{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:03:12Z","timestamp":1751688192730,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713820","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:24:33Z","timestamp":1745465073000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["\"A five-year-old could understand it\" versus \"This is way too confusing\": Exploring Non-expert Understandings and Perceptions of Cybersecurity Definitions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3084-7451","authenticated-orcid":false,"given":"Lorenzo C.","family":"Neil","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3408-3216","authenticated-orcid":false,"given":"Charlotte","family":"Healy","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, College Park, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6017-9693","authenticated-orcid":false,"given":"Julie","family":"Haney","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology, Gaithersburg, Maryland, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"crossref","unstructured":"Sanne\u00a0F. Akkerman and Arthur Bakker. 2011. Boundary crossing and boundary objects. Review of Educational Research 81 2 (2011) 132\u2013169.","DOI":"10.3102\/0034654311404435"},{"key":"e_1_3_3_3_3_2","unstructured":"Isslam\u00a0Yousef Alhasan. 2023. Human Factors in Cybersecurity: A Cross-Cultural Study on Trust. Doctoral Dissertation. Purdue University."},{"key":"e_1_3_3_3_4_2","unstructured":"Maria Bada M.\u00a0Angela Sasse and Jason\u00a0RC Nurse. 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1901\/1901.02672.pdf."},{"key":"e_1_3_3_3_5_2","unstructured":"Sarah Baker and Rosalind Edwards. 2012. How many qualitative interviews is enough? Expert voices and early career reflections on sampling and cases in qualitative research. https:\/\/eprints.ncrm.ac.uk\/id\/eprint\/2273\/4\/how_many_interviews.pdf."},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"crossref","unstructured":"Rosaline\u00a0S. Barbour. 2001. Checklists for improving rigour in qualitative research: a case of the tail wagging the dog? British Medical Journal 322 7294 (2001) 1115\u20131117.","DOI":"10.1136\/bmj.322.7294.1115"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Christine\u00a0A. Barry Nicky Britten Nick Barbera Colin Bradley and Fiona Stevenson. 1999. Using reflexivity to optimize teamwork in qualitative research. Qualitative Health Research 9 1 (1999) 26\u201344.","DOI":"10.1177\/104973299129121677"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"crossref","unstructured":"Cristian Bravo-Lillo Lorrie\u00a0Faith Cranor Julie Downs and Saranga Komanduri. 2010. Bridging the gap in computer security warnings: A mental model approach. IEEE Security & Privacy 9 (2010) 18\u201326.","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_3_3_9_2","unstructured":"Charles Brookson Scott Cadzow Ralph Eckmaier J\u00f6rg Eschweiler Berthold Gerber Alessandro Guarino Kai Rannenberg Jon Shamah and S\u0142awomir G\u00f3rniak. 2015. Definition of cybersecurity-gaps and overlaps in standardisation. Heraklion ENISA (2015)."},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Olivia\u00a0M. Bullock Daniel\u00a0Colon Amill Hillary\u00a0C. Shulman and Graham\u00a0N. Dixon. 2019. Jargon as a barrier to effective science communication: Evidence from metacognition. Public Understanding of Science 28 7 (2019) 845\u2013853.","DOI":"10.1177\/0963662519865687"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"A.\u00a0J. Burns Tom\u00a0L. Roberts Clay Posey and Paul\u00a0Benjamin Lowry. 2019. The adaptive roles of positive and negative emotions in organizational insiders\u2019 security-based precaution taking. Information Systems Research 30 4 (2019) 1228\u20131247.","DOI":"10.1287\/isre.2019.0860"},{"key":"e_1_3_3_3_12_2","first-page":"117","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Busse Karoline","year":"2019","unstructured":"Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: \u2018...no one can hack my mind\u2019: Revisiting a study on expert and non-expert security practices and advice. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, USA, 117\u2013136."},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"crossref","unstructured":"Mariana\u00a0G. Cains Liberty Flora Danica Taber Zoe King and Diane\u00a0S. Henshel. 2022. Defining cyber security and cyber security risk within a multidisciplinary context using expert elicitation. Risk Analysis 42 8 (2022) 1643\u20131669.","DOI":"10.1111\/risa.13687"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Paul\u00a0R. Carlile. 2002. A pragmatic view of knowledge and boundaries: Boundary objects in new product development. Organization Science 13 4 (2002) 442\u2013455.","DOI":"10.1287\/orsc.13.4.442.2953"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1037\/10096-006"},{"key":"e_1_3_3_3_16_2","volume-title":"The Stanford Encyclopedia of Philosophy (Winter 2021 Edition)","author":"Cohen S.\u00a0Marc","year":"2021","unstructured":"S.\u00a0Marc Cohen and C.\u00a0D.\u00a0C. Reeve. 2021. Aristotle\u2019s Metaphysics. In The Stanford Encyclopedia of Philosophy (Winter 2021 Edition), Edward\u00a0N. Zalta (Ed.). Stanford University."},{"key":"e_1_3_3_3_17_2","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (4th ed.)","author":"Corbin Juliet","year":"2015","unstructured":"Juliet Corbin and Anselm Strauss. 2015. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (4th ed.). Sage Publications, Thousand Oaks, CA."},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Dan Craigen Nadia Diakun-Thibault and Randy Purse. 2014. Defining cybersecurity. Technology Innovation Management Review 4 10 (2014).","DOI":"10.22215\/timreview\/835"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"crossref","unstructured":"John D\u2019Arcy and Pei-Lee Teh. 2019. Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress emotions and neutralization. Information & Management 56 7 (2019) 103151.","DOI":"10.1016\/j.im.2019.02.006"},{"key":"e_1_3_3_3_20_2","unstructured":"Michael Dimock. 2019. Defining generations: Where Millennials end and Generation Z begins. https:\/\/www.pewresearch.org\/short-reads\/2019\/01\/17\/where-millennials-end-and-generation-z-begins\/."},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"crossref","unstructured":"Cassandra\u00a0E. Dodge Nathan Fisk George\u00a0W. Burruss Richard K.\u00a0Moule Jr and Chae\u00a0M. Jaynes. 2023. What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory. Criminology & Public Policy 22 4 (2023) 849\u2013868.","DOI":"10.1111\/1745-9133.12641"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"Shari\u00a0L. Dworkin. 2012. Sample size policy for qualitative studies using in-depth interviews. Archives of Sexual Behavior 41 (2012) 1319\u20131320.","DOI":"10.1007\/s10508-012-0016-6"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"crossref","unstructured":"Nick\u00a0J. Fox. 2011. Boundary objects social meanings and the success of new technologies. Sociology 45 1 (2011) 70\u201385.","DOI":"10.1177\/0038038510387196"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"Steven Furnell and Emily Collins. 2021. Cyber security: What are we talking about? Computer Fraud & Security 2021 7 (2021) 6\u201311.","DOI":"10.1016\/S1361-3723(21)00073-7"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"crossref","unstructured":"Greg Guest Arwen Bunce and Laura Johnson. 2006. How many interviews are enough? An experiment with data saturation and variability. Field Methods 18 1 (2006) 59\u201382.","DOI":"10.1177\/1525822X05279903"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Julie Haney and Wayne Lutters. 2020. Security awareness training for the workforce: moving beyond \u201ccheck-the-box\u201d compliance. Computer 53 10 (2020).","DOI":"10.1109\/MC.2020.3001959"},{"key":"e_1_3_3_3_27_2","first-page":"411","volume-title":"2018 Symposium on Usable Privacy and Security","author":"Haney Julie\u00a0M.","year":"2018","unstructured":"Julie\u00a0M. Haney and Wayne\u00a0G. Lutters. 2018. \u2018It\u2019s Scary...It\u2019s Confusing...It\u2019s Dull\u2019: How Cybersecurity Advocates Overcome Negative Perceptions of Security. In 2018 Symposium on Usable Privacy and Security. USENIX Association, USA, 411\u2013425."},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"crossref","unstructured":"Tejaswini Herath and H.\u00a0Raghav Rao. 2009. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems 18 2 (2009) 106\u2013125.","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"crossref","unstructured":"Isto Huvila Theresa\u00a0Dirndorfer Anderson Eva\u00a0Hourihan Jansen Pam McKenzie and Adam Worrall. 2017. Boundary objects in information science. Journal of the Association for Information Science and Technology 68 8 (2017) 1807\u20131822.","DOI":"10.1002\/asi.23817"},{"key":"e_1_3_3_3_30_2","first-page":"327","volume-title":"Eleventh Symposium on Usable Privacy and Security (SOUPS 2015)","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \u2018...no one can hack my mind\u2019: Comparing expert and non-expert security practices. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). USENIX Association, USA, 327\u2013346."},{"key":"e_1_3_3_3_31_2","first-page":"1","volume-title":"2020 CHI Conference on Human Factors in Computing Systems","author":"Jeong Rebecca","year":"2020","unstructured":"Rebecca Jeong and Sonia Chiasson. 2020. \u2018Lime\u2019, \u2018Open Lock\u2019, and \u2018Blocked\u2019: Children\u2019s Perception of Colors, Symbols, and Words in Cybersecurity Warnings. In 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1\u201313."},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312786"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"crossref","unstructured":"Hwee-Joo Kam Philip Menard Dustin Ormond and Robert\u00a0E. Crossler. 2020. Cultivating cybersecurity learning: An integration of self-determination and flow. Computers & Security 96 (2020) 101875.","DOI":"10.1016\/j.cose.2020.101875"},{"key":"e_1_3_3_3_34_2","volume-title":"Eleventh Symposium on Usable Privacy and Security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cmy data just goes everywhere\u201d: User mental models of the internet and implications for privacy and security. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). USENIX Association, USA."},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Nadiya Kostyuk and Carly Wayne. 2021. The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public. Journal of Global Security Studies 6 2 (2021) ogz077.","DOI":"10.1093\/jogss\/ogz077"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Eric Luiijf Kim Besseling and Patrick De\u00a0Graaf. 2013. Nineteen national cyber security strategies. International Journal of Critical Infrastructures 6 9 1-2 (2013) 3\u201331.","DOI":"10.1504\/IJCIS.2013.051608"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"crossref","unstructured":"Mary\u00a0L. McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia Medica 22 3 (2012) 276\u2013282.","DOI":"10.11613\/BM.2012.031"},{"key":"e_1_3_3_3_39_2","volume-title":"Qualitative Research: A Guide to Design and Implementation (4th ed.)","author":"Merriam Sharan\u00a0B.","year":"2016","unstructured":"Sharan\u00a0B. Merriam and Elizabeth\u00a0J. Tisdell. 2016. Qualitative Research: A Guide to Design and Implementation (4th ed.). John Wiley & Sons, San Francisco, CA."},{"key":"e_1_3_3_3_40_2","unstructured":"Merriam-Webster Dictionary. [n. d.]. definition. https:\/\/www.merriam-webster.com\/dictionary\/definition."},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190058135.001.0001"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"crossref","unstructured":"David Modic and Ross Anderson. 2014. Reading this may harm your computer: The psychology of malware warnings. Computers in Human Behavior 41 (2014) 71\u201379.","DOI":"10.1016\/j.chb.2014.09.014"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Benjamin Morrison Lynne Coventry and Pam Briggs. 2021. How do Older Adults feel about engaging with Cyber\u2010Security? Human Behavior and Emerging Technologies 3 5 (2021) 1033\u20131049.","DOI":"10.1002\/hbe2.291"},{"key":"e_1_3_3_3_44_2","volume-title":"Introduction to Technical and Professional Communication","author":"Mussack Brigitte","year":"2021","unstructured":"Brigitte Mussack and Brandi Fuglsby. 2021. Descriptions and Definitions. In Introduction to Technical and Professional Communication, Brigitte Mussack (Ed.). University of Minnesota."},{"key":"e_1_3_3_3_45_2","unstructured":"National Institute of Standards and Technology. 2024. Glossary: availability. https:\/\/csrc.nist.gov\/glossary\/term\/availability."},{"key":"e_1_3_3_3_46_2","unstructured":"National Institute of Standards and Technology. 2024. Glossary: integrity. https:\/\/csrc.nist.gov\/glossary\/term\/integrity."},{"key":"e_1_3_3_3_47_2","first-page":"359","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Neil Lorenzo","year":"2021","unstructured":"Lorenzo Neil, Elijah Bouma-Sims, Evan Lafontaine, Yasemin Acar, and Bradley Reaves. 2021. Investigating web service account remediation advice. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, USA, 359\u2013376."},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_31"},{"key":"e_1_3_3_3_49_2","first-page":"283","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Neil Lorenzo","year":"2023","unstructured":"Lorenzo Neil, Harshini\u00a0Sri Ramulu, Yasemin Acar, and Bradley Reaves. 2023. Who comes up with this stuff? interviewing authors to understand how they produce security advice. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). USENIX Association, USA, 283\u2013299."},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300579"},{"key":"e_1_3_3_3_51_2","volume-title":"7th International Scientific Conference on Security and Protection of Information (SPI 2013)","author":"Nurse Jason\u00a0RC","year":"2013","unstructured":"Jason\u00a0RC Nurse. 2013. Effective communication of cyber security risks. In 7th International Scientific Conference on Security and Protection of Information (SPI 2013)."},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2011.6059257"},{"key":"e_1_3_3_3_53_2","unstructured":"Jason\u00a0R.C. Nurse Inka Karppinen Jo Milward and Joanne Varughese. 2022. Oh behave! The annual cybersecurity attitudes and behaviors report. https:\/\/staysafeonline.org\/online-safety-privacy-basics\/oh-behave\/."},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Clif Oswick and Maxine Robertson. 2009. Boundary objects reconsidered: From bridges and anchors to barricades and mazes. Journal of Change Management 9 2 (2009) 179\u2013193.","DOI":"10.1080\/14697010902879137"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Shari\u00a0Lawrence Pfleeger and Deanna\u00a0D. Caputo. 2012. Leveraging behavioral science to mitigate cyber security risk. Computers & Security 31 4 (2012) 597\u2013611.","DOI":"10.1016\/j.cose.2011.12.010"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_24"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217907"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"crossref","unstructured":"Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1 1 (2015) 121\u2013144.","DOI":"10.1093\/cybsec\/tyv008"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312770"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_3_3_61_2","volume-title":"2018 IEEE Security & Privacy Workshop on Technology and Consumer Protection (ConPro)","author":"Redmiles Elissa\u00a0M.","year":"2018","unstructured":"Elissa\u00a0M. Redmiles, Miraida Morales, Lisa Maszkiewicz, Rock Stevens, Everest Liu, Dhruv Kuchhal, and Michelle\u00a0L. Mazurek. 2018. First steps toward measuring the readability of security advice. In 2018 IEEE Security & Privacy Workshop on Technology and Consumer Protection (ConPro)."},{"key":"e_1_3_3_3_62_2","first-page":"89","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Redmiles Elissa\u00a0M.","year":"2020","unstructured":"Elissa\u00a0M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle\u00a0L. Mazurek. 2020. A comprehensive quality evaluation of security and privacy advice on the web. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, USA, 89\u2013108."},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368860.3368864"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"crossref","unstructured":"Benjamin Saunders Julius Sim Tom Kingstone Shula Baker Jackie Waterfield Bernadette Bartlam Heather Burroughs and Clare Jinks. 2018. Saturation in qualitative research: exploring its conceptualization and operationalization. Quality & Quantity 52 (2018) 1893\u20131907.","DOI":"10.1007\/s11135-017-0574-8"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"crossref","unstructured":"Daniel Schatz Rabih Bashroush and Julie Wall. 2017. Towards a more representative definition of cyber security. Journal of Digital Forensics Security and Law 12 2 (2017) 8.","DOI":"10.15394\/jdfsl.2017.1476"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"crossref","unstructured":"Hillary\u00a0C. Shulman Graham\u00a0N. Dixon Olivia\u00a0M. Bullock and Daniel\u00a0Colon Amill. 2020. The effects of jargon on processing fluency self-perceptions and scientific engagement. Journal of Language and Social Psychology 39 5-6 (2020) 579\u2013597.","DOI":"10.1177\/0261927X20902177"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_14"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"crossref","unstructured":"Brian Stanton Mary\u00a0F. Theofanos Sandra\u00a0Spickard Prettyman and Susanne Furman. 2016. Security fatigue. IT Professional 18 5 (2016) 26\u201332.","DOI":"10.1109\/MITP.2016.84"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"crossref","unstructured":"Susan\u00a0Leigh Star and James\u00a0R. Griesemer. 1989. Institutional Ecology \u2019Translations\u2019 and Boundary Objects: Amateurs and Professionals in Berkeley\u2019s Museum of Vertebrate Zoology 1907-39. Social Studies of Science 19 3 (1989) 387\u2013420.","DOI":"10.1177\/030631289019003001"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23006"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Julia\u00a0D. Thompson Geoffrey\u00a0L. Herman Travis Scheponik Linda Oliva Alan Sherman Ennis Golaszewski Dhananjay Phatak and Kostantinos Patsourakos. 2018. Student misconceptions about cybersecurity concepts: Analysis of think-aloud interviews. Journal of Cybersecurity Education Research and Practice1 (2018) 5.","DOI":"10.62915\/2472-2707.1030"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Kerry Tomlinson. 2023. The curse of knowledge can damage awareness programmes: Here\u2019s how to defeat it. Cyber Security: A Peer-Reviewed Journal 6 4 (2023) 311\u2013319.","DOI":"10.69554\/XLSP8216"},{"key":"e_1_3_3_3_73_2","unstructured":"Unified Compliance Framework. [n. d.]. The Definitions Book: How to Write Definitions. https:\/\/www.unifiedcompliance.com\/education\/how-to-write-definitions\/."},{"key":"e_1_3_3_3_74_2","unstructured":"Verizon. 2024. 2024 data breach investigations report. https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/."},{"key":"e_1_3_3_3_75_2","first-page":"623","volume-title":"Twentieth Symposium on Usable Privacy and Security (SOUPS 2024)","author":"Preuschen Alexandra von","year":"2024","unstructured":"Alexandra von Preuschen, Monika\u00a0C. Schuhmacher, and Verena Zimmermann. 2024. Beyond Fear and Frustration-Towards a Holistic Understanding of Emotions in Cybersecurity. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). 623\u2013642."},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.2478\/9788366675896-001"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384761"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '25"},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:14:55Z","timestamp":1751606095000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":76,"alternative-id":["10.1145\/3706598.3713820","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713820","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}