{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:05Z","timestamp":1746115865226,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405105"},{"type":"electronic","value":"9783642405112"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40511-2_18","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T01:53:28Z","timestamp":1376877208000},"page":"256-271","source":"Crossref","is-referenced-by-count":0,"title":["Seeking Risks: Towards a Quantitative Risk Perception Measure"],"prefix":"10.1007","author":[{"given":"\u00c5smund Ahlmann","family":"Nyre","sequence":"first","affiliation":[]},{"given":"Martin Gilje","family":"Jaatun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"18_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.jsis.2007.12.002","volume":"17","author":"F. B\u00e9langer","year":"2008","unstructured":"B\u00e9langer, F., Carter, L.: Trust and risk in e-government adoption. The Journal of Strategic Information Systems\u00a017(2), 165\u2013176 (2008)","journal-title":"The Journal of Strategic Information Systems"},{"issue":"3","key":"18_CR2","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B. Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly\u00a034(3), 523\u2013548 (2010)","journal-title":"MIS Quarterly"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Caralli, R.A., Stevens, J.F., Young, L.R., Wilson, W.R.: Introducing octave allegro: Improving the information security risk assessment process. Technical report CMU\/SEI-2007-TR-012, Software Engineering Institute, Carnegie Mellon University (May 2007)","DOI":"10.21236\/ADA470450"},{"key":"18_CR4","unstructured":"Chenoweth, T., Minch, R., Gattiker, T.: Application of protection motivation theory to adoption of protective technologies. In: 42nd Hawaii International Conference on System Sciences, HICSS 2009, pp. 1\u201310 (January 2009)"},{"issue":"6","key":"18_CR5","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1177\/0146167294206001","volume":"20","author":"S.L. Crites","year":"1994","unstructured":"Crites, S.L., Fabrigar, L.R., Petty, R.E.: Measuring the affective and cognitive properties of attitudes: Conceptual and methodological issues. Personality and Social Psychology Bulletin\u00a020(6), 619\u2013634 (1994)","journal-title":"Personality and Social Psychology Bulletin"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Crossler, R.: Protection motivation theory: Understanding determinants to backing up personal data. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1\u201310 (January 2010)","DOI":"10.1109\/HICSS.2010.311"},{"issue":"8","key":"18_CR7","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1037\/0003-066X.49.8.709","volume":"49","author":"S. Epstein","year":"1994","unstructured":"Epstein, S.: Integration of the cognitive and the psychodynamic unconscious. American Psychologist\u00a049(8), 709\u2013724 (1994)","journal-title":"American Psychologist"},{"issue":"4","key":"18_CR8","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/S1071-5819(03)00111-3","volume":"59","author":"M.S. Featherman","year":"2003","unstructured":"Featherman, M.S., Pavlou, P.A.: Predicting e-services adoption: a perceived risk facets perspective. International Journal of Human-Computer Studies\u00a059(4), 451\u2013474 (2003)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"1","key":"18_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/(SICI)1099-0771(200001\/03)13:1<1::AID-BDM333>3.0.CO;2-S","volume":"13","author":"M.L. Finucane","year":"2000","unstructured":"Finucane, M.L., Alhakami, A., Slovic, P., Johnson, S.M.: The affect heuristic in judgements of risks and benefits. Journal of Behavioral Decision Making\u00a013(1), 1\u201317 (2000)","journal-title":"Journal of Behavioral Decision Making"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BF00143739","volume":"9","author":"B. Fischhoff","year":"1978","unstructured":"Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., Combs, B.: How safe is safe enough? a psychometric study of attitudes towards technological risks and benefits. Policy Sciences\u00a09, 127\u2013152 (1978), doi:10.1007\/BF00143739","journal-title":"Policy Sciences"},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T. Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems\u00a018(2), 106\u2013125 (2009)","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"18_CR12","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1016\/j.chb.2005.11.003","volume":"23","author":"M. Horst","year":"2007","unstructured":"Horst, M., Kuttschreuter, M., Gutteling, J.M.: Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in the netherlands. Computers in Human Behavior\u00a023(4), 1838\u20131852 (2007)","journal-title":"Computers in Human Behavior"},{"key":"18_CR13","unstructured":"ISO\/IEC 27005: Information technology \u2014 Security techniques \u2014 Information security risk management. International Organisation for Standardisation, Geneva, Switzerland (2011)"},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1086\/376806","volume":"30","author":"C.B. Jarvis","year":"2003","unstructured":"Jarvis, C.B., MacKenzie, S.B., Podsakoff, P.M.: A critical review of construct indicators and measurement model misspecification in marketing and consumer research. Journal of Consumer Research\u00a030(2), 199\u2013218 (2003)","journal-title":"Journal of Consumer Research"},{"issue":"2","key":"18_CR15","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"issue":"9","key":"18_CR16","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1037\/0003-066X.58.9.697","volume":"58","author":"D. Kahneman","year":"2003","unstructured":"Kahneman, D.: A perspective on judgment and choice: Mapping bounded rationality. American Psychologist\u00a058(9), 697\u2013720 (2003)","journal-title":"American Psychologist"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Kahneman, D., Frederick, S.: Representativeness revisited: Attribute substitution in intuitive judgment. In: Gilovich, T., Griffin, D., Kahneman, D. (eds.) Heuristics and Biases: The Psychology of Intuitive Judgment, pp. 49\u201381. Cambridge University Press (2002)","DOI":"10.1017\/CBO9780511808098.004"},{"issue":"2","key":"18_CR18","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"D.J. Kim","year":"2008","unstructured":"Kim, D.J., Ferrin, D.L., Rao, H.R.: A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems\u00a044(2), 544\u2013564 (2008)","journal-title":"Decision Support Systems"},{"issue":"2","key":"18_CR19","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1037\/0033-2909.127.2.267","volume":"127","author":"G.F. Loewenstein","year":"2001","unstructured":"Loewenstein, G.F., Weber, E.U., Hsee, C.K., Welch, N.: Risk as feelings. Psychological Bulletin\u00a0127(2), 267\u2013286 (2001)","journal-title":"Psychological Bulletin"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer (2011)","DOI":"10.1007\/978-3-642-12323-8"},{"issue":"3","key":"18_CR21","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. The Academy of Management Review\u00a020(3), 709\u2013734 (1995)","journal-title":"The Academy of Management Review"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-32498-7_24","volume-title":"Multidisciplinary Research and Practice for Information Systems","author":"\u00c5.A. Nyre","year":"2012","unstructured":"Nyre, \u00c5.A., Jaatun, M.G.: Usage control in inter-organisational collaborative environments \u2013 A case study from an industry perspective. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol.\u00a07465, pp. 317\u2013331. Springer, Heidelberg (2012)"},{"key":"18_CR23","unstructured":"Nyre, \u00c5.A., Jaatun, M.G.: On the adoption of usage control technology in collaborative environments. In: Proceedings of the 12th International Conference on Innovative Internet Community Systems, Trondheim, Norway, June 13-15, pp. 142\u2013153 (2012)"},{"key":"18_CR24","unstructured":"OWASP: OWASP testing guide v3. Tech. rep., The Open Web Application Security Project (2008), https:\/\/www.owasp.org\/images\/5\/56\/OWASP_Testing_Guide_v3.pdf"},{"issue":"3","key":"18_CR25","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"P.A. Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce\u00a07(3), 101\u2013134 (2003)","journal-title":"International Journal of Electronic Commerce"},{"issue":"4","key":"18_CR26","doi-asserted-by":"crossref","first-page":"623","DOI":"10.2307\/25148814","volume":"31","author":"S. Petter","year":"2007","unstructured":"Petter, S., Straub, D., Rai, A.: Specifying formative constructs in information systems research. MIS Q\u00a031(4), 623\u2013656 (2007)","journal-title":"MIS Q"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude. Journal of Psychology\u00a091(1) (1975)","DOI":"10.1080\/00223980.1975.9915803"},{"key":"18_CR28","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-0-387-72367-9_12","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"M. Siponen","year":"1986","unstructured":"Siponen, M., Pahnila, S., Mahmood, A.: Employees\u2019 adherence to information security policies: An empirical study. In: Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) Fundamentals of Artificial Intelligence. IFIP, vol.\u00a0232, pp. 133\u2013144. Springer, Heidelberg (1986)"},{"key":"18_CR29","unstructured":"Sj\u00f6berg, L., Moen, B.E., Rundmo, T.: Explaining risk perception: An evaluation of the psychometric paradigm in risk perception research. Rotunde, vol.\u00a084. Norwegian Univeristy of Science and Technology (2004)"},{"issue":"4799","key":"18_CR30","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1126\/science.3563507","volume":"236","author":"P. Slovic","year":"1987","unstructured":"Slovic, P.: Perception of risk. Science\u00a0236(4799), 280\u2013285 (1987)","journal-title":"Science"},{"issue":"3","key":"18_CR31","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1080\/00139157.1979.9933091","volume":"21","author":"P. Slovic","year":"1979","unstructured":"Slovic, P., Fischhoff, B., Lichtenstein, S.: Rating the risks. Environment\u00a021(3), 14\u201320, 36\u201339 (1979)","journal-title":"Environment"},{"key":"18_CR32","volume-title":"The Feeling of Risk - New perspectives on risk perception","author":"P. Slovic","year":"2010","unstructured":"Slovic, P.: The Feeling of Risk - New perspectives on risk perception. Earthscan, London (2010)"},{"issue":"2","key":"18_CR33","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1111\/j.0272-4332.2004.00433.x","volume":"24","author":"P. Slovic","year":"2004","unstructured":"Slovic, P., Finucane, M.L., Peters, E., MacGregor, D.G.: Risk as analysis and risk as feelings: Some thoughts about affect, reason, risk, and rationality. Risk Analysis\u00a024(2), 311\u2013322 (2004)","journal-title":"Risk Analysis"},{"issue":"3","key":"18_CR34","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1016\/j.ejor.2005.04.006","volume":"177","author":"P. Slovic","year":"2007","unstructured":"Slovic, P., Finucane, M.L., Peters, E., MacGregor, D.G.: The affect heuristic. European Journal of Operational Research\u00a0177(3), 1333\u20131352 (2007)","journal-title":"European Journal of Operational Research"},{"issue":"2","key":"18_CR35","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1539-6924.1982.tb01369.x","volume":"2","author":"P. Slovic","year":"1982","unstructured":"Slovic, P., Fischhoff, B., Lichtenstein, S.: Why study risk perception? Risk Analysis\u00a02(2), 83\u201393 (1982)","journal-title":"Risk Analysis"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk management guide for information technology systems. NIST Special Publication 800-30, National Institute of Standards and Technology (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"18_CR37","unstructured":"Woon, I., Tan, G., Low, R.: A protection motivation theory approach to home wireless security. In: Proceedings of the Twenty-Sixth International Conference on Information Systems, pp. 367\u2013380 (2005)"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems and HCI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40511-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T13:59:08Z","timestamp":1746021548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40511-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405105","9783642405112"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40511-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}