{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T13:04:21Z","timestamp":1766754261478,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_22","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"337-352","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["It\u2019s Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6815-2938","authenticated-orcid":false,"given":"Brian","family":"Pickering","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2741-8127","authenticated-orcid":false,"given":"Costas","family":"Boletsis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3774-4287","authenticated-orcid":false,"given":"Ragnhild","family":"Halvorsrud","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7901-0839","authenticated-orcid":false,"given":"Stephen","family":"Phillips","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1485-7024","authenticated-orcid":false,"given":"Mike","family":"Surridge","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"22_CR1","first-page":"28","volume":"2","author":"C Abraham","year":"2005","unstructured":"Abraham, C., Sheeran, P.: The health belief model. Predict. Health Behav. 2, 28\u201380 (2005)","journal-title":"Predict. Health Behav."},{"issue":"2","key":"22_CR2","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"issue":"9","key":"22_CR3","first-page":"536","volume":"69","author":"S Bell","year":"2017","unstructured":"Bell, S., et al.: Cybersecurity is not just a \u2018big business\u2019 issue. Gov. Dir. 69(9), 536 (2017)","journal-title":"Gov. Dir."},{"key":"22_CR4","unstructured":"Blythe, J.: Cyber security in the workplace: understanding and promoting behaviour change. In: Proceedings of CHI taly 2013 Doctoral Consortium, vol. 1065, pp. 92\u2013101. CEUR Workshop Proceedings (2013)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Boletsis, C., Halvorsrud, R., Pickering, B., Phillips, S., Surridge, M.: Cybersecurity for SMEs: introducing the human element into socio-technical cybersecurity risk assessment. In: Proceedings of the IVAPP 2021 Conference, vol. to appear. Scitepress (2021)","DOI":"10.5220\/0010332902660274"},{"key":"22_CR6","unstructured":"Browne, S., Lang, M., Golden, W.: Linking threat avoidance and security adoption: A theoretical model for SMEs (2015)"},{"issue":"8","key":"22_CR7","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1080\/10410236.2010.521906","volume":"25","author":"CJ Carpenter","year":"2010","unstructured":"Carpenter, C.J.: A meta-analysis of the effectiveness of health belief model variables in predicting behavior. Health Commun. 25(8), 661\u2013669 (2010)","journal-title":"Health Commun."},{"key":"22_CR8","unstructured":"Champion, V.L., Skinner, C.S.: The health belief model. In: Glanz, K., Rimer, B.K., Viswanath, K. (eds.) Health Behavior and Health Education: Theory, Research, and Practice, pp. 45\u201365. John Wiley & Sons, 4th edn. (2008)"},{"key":"22_CR9","unstructured":"Conner, M., Norman, P.: Predicting Health Behaviour, 2nd edn. Open University Press, Maidenhead (2005)"},{"key":"22_CR10","unstructured":"Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: Theory and results. Ph.D. thesis, Massachusetts Institute of Technology (1985)"},{"issue":"8","key":"22_CR11","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"FD Davis","year":"1989","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manag. Sci. 35(8), 982\u20131003 (1989)","journal-title":"Manag. Sci."},{"key":"22_CR12","first-page":"177","volume":"5","author":"M Fishbein","year":"1977","unstructured":"Fishbein, M., Ajzen, I.: Belief, attitude, intention, and behavior: an introduction to theory and research. J. Bus. Ventur. 5, 177\u2013189 (1977)","journal-title":"J. Bus. Ventur."},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Halvorsrud, R., Haugstveit, I.M., Pultier, A.: Evaluation of a modelling language for customer journeys. In: Proceedings of IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), pp. 40\u201348. IEEE (2016)","DOI":"10.1109\/VLHCC.2016.7739662"},{"key":"22_CR14","unstructured":"Jackson, J., Allum, N., Gaskell, G.: Perceptions of risk in cyberspace. Technical report, London School of Economics and Politics (2004). Cyber trust & crime prevention project (04\/1157)"},{"key":"22_CR15","unstructured":"Lewis, R., Louvieris, P., Abbott, P., Clewley, N., Jones, K.: Cybersecurity information sharing: a framework for information security management in UK SME supply chains. In: Proceedings of the 22nd European Conference on Information Systems, pp. 1\u201315 (2014)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Martin, G., Ghafur, S., Kinross, J., Hankin, C., Darzi, A.: WannaCry - a year on. BMJ 361, k2381 (2018)","DOI":"10.1136\/bmj.k2381"},{"key":"22_CR17","unstructured":"May, C., et al.: Normalization Process Theory On-line Users\u2019 Manual, Toolkit and NoMAD instrument (2015). http:\/\/www.normalizationprocess.org. Accessed 11 Feb 2021"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"May, C., Finch, T.: Implementing, embedding, and integrating practices: an outline of normalization process theory. Sociology 43(3), 535\u2013554 (2009)","DOI":"10.1177\/0038038509103208"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"May, C.R., et al.: Development of a theory of implementation and integration: normalization process theory. Implement. Sci. 4, 29:1\u201329:9 (2009)","DOI":"10.1186\/1748-5908-4-29"},{"issue":"4","key":"22_CR20","first-page":"231","volume":"70","author":"DE Monta\u00f1o","year":"2015","unstructured":"Monta\u00f1o, D.E., Kasprzyk, D.: Theory of reasoned action, theory of planned behavior, and the integrated behavioral model. Health Behav. Theor. Res. Pract. 70(4), 231 (2015)","journal-title":"Health Behav. Theor. Res. Pract."},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-030-49059-1_9","volume-title":"Human-Computer Interaction. Design and User Experience","author":"B Pickering","year":"2020","unstructured":"Pickering, B., Bartholomew, R., Nouri Janian, M., L\u00f3pez Moreno, B., Surridge, M.: Ask me no questions: increasing empirical evidence for a qualitative approach to technology acceptance. In: Kurosu, M. (ed.) HCII 2020, Part I. LNCS, vol. 12181, pp. 125\u2013136. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49059-1_9"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-030-23535-2_18","volume-title":"Design, User Experience, and Usability. Practice and Case Studies","author":"B Pickering","year":"2019","unstructured":"Pickering, B., Janian, M.N., L\u00f3pez Moreno, B., Micheletti, A., Sanno, A., Surridge, M.: Seeing potential is more important than usability: revisiting technology acceptance. In: Marcus, A., Wang, W. (eds.) HCII 2019, Part IV. LNCS, vol. 11586, pp. 238\u2013249. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23535-2_18"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Pope, C., Halford, S., Turnbull, J., Prichard, J., Calestani, M., May, C.: Using computer decision support systems in NHS emergency and urgent care: ethnographic study using normalisation process theory. BMC Health Serv. Res. 13, 111:1\u2013111:13 (2013)","DOI":"10.1186\/1472-6963-13-111"},{"key":"22_CR24","unstructured":"Rogers, E.M.: Diffusion of Innovations, 5th edn. Free Press, New York (2010)"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Rokkas, T., Neokosmidis, I.: Factors affecting the market adoption of cyber-security products in energy and electrical systems: the case of spear. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u20138 (2020)","DOI":"10.1145\/3407023.3409315"},{"issue":"5\u20136","key":"22_CR26","first-page":"1","volume":"39","author":"K Sharma","year":"2009","unstructured":"Sharma, K., Singh, A., Sharma, V.P.: SMEs and cybersecurity threats in e-commerce. EDPACS EDP Audit Control Secur. Newsl. 39(5\u20136), 1\u201349 (2009)","journal-title":"EDPACS EDP Audit Control Secur. Newsl."},{"key":"22_CR27","doi-asserted-by":"publisher","first-page":"135","DOI":"10.3389\/fphar.2013.00135","volume":"4","author":"J Simon","year":"2013","unstructured":"Simon, J.: Attitudes of Hungarian asthmatic and COPD patients affecting disease control: empirical research based on health belief model. Front. Pharmacol. 4, 135 (2013)","journal-title":"Front. Pharmacol."},{"key":"22_CR28","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-030-32213-7_14","volume-title":"New Trends in Model and Data Engineering","author":"M Surridge","year":"2019","unstructured":"Surridge, M., et al.: Modelling compliance threats and security analysis of cross border health data exchange. In: Attiogb\u00e9, C., Ferrarotti, F., Maabout, S. (eds.) MEDI 2019. CCIS, vol. 1085, pp. 180\u2013189. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32213-7_14"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Vakakis, N., Nikolis, O., Ioannidis, D., Votis, K., Tzovaras, D.: Cybersecurity in SMEs: the smart-home\/office use case. In: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1\u20137. IEEE (2019)","DOI":"10.1109\/CAMAD.2019.8858471"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","DOI":"10.2307\/30036540"},{"key":"22_CR31","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R Von Solms","year":"2013","unstructured":"Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013)","journal-title":"Comput. Secur."},{"issue":"3","key":"22_CR32","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1080\/23736992.2018.1477047","volume":"33","author":"K Ward","year":"2018","unstructured":"Ward, K.: Social networks, the 2016 US presidential election, and Kantian ethics: applying the categorical imperative to Cambridge analytica\u2019s behavioral microtargeting. J. Media Ethics 33(3), 133\u2013148 (2018)","journal-title":"J. Media Ethics"},{"key":"22_CR33","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.dss.2016.09.013","volume":"92","author":"M Warkentin","year":"2016","unstructured":"Warkentin, M., Johnston, A.C., Shropshire, J., Barnett, W.D.: Continuance of protective security behavior: a longitudinal study. Decis. Support Syst. 92, 25\u201335 (2016)","journal-title":"Decis. Support Syst."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:27:50Z","timestamp":1751495270000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}