{"id":"https://openalex.org/W4378894634","doi":"https://doi.org/10.1108/ics-03-2023-0032","title":"Smart home cybersecurity awareness and behavioral incentives","display_name":"Smart home cybersecurity awareness and behavioral incentives","publication_year":2023,"publication_date":"2023-05-31","ids":{"openalex":"https://openalex.org/W4378894634","doi":"https://doi.org/10.1108/ics-03-2023-0032"},"language":"en","primary_location":{"id":"doi:10.1108/ics-03-2023-0032","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-03-2023-0032","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022286579","display_name":"N\u2019guessan Yves-Roland Douha","orcid":"https://orcid.org/0000-0002-6131-6872"},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"N\u2019guessan Yves-Roland Douha","raw_affiliation_strings":["Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Japan","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035796880","display_name":"Karen Renaud","orcid":"https://orcid.org/0000-0002-7187-6531"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Karen Renaud","raw_affiliation_strings":["Department of Computer and Information Sciences, University of Strathclyde, Glasgow, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, University of Strathclyde, Glasgow, UK","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110510380","display_name":"Yuzo Taenaka","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuzo Taenaka","raw_affiliation_strings":["Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Japan","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084740320","display_name":"Youki Kadobayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Youki Kadobayashi","raw_affiliation_strings":["Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Japan","institution_ids":["https://openalex.org/I75917431"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022286579"],"corresponding_institution_ids":["https://openalex.org/I75917431"],"apc_list":null,"apc_paid":null,"fwci":11.0511,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.98350185,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"31","issue":"5","first_page":"545","last_page":"575"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.7586421370506287},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.6268153190612793},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6085910797119141},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5108878016471863},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5023019313812256},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5001091957092285},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4649907946586609},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.44360560178756714},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.3582782745361328},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.3238176703453064},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.30167800188064575},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.28286486864089966},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.15952569246292114},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1562613844871521},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.08189976215362549}],"concepts":[{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.7586421370506287},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.6268153190612793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6085910797119141},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5108878016471863},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5023019313812256},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5001091957092285},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4649907946586609},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.44360560178756714},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3582782745361328},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.3238176703453064},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30167800188064575},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.28286486864089966},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.15952569246292114},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1562613844871521},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.08189976215362549},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1108/ics-03-2023-0032","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-03-2023-0032","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:strathprints.strath.ac.uk:85394","is_oa":false,"landing_page_url":"https://strathprints.strath.ac.uk/view/author/1324853.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4306402226","display_name":"Strathprints: The University of Strathclyde institutional repository (University of Strathclyde)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I181647926","host_organization_name":"University of Strathclyde","host_organization_lineage":["https://openalex.org/I181647926"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1488572223","https://openalex.org/W1978860163","https://openalex.org/W2045784505","https://openalex.org/W2105992541","https://openalex.org/W2130922150","https://openalex.org/W2133535394","https://openalex.org/W2146868725","https://openalex.org/W2211083916","https://openalex.org/W2330983506","https://openalex.org/W2610939075","https://openalex.org/W2740252643","https://openalex.org/W2886653580","https://openalex.org/W2896396724","https://openalex.org/W2911342520","https://openalex.org/W2914400092","https://openalex.org/W2924939894","https://openalex.org/W2937220280","https://openalex.org/W2977630035","https://openalex.org/W3043737462","https://openalex.org/W3131875570","https://openalex.org/W3172572707","https://openalex.org/W3203875322","https://openalex.org/W3206277248","https://openalex.org/W3212746345","https://openalex.org/W4210947630","https://openalex.org/W4252136409","https://openalex.org/W4294707301","https://openalex.org/W4384948686"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2544387082","https://openalex.org/W2968709340","https://openalex.org/W2099222119","https://openalex.org/W2888935944"],"abstract_inverted_index":{"Purpose":[0],"Smart-home":[1],"security":[2,5,175],"involves":[3],"multilayered":[4],"challenges":[6],"related":[7],"to":[8,29,53,106,143,202,222,227,234,241,262],"smart-home":[9,24,40,63,95,159,190,210,218,260,275],"devices,":[10],"networks,":[11],"mobile":[12],"applications,":[13],"cloud":[14],"servers":[15],"and":[16,46,70,84,122,125,147,153,183,225,233,238,279],"users.":[17,25,160,191,211],"However,":[18],"very":[19],"few":[20],"studies":[21],"focus":[22],"on":[23,114,177],"This":[26,163],"paper":[27,214,250,270],"aims":[28],"fill":[30],"this":[31,77],"gap":[32],"by":[33],"investigating":[34],"the":[35,66,87,115,141,178,193,249,269,280],"potential":[36,149],"interests":[37],"of":[38,61,68,117,180,206],"adult":[39,94,217,259],"users":[41,64,219,261,276],"in":[42,108,198,229,243,277],"cybersecurity":[43,56,109,118,136,155,185,207,230,264],"awareness":[44,110,186,231],"training":[45,119,187,232],"nonfinancial":[47,129,200,254],"rewards":[48,130],"that":[49,157,256],"may":[50,195,257],"encourage":[51,203,235],"them":[52],"adopt":[54,263],"sound":[55],"practices.":[57],"Design/methodology/approach":[58],"A":[59],"total":[60],"423":[62],"between":[65],"ages":[67],"25":[69],"64":[71],"completed":[72],"a":[73],"survey":[74],"questionnaire":[75],"for":[76,120,128,134,173,189],"study,":[78],"with":[79],"224":[80],"participants":[81],"from":[82,86],"Japan":[83,278],"199":[85],"UK.":[88,281],"Findings":[89],"Cultural":[90],"factors":[91],"considerably":[92],"influence":[93],"users\u2019":[96],"attitudes":[97],"toward":[98],"cybersecurity.":[99],"Specifically,":[100],"cultural":[101,145],"differences":[102,146,273],"impact":[103,150],"their":[104,112,126,148,236],"willingness":[105],"participate":[107,242],"training,":[111,244],"views":[113],"importance":[116,179],"children":[121,237],"senior":[123],"citizens":[124],"preference":[127],"as":[131,245],"an":[132],"incentive":[133],"good":[135],"behavior.":[137],"These":[138],"results":[139],"highlight":[140],"need":[142],"consider":[144],"when":[151],"developing":[152],"implementing":[154],"programs":[156,188],"target":[158],"Practical":[161],"implications":[162],"research":[164],"has":[165],"two":[166],"main":[167],"implications.":[168],"First,":[169],"it":[170],"provides":[171],"insights":[172],"information":[174],"professionals":[176],"designing":[181],"cost-effective":[182],"time-efficient":[184],"Second,":[192],"findings":[194],"assist":[196],"governments":[197],"establishing":[199],"incentives":[201],"greater":[204],"uptake":[205],"practices":[208],"among":[209,274],"Originality/value":[212],"The":[213],"investigates":[215],"whether":[216],"are":[220],"willing":[221],"spend":[223],"time":[224],"money":[226],"engage":[228],"elderly":[239],"parents":[240],"well.":[246],"In":[247],"addition,":[248],"examines":[251],"incentives,":[252],"especially":[253],"rewards,":[255],"motivate":[258],"behaviors":[265],"at":[266],"home.":[267],"Furthermore,":[268],"analyses":[271],"demographic":[272]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":9}],"updated_date":"2026-05-11T08:15:01.531666","created_date":"2025-10-10T00:00:00"}
