{"id":"https://openalex.org/W7125473693","doi":"https://doi.org/10.1145/3772318.3791486","title":"From Harm to Healing: Understanding Individual Resilience after Cybercrimes","display_name":"From Harm to Healing: Understanding Individual Resilience after Cybercrimes","publication_year":2026,"publication_date":"2026-04-13","ids":{"openalex":"https://openalex.org/W7125473693","doi":"https://doi.org/10.1145/3772318.3791486"},"language":null,"primary_location":{"id":"doi:10.1145/3772318.3791486","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772318.3791486","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3772318.3791486","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021272333","display_name":"X. J. Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Xiaowei Chen","raw_affiliation_strings":["Max Planck Insititute for Security and Privacy, Bochum, Germany"],"raw_orcid":"https://orcid.org/0000-0003-0794-1551","affiliations":[{"raw_affiliation_string":"Max Planck Insititute for Security and Privacy, Bochum, Germany","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102540504","display_name":"Mindy Tran","orcid":null},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mindy Tran","raw_affiliation_strings":["Max Planck Insititute for Security and Privacy, Bochum, Germany"],"raw_orcid":"https://orcid.org/0009-0000-1601-8588","affiliations":[{"raw_affiliation_string":"Max Planck Insititute for Security and Privacy, Bochum, Germany","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123656373","display_name":"Yue Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yue Deng","raw_affiliation_strings":["The Hong Kong University of Science and Technology, Hong Kong, China"],"raw_orcid":"https://orcid.org/0009-0008-5339-8792","affiliations":[{"raw_affiliation_string":"The Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021014892","display_name":"Bhupendra Acharya","orcid":"https://orcid.org/0009-0005-3663-152X"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bhupendra Acharya","raw_affiliation_strings":["University of Louisiana, Lafayette, Louisiana, USA"],"raw_orcid":"https://orcid.org/0009-0005-3663-152X","affiliations":[{"raw_affiliation_string":"University of Louisiana, Lafayette, Louisiana, USA","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123479621","display_name":"Yixin Zou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Yixin Zou","raw_affiliation_strings":["Max Planck Institute for Security and Privacy, Bochum, Germany"],"raw_orcid":"https://orcid.org/0000-0002-9088-705X","affiliations":[{"raw_affiliation_string":"Max Planck Institute for Security and Privacy, Bochum, Germany","institution_ids":["https://openalex.org/I4210096592"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021272333"],"corresponding_institution_ids":["https://openalex.org/I4210096592"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.10006875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.1665000021457672,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.1665000021457672,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.1273999959230423,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11761","display_name":"Resilience and Mental Health","score":0.12060000002384186,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8564000129699707},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.7476999759674072},{"id":"https://openalex.org/keywords/conceptualization","display_name":"Conceptualization","score":0.6712999939918518},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5827000141143799},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5428000092506409},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4546000063419342},{"id":"https://openalex.org/keywords/psychological-resilience","display_name":"Psychological resilience","score":0.43779999017715454}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8564000129699707},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.7476999759674072},{"id":"https://openalex.org/C90734943","wikidata":"https://www.wikidata.org/wiki/Q17008777","display_name":"Conceptualization","level":2,"score":0.6712999939918518},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5827000141143799},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5428000092506409},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5371999740600586},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4546000063419342},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.44269999861717224},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.43779999017715454},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4237000048160553},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.41280001401901245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4075999855995178},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.35339999198913574},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.34880000352859497},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3443000018596649},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.3312000036239624},{"id":"https://openalex.org/C2778087770","wikidata":"https://www.wikidata.org/wiki/Q2297111","display_name":"Social support","level":2,"score":0.33059999346733093},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.3206999897956848},{"id":"https://openalex.org/C526869908","wikidata":"https://www.wikidata.org/wiki/Q3298118","display_name":"Suicide prevention","level":3,"score":0.2612000107765198},{"id":"https://openalex.org/C166735990","wikidata":"https://www.wikidata.org/wiki/Q1750812","display_name":"Human factors and ergonomics","level":3,"score":0.25940001010894775}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3772318.3791486","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772318.3791486","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2601.16050","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2601.16050","pdf_url":"https://arxiv.org/pdf/2601.16050","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:doi:10.48550/arxiv.2601.16050","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1145/3772318.3791486","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772318.3791486","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5919553637504578,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G18682879","display_name":null,"funder_award_id":"390781972","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"How":[0],"do":[1],"individuals":[2],"recover":[3,106],"from":[4,49],"cybercrimes?":[5],"Victims":[6],"experience":[7],"various":[8,70],"types":[9],"of":[10,76,132,147],"harm":[11],"after":[12],"cybercrimes,":[13],"including":[14],"monetary":[15],"loss,":[16],"data":[17],"breaches,":[18],"negative":[19],"emotions,":[20],"and":[21,32,66,78,92,113,139],"even":[22],"psychological":[23],"trauma.":[24],"The":[25],"aspects":[26],"that":[27],"support":[28,91,125],"their":[29,107],"recovery":[30],"process":[31],"contribute":[33,117],"to":[34,72,82,105,118,142],"individual":[35,133],"cyber":[36,120,134],"resilience":[37],"remain":[38],"underinvestigated.":[39],"To":[40],"address":[41,143],"this":[42],"gap,":[43],"we":[44,136],"interviewed":[45],"18":[46],"cybercrime":[47,77,127],"victims":[48,102],"Western":[50],"Europe":[51],"using":[52],"a":[53],"trauma-informed":[54,124],"approach.":[55],"We":[56,122],"identified":[57],"four":[58],"common":[59],"stages":[60],"following":[61],"victimization:":[62],"recognition,":[63],"coping,":[64,96],"processing,":[65],"recovery.":[67,84],"Participants":[68],"adopted":[69],"strategies":[71,141],"mitigate":[73],"the":[74,144],"impact":[75],"used":[79],"different":[80],"indicators":[81],"describe":[83],"While":[85],"they":[86],"mostly":[87],"relied":[88],"on":[89],"social":[90],"self-regulation":[93],"for":[94,126],"emotional":[95],"service":[97],"providers":[98],"largely":[99],"determined":[100],"whether":[101],"were":[103],"able":[104],"money.":[108],"Internal":[109],"factors,":[110],"external":[111],"support,":[112],"context":[114],"sensitivity":[115],"collectively":[116],"individuals\u2019":[119],"resilience.":[121],"recommend":[123],"victims.":[128],"Extending":[129],"our":[130],"conceptualization":[131],"resilience,":[135],"propose":[137],"collaborative":[138],"context-sensitive":[140],"harmful":[145],"impacts":[146],"cybercrime.":[148]},"counts_by_year":[],"updated_date":"2026-04-14T06:08:25.285971","created_date":"2026-01-24T00:00:00"}
