{"id":"https://openalex.org/W3157401358","doi":"https://doi.org/10.1145/3412841.3442103","title":"Behavior control-based approach to influencing user's cybersecurity actions using mobile news app","display_name":"Behavior control-based approach to influencing user's cybersecurity actions using mobile news app","publication_year":2021,"publication_date":"2021-03-22","ids":{"openalex":"https://openalex.org/W3157401358","doi":"https://doi.org/10.1145/3412841.3442103","mag":"3157401358"},"language":"en","primary_location":{"id":"doi:10.1145/3412841.3442103","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3412841.3442103","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 36th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103266472","display_name":"Vincent Lombardi","orcid":"https://orcid.org/0000-0002-5748-9383"},"institutions":[{"id":"https://openalex.org/I119888943","display_name":"Gonzaga University","ror":"https://ror.org/03ze70h02","country_code":"US","type":"education","lineage":["https://openalex.org/I119888943"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vincent Lombardi","raw_affiliation_strings":["Gonzaga University"],"affiliations":[{"raw_affiliation_string":"Gonzaga University","institution_ids":["https://openalex.org/I119888943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058367262","display_name":"Sarah Ortiz","orcid":null},"institutions":[{"id":"https://openalex.org/I141670070","display_name":"Willamette University","ror":"https://ror.org/04g9e0f44","country_code":"US","type":"education","lineage":["https://openalex.org/I141670070"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sarah Ortiz","raw_affiliation_strings":["Willamette University"],"affiliations":[{"raw_affiliation_string":"Willamette University","institution_ids":["https://openalex.org/I141670070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046694689","display_name":"Jen Phifer","orcid":null},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jen Phifer","raw_affiliation_strings":["New Mexico Tech"],"affiliations":[{"raw_affiliation_string":"New Mexico Tech","institution_ids":["https://openalex.org/I207123951"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tomas Cerny","orcid":null},"institutions":[{"id":"https://openalex.org/I157394403","display_name":"Baylor University","ror":"https://ror.org/005781934","country_code":"US","type":"education","lineage":["https://openalex.org/I157394403"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tomas Cerny","raw_affiliation_strings":["Baylor University"],"affiliations":[{"raw_affiliation_string":"Baylor University","institution_ids":["https://openalex.org/I157394403"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059068557","display_name":"Dongwan Shin","orcid":"https://orcid.org/0000-0002-2151-3986"},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongwan Shin","raw_affiliation_strings":["New Mexico Tech"],"affiliations":[{"raw_affiliation_string":"New Mexico Tech","institution_ids":["https://openalex.org/I207123951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103266472"],"corresponding_institution_ids":["https://openalex.org/I119888943"],"apc_list":null,"apc_paid":null,"fwci":1.4194,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.8508118,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"912","last_page":"915"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7629069089889526},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.7189143896102905},{"id":"https://openalex.org/keywords/theory-of-planned-behavior","display_name":"Theory of planned behavior","score":0.578288197517395},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5705589056015015},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49779820442199707},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4861857295036316},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.47315558791160583},{"id":"https://openalex.org/keywords/context-awareness","display_name":"Context awareness","score":0.4635097086429596},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4082205593585968},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40342018008232117},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08136710524559021}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7629069089889526},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.7189143896102905},{"id":"https://openalex.org/C89785696","wikidata":"https://www.wikidata.org/wiki/Q2290753","display_name":"Theory of planned behavior","level":3,"score":0.578288197517395},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5705589056015015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49779820442199707},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4861857295036316},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.47315558791160583},{"id":"https://openalex.org/C2781368080","wikidata":"https://www.wikidata.org/wiki/Q501688","display_name":"Context awareness","level":3,"score":0.4635097086429596},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4082205593585968},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40342018008232117},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08136710524559021},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3412841.3442103","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3412841.3442103","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 36th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4000000059604645,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2026843999","https://openalex.org/W2099697766","https://openalex.org/W2186340909","https://openalex.org/W2293627955","https://openalex.org/W2754794588","https://openalex.org/W2759725717","https://openalex.org/W2898400520","https://openalex.org/W2943702062","https://openalex.org/W4235678817","https://openalex.org/W4241720604"],"related_works":["https://openalex.org/W3021563500","https://openalex.org/W2481089422","https://openalex.org/W4237591271","https://openalex.org/W4400865353","https://openalex.org/W2948184250","https://openalex.org/W4321373331","https://openalex.org/W2890271786","https://openalex.org/W4281614306","https://openalex.org/W4293083150","https://openalex.org/W2808363712"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,47],"propose":[4],"that":[5,54,98],"the":[6,13,88],"theory":[7],"of":[8,16,66,85],"planned":[9],"behavior":[10],"(TPB)":[11],"with":[12],"additional":[14],"factors":[15],"awareness":[17,80,104],"and":[18,38,63,74,94],"context-based":[19,56,99],"information":[20,57,65,100],"can":[21],"be":[22],"used":[23],"to":[24,77],"positively":[25,101],"influence":[26],"users'":[27,103],"cybersecurity":[28,51],"behavior.":[29],"A":[30],"research":[31,90],"model":[32,91],"based":[33],"on":[34],"TPB":[35],"is":[36],"developed":[37,48],"validated":[39],"using":[40],"a":[41,45,49,83],"user":[42,79],"study.":[43],"As":[44],"proof-of-concept,":[46],"mobile":[50,68],"news":[52],"app":[53],"incorporates":[55],"such":[58],"as":[59],"location,":[60],"search":[61],"history,":[62],"usage":[64],"other":[67],"apps":[69],"into":[70],"its":[71],"article":[72],"recommendations":[73],"warning":[75],"notifications":[76],"address":[78],"better.":[81],"Through":[82],"survey":[84],"100":[86],"participants,":[87],"proposed":[89],"was":[92,96],"validated,":[93],"it":[95],"confirmed":[97],"influences":[102],"in":[105],"cybersecurity.":[106]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
