{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T22:22:22Z","timestamp":1751840542044,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:00:00Z","timestamp":1569456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Rubica Inc."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,26]]},"DOI":"10.1145\/3349266.3351419","type":"proceedings-article","created":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T12:17:48Z","timestamp":1569500268000},"page":"81-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["The Use and Non-Use of Cybersecurity Tools Among Consumers"],"prefix":"10.1145","author":[{"given":"Marc","family":"Dupuis","sequence":"first","affiliation":[{"name":"University of Washington, Bothell, WA, USA"}]},{"given":"Tamara","family":"Geiger","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Marshelle","family":"Slayton","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Frances","family":"Dewing","sequence":"additional","affiliation":[{"name":"Rubica, Inc., Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_3_2_1_4_1","volume-title":"Scale development: theory and applications","author":"DeVellis Robert F.","unstructured":"Robert F. DeVellis . 2012. Scale development: theory and applications ( 3 rd ed ed.). SAGE. Robert F. DeVellis. 2012. Scale development: theory and applications (3rd ed ed.). SAGE.","edition":"3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.584"},{"key":"e_1_3_2_1_6_1","volume-title":"Measuring the Human Factor in Information Security and Privacy. In The 49th Hawaii International Conference on System Sciences (HICSS). IEEE.","author":"Dupuis Marc","year":"2016","unstructured":"Marc Dupuis , Robert Crossler , and Barbara Endicott-Popovsky . 2016 . Measuring the Human Factor in Information Security and Privacy. In The 49th Hawaii International Conference on System Sciences (HICSS). IEEE. Marc Dupuis, Robert Crossler, and Barbara Endicott-Popovsky. 2016. Measuring the Human Factor in Information Security and Privacy. In The 49th Hawaii International Conference on System Sciences (HICSS). IEEE."},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Cloud Security Management.","author":"Dupuis Marc","year":"2013","unstructured":"Marc Dupuis , Barbara Endicott-Popovsky , and Robert Crossler . 2013 . An Analysis of the Use of Amazon's Mechanical Turk for Survey Research in the Cloud . In International Conference on Cloud Security Management. Marc Dupuis, Barbara Endicott-Popovsky, and Robert Crossler. 2013. An Analysis of the Use of Amazon's Mechanical Turk for Survey Research in the Cloud. In International Conference on Cloud Security Management."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376210"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2017.48"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"e_1_3_2_1_14_1","volume-title":"Internet Security and Privacy in VPN. In International Conference on Digital Information ManagementInternational Conference on Digital Information Management","volume":"9","author":"Pavlicek Antonin","year":"2018","unstructured":"Antonin Pavlicek and Frantisek Sudzina . 2018 . Internet Security and Privacy in VPN. In International Conference on Digital Information ManagementInternational Conference on Digital Information Management , Vol. 9 . 133--139. Antonin Pavlicek and Frantisek Sudzina. 2018. Internet Security and Privacy in VPN. In International Conference on Digital Information ManagementInternational Conference on Digital Information Management, Vol. 9. 133--139."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.3.515"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.02"}],"event":{"name":"SIGITE '19: The 20th Annual Conference on Information Technology Education","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Tacoma WA USA","acronym":"SIGITE '19"},"container-title":["Proceedings of the 20th Annual SIG Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3349266.3351419","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3349266.3351419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:07Z","timestamp":1750201987000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3349266.3351419"}},"subtitle":["Do They Want Help?"],"short-title":[],"issued":{"date-parts":[[2019,9,26]]},"references-count":18,"alternative-id":["10.1145\/3349266.3351419","10.1145\/3349266"],"URL":"https:\/\/doi.org\/10.1145\/3349266.3351419","relation":{},"subject":[],"published":{"date-parts":[[2019,9,26]]},"assertion":[{"value":"2019-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}