{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T17:45:57Z","timestamp":1774115157226,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T00:00:00Z","timestamp":1581638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,14]]},"DOI":"10.1145\/3384613.3384629","type":"proceedings-article","created":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T15:27:04Z","timestamp":1590074824000},"page":"129-135","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Exploring Factors Affecting User's Cybersecurity Behaviour by Using Mobile Augmented Reality App (CybAR)"],"prefix":"10.1145","author":[{"given":"Hamed","family":"Alqahtani","sequence":"first","affiliation":[{"name":"Macquarie University, Australia"}]},{"given":"Manolya","family":"Kavakli-Thorne","sequence":"additional","affiliation":[{"name":"Macquarie University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/861"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2017.8282928"},{"key":"e_1_3_2_1_3_1","volume-title":"Michel JJ Handgraaf, and Elke U Weber","author":"Appelt Kirstin C","year":"2011","unstructured":"Kirstin C Appelt , Kerry F Milch , Michel JJ Handgraaf, and Elke U Weber . 2011 . The decision making individual differences inventory and guidelines for the study of individual differences in judgment and decision-making research. Judgment and Decision making (2011). Kirstin C Appelt, Kerry F Milch, Michel JJ Handgraaf, and Elke U Weber. 2011. The decision making individual differences inventory and guidelines for the study of individual differences in judgment and decision-making research. Judgment and Decision making (2011)."},{"key":"e_1_3_2_1_4_1","volume-title":"Motivational determinants of risk-taking behavior. Psychological review 64, 6p1","author":"Atkinson John W","year":"1957","unstructured":"John W Atkinson . 1957. Motivational determinants of risk-taking behavior. Psychological review 64, 6p1 ( 1957 ), 359. John W Atkinson. 1957. Motivational determinants of risk-taking behavior. Psychological review 64, 6p1 (1957), 359."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Michael Bosnjak Denis Bratko Mirta Galesic and Tracy Tuten. 207. Consumer personality and individual differences: Revitalizing a temporarily abandoned field. Journal of Business Research 60 6 (207) 587--589.  Michael Bosnjak Denis Bratko Mirta Galesic and Tracy Tuten. 207. Consumer personality and individual differences: Revitalizing a temporarily abandoned field. Journal of Business Research 60 6 (207) 587--589.","DOI":"10.1016\/j.jbusres.2006.12.002"},{"key":"e_1_3_2_1_6_1","article-title":"PHISHING, PHARMING AND IDENTITY THEFT","volume":"11","author":"Brody Richard G","year":"2007","unstructured":"Richard G Brody , Elizabeth Mulig , and Valerie Kimball . 2007 . PHISHING, PHARMING AND IDENTITY THEFT . Academy of Accounting & Financial Studies Journal 11 , 3 (2007). Richard G Brody, Elizabeth Mulig, and Valerie Kimball. 2007. PHISHING, PHARMING AND IDENTITY THEFT. Academy of Accounting & Financial Studies Journal 11, 3 (2007).","journal-title":"Academy of Accounting & Financial Studies Journal"},{"key":"e_1_3_2_1_7_1","first-page":"43","article-title":"The five-factor model and safety in the workplace: Investigating the relationships between personality and accident involvement","volume":"22","author":"Cellar Douglas F","year":"2001","unstructured":"Douglas F Cellar , Zachary C Nelson , Candice M Yorke , and Cara Bauer . 2001 . The five-factor model and safety in the workplace: Investigating the relationships between personality and accident involvement . Journal of Prevention & Intervention in the community 22 , 1 (2001), 43 -- 52 . Douglas F Cellar, Zachary C Nelson, Candice M Yorke, and Cara Bauer. 2001. The five-factor model and safety in the workplace: Investigating the relationships between personality and accident involvement. Journal of Prevention & Intervention in the community 22, 1 (2001), 43--52.","journal-title":"Journal of Prevention & Intervention in the community"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1097\/00006199-199711000-00006"},{"key":"e_1_3_2_1_9_1","volume-title":"Annual cybersecurity report.","year":"2017","unstructured":"Cisco. 2017. Annual cybersecurity report. Retrieved from http:\/\/b2me.cisco.com\/en-usannual-cybersecurity-report-2017?keycode1=001464170 ( 2017 ). Cisco. 2017. Annual cybersecurity report. Retrieved from http:\/\/b2me.cisco.com\/en-usannual-cybersecurity-report-2017?keycode1=001464170 (2017)."},{"key":"e_1_3_2_1_10_1","volume-title":"Computer self-efficacy: Development of a measure and initial test. MIS quarterly","author":"Compeau Deborah R","year":"1995","unstructured":"Deborah R Compeau and Christopher A Higgins . 1995. Computer self-efficacy: Development of a measure and initial test. MIS quarterly ( 1995 ), 189--211. Deborah R Compeau and Christopher A Higgins. 1995. Computer self-efficacy: Development of a measure and initial test. MIS quarterly (1995), 189--211."},{"key":"e_1_3_2_1_11_1","volume-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly","author":"Davis Fred D","year":"1989","unstructured":"Fred D Davis . 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly ( 1989 ), 319--340. Fred D Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly (1989), 319--340."},{"key":"e_1_3_2_1_12_1","volume-title":"The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Frontiers in psychology 9","author":"Dawson Jessica","year":"2018","unstructured":"Jessica Dawson and Robert Thomson . 2018. The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Frontiers in psychology 9 ( 2018 ). Jessica Dawson and Robert Thomson. 2018. The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Frontiers in psychology 9 (2018)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_1_16_1","first-page":"199","article-title":"Classifying different types of augmented reality technology","volume":"14","author":"Edwards-Stewart Amanda","year":"2016","unstructured":"Amanda Edwards-Stewart , Tim Hoyt , and Greg Reger . 2016 . Classifying different types of augmented reality technology . Annual Review of CyberTherapy and Telemedicine 14 (2016), 199 -- 201 . Amanda Edwards-Stewart, Tim Hoyt, and Greg Reger. 2016. Classifying different types of augmented reality technology. Annual Review of CyberTherapy and Telemedicine 14 (2016), 199--201.","journal-title":"Annual Review of CyberTherapy and Telemedicine"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_18_1","volume-title":"IT security spending trends. SANS. https:\/\/www. sans. org\/readingroom\/whitepapers\/analyst\/security-spending-trends-36697","author":"Filkins Barbara","year":"2016","unstructured":"Barbara Filkins and GM Hardy . 2016. IT security spending trends. SANS. https:\/\/www. sans. org\/readingroom\/whitepapers\/analyst\/security-spending-trends-36697 ( 2016 ). Barbara Filkins and GM Hardy. 2016. IT security spending trends. SANS. https:\/\/www. sans. org\/readingroom\/whitepapers\/analyst\/security-spending-trends-36697 (2016)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2005.08.007"},{"key":"e_1_3_2_1_21_1","volume-title":"Correlating human traits and cyber security behavior intentions. computers & security 73","author":"Gratian Margaret","year":"2018","unstructured":"Margaret Gratian , Sruthi Bandi , Michel Cukier , Josiah Dykstra , and Amy Ginther . 2018. Correlating human traits and cyber security behavior intentions. computers & security 73 ( 2018 ), 345--358. Margaret Gratian, Sruthi Bandi, Michel Cukier, Josiah Dykstra, and Amy Ginther. 2018. Correlating human traits and cyber security behavior intentions. computers & security 73 (2018), 345--358."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2017.0524"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.64"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0938-4"},{"key":"e_1_3_2_1_25_1","unstructured":"Oliver P John Sanjay Srivastava etal 1999. The Big Five trait taxonomy: History measurement and theoretical perspectives. Handbook of personality: Theory and research 2 1999 (1999) 102--138.  Oliver P John Sanjay Srivastava et al. 1999. The Big Five trait taxonomy: History measurement and theoretical perspectives. Handbook of personality: Theory and research 2 1999 (1999) 102--138."},{"key":"e_1_3_2_1_26_1","volume-title":"An exploratory investigation of message-person congruence in information security awareness campaigns. Computers & security 43","author":"Kajzer Mitchell","year":"2014","unstructured":"Mitchell Kajzer , John D'Arcy , Charles R Crowell , Aaron Striegel , and Dirk Van Bruggen . 2014. An exploratory investigation of message-person congruence in information security awareness campaigns. Computers & security 43 ( 2014 ), 64--76. Mitchell Kajzer, John D'Arcy, Charles R Crowell, Aaron Striegel, and Dirk Van Bruggen. 2014. An exploratory investigation of message-person congruence in information security awareness campaigns. Computers & security 43 (2014), 64--76."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/PICMET.2015.7273084"},{"key":"e_1_3_2_1_28_1","unstructured":"J. Kirschner. 2018. Litterati - A Mobile App to Track & Reduce Litter. Kickstarter. https:\/\/www.kickstarter.com\/projects\/litterati\/litterati-join-the-community-thats-cleaning-the-pl  J. Kirschner. 2018. Litterati - A Mobile App to Track & Reduce Litter. Kickstarter. https:\/\/www.kickstarter.com\/projects\/litterati\/litterati-join-the-community-thats-cleaning-the-pl"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_2_1_30_1","volume-title":"Avoidance of information technology threats: a theoretical perspective. MIS quarterly","author":"Liang Huigang","year":"2009","unstructured":"Huigang Liang and Yajiong Xue . 2009. Avoidance of information technology threats: a theoretical perspective. MIS quarterly ( 2009 ), 71--90. Huigang Liang and Yajiong Xue. 2009. Avoidance of information technology threats: a theoretical perspective. MIS quarterly (2009), 71--90."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.008"},{"key":"e_1_3_2_1_33_1","volume-title":"PACIS 2007 Proceedings","author":"Ng Boon-Yuen","year":"2007","unstructured":"Boon-Yuen Ng and Yunjie Xu . 2007 . Studying users' computer security behavior using the Health Belief Model . PACIS 2007 Proceedings (2007), 45. Boon-Yuen Ng and Yunjie Xu. 2007. Studying users' computer security behavior using the Health Belief Model. PACIS 2007 Proceedings (2007), 45."},{"key":"e_1_3_2_1_34_1","volume-title":"David Tobey Sr, and Ralph Soule","author":"Pusey Portia","year":"2014","unstructured":"Portia Pusey , David Tobey Sr, and Ralph Soule . 2014 . An Argument for Game Balance: Improving student engagement by matching difficulty level with learner readiness. In 2014 {USENIX} Summit on Gaming, Games, and Gamification in Security Education ( 3GSE 14). Portia Pusey, David Tobey Sr, and Ralph Soule. 2014. An Argument for Game Balance: Improving student engagement by matching difficulty level with learner readiness. In 2014 {USENIX} Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.006"},{"key":"e_1_3_2_1_36_1","volume-title":"A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1","author":"Rogers Ronald W","year":"1975","unstructured":"Ronald W Rogers . 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 ( 1975 ), 93--114. Ronald W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93--114."},{"key":"e_1_3_2_1_37_1","volume-title":"Historical origins of the health belief model. Health education monographs 2, 4","author":"Rosenstock Irwin M","year":"1974","unstructured":"Irwin M Rosenstock . 1974. Historical origins of the health belief model. Health education monographs 2, 4 ( 1974 ), 328--335. Irwin M Rosenstock. 1974. Historical origins of the health belief model. Health education monographs 2, 4 (1974), 328--335."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5993\/AJHB.24.2.1"},{"key":"e_1_3_2_1_39_1","volume-title":"Decision-making style: The development and assessment of a new measure. Educational and psychological measurement 55, 5","author":"Scott Susanne G","year":"1995","unstructured":"Susanne G Scott and Reginald A Bruce . 1995. Decision-making style: The development and assessment of a new measure. Educational and psychological measurement 55, 5 ( 1995 ), 818--831. Susanne G Scott and Reginald A Bruce. 1995. Decision-making style: The development and assessment of a new measure. Educational and psychological measurement 55, 5 (1995), 818--831."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_42_1","volume-title":"AMCIS 2006 Proceedings","author":"Shropshire Jordan","year":"2006","unstructured":"Jordan Shropshire , Merrill Warkentin , Allen Johnston , and Mark Schmidt . 2006 . Personality and IT security: An application of the five-factor model . AMCIS 2006 Proceedings (2006), 415. Jordan Shropshire, Merrill Warkentin, Allen Johnston, and Mark Schmidt. 2006. Personality and IT security: An application of the five-factor model. AMCIS 2006 Proceedings (2006), 415."},{"key":"e_1_3_2_1_43_1","volume-title":"Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly","author":"Smith H Jeff","year":"1996","unstructured":"H Jeff Smith , Sandra J Milberg , and Sandra J Burke . 1996. Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly ( 1996 ), 167--196. H Jeff Smith, Sandra J Milberg, and Sandra J Burke. 1996. Information privacy: measuring individuals' concerns about organizational practices. MIS quarterly (1996), 167--196."},{"key":"e_1_3_2_1_44_1","unstructured":"Statista. 2019. Number of mobile phone users worldwide 2015-2020 | Statista. https:\/\/www.statista.com\/statistics\/274774\/forecast-of-mobile-phone-users-worldwide\/  Statista. 2019. Number of mobile phone users worldwide 2015-2020 | Statista. https:\/\/www.statista.com\/statistics\/274774\/forecast-of-mobile-phone-users-worldwide\/"},{"key":"e_1_3_2_1_45_1","volume-title":"Global Cybersecurity: New Directions in Theory and Methods. Politics and Governance 6(2)","author":"Stevens Tim","year":"2018","unstructured":"Tim Stevens . 2018 . Global Cybersecurity: New Directions in Theory and Methods. Politics and Governance 6(2) (2018), 1--4. Tim Stevens. 2018. Global Cybersecurity: New Directions in Theory and Methods. Politics and Governance 6(2) (2018), 1--4."},{"key":"e_1_3_2_1_46_1","unstructured":"Technopedia. 2018. Augmented Reality (AR). Technopedia. https:\/\/www.techopedia.com\/definition\/4776\/augmented-reality-ar  Technopedia. 2018. Augmented Reality (AR). Technopedia. https:\/\/www.techopedia.com\/definition\/4776\/augmented-reality-ar"},{"key":"e_1_3_2_1_47_1","volume-title":"Decision-making style: habit, style or both? Personality and individual differences 36, 4","author":"Thunholm Peter","year":"2004","unstructured":"Peter Thunholm . 2004. Decision-making style: habit, style or both? Personality and individual differences 36, 4 ( 2004 ), 931--944. Peter Thunholm. 2004. Decision-making style: habit, style or both? Personality and individual differences 36, 4 (2004), 931--944."},{"key":"e_1_3_2_1_48_1","volume-title":"A role-based model for federal information technology\/cyber security training. NIST special publication 800","author":"Toth Patricia","year":"2014","unstructured":"Patricia Toth and Penny Klein . 2014. A role-based model for federal information technology\/cyber security training. NIST special publication 800 ( 2014 ), 16. Patricia Toth and Penny Klein. 2014. A role-based model for federal information technology\/cyber security training. NIST special publication 800 (2014), 16."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1038\/533164a"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3048412"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.58"},{"key":"e_1_3_2_1_52_1","volume-title":"Gamification by design: Implementing game mechanics in web and mobile apps","author":"Zichermann Gabe","unstructured":"Gabe Zichermann and Christopher Cunningham . 2011. Gamification by design: Implementing game mechanics in web and mobile apps . O'Reilly Media, Inc. Gabe Zichermann and Christopher Cunningham. 2011. Gamification by design: Implementing game mechanics in web and mobile apps. O'Reilly Media, Inc."}],"event":{"name":"ICCAE 2020: 2020 12th International Conference on Computer and Automation Engineering","location":"Sydney NSW Australia","acronym":"ICCAE 2020","sponsor":["The University of Western Australia, Department of Electronic Engineering, University of Western Australia","Macquarie U., Austarlia","University of Technology Sydney"]},"container-title":["Proceedings of the 2020 12th International Conference on Computer and Automation Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384613.3384629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3384613.3384629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:13Z","timestamp":1750199593000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384613.3384629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,14]]},"references-count":51,"alternative-id":["10.1145\/3384613.3384629","10.1145\/3384613"],"URL":"https:\/\/doi.org\/10.1145\/3384613.3384629","relation":{},"subject":[],"published":{"date-parts":[[2020,2,14]]},"assertion":[{"value":"2020-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}