{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:09:48Z","timestamp":1771330188495,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1757945, 1833630"],"award-info":[{"award-number":["1757945, 1833630"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3442103","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:10:24Z","timestamp":1619154624000},"page":"912-915","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Behavior control-based approach to influencing user's cybersecurity actions using mobile news app"],"prefix":"10.1145","author":[{"given":"Vincent","family":"Lombardi","sequence":"first","affiliation":[{"name":"Gonzaga University"}]},{"given":"Sarah","family":"Ortiz","sequence":"additional","affiliation":[{"name":"Willamette University"}]},{"given":"Jen","family":"Phifer","sequence":"additional","affiliation":[{"name":"New Mexico Tech"}]},{"given":"Tomas","family":"Cerny","sequence":"additional","affiliation":[{"name":"Baylor University"}]},{"given":"Dongwan","family":"Shin","sequence":"additional","affiliation":[{"name":"New Mexico Tech"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"San Diego","author":"End","year":"2019","unstructured":"2018 End of Year Data Breach Report (pp. 1--17, Rep.). (2019). San Diego, CA: Identity Theft Resource Center."},{"key":"e_1_3_2_1_2_1","volume-title":"Predicting and changing behavior: The Reasoned Action Approach","author":"Fishbein M.","year":"2010","unstructured":"Fishbein, M. Ajzen, I. (2010). Predicting and changing behavior: The Reasoned Action Approach. New York: Taylor Francis."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446249215.n22"},{"key":"e_1_3_2_1_5_1","volume-title":"Examining the Behavioral Intentions of Individuals Compliance with Information Security Policies","author":"Brown D. A.","year":"2017","unstructured":"Brown, D. A. (2017). Examining the Behavioral Intentions of Individuals Compliance with Information Security Policies. Walden University ScholarWorks. Retrieved August 3, 2019."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_3_2_1_7_1","volume-title":"The Impact of Active and Context-Based Learning in Introductory Chemistry Courses: An Early Evaluation of the Modular Approach [Abstract]. Journal of Chemical Education. Retrieved","author":"Gutwill-Wise J. P.","year":"2001","unstructured":"Gutwill-Wise, J. P. (2001). The Impact of Active and Context-Based Learning in Introductory Chemistry Courses: An Early Evaluation of the Modular Approach [Abstract]. Journal of Chemical Education. Retrieved August 7, 2019."},{"key":"e_1_3_2_1_8_1","volume-title":"Multivariate data analysis: Pearson College Division","author":"Hair J. F.","year":"2010","unstructured":"Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis: Pearson College Division."},{"key":"e_1_3_2_1_9_1","unstructured":"Liljestrand I. Gonzales M. & Shin D. (n.d.). Developing a Mental Model for use in the Context of Cyber Security."},{"key":"e_1_3_2_1_10_1","first-page":"410","volume-title":"E - European Advances in Consumer Research","author":"Magnus Soderlund","year":"2005","unstructured":"Magnus Soderlund and Niclas Ohman (2005) \",Intentions Are Plural: Towards a Multidimensional View of Intentions in Consumer Research\", in E - European Advances in Consumer Research Volume 7, eds. Karin M. Ekstrom and Helene Brembeck, Goteborg, Sweden : Association for Consumer Research, Pages: 410--416."},{"key":"e_1_3_2_1_11_1","volume-title":"WarpPLS User Manual: Version 6.0. (August","author":"Ned Knock","year":"2018","unstructured":"Ned Knock. 2018. WarpPLS User Manual: Version 6.0. (August 2018)."},{"key":"e_1_3_2_1_12_1","volume-title":"Psychometric theory: New York : McGraw-Hill, c1978. 2d ed","author":"Nunnally J. C.","year":"1978","unstructured":"Nunnally, J. C. (1978). Psychometric theory: New York : McGraw-Hill, c1978. 2d ed."},{"key":"e_1_3_2_1_13_1","volume-title":"Applying the Theory of Planned Behavior in Predicting Pro- environmental Behaviour: The Case of Energy Conservation. Acta Universitatis Danubius. \u00edconomica. 11. 15--32","author":"Octav-Ionut","year":"2015","unstructured":"Octav-Ionut, Macovei. (2015). Applying the Theory of Planned Behavior in Predicting Pro- environmental Behaviour: The Case of Energy Conservation. Acta Universitatis Danubius. \u00edconomica. 11. 15--32."},{"key":"e_1_3_2_1_14_1","unstructured":"Pham K. (n.d.). PushNotification [Computer software]. Retrieved from https:\/\/github.com\/onmyway133\/PushNotifications"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2017.1368421"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/K-05-2018-0226"},{"key":"e_1_3_2_1_17_1","article-title":"Semantic attacks: The third wave of network attacks","author":"Schneier","year":"2000","unstructured":"Schneier, Bruce. (2000) \"Semantic attacks: The third wave of network attacks,\" CryptoGram Newsletter.","journal-title":"CryptoGram Newsletter."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"}],"event":{"name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","location":"Virtual Event Republic of Korea","acronym":"SAC '21","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3442103","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3442103","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3442103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:01Z","timestamp":1750193221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3442103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":18,"alternative-id":["10.1145\/3412841.3442103","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3442103","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}