{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:31:08Z","timestamp":1759228268783,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":133,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["V5DISO056-03"],"award-info":[{"award-number":["V5DISO056-03"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014690","name":"Ministerium f\u00fcr Kultur und Wissenschaft des Landes Nordrhein-Westfalen","doi-asserted-by":"publisher","award":["1706dgn006"],"award-info":[{"award-number":["1706dgn006"]}],"id":[{"id":"10.13039\/501100014690","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580860","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:28:44Z","timestamp":1681964924000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Home Is Where the Smart Is: Development and Validation of the Cybersecurity Self-Efficacy in Smart Homes (CySESH) Scale"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0255-5822","authenticated-orcid":false,"given":"Nele","family":"Borgert","sequence":"first","affiliation":[{"name":"Faculty of Psychology, Ruhr University Bochum, Germany and Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7565-7435","authenticated-orcid":false,"given":"Oliver D.","family":"Reithmaier","sequence":"additional","affiliation":[{"name":"Usable Security &amp; Privacy Group, Leibniz University Hannover, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8126-1306","authenticated-orcid":false,"given":"Luisa","family":"Jansen","sequence":"additional","affiliation":[{"name":"Faculty of Psychology, Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1694-4009","authenticated-orcid":false,"given":"Larina","family":"Hillemann","sequence":"additional","affiliation":[{"name":"Faculty of Psychology, Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8906-7559","authenticated-orcid":false,"given":"Ian","family":"Hussey","sequence":"additional","affiliation":[{"name":"Faculty of Psychology, Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7806-9583","authenticated-orcid":false,"given":"Malte","family":"Elson","sequence":"additional","affiliation":[{"name":"Faculty of Psychology, Ruhr University Bochum, Germany and Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28507-5"},{"key":"e_1_3_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0053479"},{"key":"e_1_3_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"e_1_3_3_2_4_1","unstructured":"Noah Apthorpe Dillon Reisman Srikanth Sundaresan Arvind Narayanan and Nick Feamster. 2017. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic: arXiv preprint. https:\/\/arxiv.org\/abs\/1708.05044"},{"key":"e_1_3_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3119721"},{"key":"e_1_3_3_2_6_1","volume-title":"AMCIS 2003 Proceedings, Association for Information Systems (Ed.). AIS Electronic Library","author":"Aytes Kregg","year":"2003","unstructured":"Kregg Aytes and Terry Conolly. 2003. A Research Model for Investigating Human Behavior Related to Computer Security. In AMCIS 2003 Proceedings, Association for Information Systems (Ed.). AIS Electronic Library, Tampa, FL, United States, 206. https:\/\/aisel.aisnet.org\/amcis2003\/260"},{"key":"e_1_3_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"e_1_3_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.37.2.122"},{"volume-title":"Social foundations of thought and action: A social cognitive theory","author":"Bandura Albert","key":"e_1_3_3_2_10_1","unstructured":"Albert Bandura. 1986. Social foundations of thought and action: A social cognitive theory. Prentice-Hall, Englewood Cliffs, NJ, USA."},{"key":"e_1_3_3_2_11_1","volume-title":"Self-efficacy: The exercise of control","author":"Bandura Albert","year":"1997","unstructured":"Albert Bandura. 1997. Self-efficacy: The exercise of control. W H Freeman\/Times Books\/ Henry Holt & Co, New York, NY, USA."},{"volume-title":"Self-efficacy beliefs of adolescents, Frank Pajares and Timothy\u00a0C","author":"Bandura Albert","key":"e_1_3_3_2_12_1","unstructured":"Albert Bandura. 2006. Guide for constructing self-efficacy scales. In Self-efficacy beliefs of adolescents, Frank Pajares and Timothy\u00a0C. Urdan (Eds.). IAP - Information Age Pub. Inc, Greenwich, CT, USA, 307\u2013337."},{"key":"e_1_3_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470479216"},{"key":"e_1_3_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206311410606"},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.1.87"},{"key":"e_1_3_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2018.00149"},{"volume-title":"Systematic approaches to a successful literature review","author":"Booth Andrew","key":"e_1_3_3_2_17_1","unstructured":"Andrew Booth, Diana Papaioannou, and Anthea Sutton. 2012. Systematic approaches to a successful literature review. Sage, Los Angeles, Calif."},{"key":"e_1_3_3_2_18_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS)","author":"Borgert Nele","year":"2021","unstructured":"Nele Borgert, Jennifer Friedauer, Imke B\u00f6se, Angela\u00a0M. Sasse, and Malte Elson. 2021. The Study of Cybersecurity Self-Efficacy: A Systematic Literature Review of Methodology. In USENIX Symposium on Usable Privacy and Security (SOUPS) 2021. USENIX Association, Virtual Conference, 1\u20134. https:\/\/www.usenix.org\/system\/files\/soups21-abstract-poster56-borgert.pdf"},{"key":"e_1_3_3_2_19_1","doi-asserted-by":"crossref","unstructured":"Nele Borgert Luisa Jansen Imke B\u00f6se Jennifer Friedauer M.\u00a0Angela Sasse and Malte Elson. 2023. A Decade of Dividedness: A Preregistered Systematic Review of the Cybersecurity Self-efficacy Methods. arxiv:10.31234\/osf.io\/ybec9","DOI":"10.31234\/osf.io\/ybec9"},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-3984.2001.tb01129.x"},{"volume-title":"Confirmatory factor analysis for applied research","author":"Brown A.","key":"e_1_3_3_2_22_1","unstructured":"Timothy\u00a0A. Brown. 2015. Confirmatory factor analysis for applied research. The Guilford Press, New York and London. https:\/\/fid.fachportal-paedagogik.de\/ebscoProxySearch\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=831411"},{"key":"e_1_3_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_3_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.39.3.214"},{"key":"e_1_3_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-000-1009-5"},{"key":"e_1_3_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-8956-9"},{"key":"e_1_3_3_2_27_1","volume-title":"The Role of User Experience in the Security and Privacy Design of Smart Home Cameras. In USENIX Symposium on Usable Privacy and Security (SOUPS) 2020. USENIX Association, Virtual Conference, 185\u2013204","author":"Chalhoub George","year":"2020","unstructured":"George Chalhoub, Ivan Flechais, Norbert Nthala, and Ruba Abu-Salma. 2020. Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras. In USENIX Symposium on Usable Privacy and Security (SOUPS) 2020. USENIX Association, Virtual Conference, 185\u2013204."},{"key":"e_1_3_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2005.10855772"},{"key":"e_1_3_3_2_29_1","unstructured":"Nick Charalambides. 2021. We recently went viral on TikTok - here\u2019s what we learned. https:\/\/www.prolific.co\/blog\/we-recently-went-viral-on-tiktok-heres-what-we-learned"},{"key":"e_1_3_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223891.2013.781029"},{"key":"e_1_3_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1556-6676.1988.tb00874.x"},{"key":"e_1_3_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"e_1_3_3_2_33_1","unstructured":"Consumers International and Internet Society. 2019. The Trust Opportunity: Exploring Consumer attitudes to the Internet of Things. https:\/\/www.internetsociety.org\/resources\/doc\/2019\/trust-opportunity-exploring-consumer-attitudes-to-iot\/"},{"volume-title":"Measures of Social Psychological Attitudes, John\u00a0P","author":"Crandall Rick","key":"e_1_3_3_2_34_1","unstructured":"Rick Crandall. 1973. The measurement of self-esteem and related constructs. In Measures of Social Psychological Attitudes, John\u00a0P. Robinson and Phillip\u00a0R. Shaver (Eds.). The University of Michigan, Ann Arbor, MI, USA, 45\u2013167."},{"key":"e_1_3_3_2_35_1","unstructured":"Lee\u00a0J. Cronbach. 1971. Test Validation. In Educational Measurement Robert\u00a0L. Thorndike (Ed.). American Council on Education Washington DC USA 443\u2013507."},{"key":"e_1_3_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0040957"},{"key":"e_1_3_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.311"},{"key":"e_1_3_3_2_38_1","volume-title":"Scale Development: Theory and Application","author":"DeVellis F.","year":"2012","unstructured":"Robert\u00a0F. DeVellis. 2012. Scale Development: Theory and Application. SAGE Publications, Los Angeles, CA, USA."},{"key":"e_1_3_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/2515245919863296"},{"key":"e_1_3_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.2824\/324042"},{"key":"e_1_3_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24612-3_1802"},{"key":"e_1_3_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596"},{"key":"e_1_3_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.6.2.161"},{"key":"e_1_3_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1037\/amp0001006"},{"key":"e_1_3_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/2515245920952393"},{"key":"e_1_3_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751957.2751966"},{"key":"e_1_3_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502016"},{"key":"e_1_3_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/0269215506071284"},{"key":"e_1_3_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8287.2011.02046.x"},{"key":"e_1_3_3_2_52_1","unstructured":"Dan Goodin. 2021. Home alarm tech backdoored security cameras to spy on customers having sex: Employee for ADT accessed 200 customer cams on more than 9 600 occasions. https:\/\/arstechnica.com\/information-technology\/2021\/01\/home-alarm-tech-backdoored-security-cameras-to-spy-on-customers-having-sex\/"},{"key":"e_1_3_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/0013164406288165"},{"key":"e_1_3_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/2041-210X.13268"},{"key":"e_1_3_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-020-2025-8"},{"key":"e_1_3_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011141.3011165"},{"volume-title":"A Practitioner\u2019s Guide to Criterion-Referenced Test Development, Validation, and Test Score Usage(2 ed.)","author":"Hambleton K.","key":"e_1_3_3_2_57_1","unstructured":"Ronald\u00a0K. Hambleton and Daniel\u00a0R. Eignor. 1979. A Practitioner\u2019s Guide to Criterion-Referenced Test Development, Validation, and Test Score Usage(2 ed.). University of Massachusetts, School of Educacation, Laboratory of Psychometric and Evaluative Research, Amherst, MA, USA."},{"key":"e_1_3_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2015.1117842"},{"key":"e_1_3_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/09613218.2017.1286882"},{"key":"e_1_3_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/19312458.2020.1718629"},{"key":"e_1_3_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1037\/10612-014"},{"key":"e_1_3_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1002\/jts5.120"},{"key":"e_1_3_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1623322"},{"key":"e_1_3_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519833"},{"key":"e_1_3_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.1.107"},{"key":"e_1_3_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.47263\/jasem.2(1)03"},{"volume-title":"Messen und Testen, Hubert Feger and J\u00fcrgen Bredenkamp (Eds.)","author":"Kristof W.","key":"e_1_3_3_2_70_1","unstructured":"W. Kristof. 1983. Klassische Testtheorie und Testkonstruktion. In Messen und Testen, Hubert Feger and J\u00fcrgen Bredenkamp (Eds.). Springer, G\u00f6ttingen, Germany, 544\u2013603."},{"key":"e_1_3_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2023"},{"key":"e_1_3_3_2_72_1","volume-title":"Number of Smart Homes forecast in the World from 2017 to","author":"Lasquety-Reyes Jeremiah","year":"2025","unstructured":"Jeremiah Lasquety-Reyes. 2021. Number of Smart Homes forecast in the World from 2017 to 2025. https:\/\/www.statista.com\/forecasts\/887613\/number-of-smart-homes-in-the-smart-home-market-in-the-world"},{"key":"e_1_3_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2022.119384"},{"key":"e_1_3_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-015-0619-7"},{"key":"e_1_3_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1791966"},{"key":"e_1_3_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1037\/cap0000236"},{"key":"e_1_3_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24612-3_1145"},{"key":"e_1_3_3_2_78_1","first-page":"54","article-title":"Development and Validation of a Financial Self-Efficacy Scale","volume":"22","author":"Lown M.","year":"2011","unstructured":"Jean\u00a0M. Lown. 2011. Development and Validation of a Financial Self-Efficacy Scale. Journal of Financial Counseling and Planning 22, 2 (2011), 54\u201363. https:\/\/ssrn.com\/abstract=2006665","journal-title":"Journal of Financial Counseling and Planning"},{"volume-title":"Handbook of self and identity, M.\u00a0R. Leary and J.\u00a0P","author":"Maddux E.","key":"e_1_3_3_2_79_1","unstructured":"J.\u00a0E. Maddux and J.\u00a0T. Gosselin. 2012. Self-efficacy. In Handbook of self and identity, M.\u00a0R. Leary and J.\u00a0P. Tangney (Eds.). The Guilford Press, New York, NY, USA, 198\u2013224."},{"key":"e_1_3_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.4.783"},{"key":"e_1_3_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4679(199905)55:5<539::AID-JCLP2>3.0.CO;2-G"},{"key":"e_1_3_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6520.2009.00304.x"},{"key":"e_1_3_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.5130\/acis2018.co"},{"key":"e_1_3_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.20533\/ijds.2040.2570.2010.0010"},{"volume-title":"Cyber Security at Home: The Effect of Home User Perceptions of Personal Security Performance on Household IoT Security Intentions: Dissertation. ProQuest LLC","author":"Mitchell M.","key":"e_1_3_3_2_86_1","unstructured":"Erica\u00a0M. Mitchell. 2020. Cyber Security at Home: The Effect of Home User Perceptions of Personal Security Performance on Household IoT Security Intentions: Dissertation. ProQuest LLC, Ann Arbor, MI, USA."},{"key":"e_1_3_3_2_87_1","doi-asserted-by":"publisher","unstructured":"Helfried Moosbrugger and Augustin Kelava (Eds.). 2020. Testtheorie und Fragebogenkonstruktion. Springer Berlin Heidelberg Germany. https:\/\/doi.org\/10.1007\/978-3-662-61532-4","DOI":"10.1007\/978-3-662-61532-4"},{"key":"e_1_3_3_2_88_1","unstructured":"Lily\u00a0Hay Newman. 2016. The Botnet That Broke the Internet Isn\u2019t Going Away. https:\/\/www.wired.com\/2016\/12\/botnet-broke-internet-isnt-going-away\/"},{"key":"e_1_3_3_2_89_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.1177\/2515245920917961"},{"key":"e_1_3_3_2_91_1","doi-asserted-by":"publisher","DOI":"10.36244\/ICJ.2019.2.1"},{"key":"e_1_3_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-590241-0.50006-X"},{"key":"e_1_3_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008191211004"},{"key":"e_1_3_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-020-09531-w"},{"volume-title":"Criterion-referenced measurement","author":"Popham William\u00a0James","key":"e_1_3_3_2_96_1","unstructured":"William\u00a0James Popham. 1978. Criterion-referenced measurement. Prentice-Hall, Englewood Cliffs, NJ, USA."},{"key":"e_1_3_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.46.2.151.b"},{"volume-title":"Introduction to psychometric theory","author":"Marcoulides Raykov","key":"e_1_3_3_2_98_1","unstructured":"Tenko. Raykov and George\u00a0A. Marcoulides. 2011. Introduction to psychometric theory. Routledge, New York."},{"volume-title":"The media equation: How people treat computers, television, and new media like real people","author":"Reeves Byron","key":"e_1_3_3_2_99_1","unstructured":"Byron Reeves and Clifford Nass. 1996. The media equation: How people treat computers, television, and new media like real people. Cambridge University Press, New York, NY, USA."},{"key":"e_1_3_3_2_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_101_1","volume-title":"Rosenberg self-esteem scale (RSE). Acceptance and commitment therapy. Measures package 61, 52","author":"Rosenberg Morris","year":"1965","unstructured":"Morris Rosenberg. 1965. Rosenberg self-esteem scale (RSE). Acceptance and commitment therapy. Measures package 61, 52 (1965), 18."},{"volume-title":"Conceiving the Self","author":"Rosenberg Morris","key":"e_1_3_3_2_102_1","unstructured":"Morris Rosenberg. 1979. Conceiving the Self. Basic Books, New York, NY, USA."},{"key":"e_1_3_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7705-9.ch008"},{"key":"e_1_3_3_2_104_1","volume-title":"Rebooting IT-Security: How Organisations Can Encourage and Sustain Secure Behaviours. In 27th European Symposium on Research in Computer Security. Springer","author":"Sasse Angela","year":"2022","unstructured":"M.\u00a0Angela Sasse, Jonas Hielscher, Jennifer Friedauer, and Annalina Buckmann. 2022. Rebooting IT-Security: How Organisations Can Encourage and Sustain Secure Behaviours. In 27th European Symposium on Research in Computer Security. Springer, Copenhagen, Denmark, 1\u201318."},{"key":"e_1_3_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342775.3342803"},{"key":"e_1_3_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.4.3.219"},{"key":"e_1_3_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.67.6.1063"},{"key":"e_1_3_3_2_108_1","doi-asserted-by":"publisher","DOI":"10.1037\/10385-009"},{"key":"e_1_3_3_2_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0591-5"},{"key":"e_1_3_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.18148\/srm"},{"key":"e_1_3_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1982.51.2.663"},{"key":"e_1_3_3_2_113_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic"},{"key":"e_1_3_3_2_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858448"},{"key":"e_1_3_3_2_115_1","doi-asserted-by":"publisher","DOI":"10.1080\/08923647.2020.1831357"},{"key":"e_1_3_3_2_116_1","first-page":"89","article-title":"Symmetrifying Smart Home: Topological Power and the New Governmentality of the Internet of Things","volume":"5","author":"Sungyong Ahn","year":"2021","unstructured":"Ahn Sungyong. 2021. Symmetrifying Smart Home: Topological Power and the New Governmentality of the Internet of Things. Media Theory 5, 1 (2021), 89\u2013114.","journal-title":"Media Theory"},{"key":"e_1_3_3_2_117_1","volume-title":"Internal Consistency: Do We Really Know What It Is and How to Assess It?Journal of Psychology and Behavioral Science 2, 2","author":"Tang Wei","year":"2014","unstructured":"Wei Tang, Ying Cui, and Oksana Babenko. 2014. Internal Consistency: Do We Really Know What It Is and How to Assess It?Journal of Psychology and Behavioral Science 2, 2 (2014), 205\u2013220."},{"volume-title":"Measurement and evaluation in education and psychology (4 ed.)","author":"Thorndike L.","key":"e_1_3_3_2_118_1","unstructured":"Robert\u00a0L. Thorndike and Elizabeth\u00a0P. Hagen. 1977. Measurement and evaluation in education and psychology (4 ed.). Wiley, New York, NY, USA."},{"key":"e_1_3_3_2_119_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2016.00769"},{"key":"e_1_3_3_2_120_1","doi-asserted-by":"publisher","DOI":"10.1177\/0890334415599533"},{"key":"e_1_3_3_2_121_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_3_3_2_122_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0526"},{"key":"e_1_3_3_2_123_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.07.034"},{"key":"e_1_3_3_2_124_1","volume-title":"Somebody\u2019s Watching: Hackers Breach Ring Home Security Cameras. https:\/\/www.nytimes.com\/2019\/12\/15\/us\/Hacked-ring-home-security-cameras.html","author":"Vigdor Neil","year":"2019","unstructured":"Neil Vigdor. 2019. Somebody\u2019s Watching: Hackers Breach Ring Home Security Cameras. https:\/\/www.nytimes.com\/2019\/12\/15\/us\/Hacked-ring-home-security-cameras.html"},{"key":"e_1_3_3_2_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376754"},{"key":"e_1_3_3_2_126_1","doi-asserted-by":"publisher","DOI":"10.1037\/emo0000226"},{"key":"e_1_3_3_2_127_1","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-05-2016-0127"},{"key":"e_1_3_3_2_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_2_129_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"e_1_3_3_2_130_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00960735"},{"key":"e_1_3_3_2_131_1","doi-asserted-by":"publisher","DOI":"10.5817\/cp2018-1-5"},{"key":"e_1_3_3_2_132_1","volume-title":"End User Security & Privacy Concerns with Smart Homes. In USENIX Symposium on Usable Privacy and Security (SOUPS) 2017(SOUPS \u201917)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. In USENIX Symposium on Usable Privacy and Security (SOUPS) 2017(SOUPS \u201917). USENIX Association, USA, 65\u201380."},{"key":"e_1_3_3_2_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hamburg Germany","acronym":"CHI '23"},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580860","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:17Z","timestamp":1750178837000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":133,"alternative-id":["10.1145\/3544548.3580860","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580860","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}