{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:33:21Z","timestamp":1768340001856,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319203751","type":"print"},{"value":"9783319203768","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_21","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"231-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Factors that Influence Information Security Behavior: An Australian Web-Based Study"],"prefix":"10.1007","author":[{"given":"Malcolm","family":"Pattinson","sequence":"first","affiliation":[]},{"given":"Marcus","family":"Butavicius","sequence":"additional","affiliation":[]},{"given":"Kathryn","family":"Parsons","sequence":"additional","affiliation":[]},{"given":"Agata","family":"McCormac","sequence":"additional","affiliation":[]},{"given":"Dragana","family":"Calic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"21_CR1","unstructured":"Abraham, S.: Information security behaviour: factors and research directions. In: AMCIS 2011 Proceedings - All Submissions, Paper 462 (2011)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Pahnila, S., Siponen, M., Mahmood, A.: Employees\u2019 behavior towards IS security policy compliance. In: 40th Annual Hawaii International Conference on System Sciences (HICSS 2007). IEEE, Hawaii (2007)","DOI":"10.1109\/HICSS.2007.206"},{"issue":"1","key":"21_CR3","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Syst. Res. 20(1), 79\u201398 (2009)","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"21_CR4","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"C Anderson","year":"2010","unstructured":"Anderson, C., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613\u2013643 (2010)","journal-title":"MIS Q."},{"issue":"3","key":"21_CR5","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance, A., Siponen, M., Pahnila, S.: Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manag. 49(3), 190\u2013198 (2012)","journal-title":"Inf. Manag."},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.cose.2014.03.003","volume":"43","author":"M Kajzer","year":"2014","unstructured":"Kajzer, M., et al.: An exploratory investigation of message-person congruence in information security awareness campaigns. Comput. Secur. 43, 64\u201376 (2014)","journal-title":"Comput. Secur."},{"key":"21_CR7","unstructured":"AS\/NZS_ISO\/IEC_27002: Information Technology - Security Techniques - Code of practice for Information security management. Standards Australia\/Standards New Zealand (2006)"},{"key":"21_CR8","unstructured":"NIST_SP800_100: Information Security Handbook: A Guide for Managers. National Institute of Standards and Technology, MD (2006)"},{"key":"21_CR9","unstructured":"COBIT5: A Business Framework for the Governance and Management of Enterprise IT. ISACA, IL (2012)"},{"key":"21_CR10","volume-title":"The Big Five Inventory\u2014Versions 4a and 54","author":"OP John","year":"1991","unstructured":"John, O.P., Donahue, E.M., Kentle, R.L.: The Big Five Inventory\u2014Versions 4a and 54. University of California, Institute of Personality and Social Research, Berkeley (1991)"},{"issue":"6","key":"21_CR11","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/S0092-6566(03)00046-1","volume":"37","author":"SD Gosling","year":"2003","unstructured":"Gosling, S.D., Rentfrow, P.J., Swann Jr., W.B.: A very brief measure of the Big-Five personality domains. J. Res. Pers. 37(6), 504\u2013528 (2003)","journal-title":"J. Res. Pers."},{"issue":"4","key":"21_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1257\/089533005775196732","volume":"19","author":"S Frederick","year":"2005","unstructured":"Frederick, S.: Cognitive reflection and decision making. J. Econ. Perspect. 19(4), 25\u201342 (2005)","journal-title":"J. Econ. Perspect."},{"key":"21_CR13","unstructured":"Welsh, M., Burns, N., Delfabbro, P.: The cognitive reflection test: how much more than numerical ability? In: Proceedings of the 35th Annual Conference of the Cognitive Science Society (2013)"},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1207\/s15327906mbr2603_7","volume":"26","author":"SB Green","year":"1991","unstructured":"Green, S.B.: How many subjects does it take to do a regression analysis. Multivar. Behav. Res. 26, 499\u2013510 (1991)","journal-title":"Multivar. Behav. Res."},{"key":"21_CR15","volume-title":"Applying Regression and Correlation: A Guide for Students and Researchers","author":"J Miles","year":"2001","unstructured":"Miles, J., Shevlin, M.: Applying Regression and Correlation: A Guide for Students and Researchers. SAGE Publications, London (2001)"},{"key":"21_CR16","volume-title":"Statistical Power Analysis for the Behavioral Sciences, 2 ed.","author":"JW Cohen","year":"1988","unstructured":"Cohen, J.W.: Statistical Power Analysis for the Behavioral Sciences, 2 ed. Lawrence Erlbaum Associates, New Jersey (1988)"},{"key":"21_CR17","volume-title":"SPSS Survival Manual: A Step-by-Step Guide to Data Analysis using SPSS for Windows, 3 ed.","author":"J Pallant","year":"2007","unstructured":"Pallant, J.: SPSS Survival Manual: A Step-by-Step Guide to Data Analysis using SPSS for Windows, 3 ed. Allen & Unwin, NSW (2007)"},{"key":"21_CR18","volume-title":"Psychological Theory","author":"J Nunnally","year":"1994","unstructured":"Nunnally, J., Bernstein, I.: Psychological Theory. McGraw-Hill, New York (1994)"},{"issue":"5","key":"21_CR19","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1108\/IMCS-08-2013-0057","volume":"22","author":"J D\u2019Arcy","year":"2014","unstructured":"D\u2019Arcy, J., Greene, G.: Security culture and the employment relationship as drivers of employees\u2019 security compliance. Inf. Manage. Comput. Secur. 22(5), 474\u2013489 (2014)","journal-title":"Inf. Manage. Comput. Secur."},{"issue":"6","key":"21_CR20","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1080\/10658980701788165","volume":"16","author":"M Workman","year":"2007","unstructured":"Workman, M.: Gaining access with social engineering: an empirical study of the threat. Inf. Syst. Secur. 16(6), 315\u2013331 (2007)","journal-title":"Inf. Syst. Secur."},{"issue":"5","key":"21_CR21","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1002\/job.4030150503","volume":"15","author":"PE Spector","year":"1994","unstructured":"Spector, P.E.: Using self-report questionnaires in OB research: a comment on the use of a controversial method. J. Organ. Behav. 15(5), 385\u2013392 (1994)","journal-title":"J. Organ. Behav."},{"issue":"2","key":"21_CR22","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1037\/h0058073","volume":"37","author":"AL Edwards","year":"1953","unstructured":"Edwards, A.L.: The relationship between the judged desirability of a trait and the probability that the trait will be endorsed. J. Appl. Psychol. 37(2), 90\u201393 (1953)","journal-title":"J. Appl. Psychol."},{"key":"21_CR23","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.cose.2012.09.010","volume":"32","author":"RE Crossler","year":"2013","unstructured":"Crossler, R.E., et al.: Future directions for behavioral information security research. Comput. Secur. 32, 90\u2013101 (2013)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:17:32Z","timestamp":1583507852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}