{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T22:23:04Z","timestamp":1770502984815,"version":"3.49.0"},"publisher-location":"Boston, MA","reference-count":29,"publisher":"Springer US","isbn-type":[{"value":"9780387481364","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-48137-1_10","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T12:33:31Z","timestamp":1196512411000},"page":"177-191","source":"Crossref","is-referenced-by-count":5,"title":["Individual\u2019s Response to Security Messages: A Decision-Making Perspective"],"prefix":"10.1007","author":[{"given":"Tang","family":"Qing","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Boon-Yuen","family":"Ng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Atreyi","family":"Kankanhalli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1146\/annurev.psych.52.1.27","volume":"52","author":"I. Ajzen","year":"2001","unstructured":"Ajzen, I.: Nature and Operation of Attitudes, Annual Review of Psychology, Vol. 52 (2001) 27\u201358","journal-title":"Annual Review of Psychology"},{"key":"10_CR2","first-page":"284","volume-title":"Psychology: A Study of Science","author":"D.E. Berlyne","year":"1963","unstructured":"Berlyne, D.E.: Motivational Problems Raised by Exploratory and Epistemic Behavior. In: Psychology: A Study of Science (5), New York: McGraw-Hill (1963) 284\u2013364"},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1207\/s15327752jpa4803_13","volume":"48","author":"J.T. Cacioppo","year":"1984","unstructured":"Cacioppo, J.T., Petty, R.E., and Chuan, F.K.: The Efficient Assessment of Need for Cognition, Journal of Personality Assessment, Vol. 48:3 (1984) 306\u2013307","journal-title":"Journal of Personality Assessment"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1037\/0022-3514.45.4.805","volume":"45","author":"J.T. Cacioppo","year":"1983","unstructured":"Cacioppo, J.T., Petty, R.E., and Morris, K.J.: Effects of Need for Cognition on Message Evaluation, Recall, and Persuasion, Journal of Personality and Social Psychology, Vol. 45 (1983) 805\u2013818","journal-title":"Journal of Personality and Social Psychology"},{"key":"10_CR5","first-page":"3","volume-title":"Social Influence: The Ontario Symposium","author":"S. Chaiken","year":"1987","unstructured":"Chaiken, S.: The Heuristic Model of Persuasion. In: Social Influence: The Ontario Symposium, M.P. Zanna, J.M. Olson, and C.P. Herman (eds.), Vol. 5, Hillsdale: Erlbaum, (1987) 3\u201339"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/S0148-2963(99)00078-8","volume":"53","author":"J.C. Chebat","year":"2001","unstructured":"Chebat, J.C., Charlebois, M., and Gelinas-Chebat, C.: What Makes Open vs. Closed Conclusion Advertisements More Persuasive? The Moderating Role of Prior Knowledge and Involvement, Journal of Business Research, Vol. 53 (2001) 93\u2013102","journal-title":"Journal of Business Research"},{"key":"10_CR7","first-page":"353","volume":"19","author":"J.C. Chebat","year":"1992","unstructured":"Chebat, J.C., Laroche, M., Baddoura, D., and Filiatrault, P.: Effects of Source Likeability on Attitude Change through Message Repetition, Advances in Consumer Research, Vol. 19 (1992) 353\u2013357","journal-title":"Advances in Consumer Research"},{"key":"10_CR8","volume-title":"Readings in Attitude Change","author":"A.H. Eagly","year":"1974","unstructured":"Eagly, A.H. and Himmelfarb, S.: Current Trends in Attitude Theory and Research. In: Readings in Attitude Change, S. Himmelfarb and A. Eagly (eds.), Wiley, New York (1974)"},{"key":"10_CR9","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., and Richardson, R.: 2005 CSI\/FBI Computer Crime and Security Survey, Computer Security Institute, July 2005, Accessed 8 May 2006. http:\/\/www.gocsi.com\/forms\/fbi\/csi_fbi_survey.jhtml."},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0268-4012(02)00105-6","volume":"23","author":"A. Kankanhalli","year":"2003","unstructured":"Kankanhalli, A., Teo, H.H., Tan, B.C.Y., and Wei, K.K.: An Integrative Study of Information Systems Security Effectiveness, International Journal of Information Management, Vol. 23 (2003) 139\u2013154","journal-title":"International Journal of Information Management"},{"key":"10_CR11","volume-title":"Decision Support Systems: An Organizational Perspective","author":"P.G.W. Keen","year":"1978","unstructured":"Keen, P.G.W. and Scott Morton, M.S.: Decision Support Systems: An Organizational Perspective, Addison-Wesley, Reading, Mass. (1978)"},{"key":"10_CR12","volume-title":"Design and Analysis: A Researcher\u2019s Handbook","author":"G. Keppel","year":"1993","unstructured":"Keppel, G.: Design and Analysis: A Researcher\u2019s Handbook (3rd Ed.). Prentice Hall, New Jersey (1993)","edition":"3rd Ed."},{"key":"10_CR13","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1080\/02650487.2002.11104924","volume":"21","author":"M. Laroche","year":"2002","unstructured":"Laroche, M., Cleveland, M., and Maravelakis, I.: Attitude Accessibility, Certainty and the Attitude-Behavior Relationship: An Empirical Study of Ad Repetition and Competitive Interference Effects, International Journal of Advertising, Vol. 21 (2002) 149\u2013174","journal-title":"International Journal of Advertising"},{"issue":"3","key":"10_CR14","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1287\/isre.2.3.192","volume":"2","author":"G.C. Moore","year":"1991","unstructured":"Moore, G.C. and Benbasat, I.: Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research, Vol. 2:3 (1991) 173\u2013191","journal-title":"Information Systems Research"},{"issue":"1","key":"10_CR15","first-page":"668","volume":"11","author":"R.E. Petty","year":"1984","unstructured":"Petty, R.E., and Cacioppo, J.T.; Source Factors and the Elaboration Likelihood Model of Persuasion, Advances in Consumer Research, Vol. 11:1 (1984) 668\u2013670","journal-title":"Advances in Consumer Research"},{"key":"10_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4964-1","volume-title":"Communication and Persuasion: Central and Peripheral Routes to Attitude Change","author":"R.E. Petty","year":"1986","unstructured":"Petty, R.E., and Cacioppo, J.T.: Communication and Persuasion: Central and Peripheral Routes to Attitude Change, Springer-Verlag, New York (1986)"},{"key":"10_CR17","unstructured":"Power, D.J.: A Brief History of Decision Support Systems. DSSResources.COM, World Wide Web, http:\/\/DSSResources.COM\/history\/dsshistory.html, version 2.8, May 33, (2003)"},{"key":"10_CR18","first-page":"52","volume":"38","author":"S. Ratneshwar","year":"1993","unstructured":"Ratneshwar, S., and Chaiken, S.: Comprehension\u2019s Role in Persuasion: The Case of Its Moderating Effect on the Persuasive Impact of Source Cues, Journal of Consumer Research, Vol. 38 (1993) 52\u201362","journal-title":"Journal of Consumer Research"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"M.A. Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, S., and Weirich, D.: Transforming the \u2018Weakest Link\u2019: A Human\/Computer Interaction Approach to Usable and Effective Security, BT Technology Journal, Vol. 19 (2001) 122\u2013131","journal-title":"BT Technology Journal"},{"issue":"2","key":"10_CR20","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1287\/mnsc.34.2.139","volume":"34","author":"R. Sharda","year":"1988","unstructured":"Sharda, R., Barr, S., and McDonnell, J.: Decision Support Systems Effectiveness: A Review and an Empirical Test, Management Science, Vol. 34:2 (1988) 139\u2013159","journal-title":"Management Science"},{"key":"10_CR21","volume-title":"Administrative Behavior","author":"H.A. Simon","year":"1997","unstructured":"Simon, H.A.: Administrative Behavior (4th Ed.). Free Press, New York (1997)","edition":"4th Ed."},{"issue":"1","key":"10_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"M.T. Siponen","year":"2000","unstructured":"Siponen, M.T.: A Conceptual Foundation for Organizational Information Security Awareness, Information Management and Computer Security, Vol. 8:1 (2000) 31\u201341","journal-title":"Information Management and Computer Security"},{"issue":"5","key":"10_CR23","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1108\/09685220010353178","volume":"8","author":"M.T. Siponen","year":"2000","unstructured":"Siponen, M.T.: Critical Analysis of Different Approaches to Minimizing User-Related Faults in Information Systems Security: Implications for Research and Practice, Information Management and Computer Security, Vol. 8:5 (2000) 197\u2013209","journal-title":"Information Management and Computer Security"},{"issue":"3","key":"10_CR24","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1287\/isre.1.3.255","volume":"1","author":"D. Straub","year":"1990","unstructured":"Straub, D.: Effective IS Security: An Empirical Study, Information Systems Research, Vol. 1:3 (1990) 255\u2013276","journal-title":"Information Systems Research"},{"issue":"4","key":"10_CR25","doi-asserted-by":"publisher","first-page":"441","DOI":"10.2307\/249551","volume":"22","author":"D. Straub","year":"1998","unstructured":"Straub, D., and Welke, R.: Coping with Systems Risk: Security Planning Models for Management Decision-Making, MIS Quarterly, Vol. 22:4 (1998) 441\u2013469","journal-title":"MIS Quarterly"},{"issue":"4","key":"10_CR26","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1108\/09685229810227649","volume":"6","author":"M.E. Thomson","year":"1998","unstructured":"Thomson, M.E., and Solms, R.V.: Information Security Awareness: Educating Your Users Effectively, Information Management and Computer Security, Vol. 6:4 (1998) 167\u2013173","journal-title":"Information Management and Computer Security"},{"key":"10_CR27","unstructured":"Todd, P., and Benbasat, I.: The Impact of Information Technology on Decision Making: A Cognitive Perspective. In: Framing the Domains of IT Management, R.W. Zmud (ed.), Pinnaflex Educational Resources (2000) 1\u201314"},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/0022-1031(85)90007-1","volume":"21","author":"W. Wood","year":"1985","unstructured":"Wood, W., Kallgren, C., and Preisler, R.M.: Access to Attitude-Relevant Information in Memory as a Determinant of Persuasion: The Role of Message Attributes, Journal of Experimental Social Psychology, Vol. 21 (1985) 73\u201385","journal-title":"Journal of Experimental Social Psychology"},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1086\/208520","volume":"12","author":"J.L. Zaichkowsky","year":"1985","unstructured":"Zaichkowsky, J.L.: Measuring the Involvement Construct, Journal of Consumer Research, Vol. 12 (1985) 341\u2013352","journal-title":"Journal of Consumer Research"}],"container-title":["Annals of Information Systems","Decision Support for Global Enterprises"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-48137-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T02:16:06Z","timestamp":1619576166000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-48137-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387481364"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-48137-1_10","relation":{},"subject":[]}}