{"id":"https://openalex.org/W3011164067","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035361","title":"Information Security Risk Communication: A User-Centric Approach","display_name":"Information Security Risk Communication: A User-Centric Approach","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3011164067","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035361","mag":"3011164067"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa47632.2019.9035361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworkspost2013/8141","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091572261","display_name":"Manal Alohali","orcid":null},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Manal Alohali","raw_affiliation_strings":["College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029670131","display_name":"Nathan Clarke","orcid":"https://orcid.org/0000-0002-3595-3800"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU","GB"],"is_corresponding":false,"raw_author_name":"Nathan Clarke","raw_affiliation_strings":["Centre for Security, Communications and Network Research, Plymouth University, United Kingdom","Security Research Institute, Edith Cowan University, Western Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Security, Communications and Network Research, Plymouth University, United Kingdom","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"Security Research Institute, Edith Cowan University, Western Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033160778","display_name":"Steven Furnell","orcid":"https://orcid.org/0000-0003-0984-7542"},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["AU","GB","ZA"],"is_corresponding":false,"raw_author_name":"Steven Furnell","raw_affiliation_strings":["Centre for Research in Information and Cyber Security, School of ICT, Nelson Mandela University, South Africa","Centre for Security, Communications and Network Research, Plymouth University, United Kingdom","Security Research Institute, Edith Cowan University, Western Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Research in Information and Cyber Security, School of ICT, Nelson Mandela University, South Africa","institution_ids":["https://openalex.org/I99712911"]},{"raw_affiliation_string":"Centre for Security, Communications and Network Research, Plymouth University, United Kingdom","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"Security Research Institute, Edith Cowan University, Western Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091572261"],"corresponding_institution_ids":["https://openalex.org/I106778892"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31737672,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9553999900817871,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7676104307174683},{"id":"https://openalex.org/keywords/salient","display_name":"Salient","score":0.6553564667701721},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6366897821426392},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5042208433151245},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.46318578720092773},{"id":"https://openalex.org/keywords/user-information","display_name":"User information","score":0.43180084228515625},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40314823389053345},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.2099553942680359},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10860717296600342},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10545110702514648}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7676104307174683},{"id":"https://openalex.org/C2780719617","wikidata":"https://www.wikidata.org/wiki/Q1030752","display_name":"Salient","level":2,"score":0.6553564667701721},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6366897821426392},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5042208433151245},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.46318578720092773},{"id":"https://openalex.org/C2777622855","wikidata":"https://www.wikidata.org/wiki/Q7901844","display_name":"User information","level":3,"score":0.43180084228515625},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40314823389053345},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.2099553942680359},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10860717296600342},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10545110702514648},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/aiccsa47632.2019.9035361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-9147","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/8141","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},{"id":"mag:3041631526","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002238870364488","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-9147","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/8141","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1507209377","https://openalex.org/W1546338006","https://openalex.org/W1584270256","https://openalex.org/W1966004842","https://openalex.org/W1982182878","https://openalex.org/W2016388989","https://openalex.org/W2017836055","https://openalex.org/W2022259081","https://openalex.org/W2040517709","https://openalex.org/W2051297451","https://openalex.org/W2070801556","https://openalex.org/W2075080680","https://openalex.org/W2087927558","https://openalex.org/W2122988682","https://openalex.org/W2146500626","https://openalex.org/W2406775074","https://openalex.org/W2782893299","https://openalex.org/W2783084910","https://openalex.org/W2801894056","https://openalex.org/W2805749331","https://openalex.org/W2900404761","https://openalex.org/W6634954595"],"related_works":["https://openalex.org/W2329500892","https://openalex.org/W28991112","https://openalex.org/W2370726991","https://openalex.org/W2369710579","https://openalex.org/W4327728159","https://openalex.org/W4394266730","https://openalex.org/W1990856605","https://openalex.org/W2053783616","https://openalex.org/W118448456","https://openalex.org/W2596305496"],"abstract_inverted_index":{"Users":[0],"have":[1],"difficulties":[2],"in":[3,89,110,122,145,163],"understanding":[4],"and":[5,39,69,92,156],"reacting":[6],"to":[7,14,20,24,35,42,57,75,106,130,165,173],"security-related":[8,112],"threats.":[9],"Moreover,":[10],"users":[11,72,155,168],"only":[12],"try":[13],"protect":[15],"themselves":[16],"from":[17],"risks":[18,88],"salient":[19],"them.":[21],"In":[22],"contrast":[23],"the":[25,51,67,76,79,108,139,151,158],"traditional":[26],"one-message/one-size-fits-all":[27],"approach":[28,41,85,103,160,172],"when":[29],"communicating":[30,174],"risks,":[31],"this":[32],"paper":[33],"aims":[34],"propose":[36],"an":[37,123],"individualized":[38,124],"persuasive":[40],"information":[43,175],"security":[44,62,176],"risk":[45,119,148],"communication":[46],"that":[47,70,86],"goes":[48],"beyond":[49],"alerting":[50],"user":[52,68,109],"of":[53,61],"his":[54,118],"insecure":[55],"behavior":[56,121],"providing":[58],"a":[59,82,90,96,133,170],"level":[60],"education.":[63],"By":[64],"focusing":[65],"on":[66],"different":[71],"react":[73],"differently":[74],"same":[77,152],"stimuli,":[78],"authors":[80],"proposed":[81,97,140,159],"targeted":[83],"user-centric":[84,102],"communicates":[87],"timely":[91],"continuous":[93],"manner":[94],"using":[95],"gradual":[98],"response":[99,134],"mechanism.":[100],"This":[101,142],"is":[104,128,136,149,161],"anticipated":[105],"help":[107],"making":[111],"decisions":[113],"by":[114],"educating":[115],"him":[116],"about":[117],"taking":[120],"way.":[125],"A":[126],"scenario":[127],"assumed":[129],"demonstrate":[131],"how":[132,147,157],"decision":[135],"made":[137],"within":[138],"approach.":[141],"was":[143],"useful":[144],"demonstrating":[146],"not":[150],"for":[153],"all":[154],"effective":[162],"adapting":[164],"differences":[166],"between":[167],"offering":[169],"novel":[171],"risks.":[177]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
