{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T10:57:09Z","timestamp":1756810629731,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030799960"},{"type":"electronic","value":"9783030799977"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79997-7_30","type":"book-chapter","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T11:02:57Z","timestamp":1624705377000},"page":"238-246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["How Safely Do We Behave Online? An Explanatory Study into the Cybersecurity Behaviors of Dutch Citizens"],"prefix":"10.1007","author":[{"given":"Rick","family":"van der Kleij","sequence":"first","affiliation":[]},{"given":"Susanne","family":"van \u2019t Hoff-De Goede","sequence":"additional","affiliation":[]},{"given":"Steve","family":"van de Weijer","sequence":"additional","affiliation":[]},{"given":"Rutger","family":"Leukfeldt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,27]]},"reference":[{"issue":"1","key":"30_CR1","doi-asserted-by":"publisher","first-page":"79","DOI":"10.5281\/zenodo.58523","volume":"10","author":"J Jansen","year":"2016","unstructured":"Jansen, J., Leukfeldt, R.: Phishing and malware attacks on online banking customers in the Netherlands: a qualitative analysis of factors leading to victimization. Int. J. Cyber Criminol. 10(1), 79\u201391 (2016). https:\/\/doi.org\/10.5281\/zenodo.58523","journal-title":"Int. J. Cyber Criminol."},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"101970","DOI":"10.1016\/j.cose.2020.101970","volume":"97","author":"R Van der Kleij","year":"2020","unstructured":"Van der Kleij, R., Wijn, R., Hof, T.: An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Comput. Secur. 97, 101970 (2020)","journal-title":"Comput. Secur."},{"key":"30_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.jisa.2018.08.002","volume":"42","author":"AA Cain","year":"2018","unstructured":"Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36\u201345 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2018.08.002","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"30_CR4","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1287\/isre.2019.0846","volume":"30","author":"RE Crossler","year":"2019","unstructured":"Crossler, R.E., B\u00e9langer, F.: Why would i use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge-belief gap. Inf. Syst. Res. 30(3), 995\u20131006 (2019)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"30_CR5","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"JM Stanton","year":"2005","unstructured":"Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124\u2013133 (2005)","journal-title":"Comput. Secur."},{"issue":"5","key":"30_CR6","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.cose.2012.04.004","volume":"31","author":"K Padayachee","year":"2012","unstructured":"Padayachee, K.: Taxonomy of compliant information security behavior. Comput. Secur. 31(5), 673\u2013680 (2012)","journal-title":"Comput. Secur."},{"issue":"2","key":"30_CR7","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s10796-017-9755-1","volume":"21","author":"RE Crossler","year":"2017","unstructured":"Crossler, R.E., B\u00e9langer, F., Ormond, D.: The quest for complete security: an empirical analysis of users\u2019 multi-layered protection from security threats. Inf. Syst. Front. 21(2), 343\u2013357 (2017). https:\/\/doi.org\/10.1007\/s10796-017-9755-1","journal-title":"Inf. Syst. Front."},{"unstructured":"Symantec: Security Center White Papers (2018). https:\/\/www.symantec.com\/security-center\/white-papers","key":"30_CR8"},{"doi-asserted-by":"publisher","unstructured":"Michie, S., Stralen, M.M. Van, West, R.: The behaviour change wheel: a new method for characterising and designing behaviour change interventions. Implement. Sci. 42 (6) (2011). https:\/\/doi.org\/10.1186\/1748-5908-6-42","key":"30_CR9","DOI":"10.1186\/1748-5908-6-42"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.drugalcdep.2013.11.003","volume":"135","author":"J Brown","year":"2014","unstructured":"Brown, J., Kotz, D., Michie, S., Stapleton, J., Walmsley, M., West, R.: How effective and cost-effective was the national mass media smoking cessation campaign \u2018Stoptober\u2019? Drug Alcohol Depend. 135, 52\u201358 (2014)","journal-title":"Drug Alcohol Depend."},{"issue":"1","key":"30_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1111\/nbu.12004","volume":"38","author":"L Atkins","year":"2013","unstructured":"Atkins, L., Michie, S.: Changing eating behaviour: what can we learn from behavioural science? Nutr. Bull. 38(1), 30\u201335 (2013)","journal-title":"Nutr. Bull."},{"unstructured":"Van\u2019t Hoff-de Goede, S., Van der Kleij, R., Van de Weijer, S., Leukfeldt, R.: Hoe veilig gedragen wij ons online? Een studie naar de samenhang tussen kennis, gelegenheid, motivatie en online gedrag van Nederlanders. WODC report (2019). https:\/\/www.wodc.nl\/binaries\/2975_Volledige_Tekst_tcm28-421151.pdf","key":"30_CR12"},{"unstructured":"CBS: Bevolking; geslacht, leeftijd en burgerlijke staat (2019). https:\/\/opendata.cbs.nl\/statline\/#\/CBS\/nl\/dataset\/7461BEV\/table?fromstatweb","key":"30_CR13"},{"issue":"2","key":"30_CR14","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1017\/XPS.2015.19","volume":"2","author":"KJ Mullinix","year":"2015","unstructured":"Mullinix, K.J., Leeper, T.J., Druckman, J.N., Freese, J.: The generalizability of survey experiments. J. Exp. Polit. Sci. 2(2), 109\u2013138 (2015)","journal-title":"J. Exp. Polit. Sci."},{"doi-asserted-by":"publisher","unstructured":"Huijg, J.M., Gebhardt, W.A., Crone, M.R., Dusseldorp, E., Presseau, J.: Discriminant content validity of a theoretical domains framework questionnaire for use in implementation research. Implement. Sci. 9 (11) (2014). https:\/\/doi.org\/10.1186\/1748-5908-9-11","key":"30_CR15","DOI":"10.1186\/1748-5908-9-11"},{"issue":"2","key":"30_CR16","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18(2), 106\u2013125 (2009). https:\/\/doi.org\/10.1057\/ejis.2009.6","journal-title":"Eur. J. Inf. Syst."},{"key":"30_CR17","doi-asserted-by":"publisher","DOI":"10.4324\/9781410606266","volume-title":"Applied Multiple Regression\/Correlation Analysis for the Behavioral Sciences","author":"P Cohen","year":"2014","unstructured":"Cohen, P., West, S.G., Aiken, L.S.: Applied Multiple Regression\/Correlation Analysis for the Behavioral Sciences. Psychology Press, New York (2014)"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","volume":"38","author":"NAG Arachchilage","year":"2014","unstructured":"Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304\u2013312 (2014). https:\/\/doi.org\/10.1016\/j.chb.2014.05.046","journal-title":"Comput. Hum. Behav."},{"doi-asserted-by":"publisher","unstructured":"Downs, J.S., Holbrook, M., Cranor, L.F.: Behavioral response to phishing risk. In: Proceedings of the Anti-Phishing Working Groups - 2nd Annual eCrime Researchers Summit, pp. 37\u201344. New York, NY, USA: ACM Press (2007). https:\/\/doi.org\/10.1145\/1299015.1299019","key":"30_CR19","DOI":"10.1145\/1299015.1299019"},{"issue":"4","key":"30_CR20","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1177\/1043986213507401","volume":"29","author":"TJ Holt","year":"2013","unstructured":"Holt, T.J., Bossler, A.M.: Examining the relationship between routine activities and malware infection indicators. J. Contemp. Crim. Justice 29(4), 420\u2013436 (2013). https:\/\/doi.org\/10.1177\/1043986213507401","journal-title":"J. Contemp. Crim. Justice"},{"key":"30_CR21","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur. 42, 165\u2013176 (2014). https:\/\/doi.org\/10.1016\/j.cose.2013.12.003","journal-title":"Comput. Secur."},{"key":"30_CR22","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.chb.2015.01.046","volume":"48","author":"R Shillair","year":"2015","unstructured":"Shillair, R., Cotten, S.R., Tsai, H.Y.S., Alhabash, S., Larose, R., Rifon, N.J.: Online safety begins with you and me: convincing Internet users to protect themselves. Comput. Hum. Behav. 48, 199\u2013207 (2015). https:\/\/doi.org\/10.1016\/j.chb.2015.01.046","journal-title":"Comput. Hum. Behav."},{"key":"30_CR23","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.chb.2019.03.006","volume":"97","author":"DA Ellis","year":"2019","unstructured":"Ellis, D.A.: Are smartphones really that bad? Improving the psychological measurement of technology-related behaviors. Comput. Hum. Behav. 97, 60\u201366 (2019)","journal-title":"Comput. Hum. Behav."},{"doi-asserted-by":"publisher","unstructured":"Van \u2019t Hoff-de Goede, S., Leukfeldt, E., Van der Kleij, R., Van de Weijer, S.: The online behaviour and victimization study: the development of an experimental research instrument for measuring and explaining online behaviour and cybercrime victimization. In: Weulen Kranenbarg, M., Leukfeldt, R. (eds.) Cybercrime in Context, Crime and Justice in Digital Society, vol. I, pp. 21\u201341. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-60527-8_3","key":"30_CR24","DOI":"10.1007\/978-3-030-60527-8_3"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79997-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T11:16:00Z","timestamp":1624706160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79997-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030799960","9783030799977"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79997-7_30","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AHFE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Human Factors and Ergonomics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ahfe2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.ahfe.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}