{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T15:45:12Z","timestamp":1749483912973,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_14","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"154-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Bauer","sequence":"first","affiliation":[]},{"given":"Edward W.N.","family":"Bernroider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"issue":"6","key":"14_CR1","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.cose.2009.01.003","volume":"28","author":"E Albrechtsen","year":"2009","unstructured":"Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Comput. Secur. 28(6), 476\u2013490 (2009)","journal-title":"Comput. Secur."},{"issue":"6","key":"14_CR2","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1037\/0022-3514.51.6.1173","volume":"51","author":"RM Baron","year":"1986","unstructured":"Baron, R.M., Kenny, D.A.: The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. J. Pers. Soc. Psychol. 51(6), 1173\u20131182 (1986)","journal-title":"J. Pers. Soc. Psychol."},{"key":"14_CR3","unstructured":"Bauer, S., Bernroider, E.W.N.: IT operational risk awareness building in banking companies: a preliminary research design highlighting the importance of risk cultures and control systems. In: Janczewski, L. (ed.) Proceedings of the International Conference on Information Resource Management 2013 (Conf-IRM 2013), Natal, pp. 1\u20134 (2013)"},{"key":"14_CR4","first-page":"30","volume-title":"Proceedings of the International Conference Information Systems 2013","author":"S Bauer","year":"2013","unstructured":"Bauer, S., Bernroider, E.W.N.: IT operational risk management practices in austrian banks: preliminary results from exploratory case study. In: Nunes, M.B. (ed.) Proceedings of the International Conference Information Systems 2013, pp. 30\u201338. IADIS Press, Lissabon (2013)"},{"key":"14_CR5","unstructured":"Bauer, S., Bernroider, E.W.N., Chudzikowski, K.: End user information security awareness programs for improving information security in banking organizations: preliminary results from an exploratory study. In: AIS SIGSEC Workshop on Information Security & Privacy (WISP 2013), Milano (2013)"},{"issue":"3","key":"14_CR6","doi-asserted-by":"publisher","first-page":"800","DOI":"10.3758\/s13428-011-0081-0","volume":"43","author":"TS Behrend","year":"2011","unstructured":"Behrend, T.S., Sharek, D.J., Meade, A.W., et al.: The viability of crowdsourcing for survey research. Behav. Res. Methods 43(3), 800\u2013813 (2011)","journal-title":"Behav. Res. Methods"},{"issue":"1","key":"14_CR7","first-page":"59","volume":"89","author":"J D\u2019arcy","year":"2008","unstructured":"D\u2019arcy, J., Hovav, A.: Does one size fit all? Examining the differential effects of is security countermeasures. J. Bus. Ethics 89(1), 59\u201371 (2008)","journal-title":"J. Bus. Ethics"},{"issue":"4","key":"14_CR8","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.istr.2010.05.002","volume":"14","author":"M Emina\u011fao\u011flu","year":"2009","unstructured":"Emina\u011fao\u011flu, M., U\u00e7ar, E., Eren, \u015e.: The positive outcomes of information security awareness training in companies \u2013 a case study. Inf. Secur. Tech. Rep. 14(4), 223\u2013229 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","volume":"30","author":"DL Floyd","year":"2000","unstructured":"Floyd, D.L., Prentice-Dunn, S., Rogers, R.W.: A meta-analysis of research on protection motivation theory. J. Appl. Soc. Psychol. 30, 407\u2013429 (2000)","journal-title":"J. Appl. Soc. Psychol."},{"key":"14_CR10","first-page":"606","volume":"12","author":"J Goldstein","year":"2011","unstructured":"Goldstein, J., Chernobai, A., Benaroch, M.: An event study analysis of the economic impact of it operational risk and its subcategories. J. Assoc. Inf. Syst. 12, 606\u2013631 (2011)","journal-title":"J. Assoc. Inf. Syst."},{"key":"14_CR11","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1108\/09685220810908796","volume":"16","author":"JM Hagen","year":"2008","unstructured":"Hagen, J.M., Albrechtsen, E., Hovden, J.: Implementation and effectiveness of organizational information security measures. Inf. Manag. Comput. Secur. 16, 377\u2013397 (2008)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"14_CR12","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"JF Hair","year":"2013","unstructured":"Hair, J.F., Hult, G.T.M., Ringle, C.M., et al.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage, Thousand Oaks (2013)"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/s11747-011-0261-6","volume":"40","author":"JF Hair","year":"2011","unstructured":"Hair, J.F., Sarstedt, M., Ringle, C.M., et al.: An assessment of the use of partial least squares structural equation modeling in marketing research. J. Acad. Mark. Sci. 40, 414\u2013433 (2011)","journal-title":"J. Acad. Mark. Sci."},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47, 154\u2013165 (2009)","journal-title":"Decis. Support Syst."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18, 106\u2013125 (2009)","journal-title":"Eur. J. Inf. Syst."},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1111\/j.1540-5915.2012.00361.x","volume":"43","author":"Q Hu","year":"2012","unstructured":"Hu, Q., Dinev, T., Hart, P., et al.: Managing employee compliance with information security policies: the critical role of top management and organizational culture. Decis. Sci. 43, 615\u2013659 (2012)","journal-title":"Decis. Sci."},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31, 83\u201395 (2012)","journal-title":"Comput. Secur."},{"key":"14_CR18","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"AC Johnston","year":"2010","unstructured":"Johnston, A.C., Warkentin, M.: Fear appeals and information security behaviors: an empirical study. MIS Q. 34, 549\u2013566 (2010)","journal-title":"MIS Q."},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.cose.2014.03.003","volume":"43","author":"M Kajzer","year":"2014","unstructured":"Kajzer, M., D\u2019arcy, J., Crowell, C.R., et al.: An exploratory investigation of message-person congruence in information security awareness campaigns. Comput. Secur. 43, 64\u201376 (2014)","journal-title":"Comput. Secur."},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1108\/MRR-04-2013-0085","volume":"37","author":"B Lebek","year":"2014","unstructured":"Lebek, B., Uffen, J., Neumann, M., et al.: Information security awareness and behavior: a theory-based literature review. Manag. Res. Rev. 37, 1049\u20131092 (2014)","journal-title":"Manag. Res. Rev."},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/15536548.2013.10845672","volume":"9","author":"P Meso","year":"2013","unstructured":"Meso, P., Ding, Y., Xu, S.: Applying protection motivation theory to information security training for college students. J. Inf. Priv. Secur. 9, 47\u201367 (2013)","journal-title":"J. Inf. Priv. Secur."},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1111\/j.1559-1816.2000.tb02308.x","volume":"30","author":"S Milne","year":"2000","unstructured":"Milne, S., Orbell, P.S., Orbell, S.: Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. J. Appl. Soc. Psychol. 30, 106\u2013143 (2000)","journal-title":"J. Appl. Soc. Psychol."},{"key":"14_CR23","unstructured":"Orx: ORX report on operational risk loss data. In: Operational Riskdata eXchange Association (2014)"},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.cose.2012.04.004","volume":"31","author":"K Padayachee","year":"2012","unstructured":"Padayachee, K.: Taxonomy of compliant information security behavior. Comput. Secur. 31, 673\u2013680 (2012)","journal-title":"Comput. Secur."},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Pahnila, S., Siponen, M., Mahmood, M.A.: Employees\u2019 behavior towards is security policy compliance. In: Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS 2007). IEEE, Hawaii (2007)","DOI":"10.1109\/HICSS.2007.206"},{"key":"14_CR26","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"P Puhakainen","year":"2010","unstructured":"Puhakainen, P., Siponen, M.: Improving employees\u2019 compliance through information systems security training: an action research study. MIS Q. 34, 757\u2013778 (2010)","journal-title":"MIS Q."},{"key":"14_CR27","unstructured":"Ringle, C., Wende, S., Will, A.: SmartPLS 2.0 (beta). In: Hamburg Uo (ed.) (2005)"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change. J. Psychol. 91, 93\u2013114 (1975)","journal-title":"J. Psychol."},{"key":"14_CR29","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","volume":"19","author":"M Sarstedt","year":"2011","unstructured":"Sarstedt, M., Ringle, C.M., Hair, J.F.: PLS-SEM: indeed a silver bullet. J. Mark. Theory Pract. 19, 139\u2013152 (2011)","journal-title":"J. Mark. theory Pract."},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","volume":"51","author":"M Siponen","year":"2014","unstructured":"Siponen, M., Mahmood, M.A., Pahnila, S.: Employees\u2019 adherence to information security policies: an exploratory field study. Inf. Manag. 51, 217\u2013224 (2014)","journal-title":"Inf. Manag."},{"issue":"2","key":"14_CR31","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MC.2010.35","volume":"43","author":"M Siponen","year":"2010","unstructured":"Siponen, M., Pahnila, S., Mahmood, M.A.: Compliance with information security policies an empirical investigation. IEEE Comput. 43(2), 64\u201371 (2010)","journal-title":"IEEE Comput."},{"key":"14_CR32","first-page":"290","volume-title":"Sociological Methodology","author":"ME Sobel","year":"1982","unstructured":"Sobel, M.E.: Asymptotic confidence intervals for indirect effects in structural equation models. In: Leinhardt, S. (ed.) Sociological Methodology, pp. 290\u2013312. American Sociological Association, Washington DC (1982)"},{"issue":"1","key":"14_CR33","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1057\/ejis.2013.27","volume":"24","author":"A Tsohou","year":"2013","unstructured":"Tsohou, A., Karyda, M., Kokolakis, S., et al.: Managing the introduction of information security awareness programmes in organisations. Eur. J. Inf. Syst. 24(1), 38\u201358 (2013)","journal-title":"Eur. J. Inf. Syst."},{"key":"14_CR34","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance, A., Siponen, M., Pahnila, S.: Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manag. 49, 190\u2013198 (2012)","journal-title":"Inf. Manag."},{"key":"14_CR35","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.infoandorg.2009.06.001","volume":"19","author":"M Workman","year":"2009","unstructured":"Workman, M.: A field study of corporate employee monitoring: attitudes, absenteeism, and the moderating influences of procedural justice perceptions. Inf. Organ. 19, 218\u2013232 (2009)","journal-title":"Inf. Organ."},{"key":"14_CR36","doi-asserted-by":"publisher","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","volume":"24","author":"M Workman","year":"2008","unstructured":"Workman, M., Bommer, W.H., Straub, D.: Security lapses and the omission of information security measures: a threat control model and empirical test. Comput. Hum. Behav. 24, 2799\u20132816 (2008)","journal-title":"Comput. Hum. Behav."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:16:51Z","timestamp":1583507811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}