{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:45:44Z","timestamp":1743039944660,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819605699"},{"type":"electronic","value":"9789819605705"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0570-5_28","type":"book-chapter","created":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:47:25Z","timestamp":1732927645000},"page":"389-401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of Personality Traits and Need for Cognition on Cybersecurity Behavior: A Study Across Arab and European Samples"],"prefix":"10.1007","author":[{"given":"Eiman A.","family":"Al-Hamad","sequence":"first","affiliation":[]},{"given":"Sameha","family":"Alshakhsi","sequence":"additional","affiliation":[]},{"given":"Areej","family":"Babiker","sequence":"additional","affiliation":[]},{"given":"Aiman","family":"Erbad","sequence":"additional","affiliation":[]},{"given":"Raian","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Egelman, S., Harbach, M., Peer, E.: Behavior Ever Follows Intention? pp. 5257\u20135261, 7 May 2016","key":"28_CR1","DOI":"10.1145\/2858036.2858265"},{"doi-asserted-by":"publisher","unstructured":"Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Action Control, pp. 11\u201339 (1985). https:\/\/doi.org\/10.1007\/978-3-642-69746-3_2","key":"28_CR2","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/J.COSE.2017.11.015","volume":"73","author":"M Gratian","year":"2018","unstructured":"Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A.: Correlating human traits and cyber security behavior intentions. Comput. Secur. 73, 345\u2013358 (2018). https:\/\/doi.org\/10.1016\/J.COSE.2017.11.015","journal-title":"Comput. Secur."},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/fi11040089","volume":"11","author":"F Salahdine","year":"2019","unstructured":"Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11, 89 (2019). https:\/\/doi.org\/10.3390\/fi11040089","journal-title":"Future Internet"},{"key":"28_CR5","doi-asserted-by":"publisher","first-page":"77110","DOI":"10.1109\/ACCESS.2022.3191790","volume":"10","author":"TF Blauth","year":"2022","unstructured":"Blauth, T.F., Gstrein, O.J., Zwitter, A.: Artificial intelligence crime: an overview of malicious use and abuse of AI. IEEE Access 10, 77110\u201377122 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3191790","journal-title":"IEEE Access"},{"issue":"3","key":"28_CR6","first-page":"176","volume":"3","author":"FA Aloul","year":"2012","unstructured":"Aloul, F.A.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176\u2013183 (2012)","journal-title":"J. Adv. Inf. Technol."},{"doi-asserted-by":"crossref","unstructured":"Egelman, S., Peer, E.: Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS), pp. 2873\u20132882, 18 April 2015","key":"28_CR7","DOI":"10.1145\/2702123.2702249"},{"doi-asserted-by":"crossref","unstructured":"Sawaya, Y., Sharif, M., Christin, N., Kubota, A., Nakarai, A., Yamada, A.: Self-confidence Trumps Knowledge, pp. 2202\u20132214, 2 May 2017","key":"28_CR8","DOI":"10.1145\/3025453.3025926"},{"doi-asserted-by":"crossref","unstructured":"Rammstedt, B., John, O.P.: Measuring personality in one minute or less: a 10-item short version of the Big Five Inventory in English and German. J. Res. Pers. 41, 203\u2013212 (2007)","key":"28_CR9","DOI":"10.1016\/j.jrp.2006.02.001"},{"doi-asserted-by":"publisher","unstructured":"Lins de Holanda Coelho, G., Hanel, P.H.P., Wolf, L.J.: The very efficient assessment of the need for cognition: developing a six-item version. Assessment 27, 1870\u20131885 (2018). https:\/\/doi.org\/10.1177\/1073191118793208","key":"28_CR10","DOI":"10.1177\/1073191118793208"},{"doi-asserted-by":"crossref","unstructured":"Ajzen, I.: Theory of reasoned action. In: Encyclopedia of Psychology, vol. 8, pp. 61\u201363. Oxford University Press, New York (2000)","key":"28_CR11","DOI":"10.1037\/10523-026"},{"doi-asserted-by":"crossref","unstructured":"Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177\u2013191 (2015)","key":"28_CR12","DOI":"10.1016\/j.cose.2015.01.002"},{"doi-asserted-by":"crossref","unstructured":"Roberts, B.W., Lejuez, C., Krueger, R.F., Richards, J.M., Hill, P.L.: What is conscientiousness and how can it be assessed? Dev. Psychol. 50, 1315\u20131330 (2014)","key":"28_CR13","DOI":"10.1037\/a0031109"},{"doi-asserted-by":"crossref","unstructured":"Jackson, J.J., Wood, D., Bogg, T., Walton, K.E., Harms, P.D., Roberts, B.W.: What do conscientious people do? Development and validation of the Behavioral Indicators of Conscientiousness (BIC). J. Res. Pers. 44, 501\u2013511 (2010)","key":"28_CR14","DOI":"10.1016\/j.jrp.2010.06.005"},{"doi-asserted-by":"crossref","unstructured":"Yeng, P.K., Fauzi, M.A., Yang, B.: A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals. Information (Basel) 13, 335 (2022)","key":"28_CR15","DOI":"10.3390\/info13070335"},{"issue":"2","key":"28_CR16","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1037\/0033-2909.119.2.197","volume":"119","author":"JT Cacioppo","year":"1996","unstructured":"Cacioppo, J.T., Petty, R.E., Feinstein, J.A., Jarvis, W.B.G.: Dispositional differences in cognitive motivation: the life and times of individuals varying in need for cognition. Psychol. Bull. 119(2), 197\u2013253 (1996). https:\/\/doi.org\/10.1037\/0033-2909.119.2.197","journal-title":"Psychol. Bull."},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1023\/A:1027448801656","volume":"14","author":"S Das","year":"2003","unstructured":"Das, S., Echambadi, R., McCardle, M., et al.: The effect of interpersonal trust, need for cognition, and social loneliness on shopping, information seeking and surfing on the web. Mark. Lett. 14, 185\u2013202 (2003). https:\/\/doi.org\/10.1023\/A:1027448801656","journal-title":"Mark. Lett."},{"issue":"3","key":"28_CR18","first-page":"599","volume":"25","author":"SM Kennison","year":"2023","unstructured":"Kennison, S.M., Chan-Tin, D.E.: Personality and cognitive factors in password security behaviors. N. Am. J. Psychol. 25(3), 599\u2013618 (2023)","journal-title":"N. Am. J. Psychol."},{"unstructured":"JASP Team: A Fresh Way to Do Statistics, JASP, vol. 2023 (2022)","key":"28_CR19"},{"unstructured":"Inglehart, R., et al.: WVS database, World Values Survey Project Pages (2022). https:\/\/www.worldvaluessurvey.Org\/WVSContents.Jsp?CMSID=Findings","key":"28_CR20"},{"doi-asserted-by":"crossref","unstructured":"Alohali, M., Clarke, N., Furnell, S., Albakri, S.: Information security behavior: recognizing the influencers, pp. 844\u2013853, July 2017","key":"28_CR21","DOI":"10.1109\/SAI.2017.8252194"},{"unstructured":"John, O.P., Srivastava, S., John, O.P.: The Big-Five Trait Taxonomy: History, Measurement, and Theoretical Perspectives (1999)","key":"28_CR22"},{"unstructured":"Parsons, K., McCormac, A., Butavicius, M., Ferguson, L.: Human factors and information security: individual, culture and security environment. DSTO Formal Reports, vol. TR, 1 January 2010","key":"28_CR23"},{"doi-asserted-by":"publisher","unstructured":"Park, H., Blenkinsopp, J., Oktem, M.K., et al.: Cultural orientation and attitudes toward different forms of whistleblowing: a comparison of South Korea, Turkey, and the U.K. J. Bus. Ethics 82, 929\u2013939 (2008). https:\/\/doi.org\/10.1007\/s10551-007-9603-1","key":"28_CR24","DOI":"10.1007\/s10551-007-9603-1"},{"doi-asserted-by":"publisher","unstructured":"Russell, J.D., Weems, C.F., Ahmed, I., Richard III, G.G.: Self-reported secure and insecure cyber behavior: factor structure and associations with personality factors. J. Cyber Secur. Technol. 1(3\u20134), 163\u2013174 (2017). https:\/\/doi.org\/10.1080\/23742917.2017.1345271","key":"28_CR25","DOI":"10.1080\/23742917.2017.1345271"},{"key":"28_CR26","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/J.CHB.2016.12.040","volume":"69","author":"M Anwar","year":"2017","unstructured":"Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees\u2019 cybersecurity behaviors. Comput. Human Behav. 69, 437\u2013443 (2017). https:\/\/doi.org\/10.1016\/J.CHB.2016.12.040","journal-title":"Comput. Human Behav."},{"issue":"2","key":"28_CR27","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S0165-1765(02)00045-9","volume":"76","author":"PD Dwyer","year":"2002","unstructured":"Dwyer, P.D., Gilkeson, J.H., List, J.A.: Gender differences in revealed risk-taking: evidence from mutual fund investors. Econ. Lett. 76(2), 151\u2013158 (2002). https:\/\/doi.org\/10.1016\/S0165-1765(02)00045-9","journal-title":"Econ. Lett."},{"issue":"2","key":"28_CR28","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1057\/S41284-022-00343-4\/TABLES\/8","volume":"36","author":"NF Khan","year":"2023","unstructured":"Khan, N.F., Ikram, N., Saleem, S., Zafar, S.: Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. Secur. J. 36(2), 373\u2013405 (2023). https:\/\/doi.org\/10.1057\/S41284-022-00343-4\/TABLES\/8","journal-title":"Secur. J."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0570-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T01:07:53Z","timestamp":1732928873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0570-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9789819605699","9789819605705"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0570-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wise2024-qatar.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}