{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:00:48Z","timestamp":1764997248578,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/acit-csii-bcd.2017.30","type":"proceedings-article","created":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T21:14:06Z","timestamp":1565039646000},"page":"29-34","source":"Crossref","is-referenced-by-count":9,"title":["A Concept Proposal on Modeling of Security Fatigue Level"],"prefix":"10.1109","author":[{"given":"Shigeaki","family":"Tanimoto","sequence":"first","affiliation":[]},{"given":"Keita","family":"Nagai","sequence":"additional","affiliation":[]},{"given":"Kenichiro","family":"Hata","sequence":"additional","affiliation":[]},{"given":"Takashi","family":"Hatashima","sequence":"additional","affiliation":[]},{"given":"Yasuhisa","family":"Sakamoto","sequence":"additional","affiliation":[]},{"given":"Atsushi","family":"Kanai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"91","volume":"98","year":"2008","journal-title":"Suzuki"},{"key":"ref11","first-page":"b19?124","article-title":"A Proposal of Slow Policy Level based on Cost-effectiveness of ISMS's Countermeasure","author":"hata","year":"0","journal-title":"Proceedings of the 9th International Conference on Project Management (ProMAC2015)"},{"key":"ref12","article-title":"Applying Cognitive Control Modes to Identify Security Fatigue Hotspots","author":"parkin","year":"2016","journal-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)"},{"key":"ref13","article-title":"Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users","author":"koppell","year":"2016","journal-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)"},{"key":"ref14","article-title":"Putting Your Passwords on Self-destruct Mode: Beating Password Fatigue","author":"sanchez","year":"2016","journal-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)"},{"journal-title":"The Maslach Burnout Inventory (3rd ed)","year":"1996","author":"maslach","key":"ref15"},{"journal-title":"Carnegie Mellon University CMMI","year":"0","key":"ref16"},{"journal-title":"Quality Management Systems - Requirements","year":"0","key":"ref17"},{"key":"ref4","article-title":"A study on a behavior model of mobile work with personal device","author":"hatashima","year":"2016","journal-title":"FIT (Forum on Information Technology)"},{"key":"ref3","first-page":"39","volume":"111","author":"kanaoka","year":"2011","journal-title":"Soko Soko Security Providing Appropriate Security in Required Level"},{"journal-title":"Can Cause Computer Users to Feel Hopeless and Act Recklessly New Study Suggests","article-title":"Security Fatigue","year":"2016","key":"ref6"},{"key":"ref5","first-page":"648","article-title":"Security Countermeasures Selection Technique Considering Workload","volume":"51","author":"shibaguchi","year":"2010","journal-title":"IPSJ Journal"},{"journal-title":"The number transition of ISMS authentication acquisition organizations","year":"2013","key":"ref8"},{"key":"ref7","first-page":"17","article-title":"Burnout model and Project management","volume":"11","author":"itakura","year":"2009","journal-title":"The Society of Project Management"},{"key":"ref2","first-page":"129","volume":"111","author":"hirano","year":"2011","journal-title":"Secure and Effective Password Management System"},{"journal-title":"Information technology - security techniques - code of practice for information security management","year":"0","key":"ref1"},{"journal-title":"Security damage investigation workgroup The investigation report on an information security incident","year":"2012","key":"ref9"}],"event":{"name":"2017 5th Intl Conf on Applied Computing and Information Technology\/4th Intl Conf on Computational Science\/Intelligence and Applied Informatics\/2nd Intl Conf on Big Data, Cloud Computing, Data Science (ACIT-CSII-BCD)","start":{"date-parts":[[2017,7,9]]},"location":"Hamamatsu, Japan","end":{"date-parts":[[2017,7,13]]}},"container-title":["2017 5th Intl Conf on Applied Computing and Information Technology\/4th Intl Conf on Computational Science\/Intelligence and Applied Informatics\/2nd Intl Conf on Big Data, Cloud Computing, Data Science (ACIT-CSII-BCD)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8770365\/8786994\/08787184.pdf?arnumber=8787184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T20:56:12Z","timestamp":1566852972000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/8787184\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":17,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/acit-csii-bcd.2017.30","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}