{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:38:49Z","timestamp":1756571929615,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819605699"},{"type":"electronic","value":"9789819605705"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0570-5_30","type":"book-chapter","created":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:46:00Z","timestamp":1732927560000},"page":"416-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Need for Affect and Need for Cognition vs. Cybersecurity Attitude"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2957-2472","authenticated-orcid":false,"given":"Faisal","family":"Abughazaleh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1082-6864","authenticated-orcid":false,"given":"Israa","family":"Abuelezz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8848-0760","authenticated-orcid":false,"given":"Khaled","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5285-7829","authenticated-orcid":false,"given":"Raian","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Loewenstein, G.F., Weber, E.U., Hsee, C.K., Welch, N.: Risk as feelings. Psychol. Bull. 127(2), 267\u2013286 (2001). http:\/\/psycnet.apa.org\/index.cfm?fa=main.showContent&view=fulltext&f","DOI":"10.1037\/\/0033-2909.127.2.267"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Cho, J.-H., Cam, H., Oltramari, A.: Effect of personality traits on trust and risk to phishing vulnerability: modeling and analysis. In: IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 7\u201313. IEEE (2016)","DOI":"10.1109\/COGSIMA.2016.7497779"},{"issue":"3","key":"30_CR3","doi-asserted-by":"publisher","first-page":"194","DOI":"10.18100\/ijamec.47036","volume":"3","author":"RS El-Din","year":"2015","unstructured":"El-Din, R.S., Cairns, P., Clark, J.: It\u2019s all about me! The influence of personality on susceptibility to mobile security attacks. Int. J. Appl. Math. Electron. Comput. 3(3), 194 (2015). https:\/\/doi.org\/10.18100\/ijamec.47036","journal-title":"Int. J. Appl. Math. Electron. Comput."},{"issue":"1","key":"30_CR4","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1111\/j.1539-6924.2006.00867.x","volume":"27","author":"B Chauvin","year":"2007","unstructured":"Chauvin, B., Hermand, D., Mullet, E.: Risk perception and personality facets. Risk Anal. 27(1), 171\u2013185 (2007). https:\/\/doi.org\/10.1111\/j.1539-6924.2006.00867.x","journal-title":"Risk Anal."},{"key":"30_CR5","doi-asserted-by":"publisher","unstructured":"Lucidi, F., et al.: Personality traits and attitudes toward traffic safety predict risky behavior across young, adult, and older drivers. Front. Psychol. 10 (2019). https:\/\/doi.org\/10.3389\/fpsyg.2019.00536","DOI":"10.3389\/fpsyg.2019.00536"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Auerbach, R.P., Kertz, S., Gardiner, C.K.: Predicting Adolescent Risky Behavior Engagement: The Role of Cognitive Vulnerability and Anxiety (2012)","DOI":"10.1521\/ijct.2012.5.3.300"},{"issue":"4","key":"30_CR7","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1111\/1467-6494.694156","volume":"69","author":"GR Maio","year":"2001","unstructured":"Maio, G.R., Esses, V.M.: The need for affect: individual differences in the motivation to approach or avoid emotions. J. Pers. 69(4), 583\u2013614 (2001). https:\/\/doi.org\/10.1111\/1467-6494.694156","journal-title":"J. Pers."},{"issue":"1","key":"30_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1111\/isj.12173","volume":"29","author":"J D\u2019Arcy","year":"2019","unstructured":"D\u2019Arcy, J., Lowry, P.B.: Cognitive-affective drivers of employees\u2019 daily compliance with information security policies: a multilevel, longitudinal study. Inf. Syst. J. 29(1), 43\u201369 (2019). https:\/\/doi.org\/10.1111\/isj.12173","journal-title":"Inf. Syst. J."},{"key":"30_CR9","doi-asserted-by":"publisher","unstructured":"Babiker, A., Almourad, M.B., Panourgia, C., Alshakhsi, S., Montag, C., Ali, R.: Need for affect, problematic social media use and the mediating role of fear of missing out in European and Arab samples. Psychol. Res. Behav. Manag. 16, 5025\u20135039 (2023). https:\/\/doi.org\/10.2147\/PRBM.S435437","DOI":"10.2147\/PRBM.S435437"},{"key":"30_CR10","doi-asserted-by":"publisher","unstructured":"Arriaga, P., Alexandre, J., Postolache, O., Fonseca, M.J., Langlois, T., Chambel, T.: Why do we watch? The role of emotion gratifications and individual differences in predicting rewatchability and movie recommendation. Behav. Sci. 10(1), 8 (2019). https:\/\/doi.org\/10.3390\/bs10010008","DOI":"10.3390\/bs10010008"},{"key":"30_CR11","unstructured":"Petty, R.E., Pablo, B., Loersch, C., McCaslin, M.J.: The need for cognition. In: Handbook of Individual Differences in Social Behavior, pp. 318\u2013329 (2009). https:\/\/www.researchgate.net\/publication\/271512125"},{"issue":"1","key":"30_CR12","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1037\/0022-3514.42.1.116","volume":"42","author":"JT Cacioppo","year":"1982","unstructured":"Cacioppo, J.T., Petty, R.E.: The need for cognition. J. Pers. Soc. Psychol. 42(1), 116\u2013131 (1982)","journal-title":"J. Pers. Soc. Psychol."},{"issue":"6","key":"30_CR13","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1177\/0146167208314871","volume":"34","author":"G Haddock","year":"2008","unstructured":"Haddock, G., Maio, G.R., Arnold, K., Huskinson, T.: Should persuasion be affective or cognitive? The moderating effects of need for affect and need for cognition. Pers. Soc. Psychol. Bull. 34(6), 769\u2013778 (2008). https:\/\/doi.org\/10.1177\/0146167208314871","journal-title":"Pers. Soc. Psychol. Bull."},{"issue":"3","key":"30_CR14","doi-asserted-by":"publisher","first-page":"251","DOI":"10.11610\/isij.4618","volume":"46","author":"LC de Kok","year":"2020","unstructured":"de Kok, L.C., Oosting, D., Spruit, M.: The influence of knowledge and attitude on intention to adopt cybersecure behaviour. Inf. Secur. Int. J. 46(3), 251\u2013266 (2020). https:\/\/doi.org\/10.11610\/isij.4618","journal-title":"Inf. Secur. Int. J."},{"key":"30_CR15","unstructured":"Van Der Pligt, J.: Cognition and affect in risk perception and risky decision-making. In: Psychology at the Turn of the Millennium: Social, Developmental, and Clinical Perspectives, vol. 2, pp. 247\u2013270 (2002). https:\/\/www.researchgate.net\/publication\/254771856"},{"key":"30_CR16","doi-asserted-by":"publisher","unstructured":"Halevi, T., et al.: Cultural and psychological factors in cyber-security. In: ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 318\u2013324, November 2016. https:\/\/doi.org\/10.1145\/3011141.3011165","DOI":"10.1145\/3011141.3011165"},{"key":"30_CR17","doi-asserted-by":"publisher","unstructured":"Mollazehi, A., Abuelezz, I., Barhamgi, M., Khan, K.M., Ali, R.: Do Cialdini\u2019s persuasion principles still influence trust and risk-taking when social engineering is knowingly possible? In: Ara\u00fajo, J., de la Vara, J.L., Santos, M.Y., Assar, S. (eds.) Research Challenges in Information Science. RCIS 2024. LNBIS, vol. 513, pp. 273\u2013288. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-59465-6_17","DOI":"10.1007\/978-3-031-59465-6_17"},{"key":"30_CR18","unstructured":"Alhasan, I.: Human Factors in Cybersecurity: A Cross-Cultural Study on Trust. Purdue University Graduate School (2023)"},{"issue":"2","key":"30_CR19","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1037\/0033-2909.134.2.311.supp","volume":"134","author":"D Oyserman","year":"2008","unstructured":"Oyserman, D., Lee, S.W.S.: Does culture influence what and how we think? Effects of priming individualism and collectivism. Psychol. Bull. 134(2), 311 (2008). https:\/\/doi.org\/10.1037\/0033-2909.134.2.311.supp","journal-title":"Psychol. Bull."},{"issue":"1","key":"30_CR20","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/1467598032000044647","volume":"14","author":"A-FE Darwish","year":"2003","unstructured":"Darwish, A.-F.E., Huber, G.L.: Individualism vs. collectivism in different cultures: a cross-cultural study. Intercult. Educ. 14(1), 47\u201356 (2003). https:\/\/doi.org\/10.1080\/1467598032000044647","journal-title":"Intercult. Educ."},{"key":"30_CR21","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","volume":"69","author":"M Anwar","year":"2017","unstructured":"Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees\u2019 cybersecurity behaviors. Comput. Human Behav. 69, 437\u2013443 (2017)","journal-title":"Comput. Human Behav."},{"key":"30_CR22","unstructured":"TGM Research, MOBILE Panel Sample and ONLINE Surveys TGM Research"},{"key":"30_CR23","unstructured":"Hofstede, G.: Culture\u2019s consequences: international differences in work-related values, vol. 5 (1984)"},{"issue":"3","key":"30_CR24","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1177\/135910457000100301","volume":"1","author":"RW Brislin","year":"1970","unstructured":"Brislin, R.W.: Back-translation for cross-cultural research. J. Cross Cult. Psychol. 1(3), 185\u2013216 (1970)","journal-title":"J. Cross Cult. Psychol."},{"issue":"4","key":"30_CR25","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1080\/00223891.2012.666921","volume":"94","author":"M Appel","year":"2012","unstructured":"Appel, M., Gnambs, T., Maio, G.R.: A short measure of the need for affect. J. Pers. Assess. 94(4), 418\u2013426 (2012). https:\/\/doi.org\/10.1080\/00223891.2012.666921","journal-title":"J. Pers. Assess."},{"key":"30_CR26","doi-asserted-by":"publisher","unstructured":"de H. Coelho, G.L., Hanel, P.H.P., Wolf, L.J.: The very efficient assessment of need for cognition: developing a six-item version*. Assessment 27(8), 1870\u20131885 (2020). https:\/\/doi.org\/10.1177\/1073191118793208","DOI":"10.1177\/1073191118793208"},{"key":"30_CR27","unstructured":"Cori, F., Laura, D., Hong Jason, I.: A self-report measure of end-user security attitudes (SA-6). In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pp. 61\u201377 (2019)"},{"issue":"6","key":"30_CR28","doi-asserted-by":"publisher","first-page":"85","DOI":"10.21315\/mjms2018.25.6.9","volume":"25","author":"MA Bujang","year":"2018","unstructured":"Bujang, M.A., Omar, E.D., Baharum, N.A.: A review on sample size determination for Cronbach\u2019s alpha test: a simple guide for researchers. Malays. J. Med. Sci. 25(6), 85\u201399 (2018). https:\/\/doi.org\/10.21315\/mjms2018.25.6.9","journal-title":"Malays. J. Med. Sci."},{"issue":"2","key":"30_CR29","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1037\/0022-3514.71.2.390","volume":"71","author":"S Epstein","year":"1996","unstructured":"Epstein, S., Pacini, R., Denes-Raj, V., Heier, H.: Individual differences in intuitive-experiential and analytical-rational thinking styles. J. Pers. Soc. Psychol. 71(2), 390\u2013405 (1996)","journal-title":"J. Pers. Soc. Psychol."},{"key":"30_CR30","unstructured":"Microsoft, Microsoft Excel. https:\/\/www.microsoft.com\/en-us\/microsoft-365\/excel. Accessed 10 July 2024"},{"key":"30_CR31","unstructured":"JASP, JASP - A Fresh Way to Do Statistics. https:\/\/jasp-stats.org\/. Accessed 10 July 2024"},{"key":"30_CR32","doi-asserted-by":"publisher","unstructured":"Schmidt, A.F., Finan, C.: Linear regression and the normality assumption. Elsevier USA, 1 June 2018. https:\/\/doi.org\/10.1016\/j.jclinepi.2017.12.006","DOI":"10.1016\/j.jclinepi.2017.12.006"},{"key":"30_CR33","doi-asserted-by":"publisher","unstructured":"Egelman, S., Peer, E.: Scaling the security wall\u202f: developing a security behavior intentions scale (SeBIS). In: Conference on Human Factors in Computing Systems \u2013 Proceedings, pp. 2873\u20132882. Association for Computing Machinery, April 2015. https:\/\/doi.org\/10.1145\/2702123.2702249","DOI":"10.1145\/2702123.2702249"},{"issue":"5","key":"30_CR34","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1177\/0017896911409735","volume":"71","author":"GJ De Bruijn","year":"2012","unstructured":"De Bruijn, G.J., Keer, M., Van Den Putte, B., Neijens, P.: Need for affect, need for cognition, and the intention-fruit consumption relationship: an action-control perspective. Health Educ. J. 71(5), 617\u2013628 (2012). https:\/\/doi.org\/10.1177\/0017896911409735","journal-title":"Health Educ. J."},{"key":"30_CR35","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.dss.2015.12.007","volume":"83","author":"R Chakraborty","year":"2016","unstructured":"Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., Rao, H.R.: Online shopping intention in the context of data breach in online retail stores: an examination of older and younger adults. Decis. Support Syst. 83, 47\u201356 (2016)","journal-title":"Decis. Support Syst."},{"key":"30_CR36","doi-asserted-by":"publisher","unstructured":"Carrasco-Hern\u00e1ndez, L., et al.: A mobile health solution complementing psychopharmacology-supported smoking cessation: randomized controlled trial. JMIR Res. Protoc. 8(4), e12464 (2020). https:\/\/doi.org\/10.2196\/12464","DOI":"10.2196\/12464"},{"key":"30_CR37","doi-asserted-by":"crossref","unstructured":"Witte, K., Cameron, K.A., Mckeon, J.K., Berkowitz, J.M.: Predicting Risk Behaviors: Development and Validation of a Diagnostic Scale (1996)","DOI":"10.1080\/108107396127988"},{"key":"30_CR38","unstructured":"McBride, M., Carter, L., Warkentin, M.: Exploring the role of individual employee characteristics and personality on employee compliance with cybersecurity policies. In: RTI International-Institute for Homeland Security Solutions, vol. 5, no. 1, p. 1 (2012). www.dhs.gov"},{"key":"30_CR39","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","volume":"45","author":"L Li","year":"2019","unstructured":"Li, L., He, W., Xu, L., Ash, I., Anwar, M., Yuan, X.: Investigating the impact of cybersecurity policy awareness on employees\u2019 cybersecurity behavior. Int. J. Inf. Manage. 45, 13\u201324 (2019). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.10.017","journal-title":"Int. J. Inf. Manage."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0570-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T01:08:25Z","timestamp":1732928905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0570-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9789819605699","9789819605705"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0570-5_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wise2024-qatar.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}