":"Yasuhiko Taniwaki . Cybersecurity Strategy in Japan. Deputy Director-General NISC (9 Oct. 2014) . Retrieved March 23, 2018 from https:\/\/www.nisc.go.jp\/eng\/ Yasuhiko Taniwaki. Cybersecurity Strategy in Japan. Deputy Director-General NISC (9 Oct. 2014). Retrieved March 23, 2018 from https:\/\/www.nisc.go.jp\/eng\/"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290903121386"},{"key":"e_1_3_2_1_37_1","volume-title":"Tanzania Commission for Universities. (2016). Retrieved","year":"2018","unstructured":"TCU.2016. Tanzania Commission for Universities. (2016). Retrieved April 2018 from http:\/\/tcu.go.tz\/images\/documents\/TCU_Rolling_SP_2015_16_2020_12_May_2016.pdf TCU.2016. Tanzania Commission for Universities. (2016). Retrieved April 2018 from http:\/\/tcu.go.tz\/images\/documents\/TCU_Rolling_SP_2015_16_2020_12_May_2016.pdf"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(06)70430-4"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557275"},{"key":"e_1_3_2_1_40_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Wash Rick","year":"2014","unstructured":"Rick Wash , Emilee Rader , Kami Vaniea , and Michelle Rizor . 2014 . Out of the loop: How automated software updates cause unintended security consequences . Symposium on Usable Privacy and Security (SOUPS) (2014), 89--104. Rick Wash, Emilee Rader, Kami Vaniea, and Michelle Rizor. 2014. Out of the loop: How automated software updates cause unintended security consequences. Symposium on Usable Privacy and Security (SOUPS) (2014), 89--104."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Michael S. Wogalter. 2006. Handbook of Warnings. (2006).  Michael S. Wogalter. 2006. Handbook of Warnings. (2006).","DOI":"10.1201\/9781482289688"}],"event":{"name":"AfriCHI '18: 2nd African Conference for Human Computer Interaction","location":"Windhoek Namibia","acronym":"AfriCHI '18"},"container-title":["Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3283458.3283486","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3283458.3283486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:09Z","timestamp":1750207449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3283458.3283486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":42,"alternative-id":["10.1145\/3283458.3283486","10.1145\/3283458"],"URL":"https:\/\/doi.org\/10.1145\/3283458.3283486","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}