{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:35:41Z","timestamp":1751607341277,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_34","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"494-506","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals"],"prefix":"10.1007","author":[{"given":"Duncan","family":"Hodges","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Buckley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"issue":"8","key":"34_CR1","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.cose.2011.08.004","volume":"30","author":"KKR Choo","year":"2011","unstructured":"Choo, K.K.R.: The cyber threat landscape: challenges and future research directions. Comput. Sec. 30(8), 719\u2013731 (2011)","journal-title":"Comput. Sec."},{"issue":"7","key":"34_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(13)70062-9","volume":"2013","author":"T Caldwell","year":"2013","unstructured":"Caldwell, T.: Plugging the cyber-security skills gap. Comput. Fraud Sec. 2013(7), 5\u201310 (2013)","journal-title":"Comput. Fraud Sec."},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Lawson, S., Putting the war in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States. First Monday 17(7) (2012)","DOI":"10.5210\/fm.v17i7.3848"},{"issue":"10","key":"34_CR4","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1108\/00251740110402328","volume":"39","author":"C Andriopoulos","year":"2001","unstructured":"Andriopoulos, C.: Determinants of organisational creativity: a literature review. Manag. Decis. 39(10), 834\u2013841 (2001)","journal-title":"Manag. Decis."},{"issue":"1","key":"34_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1002\/job.1943","volume":"36","author":"MAR Malik","year":"2015","unstructured":"Malik, M.A.R., Butt, A.N., Choi, J.N.: Rewards and employee creative performance: moderating effects of creative self-efficacy, reward importance, and locus of control. J. Organ. Behav. 36(1), 59\u201374 (2015)","journal-title":"J. Organ. Behav."},{"issue":"2","key":"34_CR6","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1037\/0003-066X.37.2.122","volume":"37","author":"A Bandura","year":"1982","unstructured":"Bandura, A.: Self-efficacy mechanism in human agency. Am. Psychol. 37(2), 122 (1982)","journal-title":"Am. Psychol."},{"issue":"4","key":"34_CR7","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1037\/0022-0663.76.4.647","volume":"76","author":"G Salomon","year":"1984","unstructured":"Salomon, G.: Television is \u2018easy\u2019 and print is \u2018tough\u2019: the differential investment of mental effort in learning as a function of perceptions and attributions. J. Educ. Psychol. 76(4), 647 (1984)","journal-title":"J. Educ. Psychol."},{"issue":"2","key":"34_CR8","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1080\/10573560308219","volume":"19","author":"DH Schunk","year":"2003","unstructured":"Schunk, D.H.: Self-efficacy for reading and writing: Influence of modeling, goal setting, and self-evaluation. Read. Writ. Q. 19(2), 159\u2013172 (2003)","journal-title":"Read. Writ. Q."},{"key":"34_CR9","doi-asserted-by":"publisher","DOI":"10.4324\/9781315734606","volume-title":"Work Motivation in Organizational Behavior","author":"CC Pinder","year":"2014","unstructured":"Pinder, C.C.: Work Motivation in Organizational Behavior. Psychology Press, Hove (2014)"},{"key":"34_CR10","volume-title":"Learning Theories","author":"DH Schunk","year":"1996","unstructured":"Schunk, D.H.: Learning Theories. Printice Hall Inc., New Jersey (1996)"},{"key":"34_CR11","volume-title":"Handbook of Self-determination Research","author":"EL Deci","year":"2002","unstructured":"Deci, E.L., Ryan, R.M.: Handbook of Self-determination Research. University Rochester Press, Rochester (2002)"},{"issue":"3","key":"34_CR12","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1111\/j.1467-6494.1995.tb00501.x","volume":"63","author":"RM Ryan","year":"1995","unstructured":"Ryan, R.M.: Psychological needs and the facilitation of integrative processes. J. Pers. 63(3), 397\u2013427 (1995)","journal-title":"J. Pers."},{"issue":"1","key":"34_CR13","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1006\/ceps.1999.1020","volume":"25","author":"RM Ryan","year":"2000","unstructured":"Ryan, R.M., Deci, E.L.: Intrinsic and extrinsic motivations: classic definitions and new directions. Contemp. Educ. Psychol. 25(1), 54\u201367 (2000)","journal-title":"Contemp. Educ. Psychol."},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/S0065-2601(08)60019-2","volume":"29","author":"RJ Vallerand","year":"1997","unstructured":"Vallerand, R.J.: Toward a hierarchical model of intrinsic and extrinsic motivation. Adv. Exp. Soc. Psychol. 29, 271\u2013360 (1997)","journal-title":"Adv. Exp. Soc. Psychol."},{"issue":"3","key":"34_CR15","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1037\/0008-400X.29.3.157","volume":"29","author":"I Green-Demers","year":"1997","unstructured":"Green-Demers, I., Pelletier, L.G., M\u00e9nard, S.: The impact of behavioural difficulty on the saliency of the association between self-determined motivation and environmental behaviours. Can. J. Behav. Sci.\/Rev. Can. Sci. Comportement 29(3), 157 (1997)","journal-title":"Can. J. Behav. Sci.\/Rev. Can. Sci. Comportement"},{"key":"34_CR16","unstructured":"Runco, M.A.: Motivation, competence, and creativity. In: Handbook of Competence and Motivation, pp. 609\u2013623 (2005)"},{"issue":"1","key":"34_CR17","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/10400410701841955","volume":"20","author":"V Prabhu","year":"2008","unstructured":"Prabhu, V., Sutton, C., Sauser, W.: Creativity and certain personality traits: understanding the mediating effect of intrinsic motivation. Creativity Res. J. 20(1), 53\u201366 (2008)","journal-title":"Creativity Res. J."},{"issue":"4","key":"34_CR18","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1037\/a0015167","volume":"41","author":"MA Tremblay","year":"2009","unstructured":"Tremblay, M.A., Blanchard, C.M., Taylor, S., Pelletier, L.G., Villeneuve, M.: Work extrinsic and intrinsic motivation scale: its value for organizational psychology research. Can. J. Behav. Sci.\/Rev. Can. Sci. Comportement 41(4), 213 (2009)","journal-title":"Can. J. Behav. Sci.\/Rev. Can. Sci. Comportement"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Schwarzer, R., Jerusalem, M., Generalized self-efficacy scale. In: Measures in Health Psychology: A User\u2019s Portfolio. Causal and Contrl Beliefs, pp. 35\u201337 (1995)","DOI":"10.1037\/t00393-000"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Patrick, H., Fields, Z.: A need for cyber security creativity. In: Collective Creativity for Responsible and Sustainable Business Practice, pp. 42\u201361. IGI Global (2017)","DOI":"10.4018\/978-1-5225-1823-5.ch003"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Colbaugh, R., Glass, K.: Asymmetry in coevolving adversarial systems. In: IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 360\u2013367. IEEE (2016)","DOI":"10.1109\/QRS-C.2016.55"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T14:47:09Z","timestamp":1692802029000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}