{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:29:46Z","timestamp":1763533786826},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540731092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73111-5_100","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T06:12:33Z","timestamp":1187849553000},"page":"906-915","source":"Crossref","is-referenced-by-count":12,"title":["A Survey of Factors Influencing People\u2019s Perception of Information Security"],"prefix":"10.1007","author":[{"given":"Ding-Long","family":"Huang","sequence":"first","affiliation":[]},{"given":"Pei-Luen Patrick","family":"Rau","sequence":"additional","affiliation":[]},{"given":"Gavriel","family":"Salvendy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"100_CR1","unstructured":"Berinato, S.: The Global State of Information Security 2005. CIO and PricewaterhouseCoopers (2005) (retrieved April 16, 2006), from \n                    \n                      http:\/\/www.csoonline.com\/read\/100105\/survey.html"},{"key":"100_CR2","unstructured":"UNCTAD: Information Economy Report. United Nations Conference on Trade and Development (2005) (retrieved April 17, 2006), from \n                    \n                      http:\/\/www.unctad.org"},{"key":"100_CR3","unstructured":"Gonzalez, J.J., Sawicka, A.: A Framework for Human Factors in Information Security. In: ICIS 2002. The 2002 WSEAS International Conference on Information Security (2002)"},{"key":"100_CR4","unstructured":"Turner, D., Entwisle, S., Fossi, M., Blackbird, J., Mckinney, D.: Symantec Internet Security Threat Report - Trends for January 06 to June 06 (2006) (retrieved January 17, 2007), from \n                    \n                      http:\/\/www.symantec.com"},{"key":"100_CR5","unstructured":"Gorden, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2006 CSI\/FBI Computer Crime and Security Survey. Computer Security Institute (2006) (retrieved January 9, 2007), from \n                    \n                      http:\/\/www.gocsi.com"},{"issue":"7","key":"100_CR6","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1016\/S0167-4048(01)00712-X","volume":"20","author":"E.E. Schultz","year":"2001","unstructured":"Schultz, E.E., Proctor, R.W., Lien, M.C., Salvendy, G.: Usability and security: an appraisal of usability issues in information security methods. Computers and Security\u00a020(7), 620 (2001)","journal-title":"Computers and Security"},{"key":"100_CR7","unstructured":"CNNIC: The Statistics Report of The Development of Internet in China. China Internet Network Information Center (2006) (retrieved April 17, 2006), from \n                    \n                      http:\/\/www.cnnic.net.cn\/index\/0E\/00\/11\/index.htm"},{"key":"100_CR8","unstructured":"Hassel, L., Wiedenbeck, S.: Human Factors and Information Security, in College of Information Science and Technology. Drexel University (2004)"},{"key":"100_CR9","volume-title":"Handbook of Human Factors and Ergonomics","author":"G. Salvendy","year":"1997","unstructured":"Salvendy, G.: Handbook of Human Factors and Ergonomics. Wiley-Interscience, Chichester (1997)"},{"issue":"11","key":"100_CR10","first-page":"39","volume":"48","author":"D. Cooper","year":"2003","unstructured":"Cooper, D.: Psychology, risk & safety: understanding how personality & perception can influence risk taking. Professional Safety\u00a048(11), 39\u201346 (2003)","journal-title":"Professional Safety"},{"key":"100_CR11","unstructured":"NSTISSC: National Training Standard for Information Systems Security (Infosec) Professionals. National Security Telecommunications and Information Systems Security Committee (1994)"},{"key":"100_CR12","unstructured":"Whitman, M.E., Mattford, H.J.: Principles of Information Security. Thomson Learning (2004)"},{"key":"100_CR13","unstructured":"Musekura, J.B., Ekh, R.: Information Security Issues - Difference between Perception and Practice in Organizations. In Department of Business, Economics, Statistics and Informatics. Orebro University, Sweden (2004) (retrieved January 6, 2007), from \n                    \n                      http:\/\/www.oru.se\/templates\/oruExtNormal____19402.aspx"},{"issue":"8","key":"100_CR14","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/859670.859675","volume":"46","author":"M.E. Whitman","year":"2003","unstructured":"Whitman, M.E.: Enemy at the gate: Threats to information security. Communications of the ACM\u00a046(8), 91\u201395 (2003)","journal-title":"Communications of the ACM"},{"key":"100_CR15","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.1126\/science.165.3899.1232","volume":"165","author":"C. Starr","year":"1969","unstructured":"Starr, C.: Social benefit versus technological risk. Science\u00a0165, 1232\u20131238 (1969)","journal-title":"Science"},{"key":"100_CR16","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BF00143739","volume":"9","author":"B. Fischhoff","year":"1978","unstructured":"Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., Cambs, B.: How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences\u00a09, 127\u2013152 (1978)","journal-title":"Policy Sciences"},{"key":"100_CR17","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-1-4899-0445-4_9","volume-title":"Societal Risk Assessment - How Safe is Safe Enough?","author":"P. Slovic","year":"1980","unstructured":"Slovic, P., Fischhoff, B., Lichtenstein, S.: Facts and Fears - Understanding Risk. In: Schwing, R.C., Albers, W.A. (eds.) Societal Risk Assessment - How Safe is Safe Enough?, pp. 181\u2013218. Plenum, New York (1980)"},{"key":"100_CR18","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1126\/science.3563507","volume":"236","author":"P. Slovic","year":"1987","unstructured":"Slovic, P.: Perception of Risk. Science\u00a0236, 280\u2013285 (1987)","journal-title":"Science"},{"issue":"1","key":"100_CR19","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1111\/j.0272-4332.2005.00580.x","volume":"25","author":"M. Siegrist","year":"2005","unstructured":"Siegrist, M., Keller, C., Kiers, H.A.L.: A New Look at the Psychometric Paradigm of Perception of Hazards. Risk Analysis\u00a025(1), 211\u2013222 (2005)","journal-title":"Risk Analysis"},{"key":"100_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0040-1625(83)90032-X","volume":"23","author":"V.T. Covello","year":"1983","unstructured":"Covello, V.T.: The perception of technological risks: a literature review. Tech. Forecasting Social Change\u00a023, 285\u2013297 (1983)","journal-title":"Tech. Forecasting Social Change"},{"key":"100_CR21","doi-asserted-by":"crossref","unstructured":"Covello, V.T.: Risk communication: An emerging area of health communication research. In: Deetz, S.(ed.) Communication Yearbook, 15 edn. (1992)","DOI":"10.1080\/23808985.1992.11678816"},{"key":"100_CR22","volume-title":"Risk Assessment Methods","author":"V.T. Covello","year":"1994","unstructured":"Covello, V.T., Merkhofer, M.W.: Risk Assessment Methods. Plenum Press, New York (1994)"},{"issue":"4","key":"100_CR23","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1111\/j.1539-6924.1991.tb00650.x","volume":"11","author":"L. Sjoeberg","year":"1991","unstructured":"Sjoeberg, L., Drottz-Sjoeberg, B.-M.: Knowledge and risk perception among nuclear power plant employees. Risk Analysis\u00a011(4), 607 (1991)","journal-title":"Risk Analysis"},{"issue":"5-6","key":"100_CR24","first-page":"261","volume":"7","author":"A. Stainer","year":"1995","unstructured":"Stainer, A., Stainer, L.: Young people\u2019s risk perception of nuclear power - a European viewpoint. International Journal of Global Energy Issues\u00a07(5-6), 261\u2013270 (1995)","journal-title":"International Journal of Global Energy Issues"},{"issue":"4","key":"100_CR25","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1111\/j.1539-6924.2005.00634.x","volume":"25","author":"M. Setbon","year":"2005","unstructured":"Setbon, M., Raude, J., Fischler, C., Flahault, A.: Risk perception of the mad cow disease in France: Determinants and consequences. Risk Analysis\u00a025(4), 813\u2013826 (2005)","journal-title":"Risk Analysis"},{"issue":"5","key":"100_CR26","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0001-4575(87)90022-4","volume":"19","author":"P. Slovic","year":"1987","unstructured":"Slovic, P., MacGregor, D., Kraus, N.N.: Peception of Risk from Automobile Safety Defects. Accident Analysis and Prevention\u00a019(5), 359\u2013373 (1987)","journal-title":"Accident Analysis and Prevention"},{"key":"100_CR27","doi-asserted-by":"crossref","unstructured":"MacDonald, G.: Risk perception and construction safety. In: Proceedings of the Institution of Civil Engineers: Civil Engineering, vol. 159 (2 SPEC ISS), pp. 51\u201356 (2006)","DOI":"10.1680\/cien.2006.159.6.51"},{"key":"100_CR28","unstructured":"Jackson, J., Allum, N., Gaskell, G.: Perceptions of Risk in Cyberspace. In: Mansell, R., Collins, B.S. (eds.) Trust and Crime in Information Societies, Edward Elgar, Northampton, MA (2005)"},{"key":"100_CR29","unstructured":"Vyskoc, J., Fibikova, L.: IT users\u2019 perception of information security. In: 2nd Working Conference on Security and Control of Information Technology in Security 2001, Comenius Univ., Bratislava, Slovakia (2001)"},{"issue":"4","key":"100_CR30","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1080\/0144929042000320992","volume":"24","author":"M.M. Yenisey","year":"2005","unstructured":"Yenisey, M.M., Ozok, A.A., Salvendy, G.: Perceived security determinants in e-commerce among Turkish university students. Behaviour & Information Technology\u00a024(4), 259\u2013274 (2005)","journal-title":"Behaviour & Information Technology"},{"key":"100_CR31","volume-title":"Psychometric Theory","author":"J.C. Nunnally","year":"1978","unstructured":"Nunnally, J.C.: Psychometric Theory. McGraw-Hill, New York, NY (1978)"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction. HCI Applications and Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73111-5_100.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:02:03Z","timestamp":1619503323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73111-5_100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540731092"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73111-5_100","relation":{},"subject":[]}}