{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:23:55Z","timestamp":1773548635452,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030503086","type":"print"},{"value":"9783030503093","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50309-3_3","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"32-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Does Decision-Making Style Predict Individuals\u2019 Cybersecurity Avoidance Behaviour?"],"prefix":"10.1007","author":[{"given":"Hamed","family":"Alqahtani","sequence":"first","affiliation":[]},{"given":"Manolya","family":"Kavakli-Thorne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"issue":"5","key":"3_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.31033\/ijemr.8.5.6","volume":"8","author":"H Alqahtani","year":"2018","unstructured":"Alqahtani, H., Kavakli, M., Sheikh, N.U.: Analysis of the technology acceptance theoretical model in examining users behavioural intention to use an augmented reality app (imap-campus). Int. J. Eng. Manag. Res. (IJEMR) 8(5), 37\u201349 (2018)","journal-title":"Int. J. Eng. Manag. Res. (IJEMR)"},{"key":"3_CR2","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1017\/S1930297500001455","volume":"6","author":"KC Appelt","year":"2011","unstructured":"Appelt, K.C., Milch, K.F., Handgraaf, M.J., Weber, E.U.: The decision making individual differences inventory and guidelines for the study of individual differences in judgment and decision-making research. Judgm. Decis. Mak. 6, 252\u2013262 (2011)","journal-title":"Judgm. Decis. Mak."},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.chb.2016.02.065","volume":"60","author":"NAG Arachchilage","year":"2016","unstructured":"Arachchilage, N.A.G., Love, S., Beznosov, K.: Phishing threat avoidance behaviour: an empirical investigation. Comput. Hum. Behav. 60, 185\u2013197 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"6p1","key":"3_CR4","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1037\/h0043445","volume":"64","author":"JW Atkinson","year":"1957","unstructured":"Atkinson, J.W.: Motivational determinants of risk-taking behavior. Psychol. Rev. 64(6p1), 359 (1957)","journal-title":"Psychol. Rev."},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1162\/pres.1997.6.4.355","volume":"6","author":"RT Azuma","year":"1997","unstructured":"Azuma, R.T.: A survey of augmented reality. Presence Teleop. Virt. Environ. 6(4), 355\u2013385 (1997)","journal-title":"Presence Teleop. Virt. Environ."},{"issue":"4","key":"3_CR6","doi-asserted-by":"publisher","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","volume":"39","author":"S Boss","year":"2015","unstructured":"Boss, S., Galletta, D., Lowry, P.B., Moody, G.D., Polak, P.: What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Q. (MISQ) 39(4), 837\u2013864 (2015)","journal-title":"MIS Q. (MISQ)"},{"key":"3_CR7","doi-asserted-by":"publisher","DOI":"10.4324\/9780203498187","volume-title":"Quantitative Data Analysis with SPSS 12 and 13: A Guide for Social Scientists","author":"A Bryman","year":"2004","unstructured":"Bryman, A., Cramer, D.: Quantitative Data Analysis with SPSS 12 and 13: A Guide for Social Scientists. Routledge, London (2004)"},{"key":"3_CR8","unstructured":"Chin, W.W.: Commentary: Issues and opinion on structural equation modeling (1998)"},{"issue":"3","key":"3_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1111\/1467-8721.ep10768783","volume":"1","author":"J Cohen","year":"1992","unstructured":"Cohen, J.: Statistical power analysis. Curr. Dir. Psychol. Sci. 1(3), 98\u2013101 (1992)","journal-title":"Curr. Dir. Psychol. Sci."},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319\u2013340 (1989)","journal-title":"MIS Q."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Denning, T., Lerner, A., Shostack, A., Kohno, T.: Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 915\u2013928. ACM (2013)","DOI":"10.1145\/2508859.2516753"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590. ACM (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Downs, J.S., Holbrook, M., Cranor, L.F.: Behavioral response to phishing risk. In: Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 37\u201344 (2007)","DOI":"10.1145\/1299015.1299019"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Egelman, S., Peer, E.: Scaling the security wall: developing a security behavior intentions scale (SeBIS). In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2873\u20132882 (2015)","DOI":"10.1145\/2702123.2702249"},{"key":"3_CR15","unstructured":"Filkins, B., Hardy, G.: It security spending trends. SANS (2016). https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/security-spending-trends-36697"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39\u201350 (1981)","journal-title":"J. Mark. Res."},{"issue":"1","key":"3_CR17","first-page":"7","volume":"4","author":"D Gefen","year":"2000","unstructured":"Gefen, D., Straub, D., Boudreau, M.C.: Structural equation modeling and regression: guidelines for research practice. Commun. Assoc. Inf. Syst. 4(1), 7 (2000)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.cose.2017.11.015","volume":"73","author":"M Gratian","year":"2018","unstructured":"Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A.: Correlating human traits and cyber security behavior intentions. Comput. Secur. 73, 345\u2013358 (2018)","journal-title":"Comput. Secur."},{"key":"3_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/9781118255803","volume-title":"Security 2020: Reduce security Risks This Decade","author":"D Howard","year":"2010","unstructured":"Howard, D., Prince, K.: Security 2020: Reduce security Risks This Decade. Wiley Publishing, Indianapolis (2010)"},{"issue":"4","key":"3_CR20","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s00779-016-0938-4","volume":"20","author":"D Jeske","year":"2016","unstructured":"Jeske, D., Briggs, P., Coventry, L.: Exploring the relationship between impulsivity and decision-making on mobile devices. Pers. Ubiquit. Comput. 20(4), 545\u2013557 (2016). https:\/\/doi.org\/10.1007\/s00779-016-0938-4","journal-title":"Pers. Ubiquit. Comput."},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Jin, G., Tu, M., Kim, T.H., Heffron, J., White, J.: Game based cybersecurity training for high school students. In: Proceedings of the 49th ACM Technical Symposium on Computer Science Education, pp. 68\u201373. ACM (2018)","DOI":"10.1145\/3159450.3159591"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Kassicieh, S., Lipinski, V., Seazzu, A.F.: Human centric cyber security: what are the new trends in data protection? In: 2015 Portland International Conference on Management of Engineering and Technology (PICMET), pp. 1321\u20131338. IEEE (2015)","DOI":"10.1109\/PICMET.2015.7273084"},{"issue":"2","key":"3_CR23","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2011.179","volume":"10","author":"I Kirlappos","year":"2011","unstructured":"Kirlappos, I., Sasse, M.A.: Security education against phishing: a modest proposal for a major rethink. IEEE Secur. Priv. 10(2), 24\u201332 (2011)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"3_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40497-019-0200-4","volume":"9","author":"BA Krasniqi","year":"2019","unstructured":"Krasniqi, B.A., Berisha, G., Pula, J.S.: Does decision-making style predict managers\u2019 entrepreneurial intentions? J. Glob. Entrepr. Res. 9(1), 1\u201315 (2019)","journal-title":"J. Glob. Entrepr. Res."},{"issue":"2","key":"3_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching johnny not to fall for phish. ACM Trans. Internet Technol. (TOIT) 10(2), 7 (2010)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"3_CR26","unstructured":"Li, C.Y., Ku, Y.C.: The effects of persuasive messages on system acceptance. In: PACIS, p. 110. Citeseer (2011)"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"71","DOI":"10.2307\/20650279","volume":"33","author":"H Liang","year":"2009","unstructured":"Liang, H., Xue, Y.: Avoidance of information technology threats: a theoretical perspective. MIS Q. 33, 71\u201390 (2009)","journal-title":"MIS Q."},{"key":"3_CR28","unstructured":"Mirkovic, J., Peterson, P.A.: Class capture-the-flag exercises. In: 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 2014) (2014)"},{"key":"3_CR29","unstructured":"Misra, G., Arachchilage, N.A.G., Berkovsky, S.: Phish phinder: a game design approach to enhance user confidence in mitigating phishing attacks. arXiv preprint arXiv:1710.06064 (2017)"},{"issue":"6","key":"3_CR30","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1016\/j.chb.2012.07.008","volume":"28","author":"N Mohamed","year":"2012","unstructured":"Mohamed, N., Ahmad, I.H.: Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput. Hum. Behav. 28(6), 2366\u20132375 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"3_CR31","unstructured":"Ng, B.Y., Xu, Y.: Studying users\u2019 computer security behavior using the health belief model. In: PACIS 2007 Proceedings, p. 45 (2007)"},{"issue":"1","key":"3_CR32","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change1. J. Psychol. 91(1), 93\u2013114 (1975)","journal-title":"J. Psychol."},{"issue":"4","key":"3_CR33","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1177\/109019817400200403","volume":"2","author":"IM Rosenstock","year":"1974","unstructured":"Rosenstock, I.M.: Historical origins of the health belief model. Health Educ. Monogr. 2(4), 328\u2013335 (1974)","journal-title":"Health Educ. Monogr."},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Scholefield, S., Shepherd, L.A.: Gamification techniques for raising cyber security awareness. arXiv preprint arXiv:1903.08454 (2019)","DOI":"10.1007\/978-3-030-22351-9_13"},{"issue":"5","key":"3_CR35","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1177\/0013164495055005017","volume":"55","author":"SG Scott","year":"1995","unstructured":"Scott, S.G., Bruce, R.A.: Decision-making style: the development and assessment of a new measure. Educ. Psychol. Measur. 55(5), 818\u2013831 (1995)","journal-title":"Educ. Psychol. Measur."},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Sheng, S., et al.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd symposium on Usable Privacy and Security, pp. 88\u201399. ACM (2007)","DOI":"10.1145\/1280680.1280692"},{"key":"3_CR37","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q. 20, 167\u2013196 (1996)","journal-title":"MIS Q."},{"issue":"2","key":"3_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17645\/pag.v6i2.1569","volume":"6","author":"T Stevens","year":"2018","unstructured":"Stevens, T.: Global cybersecurity: new directions in theory and methods. Politics Gov. 6(2), 1\u20134 (2018)","journal-title":"Politics Gov."},{"key":"3_CR39","unstructured":"Thompson, M.F., Irvine, C.E.: CyberCIEGE scenario design and implementation. In: 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 2014) (2014)"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Wen, Z.A., Lin, Z., Chen, R., Andersen, E.: What.Hack: engaging anti-phishing training through a role-playing phishing simulation game. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, p. 108. ACM (2019)","DOI":"10.1145\/3290605.3300338"},{"issue":"3","key":"3_CR41","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2010.58","volume":"8","author":"L Williams","year":"2010","unstructured":"Williams, L., Meneely, A., Shipley, G.: Protection poker: the new software security game. IEEE Secur. Priv. 8(3), 14\u201320 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"3_CR42","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.infsof.2017.12.002","volume":"95","author":"A Yasin","year":"2018","unstructured":"Yasin, A., Liu, L., Li, T., Wang, J., Zowghi, D.: Design and preliminary evaluation of a cyber security requirements education game (SREG). Inf. Softw. Technol. 95, 179\u2013200 (2018)","journal-title":"Inf. Softw. Technol."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50309-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:29:40Z","timestamp":1720571380000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50309-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503086","9783030503093"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50309-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}