{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:10:03Z","timestamp":1755871803475,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MBIE","award":["MAUX1912"],"award-info":[{"award-number":["MAUX1912"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,2]]},"DOI":"10.1145\/3638380.3638385","type":"proceedings-article","created":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T21:40:11Z","timestamp":1715377211000},"page":"99-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigating Cybersecurity Risks and the Responses of Home Workers in Aotearoa New Zealand"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4819-3529","authenticated-orcid":false,"given":"Lisa","family":"Patterson","sequence":"first","affiliation":[{"name":"Victoria University of Wellington, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5968-182X","authenticated-orcid":false,"given":"Ian","family":"Welch","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5180-8331","authenticated-orcid":false,"given":"Bryan","family":"Ng","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3955-8098","authenticated-orcid":false,"given":"Sue","family":"Chard","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2024,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2019.8757549"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy006"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Maryam\u00a0Nasser AL-Nuaimi. 2022. Human and contextual factors influencing cyber-security in organizations and implications for higher education institutions: a systematic review. Global Knowledge Memory and Communication ahead-of-print ahead-of-print (2022) ahead\u2013of\u2013print.","DOI":"10.1108\/GKMC-12-2021-0209"},{"key":"e_1_3_2_1_4_1","volume-title":"Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS quarterly","author":"Anderson L","year":"2010","unstructured":"Catherine\u00a0L Anderson and Ritu Agarwal. 2010. Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS quarterly (2010), 613\u2013643."},{"key":"e_1_3_2_1_5_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J.\u00a0Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1093\u20131110. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406919874596"},{"key":"e_1_3_2_1_7_1","unstructured":"Business Insider. 2020. Protect your Zoom meetings with a password now \u2014 otherwise you\u2019re leaving the door wide open for hackers to \u2019Zoom-bomb\u2019. https:\/\/www.businessinsider.com\/protect-zoom-meetings-password-hackers-zoom-bombing [Accessed: 19th May 2022]."},{"key":"e_1_3_2_1_8_1","volume-title":"CERT Top 11 Tips for Individuals. https:\/\/www.cert.govt.nz\/individuals\/guides\/get-started-cyber-security [Accessed: 26th","author":"CERT.","year":"2022","unstructured":"CERT. 2022. CERT Top 11 Tips for Individuals. https:\/\/www.cert.govt.nz\/individuals\/guides\/get-started-cyber-security [Accessed: 26th April 2022]."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382850"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-09-2019-0458"},{"volume-title":"Advances in Asset Management and Condition Monitoring, Andrew Ball, Len Gelman, and B.\u00a0K.\u00a0N","author":"Cherrington Marianne","key":"e_1_3_2_1_11_1","unstructured":"Marianne Cherrington, Zhongyu\u00a0(Joan) Lu, Qiang Xu, Fadi Thabtah, David Airehrour, and Samaneh Madanian. 2020. Digital Asset Management: New Opportunities from High Dimensional Data\u2014A New Zealand Perspective. In Advances in Asset Management and Condition Monitoring, Andrew Ball, Len Gelman, and B.\u00a0K.\u00a0N. Rao (Eds.). Springer International Publishing, Cham, 183\u2013193."},{"key":"e_1_3_2_1_12_1","volume-title":"d.]. Guidance for securing video conferencing","author":"CISA.","year":"2023","unstructured":"CISA. [n. d.]. Guidance for securing video conferencing. Cybersecurity & Infrastructure Security Agency. https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/CISA_Guidance_for_Securing_Video_Conferencing_S508C.pdf, [Accessed: 26th July 2023]."},{"volume-title":"Research design: Qualitative, quantitative, and mixed methods approaches","author":"Creswell W","key":"e_1_3_2_1_13_1","unstructured":"John\u00a0W Creswell and J\u00a0David Creswell. 2017. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications."},{"key":"e_1_3_2_1_14_1","unstructured":"CSA. 2022. CSA Releases New Research - Top Threats to Cloud Computing: Egregious Eleven. https:\/\/cloudsecurityalliance.org\/press-releases\/2019\/08\/09\/csa-releases-new-research-top-threats-to-cloud-computing-egregious-eleven\/ [Accessed: 7th May 2022]."},{"key":"e_1_3_2_1_15_1","volume-title":"Framework for improving critical infrastructure cybersecurity. Framework 1, 11","author":"Cybersecurity Critical\u00a0Infrastructure","year":"2014","unstructured":"Critical\u00a0Infrastructure Cybersecurity. 2014. Framework for improving critical infrastructure cybersecurity. Framework 1, 11 (2014)."},{"volume-title":"Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic","author":"Das Ravi","key":"e_1_3_2_1_16_1","unstructured":"Ravi Das. 2022. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic. CRC Press, Boca Raton, FL."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/13678868.2021.2017391"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/ntwe.12040"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3132398"},{"key":"e_1_3_2_1_20_1","volume-title":"Connectivity for Remote Working. https:\/\/www.digital.govt.nz\/standards-and-guidance\/remote-working\/digital-considerations-for-remote-working\/connectivity-for-remote-working\/, [Accessed: 7th","author":"Government NZ","year":"2022","unstructured":"NZ Government. 2021. Connectivity for Remote Working. https:\/\/www.digital.govt.nz\/standards-and-guidance\/remote-working\/digital-considerations-for-remote-working\/connectivity-for-remote-working\/, [Accessed: 7th May 2022]."},{"key":"e_1_3_2_1_21_1","volume-title":"Annual disaster statistical review","author":"Guha-Sapir Debarati","year":"2010","unstructured":"Debarati Guha-Sapir, Femke Vos, Regina Below, and Sylvain Ponserre. 2011. Annual disaster statistical review 2010. Centre for Research on the Epidemiology of Disasters (2011), 1\u201380."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.020"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.186"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486870"},{"volume-title":"Advances in Information and Communication","author":"Jingyao Sun","key":"e_1_3_2_1_25_1","unstructured":"Sun Jingyao, Sonali Chandel, Yu Yunnan, Zang Jingji, and Zhang Zhipeng. 2020. Securing a Network: How Effective Using Firewalls and VPNs Are?. In Advances in Information and Communication, Kohei Arai and Rahul Bhatia (Eds.). Springer International Publishing, Cham, 1050\u20131068."},{"key":"e_1_3_2_1_26_1","volume-title":"Top 5 security challenges with Zoom video conferencing. https:\/\/www.sumologic.com\/blog\/zoom-security-challenges\/ [Accessed: 19th","author":"Karnam S.","year":"2022","unstructured":"S. Karnam. 2020. Top 5 security challenges with Zoom video conferencing. https:\/\/www.sumologic.com\/blog\/zoom-security-challenges\/ [Accessed: 19th May 2022]."},{"key":"e_1_3_2_1_27_1","volume-title":"Remote work works\u2013where do we go from Here. BCG. URL","author":"Kaufman Elizabeth","year":"2020","unstructured":"Elizabeth Kaufman, Deborah Lovich, Allison Bailey, Reinhard Messenb\u00f6ck, Felix Schuler, and Abhishek Shroff. 2020. Remote work works\u2013where do we go from Here. BCG. URL (2020)."},{"volume-title":"Positive Outcomes of Human Resources Engagement and Impact on Motivation. Ph.\u00a0D. Dissertation","author":"Kurniullah Ardhariksa\u00a0Zukhruf","key":"e_1_3_2_1_28_1","unstructured":"Ardhariksa\u00a0Zukhruf Kurniullah, Anjali Kulkarni, Nordiana\u00a0Ahmad Nordin, Roy Setiawan, Girish Bagale, Rajesh\u00a0Deb Barman, Ismail Raisal, and S\u00a0Suman Rajest. 2020. Positive Outcomes of Human Resources Engagement and Impact on Motivation. Ph.\u00a0D. Dissertation. Petra Christian University."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3117371"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5570001"},{"key":"e_1_3_2_1_31_1","volume-title":"Survey: Zero Trust benefits remote work during pandemic| Network World. https:\/\/www.networkworld.com\/article\/3587598\/survey-zero-trust-benefits-remote-work-during-pandemic.html","author":"McGillicuddy S","year":"2020","unstructured":"S McGillicuddy. 2020. Survey: Zero Trust benefits remote work during pandemic| Network World. https:\/\/www.networkworld.com\/article\/3587598\/survey-zero-trust-benefits-remote-work-during-pandemic.html"},{"volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"Mitnick D.","key":"e_1_3_2_1_32_1","unstructured":"Kevin\u00a0D. Mitnick and William\u00a0L. Simon. 2003. The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons, Hoboken, NJ."},{"key":"e_1_3_2_1_33_1","volume-title":"d.]. Computer Security Resource Center. https:\/\/csrc.nist.gov\/glossary\/term\/risk [Accessed: 26th","author":"National Institute of Standards and Technology. [n.","year":"2022","unstructured":"National Institute of Standards and Technology. [n. d.]. Computer Security Resource Center. https:\/\/csrc.nist.gov\/glossary\/term\/risk [Accessed: 26th April 2022]."},{"key":"e_1_3_2_1_34_1","unstructured":"Jayden Nowitz. 2018. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients. Master\u2019s thesis. School of Engineering and Computer Science."},{"volume-title":"HCI International 2021 - Posters","author":"Nurse Jason","key":"e_1_3_2_1_35_1","unstructured":"Jason R.\u00a0C. Nurse, Nikki Williams, Emily Collins, Niki Panteli, John Blythe, and Ben Koppelman. 2021. Remote Working Pre- and Post-COVID-19: An Analysis of\u00a0New\u00a0Threats and Risks to Security and\u00a0Privacy. In HCI International 2021 - Posters, Constantine Stephanidis, Margherita Antona, and Stavroula Ntoa (Eds.). Springer International Publishing, Cham, Switzerland, 583\u2013590."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1787\/1de9675e-en"},{"key":"e_1_3_2_1_37_1","first-page":"30","article-title":"Chatgpt poses cybersecurity threats","volume":"70","author":"O\u2019Rourke Morgan","year":"2023","unstructured":"Morgan O\u2019Rourke. 2023. Chatgpt poses cybersecurity threats. Risk Management 70, 2 (2023), 30\u201330.","journal-title":"Risk Management"},{"key":"e_1_3_2_1_38_1","volume-title":"The downside of IoT: Kiwis uncomfortable with smart devices listening in. https:\/\/www.cio.com\/article\/204006\/the-downside-of-iot-kiwis-uncomfortable-with-smart-devices-listening-in.html [Accessed 20th","author":"Paredes Divina","year":"2022","unstructured":"Divina Paredes. 2019. The downside of IoT: Kiwis uncomfortable with smart devices listening in. https:\/\/www.cio.com\/article\/204006\/the-downside-of-iot-kiwis-uncomfortable-with-smart-devices-listening-in.html [Accessed 20th May 2022]."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.535"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558095"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300275"},{"volume-title":"The 2020 State of Password and Authentication Security Behaviours Report. https:\/\/cdn.brandfolder.io\/53ZDUYE6\/at\/q6ouqr-299a6o-7a3pm1\/Ponemon_Infographic_2020-UK.pdf\/ [Accessed: 26th","year":"2022","key":"e_1_3_2_1_42_1","unstructured":"Ponemon. 2022. The 2020 State of Password and Authentication Security Behaviours Report. https:\/\/cdn.brandfolder.io\/53ZDUYE6\/at\/q6ouqr-299a6o-7a3pm1\/Ponemon_Infographic_2020-UK.pdf\/ [Accessed: 26th April 2022]."},{"volume-title":"Risk management: concepts and guidance","author":"Pritchard L","key":"e_1_3_2_1_43_1","unstructured":"Carl\u00a0L Pritchard. 2014. Risk management: concepts and guidance. Taylor & Francis, Milton Park, Oxfordshire, UK."},{"key":"e_1_3_2_1_44_1","volume-title":"A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1","author":"Rogers W","year":"1975","unstructured":"Ronald\u00a0W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93\u2013114."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(20)30096-8"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174272"},{"key":"e_1_3_2_1_47_1","unstructured":"MS Sridhar. 2010. Introduction to research methodology: Problem selection formulation and research design. Lulu. com."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2022.100460"},{"volume-title":"Cybersecurity challenges in developing nations. Ph.\u00a0D. Dissertation","author":"Tagert C","key":"e_1_3_2_1_49_1","unstructured":"Adam\u00a0C Tagert. 2010. Cybersecurity challenges in developing nations. Ph.\u00a0D. Dissertation. Carnegie Mellon University."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462223.3485618"},{"key":"e_1_3_2_1_51_1","volume-title":"Lawyer tells judge \u2019I\u2019m not a cat","author":"Zdanowicz Christina","year":"2021","unstructured":"Christina Zdanowicz. 2021. Lawyer tells judge \u2019I\u2019m not a cat\u2019 after a Zoom filter mishap in virtual court hearing. https:\/\/edition.cnn.com\/2021\/02\/09\/us\/cat-filter-lawyer-zoom-court-trnd [Accessed: 26th April 2022]."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1712269"}],"event":{"name":"OzCHI 2023: OzCHI 2023","acronym":"OzCHI 2023","location":"Wellington New Zealand"},"container-title":["Proceedings of the 35th Australian Computer-Human Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638380.3638385","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638380.3638385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:41:44Z","timestamp":1755870104000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638380.3638385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,2]]},"references-count":52,"alternative-id":["10.1145\/3638380.3638385","10.1145\/3638380"],"URL":"https:\/\/doi.org\/10.1145\/3638380.3638385","relation":{},"subject":[],"published":{"date-parts":[[2023,12,2]]},"assertion":[{"value":"2024-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}