{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:09:37Z","timestamp":1767665377785,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617098","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"224-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Encouraging Organisational Information Security Incident Reporting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3960-8809","authenticated-orcid":false,"given":"Fabian Lucas","family":"Ballreich","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2674-4043","authenticated-orcid":false,"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2435-1151","authenticated-orcid":false,"given":"Dirk","family":"M\u00fcllmann","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9284-7924","authenticated-orcid":false,"given":"Benjamin Maximilian","family":"Berens","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2211-4052","authenticated-orcid":false,"given":"Elena Marie","family":"H\u00e4u\u00dfler","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7187-6531","authenticated-orcid":false,"given":"Karen V.","family":"Renaud","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Scotland Uk and University of South Africa, South Africa and Abertay University, Scotland Uk"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Austrian Government. 2004. Employees\u2019 Liability Act (Dienstnehmerhaftpflichtgesetz). https:\/\/www.ris.bka.gv.at\/GeltendeFassung.wxe?Abfrage=Bundesnormen&Gesetzesnummer=10008209."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037577"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","unstructured":"Bianka Breyer and Matthias Bluemke. 2016. Deutsche Version der Positive and Negative Affect Schedule PANAS (GESIS Panel). GESIS - Leibniz-Institut f\u00fcr Sozialwissenschaften Mannheim. 20 pages. https:\/\/doi.org\/10.6102\/zis242","DOI":"10.6102\/zis242"},{"key":"e_1_3_2_2_4_1","unstructured":"M Button Lisa Sugiura Dean Blackbourn Richard Kapend David Shepherd and Victoria Wang. 2020. VICTIMS OF COMPUTER MISUSE EXECUTIVE SUMMARY. https:\/\/researchportal.port.ac.uk\/portal\/files\/20818541\/Victims_of_Computer_Misuse_Executive_Summary.pdf."},{"issue":"3","key":"e_1_3_2_2_5_1","first-page":"V7145","article-title":"Rowe v. Guardian Auto. Products, Inc","author":"Carr James","year":"2005","unstructured":"James Carr. 2005. Rowe v. Guardian Auto. Products, Inc., Case No. 3:04CV7145 (N.D. Ohio. https:\/\/www.casemine.com\/judgement\/us\/59147324add7b0493438a826.","journal-title":"Case"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlcj.2018.08.001"},{"key":"e_1_3_2_2_7_1","volume-title":"Kelly\u00a0M Richards, and Russell\u00a0G Smith.","author":"Cross Cassandra","year":"2016","unstructured":"Cassandra Cross, Criminology Research Advisory\u00a0Council (Australia), Kelly\u00a0M Richards, and Russell\u00a0G Smith. 2016. Improving responses to online fraud victims: An examination of reporting and support. Criminology Research Advisory Council. https:\/\/eprints.qut.edu.au\/98346\/."},{"key":"e_1_3_2_2_8_1","unstructured":"DynaSis. [n. d.]. Unreported Cyber Crime. https:\/\/dynasis.com\/article-unreported-cyber-crimes."},{"key":"e_1_3_2_2_9_1","unstructured":"European Parliament. 2020. Directive on security of network and information systems (NIS Directive). https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2020)654198."},{"key":"e_1_3_2_2_10_1","unstructured":"Federal Ministry of Justice. 2019. Act on the Federal Office for Information Security (BSI Act - BSIG). https:\/\/www.gesetze-im-internet.de\/englisch_bsig\/index.html."},{"volume-title":"Discovering statistics using R","author":"Field Andy","key":"e_1_3_2_2_11_1","unstructured":"Andy Field, Jeremy Miles, and Zo\u00eb Field. 2012. Discovering statistics using R. Sage Publications."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_15"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.22260\/ISARC2012\/0030"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1706.06818"},{"key":"e_1_3_2_2_15_1","unstructured":"Wolfgang\u00a0[VerfasserIn] Hau. 2020. Becksche Online-Kommentare BGB."},{"key":"e_1_3_2_2_16_1","unstructured":"Nathan House. 2022. The real reasons why cyber crime goes unreported \u2013 and why things are about to change\u2026. https:\/\/www.stationx.net\/real-reasons-cyber-crime-goes-unreported-things-change\/."},{"key":"e_1_3_2_2_17_1","unstructured":"ISACA. 2019. New Study Reveals Cybercrime May Be Widely Underreported\u2014Even When Laws Mandate Disclosure. https:\/\/www.isaca.org\/why-isaca\/about-us\/newsroom\/press-releases\/2019\/new-study-reveals-cybercrime-may-be-widely-underreported-even-when-laws-mandate-disclosure."},{"key":"e_1_3_2_2_18_1","first-page":"78","article-title":"The Nigeria Police Force and Cybercrime Policing","volume":"1","author":"Ismail U","year":"2020","unstructured":"U Ismail. 2020. The Nigeria Police Force and Cybercrime Policing: An Appraisal. Dutse Journal of Criminology and Security Studies (DUJSCC) 1 (2020), 78\u201388.","journal-title":"An Appraisal. Dutse Journal of Criminology and Security Studies (DUJSCC)"},{"key":"e_1_3_2_2_19_1","unstructured":"Nivedita James. 2023. Cyber Crime Statistics 2023: Cost Industries and Trends. https:\/\/www.getastra.com\/blog\/security-audit\/cyber-crime-statistics\/."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11168-4"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27937-9_5"},{"volume-title":"Criminal Victimisation in Taiwan: an opportunity perspective. Ph.\u00a0D. Dissertation. UCL Department of Security and Crime Science","author":"Kuo L.","key":"e_1_3_2_2_22_1","unstructured":"T.\u00a0L. Kuo. 2022. Criminal Victimisation in Taiwan: an opportunity perspective. Ph.\u00a0D. Dissertation. UCL Department of Security and Crime Science, University College London."},{"key":"e_1_3_2_2_23_1","unstructured":"Law Case Summaries. 2012. Hodgson v Amcor [2012] VSC 94. https:\/\/lawcasesummaries.com\/knowledge-base\/hodgson-v-amco-2012-vsc-94\/."},{"key":"e_1_3_2_2_24_1","volume-title":"Fighting Cybercrime: Technical, juridical and ethical challenges., 63\u201376\u00a0pages.","author":"Lovet Guillaume","year":"2009","unstructured":"Guillaume Lovet. 2009. Fighting Cybercrime: Technical, juridical and ethical challenges., 63\u201376\u00a0pages."},{"volume-title":"Corporate under reporting of cybercrime: Why does reporting to authorities matter?Master\u2019s thesis","author":"Lydon Laure","key":"e_1_3_2_2_25_1","unstructured":"Laure Lydon. 2021. Corporate under reporting of cybercrime: Why does reporting to authorities matter?Master\u2019s thesis. Royal Holloway University London."},{"key":"e_1_3_2_2_26_1","unstructured":"Kenny MacDonald. 2019. Action Fraud. Technical Report V3-A0718. Scottish Police Authority."},{"volume-title":"Cyber crime: A review of the evidence","author":"McGuire Mike","key":"e_1_3_2_2_27_1","unstructured":"Mike McGuire and Samantha Dowling. 2013. Cyber crime: A review of the evidence Chapter 4: Improving the cyber crime evidence base. Home Office Research Report 75 https:\/\/www.gov.uk\/government\/publications\/cyber-crime-a-review-of-the-evidence."},{"volume-title":"Tackling the Challenges of Information Security Incident Reporting: A Decentralized Approach. Ph.\u00a0D. Dissertation","author":"Michail Alexis","key":"e_1_3_2_2_28_1","unstructured":"Alexis Michail. 2020. Tackling the Challenges of Information Security Incident Reporting: A Decentralized Approach. Ph.\u00a0D. Dissertation. University of East London."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2015.7335057"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.18420\/inf2020_74"},{"volume-title":"Erfurter Kommentar zum Arbeitsrecht (20., neu bearbeitete auflage ed.). C.H","key":"e_1_3_2_2_31_1","unstructured":"Rudi\u00a0[VerfasserIn] M\u00fcller-Gl\u00f6ge. 2020. Erfurter Kommentar zum Arbeitsrecht (20., neu bearbeitete auflage ed.). C.H. Beck, M\u00fcnchen."},{"key":"e_1_3_2_2_32_1","volume-title":"HOW CAN WE ADDRESS THE UNDER-REPORTING OF CYBER-CRIME?Counter Terror Business 43","author":"Media PSI","year":"2020","unstructured":"PSI Media. 2020. HOW CAN WE ADDRESS THE UNDER-REPORTING OF CYBER-CRIME?Counter Terror Business 43 (2020). https:\/\/counterterrorbusiness.com\/features\/how-can-we-address-under-reporting-cyber-crime."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498891.3498896"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Christian\u00a0[VerfasserIn] Rolfs. 2019. BeckOK Arbeitsrecht. C.H. Beck M\u00fcnchen.","DOI":"10.17104\/9783406730788"},{"key":"e_1_3_2_2_35_1","unstructured":"Alex Scroxton. 2021. Fraud and cyber crime still vastly under-reported. Computer Weekly https:\/\/www.computerweekly.com\/news\/252495844\/Fraud-and-cyber-crime-still-vastly-under-reported."},{"volume-title":"The Influence of Anonymity Factors on IT Security Incident Reporting. Ph.\u00a0D. Dissertation","author":"Smith Frederick\u00a0Antione","key":"e_1_3_2_2_36_1","unstructured":"Frederick\u00a0Antione Smith. 2020. The Influence of Anonymity Factors on IT Security Incident Reporting. Ph.\u00a0D. Dissertation. Capella University."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_7"},{"volume-title":"Largest fines issued for General Data Protection Regulation (GDPR) violations as of","year":"2022","key":"e_1_3_2_2_38_1","unstructured":"Statista. 2022. Largest fines issued for General Data Protection Regulation (GDPR) violations as of July 2022. https:\/\/www.statista.com\/statistics\/1133337\/largest-fines-issued-gdpr\/."},{"key":"e_1_3_2_2_39_1","volume-title":"Twenty Seventh International Conference of the System Dynamics Society.","author":"Sveen Finn\u00a0Olav","year":"2009","unstructured":"Finn\u00a0Olav Sveen, Jose\u00a0Maria Sarriegi, and Jose\u00a0J Gonzalez. 2009. The role of incident reporting in reducing information security risk. In Twenty Seventh International Conference of the System Dynamics Society."},{"key":"e_1_3_2_2_40_1","unstructured":"Franz J\u00fcrgen\u00a0[HerausgeberIn] S\u00e4cker Roland\u00a0[HerausgeberIn] Rixecker Hartmut\u00a0[HerausgeberIn] Oetker and Bettina\u00a0[HerausgeberIn] Limperg (Eds.). 2020. M\u00fcnchener Kommentar zum B\u00fcrgerlichen Gesetzbuch (8 ed.). Number 666 in Beck-online. Verlag C.H. Beck M\u00fcnchen."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/1098214005283748"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1108\/PIJPSM-07-2019-0122"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60527-8_17"},{"key":"e_1_3_2_2_44_1","volume-title":"Development and validation of brief measures of positive and negative affect: the PANAS scales.Journal of personality and social psychology 54, 6","author":"Watson David","year":"1988","unstructured":"David Watson, Lee\u00a0Anna Clark, and Auke Tellegen. 1988. Development and validation of brief measures of positive and negative affect: the PANAS scales.Journal of personality and social psychology 54, 6 (1988), 1063."},{"key":"e_1_3_2_2_45_1","volume-title":"London: Home Office, https:\/\/www.gov.uk\/government\/publications\/the-offending-crime-and-justice-survey-longitudinal-analysis-2003-to-06.","author":"Wilson D.","year":"2006","unstructured":"D. Wilson, A. Patterson, G. Powell, and R. Hembury. 2006. Fraud and technology crimes. Findings from the 2003\/04 British crime survey. The 2004 offending, crime and justice survey and administrative sources. London: Home Office, https:\/\/www.gov.uk\/government\/publications\/the-offending-crime-and-justice-survey-longitudinal-analysis-2003-to-06."},{"key":"e_1_3_2_2_46_1","unstructured":"Josephine Wolff. 2018. The Real Reasons Why Cybercrimes May Be Vastly Undercounted. https:\/\/slate.com\/technology\/2018\/02\/the-real-reasons-why-cybercrimes-are-vastly-underreported.html."}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","acronym":"EuroUSEC 2023","location":"Copenhagen Denmark"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:06Z","timestamp":1750178166000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":46,"alternative-id":["10.1145\/3617072.3617098","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617098","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}