{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:21:59Z","timestamp":1776097319869,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1271K"],"award-info":[{"award-number":["16KIS1271K"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3714202","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:33:32Z","timestamp":1745465612000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Achieving Resilience: Data Loss and Recovery on Devices for Personal Use in Three Countries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6545-7513","authenticated-orcid":false,"given":"Julia","family":"Wunder","sequence":"first","affiliation":[{"name":"IT Security Infrastructures Lab, Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg, Erlangen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4266-975X","authenticated-orcid":false,"given":"Rick","family":"Wash","sequence":"additional","affiliation":[{"name":"School of Information, University of Wisconsin--Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7187-6531","authenticated-orcid":false,"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, University of Strathclyde, Glasgow, Scotland, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3488-0053","authenticated-orcid":false,"given":"Daniela A","family":"Oliveira","sequence":"additional","affiliation":[{"name":"National Science Foundation, Alexandria, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7158-0219","authenticated-orcid":false,"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[{"name":"IT Security Infrastractures Lab, Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg, Erlangen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909661"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"crossref","unstructured":"Elham\u00a0Abdullah Al-Qarni. 2023. Cybersecurity in Healthcare: a review of recent attacks and mitigation strategies. International Journal of Advanced Computer Science and Applications 14 5 (2023). https:\/\/doi.org\/10.14569\/IJACSA.2023.0140513.","DOI":"10.14569\/IJACSA.2023.0140513"},{"key":"e_1_3_3_3_4_2","unstructured":"The\u00a0World Bank. 2023. The World Bank Atlas method - detailed methodology. https:\/\/datahelpdesk.worldbank.org\/knowledgebase\/articles\/378832-the-world-bank-atlas-method-detailed-methodology accessed in April 2023."},{"key":"e_1_3_3_3_5_2","first-page":"117","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Busse Karoline","year":"2019","unstructured":"Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: No One Can Hack My Mind. Revisiting a Study on Expert and Non-Expert Security Practices and Advice. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX, Santa Clara, USA, 117\u2013136."},{"key":"e_1_3_3_3_6_2","volume-title":"Joint NASA and IEEE Mass Storage Conference","volume":"99","author":"Chervenak Ann","year":"1998","unstructured":"Ann Chervenak, Vivekenand Vellanki, and Zachary Kurmas. 1998. Protecting file systems: A survey of backup techniques. In Joint NASA and IEEE Mass Storage Conference , Vol.\u00a099. Maryland, USA."},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","unstructured":"Seung Youn\u00a0(Yonnie) Chyung Katherine Roberts Ieva Swanson and Andrea Hankinson. 2018. Evidence-Based Survey Design: The Use of a Midpoint on the Likert Scale. Performance Improvement 56 10 (2018) 15\u201323. 10.1002\/pfi.21727","DOI":"10.1002\/pfi.21727"},{"key":"e_1_3_3_3_8_2","unstructured":"Clickworker. 2023. Our Clickworker community. https:\/\/www.clickworker.com\/clickworker-crowd\/ accessed in Feb 2023."},{"key":"e_1_3_3_3_9_2","unstructured":"Trevor Cooke. 2024. Backup Statistics in 2024: Recovery & Data Loss. https:\/\/earthweb.com\/blog\/backup-statistics\/ Accessed 20\/11\/24."},{"key":"e_1_3_3_3_10_2","unstructured":"Edelman Trust Institute. 2024. 2024 Edelman Trust Barometer Global Report. Accessed 6\/9\/24 https:\/\/www.edelman.com\/trust\/2024\/trust-barometer."},{"key":"e_1_3_3_3_11_2","unstructured":"Federal Office for Information Security. undated. Backups \u2013 what\u2019s the best approach?Accessed 6\/9\/24 https:\/\/www.bsi.bund.de\/dok\/6598926."},{"key":"e_1_3_3_3_12_2","first-page":"327","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. ... No one can hack my mind: Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX, Ottawa, Canada, 327\u2013346."},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91237-6_26"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Matja\u017e Kljun John Mariani and Alan Dix. 2016. Toward understanding short-term personal information preservation: A study of backup strategies of end users. Journal of the Association for Information Science and Technology 67 12 (2016) 2947\u20132963. https:\/\/doi.org\/10.1002\/asi.23526 Citations: 12.","DOI":"10.1002\/asi.23526"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","unstructured":"Philip Menard Robert Gatlin and Merrill Warkentin. 2014. Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup. Journal of Computer Information Systems 55 (09 2014) 83\u201391. 10.1080\/08874417.2014.11645743","DOI":"10.1080\/08874417.2014.11645743"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1002\/9783527825042.ch4"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2012.83"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ProComm.2019.00014"},{"key":"e_1_3_3_3_19_2","unstructured":"National Cyber Security Centre. undated. Backing up your data. Accessed 6\/9\/24 https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online\/always-back-up-your-most-important-data."},{"key":"e_1_3_3_3_20_2","unstructured":"Statistical\u00a0Offices of\u00a0the Federation and Germany the L\u00e4nder. 2022. Zensus Datenbank - Persons: Sex - Age. https:\/\/ergebnisse.zensus2022.de\/datenbank\/online\/table\/1000A-2026 accessed in Feb 2023."},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"crossref","unstructured":"Suzanne Prior and Karen Renaud. 2023. Who is best placed to support cyber responsibilized UK parents? Children 10 7 (2023) 1130. https:\/\/doi.org\/10.3390\/children10071130.","DOI":"10.3390\/children10071130"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61379-1_6"},{"key":"e_1_3_3_3_23_2","unstructured":"Prolific. 2023. Prolific Audience Checker. https:\/\/app.prolific.com\/audience-checker accessed in Feb 2023."},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"Emilee Rader and Rick Wash. accessed in December 2017. Materials for SOUPS 2012 paper \u201cStories as Informal Lessons About Security\u201d. https:\/\/osf.io\/9dfzn\/.","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Elissa\u00a0M Redmiles and Eszter Hargittai. 2018. New phone who dis? Modeling millennials\u2019 backup behavior. ACM Transactions on the Web (TWEB) 13 1 (2018) 1\u201314. https:\/\/doi.org\/10.1145\/3208105.","DOI":"10.1145\/3208105"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"key":"e_1_3_3_3_29_2","first-page":"89","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Redmiles Elissa\u00a0M.","year":"2020","unstructured":"Elissa\u00a0M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle\u00a0L. Mazurek. 2020. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 89\u2013108."},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","unstructured":"Robert\u00a0W. Reeder Iulia Ion and Sunny Consolvo. 2017. 152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users. IEEE Security and Privacy 15 5 (2017) 55\u201364. 10.1109\/MSP.2017.3681050","DOI":"10.1109\/MSP.2017.3681050"},{"key":"e_1_3_3_3_31_2","unstructured":"Paul Ruggiero and Matthew\u00a0A. Heckathorn. 2012. Data Backup Options. Accessed 6\/9\/24 https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/data_backup_options.pdf."},{"key":"e_1_3_3_3_32_2","unstructured":"Statista. 2022. Population of the United States in 2022 by educational attainment. https:\/\/www.statista.com\/statistics\/240868\/educational-attainment-in-the-us\/ accessed in November 2024."},{"key":"e_1_3_3_3_33_2","unstructured":"Statista. 2023. Verteilung der Bev\u00f6lkerung in Deutschland nach beruflichem Bildungsabschluss im Jahr 2023. https:\/\/de.statista.com\/statistik\/daten\/studie\/3276\/umfrage\/bevoelkerung-nach-beruflichem-bildungsabschluss\/ accessed in November 2024."},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Javier Su\u00e1rez-\u00c1lvarez Ignacio Pedrosa Luis Lozano Eduardo Garc\u00eda-Cueto Marcelino Cuesta and Jos\u00e9 Mu\u00f1iz. 2018. Using reversed items in Likert scales: A questionable practice. Psicothema 30 (05 2018) 149\u2013158. 10.7334\/psicothema2018.33","DOI":"10.7334\/psicothema2018.33"},{"key":"e_1_3_3_3_35_2","first-page":"367","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Tang Jenny","year":"2022","unstructured":"Jenny Tang, Eleanor Birrell, and Ada Lerner. 2022. Replication: How well do my results generalize now? The external validity of online privacy and security surveys. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX, Boston, USA, 367\u2013385."},{"key":"e_1_3_3_3_36_2","volume-title":"CYBERSECURITY DICTIONARY for Everyone: 1250 Terms Explained in Simple English","author":"Tavlas Tolga","year":"2024","unstructured":"Tolga Tavlas. 2024. CYBERSECURITY DICTIONARY for Everyone: 1250 Terms Explained in Simple English. Independently published."},{"key":"e_1_3_3_3_37_2","first-page":"309","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Wash Rick","year":"2015","unstructured":"Rick Wash and Emilee Rader. 2015. Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX, Ottawa, Canada, 309\u2013325."},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","unstructured":"Gail\u00a0H. Weems Anthony\u00a0J. Onwuegbuzie and Daniel Lustig. 2003. Profiles of Respondents Who Respond Inconsistently to Positively- and Negatively-worded Items on Rating Scales. Evaluation & Research in Education 17 1 (2003) 45\u201360. 10.1080\/14664200308668290","DOI":"10.1080\/14664200308668290"},{"key":"e_1_3_3_3_39_2","first-page":"169","volume-title":"USENIX Security Symposium","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J\u00a0Doug Tygar. 1999. Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0.. In USENIX Security Symposium , Vol.\u00a0348. 169\u2013184."},{"key":"e_1_3_3_3_40_2","unstructured":"Yev. 2022. The 2022 Backup Survey: 54% Report Data Loss With Only 10% Backing Up Daily. https:\/\/www.backblaze.com\/blog\/the-2022-backup-survey-54-report-data-loss-with-only-10-backing-up-daily\/ Accessed 20\/11\/24."}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3714202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:06:00Z","timestamp":1751605560000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":39,"alternative-id":["10.1145\/3706598.3714202","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3714202","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}