{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T00:37:39Z","timestamp":1773707859999,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["830929"],"award-info":[{"award-number":["830929"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3543794","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Properties for Cybersecurity Awareness Posters\u2019 Design and Quality Assessment"],"prefix":"10.1145","author":[{"given":"Sunil","family":"Chaudhary","sequence":"first","affiliation":[{"name":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway"}]},{"given":"Marko","family":"Kompara","sequence":"additional","affiliation":[{"name":"Faculty of Electrical Engineering and Computer Science, University of Maribor, Slovenia"}]},{"given":"Sebastian","family":"Pape","sequence":"additional","affiliation":[{"name":"Chair of Mobile Business &amp; Multilateral Security, Goethe University, Germany"}]},{"given":"Vasileios","family":"Gkioulos","sequence":"additional","affiliation":[{"name":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2147\/JMDH.S183275"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2018-0080"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Cyber Security for Sustainable Society","author":"Bada Maria","year":"2015","unstructured":"Maria Bada, Angela\u00a0M. Sasse, and Jason\u00a0R.C. Nurse. 2015. Cyber Security Awareness Campaigns: Why do they fail to change behaviour?. In International Conference on Cyber Security for Sustainable Society. Coventry, UK."},{"key":"e_1_3_2_1_4_1","volume-title":"The Seven C\u2019s of Communication","author":"Baird John","unstructured":"John Baird and Jim Stull. 1979. The Seven C\u2019s of Communication. Prentice Hall,, Englewood Cliffs, NJ, USA."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.70"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.1994.9964679"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-014-9222-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803843-7.00033-8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.009"},{"key":"e_1_3_2_1_11_1","unstructured":"Sunil Chaudhary Vasileios Gkioulos and David Goodman. 2021. D9.11 SME cybersecurity awareness program 2. Technical Report. Brussel Belgium."},{"key":"e_1_3_2_1_12_1","volume-title":"Technical Report.","author":"Chaudhary Sunil","unstructured":"Sunil Chaudhary, Sebastian Pape, Marko Kompara, Georgios Kavallieratos, and Vasileios Gkioulos. 2022. D3.19 Guidelines for Enhancement of Societal Security Awareness. Technical Report. Brussels, Belgium."},{"key":"e_1_3_2_1_13_1","volume-title":"Stop Raising Awareness Already. Retrieved","author":"Christiano Ann","year":"2022","unstructured":"Ann Christiano and Annie Neimand. 2017. Stop Raising Awareness Already. Retrieved 30 March 2022 from https:\/\/ssir.org\/articles\/entry\/stop_raising_awareness_already#"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26837-4_8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA128980"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10888691.2018.1537791"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.02.007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2011.10.009"},{"key":"e_1_3_2_1_21_1","volume-title":"The new users","author":"ENISA.","unstructured":"ENISA. 2010. The new users\u2019 guide: How to raise information security awareness. Technical Report. Athens, Greece."},{"key":"e_1_3_2_1_22_1","volume-title":"ENISA Threat Landscape","author":"ENISA.","year":"2021","unstructured":"ENISA. 2021. ENISA Threat Landscape 2021. Technical Report. Athens, Greece."},{"key":"e_1_3_2_1_23_1","unstructured":"ENISA. 2022. Material. https:\/\/www.enisa.europa.eu\/media\/multimedia\/material"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1993.tb01304.x"},{"key":"e_1_3_2_1_25_1","unstructured":"EUROPOL. 2022. Public Awareness and Prevention Guides. https:\/\/www.europol.europa.eu\/operations-services-and-innovation\/public-awareness-and-prevention-guides"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(17)30122-8"},{"key":"e_1_3_2_1_27_1","volume-title":"Critical Information Infrastructures Security(LNCS, Vol.\u00a04347)","author":"Gattiker E.","unstructured":"Urs\u00a0E. Gattiker. 2006. Can an early warning system for home users and SMEs make a difference? A field study. In Critical Information Infrastructures Security(LNCS, Vol.\u00a04347), Javier Lopez (Ed.). Springer-Verlag Berlin, Heidelberg, Samos, Greece, 112\u2013127."},{"key":"e_1_3_2_1_28_1","volume-title":"Cognitive Processes Involved in Text Learning. In Annual Meeting of the American Educational Research Association","author":"Glynn M.","year":"1983","unstructured":"Shawn\u00a0M. Glynn. 1983. Cognitive Processes Involved in Text Learning. In Annual Meeting of the American Educational Research Association. Montreal, Canada."},{"key":"e_1_3_2_1_29_1","unstructured":"InfoSec Institute. 2022. Top 20 security awareness posters with messages that STICK. https:\/\/resources.infosecinstitute.com\/topic\/top-20-security-awareness-posters-messages-stick\/"},{"key":"e_1_3_2_1_30_1","unstructured":"SANS Institute. 2022. Posters. https:\/\/www.sans.org\/security-awareness-training\/resources\/posters"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1167\/12.9.1082"},{"key":"e_1_3_2_1_32_1","volume-title":"Bias within systematic and non-systematic literature reviews: the case of the Balanced Scorecard (Master\u2019s thesis). Master\u2019s thesis","author":"Jansen Stacy","unstructured":"Stacy Jansen. 2017. Bias within systematic and non-systematic literature reviews: the case of the Balanced Scorecard (Master\u2019s thesis). Master\u2019s thesis. University of Twente, Enschede, Netherlands."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.77.2.137"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"M.\u00a0E. Kabay Bridgitt Robertson Mani Akella and D.T. Lang. 2012. Using Social Psychology to Implement Security Policies. In Computer Security Handbook(6th ed.) Seymour Bosworth Michel\u00a0E. Kabay and Eric Whyne (Eds.). John Wiley & Sons Hoboken NJ USA Chapter\u00a050 50.1\u201350.25. https:\/\/doi.org\/10.1002\/9781118820650.ch50","DOI":"10.1002\/9781118820650.ch50"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/287821.287825"},{"key":"e_1_3_2_1_36_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Kajzer Mitchell","year":"2013","unstructured":"Mitchell Kajzer, Charles\u00a0R. Crowell, Angela Ferreira, John D\u00c1rcy, Dirk VanBruggen, and Aaron Striegel. 2013. Poster: Memorability of Computer Security Posters as Affected by Message Type. In Symposium on Usable Privacy and Security (SOUPS). Newcastle, UK."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(00)00112-X"},{"key":"e_1_3_2_1_38_1","unstructured":"Global Knowledge. 2022. Cybersecurity Awareness Posters. https:\/\/www.globalknowledge.com\/us-en\/topics\/cybersecurity\/cybersecurity-awareness-posters\/#gref"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011095236"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.02.008"},{"key":"e_1_3_2_1_41_1","volume-title":"The Communication of Ideas","author":"Lasswell D.","unstructured":"Harold\u00a0D. Lasswell. 1948. The structure and function of communication in society. In The Communication of Ideas(1st ed.), Lyman Bryson (Ed.). Harper and Row, New York, USA, 37\u201351.","edition":"1"},{"key":"e_1_3_2_1_42_1","volume-title":"Risk Communication: A Handbook for Communicating Environmental, Safety, and Health Risks","author":"Lundgren E.","year":"2018","unstructured":"Regina\u00a0E. Lundgren and Andrea\u00a0H. McMakin. 2018. Risk Communication: A Handbook for Communicating Environmental, Safety, and Health Risks(6th ed.). Wiley-IEEE Press.","edition":"6"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.2307\/3172593"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098986"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027802.1027882"},{"key":"e_1_3_2_1_47_1","unstructured":"Jakob Nielsen. 2010. Horizontal Attention Leans Left (Early Research). https:\/\/www.nngroup.com\/articles\/horizontal-attention-original-research\/"},{"key":"e_1_3_2_1_48_1","volume-title":"People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization. Retrieved","author":"Olusegun Oyelami\u00a0Julius","year":"2022","unstructured":"Oyelami\u00a0Julius Olusegun and Norafida\u00a0Binti Ithnin. 2013. People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization. Retrieved 30 March 2022 from https:\/\/arxiv.org\/abs\/1309.0188"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3102\/00346543056004437"},{"key":"e_1_3_2_1_50_1","volume-title":"Retrieved","year":"2022","unstructured":"Postermywall. 2022. 8,720+ customizable design templates for marketing. Retrieved 10 April 2022 from https:\/\/www.postermywall.com\/index.php\/posters\/search?s=marketing"},{"key":"e_1_3_2_1_51_1","volume-title":"Free Research Poster PowerPoint Templates. Retrieved","year":"2022","unstructured":"PosterPresentations.com. 2022. Free Research Poster PowerPoint Templates. Retrieved 10 April 2022 from https:\/\/www.posterpresentations.com\/free-poster-templates.html"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomm.2019.00056"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.06.011"},{"key":"e_1_3_2_1_54_1","unstructured":"TerraNova Security. 2022. Why Localized Security Awareness Training Matters. https:\/\/terranovasecurity.com\/why-localized-security-awareness-training-matters\/"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0073699"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.19030\/rbis.v15i3.5398"},{"key":"e_1_3_2_1_58_1","unstructured":"Cyber\u00a0Safe Work. 2022. Security Awareness for a Culture of Security. https:\/\/cybersafework.com\/free-security-posters\/"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2022"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3543794","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3543794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:57Z","timestamp":1750186797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3543794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":55,"alternative-id":["10.1145\/3538969.3543794","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3543794","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}