{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:56:23Z","timestamp":1776930983065,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":104,"publisher":"ACM","funder":[{"name":"Deutsche Forschungsgemeinschaft","award":["EXC 2092 CASA-390781972"],"award-info":[{"award-number":["EXC 2092 CASA-390781972"]}]},{"name":"Google","award":["2024 Google Academic Research Award on Trust and Safety"],"award-info":[{"award-number":["2024 Google Academic Research Award on Trust and Safety"]}]},{"name":"Institute for Advanced Studies at the University of Luxembourg","award":["Young Academic Grant (2021)"],"award-info":[{"award-number":["Young Academic Grant (2021)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3791486","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T06:44:11Z","timestamp":1776062651000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["From Harm to Healing: Understanding Individual Resilience after Cybercrimes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0794-1551","authenticated-orcid":false,"given":"Xiaowei","family":"Chen","sequence":"first","affiliation":[{"name":"Max Planck Insititute for Security and Privacy, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1601-8588","authenticated-orcid":false,"given":"Mindy","family":"Tran","sequence":"additional","affiliation":[{"name":"Max Planck Insititute for Security and Privacy, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5339-8792","authenticated-orcid":false,"given":"Yue","family":"Deng","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3663-152X","authenticated-orcid":false,"given":"Bhupendra","family":"Acharya","sequence":"additional","affiliation":[{"name":"University of Louisiana, Lafayette, Louisiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9088-705X","authenticated-orcid":false,"given":"Yixin","family":"Zou","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"Bhupendra Acharya and Thorsten Holz. 2024. An Explorative Study of Pig Butchering Scams. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.15423 (2024)."},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3696410.3714634"},{"key":"e_1_3_3_3_4_2","first-page":"4427","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Acharya Bhupendra","year":"2024","unstructured":"Bhupendra Acharya, Dario Lazzaro, Efr\u00e9n L\u00f3pez-Morales, Adam Oest, Muhammad Saad, Antonio\u00a0Emanuele Cin\u00e0, Lea Sch\u00f6nherr, and Thorsten Holz. 2024. The imitation game: Exploring brand impersonation attacks on social media platforms. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, USA, 4427\u20134444."},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Omolola\u00a0A Adeoye-Olatunde and Nicole\u00a0L Olenik. 2021. Research and scholarly methods: Semi-structured interviews. Journal of the american college of clinical pharmacy 4 10 (2021) 1358\u20131367.","DOI":"10.1002\/jac5.1441"},{"key":"e_1_3_3_3_6_2","first-page":"4879","volume-title":"34th Usenix Security Symposium","author":"Agarwal Sharad","year":"2025","unstructured":"Sharad Agarwal, Emma Harvey, Enrico Mariconti, Guillermo Suarez-Tangil, Marie Vasek, et\u00a0al. 2025. \u2018Hey mum, I dropped my phone down the toilet\u2019: Investigating Hi Mum and Dad SMS Scams in the United Kingdom. In 34th Usenix Security Symposium. USENIX Association, Seattle, WA, USA, 4879\u20134896."},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Saleh\u00a0Mohamed Alhidaifi Muhammad\u00a0Rizwan Asghar and Imran\u00a0Shafique Ansari. 2024. A survey on cyber resilience: Key strategies research challenges and future directions. ACM computing surveys 56 8 (2024) 1\u201348.","DOI":"10.1145\/3649218"},{"key":"e_1_3_3_3_8_2","unstructured":"American Psychological Association. n. d.. \u201cTrauma\u201d. APA Dictionary of Psychology. https:\/\/dictionary.apa.org\/trauma Accessed: 2025-08-28."},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"crossref","unstructured":"John\u00a0P Baker and Howard Berenbaum. 2007. Emotional approach and problem-focused coping: A comparison of potentially adaptive strategies. Cognition and emotion 21 1 (2007) 95\u2013118.","DOI":"10.1080\/02699930600562276"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Luke Balcombe. 2025. The Mental Health Impacts of Internet Scams. International Journal of Environmental Research and Public Health 22 6 (2025) 938.","DOI":"10.3390\/ijerph22060938"},{"key":"e_1_3_3_3_11_2","first-page":"241","volume-title":"Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025)","author":"Batool Amna","year":"2025","unstructured":"Amna Batool and Kentaro Toyama. 2025. Between Court Orders and Platform Policies: Understanding Law Enforcement and Meta Interactions in Addressing Non-Consensual Image Disclosure Abuse. In Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025). USENIX Association, Seattle, WA, USA, 241\u2013258."},{"key":"e_1_3_3_3_12_2","unstructured":"Michaela Beals Marguerite DeLiema and Martha Deevy. 2015. Framework for a taxonomy of fraud. Financial Fraud Research Center (2015) 39."},{"key":"e_1_3_3_3_13_2","unstructured":"Deborah Bodeau Richard Graubart Jeffrey Picciotto and Rosalie McQuaid. 2011. Cyber resiliency engineering framework. MTR110237 MITRECorporation (2011)."},{"key":"e_1_3_3_3_14_2","unstructured":"Mary\u00a0Jo Bolton. n. d.. Phases of Trauma Recovery. https:\/\/trauma-informed.ca\/recovery\/phases-of-trauma-recovery\/. Accessed: 2025-08-20."},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642432"},{"key":"e_1_3_3_3_16_2","series-title":"(SOUPS \u201924)","volume-title":"Proceedings of the Twentieth Symposium on Usable Privacy and Security","author":"Bouma-Sims Elijah","year":"2024","unstructured":"Elijah Bouma-Sims, Hiba Hassan, Alexandra Nisenoff, Lorrie\u00a0Faith Cranor, and Nicolas Christin. 2024. \"It was honestly just gambling\": investigating the experiences of teenage cryptocurrency users on reddit. In Proceedings of the Twentieth Symposium on Usable Privacy and Security (Philadelphia, PA, USA) (SOUPS \u201924). USENIX Association, USA, Article 18, 20\u00a0pages."},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3719027.3765030"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.240342"},{"key":"e_1_3_3_3_19_2","series-title":"(SOUPS\u201921)","volume-title":"Proceedings of the Seventeenth Symposium on Usable Privacy and Security","author":"Bouwmeester Brennen","year":"2021","unstructured":"Brennen Bouwmeester, Elsa Rodr\u00edguez, Carlos Ga\u00f1\u00e1n, Michel Van\u00a0Eeten, and Simon Parkin. 2021. \"The thing doesn\u2019t have a name\": learning from emergent real-world interventions in smart home security. In Proceedings of the Seventeenth Symposium on Usable Privacy and Security(SOUPS\u201921). USENIX Association, USA, Article 26, 20\u00a0pages."},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_21_2","volume-title":"Thematic analysis: A practical guide","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. Thematic analysis: A practical guide. SAGE publications Ltd."},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517613"},{"key":"e_1_3_3_3_23_2","series-title":"(SEC \u201923)","volume-title":"Proceedings of the 32nd USENIX Conference on Security Symposium","author":"Brunken Lina","year":"2023","unstructured":"Lina Brunken, Annalina Buckmann, Jonas Hielscher, and M.\u00a0Angela Sasse. 2023. \"To do this properly, you need more resources\": the hidden costs of introducing simulated phishing campaigns. In Proceedings of the 32nd USENIX Conference on Security Symposium (Anaheim, CA, USA) (SEC \u201923). USENIX Association, USA, Article 230, 18\u00a0pages."},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"John Carruthers. 1990. A Rationale for the Use of Semi-structured Interviews. Journal of Educational Administration 28 1 (1990).","DOI":"10.1108\/09578239010006046"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"crossref","unstructured":"Ruth Chu-Lien Chao. 2011. Managing stress and maintaining well-being: Social support problem-focused coping and avoidant coping. Journal of Counseling & Development 89 3 (2011) 338\u2013348.","DOI":"10.1002\/j.1556-6678.2011.tb00098.x"},{"key":"e_1_3_3_3_26_2","volume-title":"Constructing grounded theory: A practical guide through qualitative analysis","author":"Charmaz Kathy","year":"2006","unstructured":"Kathy Charmaz. 2006. Constructing grounded theory: A practical guide through qualitative analysis. sage, London, UK."},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517475"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641943"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713122"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037589"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Sara\u00a0Giro Correia. 2019. Responding to victimisation in a digital world: a case study of fraud and computer misuse reported in Wales. Crime Science 8 1 (2019) 1\u201312.","DOI":"10.1186\/s40163-019-0099-7"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"crossref","unstructured":"Cassandra Cross. 2024. Romance baiting cryptorom and \u2018pig butchering\u2019: an evolutionary step in romance fraud. Current Issues in Criminal Justice 36 3 (2024) 334\u2013346.","DOI":"10.1080\/10345329.2023.2248670"},{"key":"e_1_3_3_3_33_2","volume-title":"Responding to cybercrime: Perceptions and need of Australian police and the general community","author":"Cross Cassandra","year":"2021","unstructured":"Cassandra Cross, Thomas Holt, Anastasia Powell, and Michael Wilson. 2021. Responding to cybercrime: Perceptions and need of Australian police and the general community. Australian Institute of Criminology, Canberra, Australia."},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"crossref","unstructured":"Joanna Curtis and Gavin Oxburgh. 2023. Understanding cybercrime in \u2018real world\u2019policing and law enforcement. The Police Journal 96 4 (2023) 573\u2013592.","DOI":"10.1177\/0032258X221107584"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Lies De\u00a0Kimpe Koen Ponnet Michel Walrave Thom Snaphaan Lieven Pauwels and Wim Hardyns. 2020. Help I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in human behavior 108 (2020) 106310.","DOI":"10.1016\/j.chb.2020.106310"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1201\/b14797"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714137"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581170"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"crossref","unstructured":"Beno\u00eet Dupont. 2019. The cyber-resilience of financial institutions: significance and applicability. Journal of cybersecurity 5 1 (2019) tyz013.","DOI":"10.1093\/cybsec\/tyz013"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"crossref","unstructured":"Thomas Ecabert Fabian Muhly and Verena Zimmermann. 2024. Implications of cyber incident reporting obligations on multinational organizations headquartered in Switzerland. International Cybersecurity Law Review 5 4 (2024) 585\u2013614.","DOI":"10.1365\/s43439-024-00129-x"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"crossref","unstructured":"Denise\u00a0E Elliott Paula Bjelajac Roger\u00a0D Fallot Laurie\u00a0S Markoff and Beth\u00a0Glover Reed. 2005. Trauma-informed or trauma-denied: Principles and implementation of trauma-informed services for women. Journal of community psychology 33 4 (2005) 461\u2013477.","DOI":"10.1002\/jcop.20063"},{"key":"e_1_3_3_3_42_2","unstructured":"European Parliament. 2025. Payment services deal: More protection from online fraud and hidden fees. https:\/\/www.europarl.europa.eu\/news\/en\/press-room\/20251121IPR31540\/payment-services-deal-more-protection-from-online-fraud-and-hidden-fees Accessed: 2025-11-28."},{"key":"e_1_3_3_3_43_2","unstructured":"European Union Agency for Cybersecurity (ENISA). 2024. ENISA Threat Landscape 2024. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024. Accessed: 2025-06-03."},{"key":"e_1_3_3_3_44_2","unstructured":"George Everly. 2025. Psychological First Aid. https:\/\/www.coursera.org\/learn\/psychological-first-aid Coursera online course. Accessed: 2025-05-10."},{"key":"e_1_3_3_3_45_2","unstructured":"FBI. 2025. Internet Crime Report 2024. https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2024_IC3Report.pdf. 47\u00a0pages. Accessed: 2025-05-05."},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","unstructured":"David Fletcher and Mustafa Sarkar. 2013. Psychological Resilience: A Review and Critique of Definitions Concepts and Theory. European Psychologist 18 1 (2013) 12\u201323. 10.1027\/1016-9040\/a000124","DOI":"10.1027\/1016-9040\/a000124"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"crossref","unstructured":"Diana Freed Sam Havron Emily Tseng Andrea Gallardo Rahul Chatterjee Thomas Ristenpart and Nicola Dell. 2019. \" Is My Phone Hacked?\" Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201324.","DOI":"10.1145\/3359304"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Christopher Freeman. 2024. Acute and diffuse impacts of fraud: A victim-centred teleology for a wicked problem. Journal of Economic Criminology 6 (2024) 100104.","DOI":"10.1016\/j.jeconc.2024.100104"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3617072.3617109"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"crossref","unstructured":"Anna Georgiadou Spiros Mouzakitis and Dimitris Askounis. 2022. Working from home during COVID-19 crisis: a cyber security culture assessment survey. Security Journal 35 2 (2022) 486\u2013505.","DOI":"10.1057\/s41284-021-00286-2"},{"key":"e_1_3_3_3_51_2","series-title":"(SOUPS \u201925)","volume-title":"Proceedings of the Twenty-First Symposium on Usable Privacy and Security","author":"Gerber Nina","year":"2025","unstructured":"Nina Gerber, Verena Zimmermann, Alexandra Von\u00a0Preuschen, and Karen Renaud. 2025. Unpacking the social and emotional dimensions of security and privacy user engagement. In Proceedings of the Twenty-First Symposium on Usable Privacy and Security (Seattle, WA, USA) (SOUPS \u201925). USENIX Association, USA, Article 29, 20\u00a0pages."},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"crossref","unstructured":"Saira Ghafur Emilia Grass Nick\u00a0R Jennings and Ara Darzi. 2019. The challenges of cybersecurity in health care: the UK National Health Service as a case study. The Lancet Digital Health 1 1 (2019) e10\u2013e12.","DOI":"10.1016\/S2589-7500(19)30005-6"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"crossref","unstructured":"Brandn Green Stephen Gies Amanda Bobnis Nicole\u00a0Leeper Piquero Alex\u00a0R Piquero and Eva Velasquez. 2020. The role of victim services for individuals who have experienced serious identity-based crime. Victims & offenders 15 6 (2020) 720\u2013743.","DOI":"10.1080\/15564886.2020.1743804"},{"key":"e_1_3_3_3_54_2","first-page":"105","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Havron Sam","year":"2019","unstructured":"Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, USA, 105\u2013122."},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Pilar Hern\u00e1ndez David Gangsei and David Engstrom. 2007. Vicarious resilience: A new concept in work with those who survive trauma. Family process 46 2 (2007) 229\u2013241.","DOI":"10.1111\/j.1545-5300.2007.00206.x"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.23"},{"key":"e_1_3_3_3_57_2","first-page":"1","volume-title":"The Workshop on the Economics of Information Security","author":"Hrle Temima","year":"2025","unstructured":"Temima Hrle, Yangheran Piao, and Daniel Woods. 2025. Anticipating Personal Cyber Insurance Disputes: A US\/UK User Study. In The Workshop on the Economics of Information Security. WEIS2025, Tokyo, Japan, 1\u201322."},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"crossref","unstructured":"Siqi Hu Carol Hsu and Zhongyun Zhou. 2022. Security education training and awareness programs: Literature review. Journal of Computer Information Systems 62 4 (2022) 752\u2013764.","DOI":"10.1080\/08874417.2021.1913671"},{"key":"e_1_3_3_3_59_2","unstructured":"Larke\u00a0N Huang Rebecca Flatow Tenly Biggs Sara Afayee Kelley Smith Thomas Clark and Mary Blake. 2014. SAMHSA\u2019s concept of truama and guidance for a trauma-informed approach. (2014)."},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00027"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"crossref","unstructured":"Jurjen Jansen and Rutger Leukfeldt. 2018. Coping with cybercrime victimization: An exploratory study into impact and change. Journal of Qualitative Criminal Justice and Criminology 6 2 (2018) 205\u2013228.","DOI":"10.21428\/88de04a1.976bcaf6"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"crossref","unstructured":"Adam\u00a0N Joinson Matt Dixon Lynne Coventry and Pam Briggs. 2023. Development of a new \u2018human cyber-resilience scale\u2019. Journal of Cybersecurity 9 1 (2023) tyad007.","DOI":"10.1093\/cybsec\/tyad007"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Maria Karyda Evangelos Kiountouzis and Spyros Kokolakis. 2005. Information systems security policies: a contextual perspective. Computers & security 24 3 (2005) 246\u2013260.","DOI":"10.1016\/j.cose.2004.08.011"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00038"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"crossref","unstructured":"Seffetullah Kuldas and Mair\u00e9ad Foody. 2022. Neither resiliency-trait nor resilience-state: Transactional Resiliency\/e. Youth & Society 54 8 (2022) 1352\u20131376.","DOI":"10.1177\/0044118X211029309"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3729176.3729188"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"crossref","unstructured":"Ann\u00a0S Masten. 2001. Ordinary magic: Resilience processes in development.American psychologist 56 3 (2001) 227.","DOI":"10.1037\/0003-066X.56.3.227"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"crossref","unstructured":"Wesley Meikle and Cassandra Cross. 2024. \u201cWhat action should l take?\u201d: Help-seeking behaviours of those targeted by romance fraud. Journal of Economic Criminology 3 (2024) 100054.","DOI":"10.1016\/j.jeconc.2024.100054"},{"key":"e_1_3_3_3_70_2","unstructured":"Tyler Moore. 2024. How Shifting Liability Explains Rising Cybercrime Costs. Rossfest Festschrift (2024) 135."},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Muhammad Naeem Wilson Ozuem Kerry Howell and Silvia Ranfagni. 2023. A step-by-step process of thematic analysis to develop a conceptual model in qualitative research. International journal of qualitative methods 22 (2023) 16094069231205789.","DOI":"10.1177\/16094069231205789"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Raoul Nott\u00e9 ER Leukfeldt and Marijke Malsch. 2021. Double triple or quadruple hits? Exploring the impact of cybercrime on victims in the Netherlands. International Review of Victimology 27 3 (2021) 272\u2013294.","DOI":"10.1177\/02697580211010692"},{"key":"e_1_3_3_3_73_2","first-page":"1","volume-title":"Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025)","author":"Oak Rajvardhan","year":"2025","unstructured":"Rajvardhan Oak and Zubair Shafiq. 2025. \u201cHello, is this Anna?\u201d: Unpacking the Lifecycle of Pig-Butchering Scams. In Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025). USENIX Association, Seattle, WA, USA, 1\u201318."},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","unstructured":"Christian Odo. 2024. Strengthening Cybersecurity Resilience: The Importance of Education Training and Risk Management. SSRN. 10.2139\/ssrn.4779289","DOI":"10.2139\/ssrn.4779289"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Clare\u00a0M Patterson Jason\u00a0RC Nurse and Virginia\u00a0NL Franqueira. 2023. Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security 132 (2023) 103309.","DOI":"10.1016\/j.cose.2023.103309"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"crossref","unstructured":"Shari\u00a0Lawrence Pfleeger M\u00a0Angela Sasse and Adrian Furnham. 2014. From weakest link to security hero: Transforming staff security behavior. Journal of Homeland Security and Emergency Management 11 4 (2014) 489\u2013510.","DOI":"10.1515\/jhsem-2014-0035"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"crossref","unstructured":"Sumithra Raghavan and Priyadharshiny Sandanapitchai. 2024. The relationship between cultural variables and resilience to psychological trauma: A systematic review of the literature.Traumatology 30 1 (2024) 37.","DOI":"10.1037\/trm0000239"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"crossref","unstructured":"Melva Ratchford Omar El-Gayar Cherie Noteboom and Yong Wang. 2022. BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective 31 3 (2022) 253\u2013273.","DOI":"10.1080\/19393555.2021.1923873"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"crossref","unstructured":"Karen Renaud Stephen Flowerday Merrill Warkentin Paul Cockshott and Craig Orgeron. 2018. Is the responsibilization of the cyber security risk reasonable and judicious?Computers & Security 78 (2018) 198\u2013211.","DOI":"10.1016\/j.cose.2018.06.006"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3498891.3498896"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"crossref","unstructured":"Deborah Seys Albert\u00a0W Wu Eva\u00a0Van Gerven Arthur Vleugels Martin Euwema Massimiliano Panella Susan\u00a0D Scott James Conway Walter Sermeus and Kris Vanhaecht. 2013. Health care professionals as second victims after adverse events: a systematic review. Evaluation & the health professions 36 2 (2013) 135\u2013162.","DOI":"10.1177\/0163278712458918"},{"key":"e_1_3_3_3_83_2","unstructured":"Juraj Sikra Karen\u00a0V Renaud and Daniel\u00a0R Thomas. 2023. UK cybercrime victims and reporting: a systematic review. Commonwealth Cybercrime Journal 1 1 (2023) 28\u201359."},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"crossref","unstructured":"Francesca Stevens Jason\u00a0RC Nurse and Budi Arief. 2021. Cyber stalking cyber harassment and adult mental health: A systematic review. Cyberpsychology Behavior and Social Networking 24 6 (2021) 367\u2013376.","DOI":"10.1089\/cyber.2020.0253"},{"key":"e_1_3_3_3_85_2","unstructured":"Victim Support. 2025. How We Can Help. https:\/\/www.victimsupport.org.uk\/help-and-support\/how-we-can-help\/ Accessed: 2025-08-20."},{"key":"e_1_3_3_3_86_2","series-title":"(SOUPS \u201924)","volume-title":"Proceedings of the Twentieth Symposium on Usable Privacy and Security","author":"Tabassum Sarah","year":"2024","unstructured":"Sarah Tabassum, Cori Faklaris, and Heather\u00a0Richter Lipford. 2024. What drives SMiShing susceptibility? a U.S. interview study of how and why mobile phone users judge text messages to be real or fake. In Proceedings of the Twentieth Symposium on Usable Privacy and Security (Philadelphia, PA, USA) (SOUPS \u201924). USENIX Association, USA, Article 21, 19\u00a0pages."},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715335.3735453"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"crossref","unstructured":"Leonie\u00a0Maria Tanczer Isabel L\u00f3pez-Neira and Simon Parkin. 2021. \u2018i feel like we\u2019re really behind the game\u2019: perspectives of the united kingdom\u2019s intimate partner violence support sector on the rise of technology-facilitated abuse. Journal of gender-based violence 5 3 (2021) 431\u2013450.","DOI":"10.1332\/239868021X16290304343529"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"crossref","unstructured":"Rachel\u00a0W Thompson Diane\u00a0B Arnkoff and Carol\u00a0R Glass. 2011. Conceptualizing mindfulness and acceptance as components of psychological resilience to trauma. Trauma Violence & Abuse 12 4 (2011) 220\u2013235.","DOI":"10.1177\/1524838011416375"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"crossref","unstructured":"Michele\u00a0M Tugade and Barbara\u00a0L Fredrickson. 2004. Resilient individuals use positive emotions to bounce back from negative emotional experiences.Journal of personality and social psychology 86 2 (2004) 320.","DOI":"10.1037\/0022-3514.86.2.320"},{"key":"e_1_3_3_3_91_2","unstructured":"UK Government. 2023. Financial Services and Markets Act 2023 Section 72: Liability of payment service providers for fraudulent transactions. https:\/\/www.legislation.gov.uk\/ukpga\/2023\/29\/section\/72. Accessed: 2025-08-06."},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","unstructured":"Carin M. M.\u00a0Reep van\u00a0den Bergh and Marianne Junger. 2018. Victims of cybercrime in Europe: a review of victim surveys. Crime Science 7 1 (2018) 5. 10.1186\/s40163-018-0079-3","DOI":"10.1186\/s40163-018-0079-3"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3720152"},{"key":"e_1_3_3_3_94_2","unstructured":"VERBIsoftware. 2024. MAXQDA. https:\/\/www.maxqda.com\/. accessed: 2025-08-10."},{"key":"e_1_3_3_3_95_2","doi-asserted-by":"crossref","unstructured":"Arun Vishwanath Loo\u00a0Seng Neo Pamela Goh Seyoung Lee Majeed Khader Gabriel Ong and Jeffery Chin. 2020. Cyber hygiene: The concept its measure and its initial tests. Decision Support Systems 128 (2020) 113160.","DOI":"10.1016\/j.dss.2019.113160"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713538"},{"key":"e_1_3_3_3_97_2","series-title":"(SOUPS \u201924)","volume-title":"Proceedings of the Twentieth Symposium on Usable Privacy and Security","author":"Von\u00a0Preuschen Alexandra","year":"2024","unstructured":"Alexandra Von\u00a0Preuschen, Monika\u00a0C. Schuhmacher, and Verena Zimmermann. 2024. Beyond fear and frustration - towards a holistic understanding of emotions in cybersecurity. In Proceedings of the Twentieth Symposium on Usable Privacy and Security (Philadelphia, PA, USA) (SOUPS \u201924). USENIX Association, USA, Article 33, 20\u00a0pages."},{"key":"e_1_3_3_3_98_2","series-title":"(SOUPS \u201915)","first-page":"309","volume-title":"Proceedings of the Eleventh Symposium on Usable Privacy and Security","author":"Wash Rick","year":"2015","unstructured":"Rick Wash and Emilee Rader. 2015. Too much knowledge? security beliefs and protective behaviors among united states internet users. In Proceedings of the Eleventh Symposium on Usable Privacy and Security (Ottawa, Canada) (SOUPS \u201915). USENIX Association, USA, 309\u2013325."},{"key":"e_1_3_3_3_99_2","doi-asserted-by":"crossref","unstructured":"Monica\u00a0T Whitty and Tom Buchanan. 2016. The online dating romance scam: The psychological impact on victims\u2013both financial and non-financial. Criminology & Criminal Justice 16 2 (2016) 176\u2013194.","DOI":"10.1177\/1748895815603773"},{"key":"e_1_3_3_3_100_2","doi-asserted-by":"crossref","unstructured":"David Wicki-Birchler. 2020. The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime?International Cybersecurity Law Review 1 1 (2020) 63\u201372.","DOI":"10.1365\/s43439-020-00012-5"},{"key":"e_1_3_3_3_101_2","doi-asserted-by":"crossref","unstructured":"Michael Wilson Cassandra Cross Thomas Holt and Anastasia Powell. 2022. Police preparedness to respond to cybercrime in Australia: An analysis of individual and organizational capabilities. Journal of Criminology 55 4 (2022) 468\u2013494.","DOI":"10.1177\/26338076221123080"},{"key":"e_1_3_3_3_102_2","doi-asserted-by":"crossref","unstructured":"Daniel Woods Ioannis Agrafiotis Jason\u00a0RC Nurse and Sadie Creese. 2017. Mapping the coverage of security controls in cyber insurance proposal forms. Journal of Internet Services and Applications 8 1 (2017) 8.","DOI":"10.1186\/s13174-017-0059-y"},{"key":"e_1_3_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714202"},{"key":"e_1_3_3_3_104_2","first-page":"429","volume-title":"30th USENIX security Symposium (USENIX Security 21)","author":"Zou Yixin","year":"2021","unstructured":"Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy. 2021. The role of computer security customer support in helping survivors of intimate partner violence. In 30th USENIX security Symposium (USENIX Security 21). USENIX Association, virtual event, 429\u2013446."},{"key":"e_1_3_3_3_105_2","series-title":"(SOUPS \u201918)","first-page":"197","volume-title":"Proceedings of the Fourteenth Symposium on Usable Privacy and Security","author":"Zou Yixin","year":"2018","unstructured":"Yixin Zou, Abraham\u00a0H. Mhaidli, Austin McCall, and Florian Schaub. 2018. \"I\u2019ve got nothing to lose\": consumers\u2019 risk perceptions and protective actions after the equifax data breach. In Proceedings of the Fourteenth Symposium on Usable Privacy and Security (Baltimore, MD, USA) (SOUPS \u201918). USENIX Association, USA, 197\u2013216."}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3791486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T07:16:38Z","timestamp":1776064598000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3791486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":104,"alternative-id":["10.1145\/3772318.3791486","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3791486","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}