{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:18:34Z","timestamp":1773415114272,"version":"3.50.1"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s00779-021-01560-1","type":"journal-article","created":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T21:03:13Z","timestamp":1617224593000},"page":"911-925","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6274-7850","authenticated-orcid":false,"given":"Mumtaz Abdul","family":"Hameed","sequence":"first","affiliation":[]},{"given":"Nalin Asanka Gamagedara","family":"Arachchilage","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,31]]},"reference":[{"issue":"2","key":"1560_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1080\/08911762.2017.1412552","volume":"31","author":"K Adhikari","year":"2018","unstructured":"Adhikari K, Panda RK (2018) Users\u2019 information privacy concerns and privacy protection behaviors in social networks. J Glob Mark 31(2):96\u2013110","journal-title":"J Glob Mark"},{"key":"1560_CR2","doi-asserted-by":"crossref","unstructured":"Alshboul A (2010) Information systems security measures and countermeasures: protecting organizational assets from malicious attacks. Communications of the IBIMA, pp 9p","DOI":"10.5171\/2010.486878"},{"issue":"3","key":"1560_CR3","doi-asserted-by":"publisher","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson CL, Agarwal R (2010) Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q 34(3):613\u2013643","journal-title":"MIS Q"},{"key":"1560_CR4","unstructured":"Arachchilage NAG, Hameed MA (2017) Integrating self-efficacy into a gamified approach to thwart phishing attacks. In: The Proceedings of 5th International Conference on Cybercrime and Computer Forensics (ICCCF)"},{"key":"1560_CR5","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","volume":"38","author":"NAG Arachchilage","year":"2014","unstructured":"Arachchilage NAG, Love S (2014) Security awareness of computer users: a phishing threat avoidance perspective. Comput Hum Behav 38:304\u2013312","journal-title":"Comput Hum Behav"},{"key":"1560_CR6","unstructured":"Aurigemma S, Mattson T (2014) Do it OR ELSE! Exploring the effectiveness of deterrence on employee compliance with information security policies. In: The Proceeding of the 20th Americas Conference on Information Systems AMCIS - 2014"},{"key":"1560_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.cose.2017.11.001","volume":"73","author":"S Aurigemma","year":"2018","unstructured":"Aurigemma S, Mattson T (2018) Exploring the effect of uncertainty avoidance on taking voluntary protective security actions. Comput Secur 73:219\u2013234","journal-title":"Comput Secur"},{"key":"1560_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1atrr.00035","volume":"5","author":"S Aurigemma","year":"2019","unstructured":"Aurigemma S, Mattson T, Leonard LNK (2019) Evaluating the core and full protection motivation theory nomologies for the voluntary adoption of password manager applications. AIS Trans Replication Res 5:1\u201321","journal-title":"AIS Trans Replication Res"},{"key":"1560_CR9","volume-title":"Self-efficacy: the exercise of control","author":"A Bandura","year":"1977","unstructured":"Bandura A (1977) Self-efficacy: the exercise of control. W. H. Freeman and Company, New York"},{"issue":"6","key":"1560_CR10","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1037\/0022-3514.51.6.1173","volume":"51","author":"RM Baron","year":"1986","unstructured":"Baron RM, Kenny DA (1986) The moderator\u2013mediator variable distinction in social psychological research: conceptual, strategic and statistical considerations. J Pers Soc Psychol 51(6):1173\u20131182","journal-title":"J Pers Soc Psychol"},{"key":"1560_CR11","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.im.2017.01.003","volume":"54","author":"F B\u00e9langer","year":"2017","unstructured":"B\u00e9langer F, Collignon S, Enget K, Negangard E (2017) Determinants of early conformance with information security policies. Inf Manag 54:887\u2013901","journal-title":"Inf Manag"},{"issue":"8","key":"1560_CR12","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1177\/0093650215607627","volume":"45","author":"SC Boerman","year":"2018","unstructured":"Boerman SC, Kruikemeier S, Borgesius FJZ (2018) Exploring motivations for online privacy protection behavior: insights from panel data. Commun Res 45(8):1103\u20131121","journal-title":"Commun Res"},{"issue":"3","key":"1560_CR13","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q 34(3):523\u2013555","journal-title":"MIS Q"},{"key":"1560_CR14","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.chb.2016.11.018","volume":"68","author":"AJ Burns","year":"2017","unstructured":"Burns AJ, Posey C, Tom L, Roberts TL, Lowry PB (2017) Examining the relationship of organizational insiders\u2019 psychological capital with information security threat and coping appraisals. Comput Hum Behav 68:190\u2013209","journal-title":"Comput Hum Behav"},{"issue":"3","key":"1560_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/15536548.2005.10855772","volume":"1","author":"M Chan","year":"2005","unstructured":"Chan M, Woon IMY, Kankanhalli A (2005) Perceptions of information security at the workplace: linking information security climate to compliant behavior. J Inf Privacy Secur 1(3):18\u201341","journal-title":"J Inf Privacy Secur"},{"issue":"4","key":"1560_CR16","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1177\/0266666917700231","volume":"34","author":"H Chaoguang","year":"2018","unstructured":"Chaoguang H, Feicheng M, Yifei Q, Yuchao W (2018) Exploring the determinants of health knowledge adoption in social media: an intention-behavior-gap perspective. Inf Dev 34(4):346\u2013363","journal-title":"Inf Dev"},{"key":"1560_CR17","doi-asserted-by":"crossref","unstructured":"Chenoweth T, Gattiker T, Corral K (2019) Adaptive and maladaptive coping with an it threat information systems management. 36(1):24\u201339","DOI":"10.1080\/10580530.2018.1553647"},{"issue":"6","key":"1560_CR18","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1080\/17517575.2017.1404132","volume":"12","author":"V Cho","year":"2018","unstructured":"Cho V, Ip WH (2018) A study of BYOD adoption from the lens of threat and coping appraisal of its security policy. Enterp Inf Syst 12(6):659\u2013673","journal-title":"Enterp Inf Syst"},{"key":"1560_CR19","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.chb.2016.08.034","volume":"65","author":"H Chou","year":"2016","unstructured":"Chou H, Chou C (2016) An analysis of multiple factors relating to teachers\u2019 problematic information security behavior. Comput Hum Behav 65:334\u2013345","journal-title":"Comput Hum Behav"},{"key":"1560_CR20","unstructured":"Cohen J (1988) Statistical power analysis for the behavioral sciences. (2nd ed.). Hillsdale, NJ"},{"issue":"2","key":"1560_CR21","doi-asserted-by":"publisher","first-page":"189","DOI":"10.2307\/249688","volume":"19","author":"DR Compeau","year":"1995","unstructured":"Compeau DR, Higgins CA (1995) Computer self-efficacy: development of a measure and initial test. MIS Q 19(2):189\u2013211","journal-title":"MIS Q"},{"key":"1560_CR22","volume-title":"The handbook of research synthesis and meta-analysis","author":"HM Cooper","year":"2009","unstructured":"Cooper HM, Hedges LV, Valentine JC (2009) The handbook of research synthesis and meta-analysis, 2nd edn. Russell Sage Foundation, New York","edition":"2"},{"key":"1560_CR23","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1016\/j.chb.2012.05.003","volume":"28","author":"J Cox","year":"2012","unstructured":"Cox J (2012) Information systems user security: a structured model of the knowing-doing gap. Comput Hum Behav 28:1849\u20131858","journal-title":"Comput Hum Behav"},{"key":"1560_CR24","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.cose.2012.09.010","volume":"32","author":"RE Crossler","year":"2013","unstructured":"Crossler RE, Johnston AC, Lowry PB, Hu Q, Warkentin M, Baskerville R (2013) Future directions for behavioral information security research. Comput Secur 32:90\u2013101","journal-title":"Comput Secur"},{"key":"1560_CR25","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1111\/j.1365-2575.2007.00289.x","volume":"19","author":"T Dinev","year":"2009","unstructured":"Dinev T, Goo J, Hu Q, Nam K (2009) User behaviour towards protective information technologies: the role of national cultural differences. Inf Syst J 19:391\u2013412","journal-title":"Inf Syst J"},{"key":"1560_CR26","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1002\/0470870168.ch8","volume-title":"Publication bias in meta-analysis: prevention, assessment, and adjustments","author":"SJ Duval","year":"2005","unstructured":"Duval SJ (2005) The trim and fill method. In: Rothstein HR, Sutton AJ, Borenstein M (eds) Publication bias in meta-analysis: prevention, assessment, and adjustments. Wiley, Chichester, pp 127\u2013144"},{"issue":"2","key":"1560_CR27","first-page":"17","volume":"2","author":"YS Feruza","year":"2007","unstructured":"Feruza YS, Kim T (2007) IT security review: privacy, protection, access control, assurance and system security. Int J Multimedia Ubiquitous Eng 2(2):17\u201332","journal-title":"Int J Multimedia Ubiquitous Eng"},{"key":"1560_CR28","volume-title":"Meta-analysis in social research","author":"GV Glass","year":"1981","unstructured":"Glass GV, McGaw B, Smith ML (1981) Meta-analysis in social research. SAGE, Beverly Hills, CA"},{"key":"1560_CR29","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.dss.2019.02.010","volume":"119","author":"M Grimes","year":"2019","unstructured":"Grimes M, Marquardson J (2019) Quality matters: evoking subjective norms and coping appraisals by system design to increase security intentions. Decis Support Syst 119:23\u201334","journal-title":"Decis Support Syst"},{"key":"1560_CR30","first-page":"407","volume":"9","author":"RA Guzzo","year":"1987","unstructured":"Guzzo RA, Jackson SE, Katzell RA (1987) Meta-analysis analysis. Res Organ Behav 9:407\u2013442","journal-title":"Res Organ Behav"},{"key":"1560_CR31","unstructured":"Hameed MA, Arachchilage NAG (2018) Understanding the influence of individual\u2019s self-efficacy for information systems security innovation adoption: a systematic literature review. In: The Proceeding of the17th Australian Cyber Warfare Conference (CWAR), arxiv.org\/abs\/1809.10890"},{"issue":"1","key":"1560_CR32","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1142\/S1363919614500078","volume":"18","author":"MA Hameed","year":"2014","unstructured":"Hameed MA, Counsell S (2014) Establishing relationship between innovation characteristics and IT innovation adoption in organizations: a meta-analysis approach. Int J Innov Manag 18(1):41","journal-title":"Int J Innov Manag"},{"issue":"5","key":"1560_CR33","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.im.2012.05.002","volume":"49","author":"MA Hameed","year":"2012","unstructured":"Hameed MA, Counsell S, Swift S (2012) A meta-analysis of relationships between organizational characteristics and IT innovation adoption in organizations. Inf Manag 49(5):218\u2013232","journal-title":"Inf Manag"},{"issue":"1","key":"1560_CR34","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/10580530.2015.1117842","volume":"33","author":"B Hanus","year":"2016","unstructured":"Hanus B, Wu YA (2016) Impact of users\u2019 security awareness on desktop security behavior: a protection motivation theory perspective. Inf Syst Manag 33(1):2\u201316","journal-title":"Inf Syst Manag"},{"issue":"2","key":"1560_CR35","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Hearth","year":"2009","unstructured":"Hearth T, Rao HR (2009) Protection motivation and deterrence: a framework for security policy compliance in organizations. Eur J Inf Syst 18(2):106\u2013125","journal-title":"Eur J Inf Syst"},{"issue":"1","key":"1560_CR36","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1111\/j.1365-2575.2012.00420.x","volume":"24","author":"T Herath","year":"2014","unstructured":"Herath T, Chen R, Wang J, Banjara K, Wilbur J, Rao HR (2014) Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Inf Syst J 24(1):61\u201384","journal-title":"Inf Syst J"},{"key":"1560_CR37","doi-asserted-by":"crossref","unstructured":"Hu WW (2010) Self-efficacy and individual knowledge sharing. In: The Proceeding of the 3rd International Conference on Information Management, Innovation Management and Industrial Engineering","DOI":"10.1109\/ICIII.2010.261"},{"key":"1560_CR38","volume-title":"Meta-analysis","author":"JE Hunter","year":"1982","unstructured":"Hunter JE, Schmidt FL, Jackson GB (1982) Meta-analysis. Sage, Beverly Hills, CA"},{"key":"1560_CR39","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo P (2012) Understanding information systems security policy compliance: an integration of the theory of planned behaviour and the protection motivation theory. Comput Secur 31:83\u201395","journal-title":"Comput Secur"},{"issue":"1","key":"1560_CR40","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","volume":"51","author":"P Ifinedo","year":"2014","unstructured":"Ifinedo P (2014) Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition. Inf Manag 51(1):69\u201379","journal-title":"Inf Manag"},{"issue":"8","key":"1560_CR41","doi-asserted-by":"publisher","first-page":"e124","DOI":"10.1371\/journal.pmed.0020124","volume":"2","author":"JPA Ioannidis","year":"2005","unstructured":"Ioannidis JPA (2005) Why most published research findings are false. PLoS Med 2(8):e124. https:\/\/doi.org\/10.1371\/journal.pmed.0020124","journal-title":"PLoS Med"},{"key":"1560_CR42","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.chb.2018.05.010","volume":"87","author":"J Jansen","year":"2018","unstructured":"Jansen J, Van Schaik P (2018) Testing a model of precautionary online behaviour: the case of online banking. Comput Hum Behav 87:371\u2013383","journal-title":"Comput Hum Behav"},{"key":"1560_CR43","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.ijhcs.2018.10.004","volume":"123","author":"J Jansen","year":"2019","unstructured":"Jansen J, Van Schaik P (2019) The design and evaluation of a theory-based intervention to promote security behaviour against phishing. Int J Hum Comput Stud 123:40\u201355","journal-title":"Int J Hum Comput Stud"},{"issue":"3","key":"1560_CR44","doi-asserted-by":"publisher","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"AC Johnston","year":"2010","unstructured":"Johnston AC, Warkentin M (2010) Fear appeal and information security behaviors: an empirical study. MIS Q 34(3):549\u2013566","journal-title":"MIS Q"},{"key":"1560_CR45","unstructured":"Keele S (2007) Guidelines for performing systematic literature reviews in software engineering. In: Technical report, Ver. 2.3 EBSE Technical Report. EBSE"},{"key":"1560_CR46","first-page":"665","volume":"16","author":"WR King","year":"2005","unstructured":"King WR, He J (2005) Understanding the role and methods of meta-analysis in IS research. Commun Assoc Inf Syst 16:665\u2013686","journal-title":"Commun Assoc Inf Syst"},{"key":"1560_CR47","unstructured":"Kitchenham B (2004) Procedures for performing systematic reviews. Keele University, UK. University Technical Report Citeseer, Vol. 33"},{"key":"1560_CR48","doi-asserted-by":"publisher","DOI":"10.1515\/9781400846184","volume-title":"Handbook of meta-analysis in ecology and evolution","author":"J Koricheva","year":"2013","unstructured":"Koricheva J, Gurevitch J, Mengersen K (2013) Handbook of meta-analysis in ecology and evolution. Princeton University Press, New Jersey"},{"key":"1560_CR49","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.dss.2011.09.002","volume":"52","author":"F Lai","year":"2012","unstructured":"Lai F, Li D, Hsieh C (2012) Fighting identity theft: the coping perspective. Decis Support Syst 52:353\u2013363","journal-title":"Decis Support Syst"},{"issue":"12","key":"1560_CR50","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1108\/MRR-04-2013-0085","volume":"37","author":"B Lebek","year":"2014","unstructured":"Lebek B, Uffen J, Neumann M, Hohler B, Breitner MH (2014) Information security awareness and behavior: a theory-based literature review. Manag Res Rev 37(12):1049\u20131092","journal-title":"Manag Res Rev"},{"issue":"2","key":"1560_CR51","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1057\/ejis.2009.11","volume":"18","author":"Y Lee","year":"2009","unstructured":"Lee Y, Larsen KR (2009) Threat or coping appraisal: determinants of SMB executive\u2019s decision to adopt anti-malware software. Eur J Inf Syst 18(2):177\u2013187","journal-title":"Eur J Inf Syst"},{"issue":"8","key":"1560_CR52","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1016\/j.im.2006.09.003","volume":"43","author":"G Lee","year":"2006","unstructured":"Lee G, Xia W (2006) Organizational size and IT innovation adoption: a meta-analysis. Inf Manag 43(8):975\u2013985","journal-title":"Inf Manag"},{"key":"1560_CR53","unstructured":"Lee Y, Lee JY, Liu Y (2007) Protection motivation theory in information system adoption: a case of anti-plagiarism system. In: The Proceedings of Americas Conference on Information Systems 2007"},{"issue":"5","key":"1560_CR54","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1080\/01449290600879344","volume":"27","author":"D Lee","year":"2008","unstructured":"Lee D, Larose R, Rifon N (2008) Keeping our network safe: a model of online protection behaviour. Behav Inform Technol 27(5):445\u2013454","journal-title":"Behav Inform Technol"},{"key":"1560_CR55","unstructured":"Li Y, Wang J, Rao HR (2017) Adoption of identity protection service: an integrated protection motivation - precaution adoption process model. In: The Proceedings of Twenty-third Americas Conference on Information Systems 2017"},{"key":"1560_CR56","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","volume":"45","author":"L Li","year":"2019","unstructured":"Li L, H W, Xu L, Ash I, Anwar M, Yuan X (2019) Investigating the impact of cybersecurity policy awareness on employees\u2019 cybersecurity behavior. Int J Inf Manag 45:13\u201324","journal-title":"Int J Inf Manag"},{"issue":"7","key":"1560_CR57","first-page":"394","volume":"11","author":"H Liang","year":"2010","unstructured":"Liang H, Xue Y (2010) Understanding security behaviors in personal computer usage: a threat avoidance perspective. J Assoc Inf Syst 11(7):394\u2013414","journal-title":"J Assoc Inf Syst"},{"key":"1560_CR58","volume-title":"Practical meta-analysis","author":"M Lipsey","year":"2001","unstructured":"Lipsey M, Wilson D (2001) Practical meta-analysis. Sage, Thousand Oaks"},{"key":"1560_CR59","unstructured":"Lui SM, Hui W (2011) The effects of knowledge on security technology adoption: results from a quasi-experiment. In: The Proceedings of the 5th International Conference on New Trends in Information Science and Service Science"},{"key":"1560_CR60","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/S0272-6963(98)00021-7","volume":"16","author":"MK Malhotra","year":"1998","unstructured":"Malhotra MK, Grover V (1998) An assessment of survey research in POM: from constructs to theory. J Oper Manag 16:407\u2013425","journal-title":"J Oper Manag"},{"issue":"3","key":"1560_CR61","doi-asserted-by":"publisher","first-page":"170","DOI":"10.17705\/1thci.00032","volume":"3","author":"K Marett","year":"2011","unstructured":"Marett K, Harris RB, McNab AL (2011) Social networking websites and posting personal information: an evaluation of protection motivation theory. Trans Hum Comput Interact 3(3):170\u2013189","journal-title":"Trans Hum Comput Interact"},{"issue":"2","key":"1560_CR62","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1037\/0033-2909.108.2.171","volume":"108","author":"JE Mathieu","year":"1990","unstructured":"Mathieu JE, Zajac DM (1990) A review and meta-analysis of the antecedents, correlates, and consequences of organizational commitment. Psychol Bull 108(2):171\u2013194","journal-title":"Psychol Bull"},{"key":"1560_CR63","doi-asserted-by":"crossref","unstructured":"Mayer P, Kunz A, Volkamer M (2017) Reliable behavioural factors in the information security context. In: The Proceedings of the 12th International Conference on Availability, Reliability and Security","DOI":"10.1145\/3098954.3098986"},{"issue":"1","key":"1560_CR64","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/15536548.2013.10845672","volume":"9","author":"P Meso","year":"2013","unstructured":"Meso P, Ding Y, Xu S (2013) Applying protection motivation theory to information security training for college students. J Inf Privacy Secur 9(1):47\u201367","journal-title":"J Inf Privacy Secur"},{"key":"1560_CR65","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1016\/j.chb.2012.07.008","volume":"28","author":"N Mohamed","year":"2012","unstructured":"Mohamed N, Ahmad I (2012) Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput Hum Behav 28:2366\u20132375","journal-title":"Comput Hum Behav"},{"key":"1560_CR66","first-page":"147","volume":"42","author":"F Mwagwabi","year":"2018","unstructured":"Mwagwabi F, McGill T, Dixon M (2018) Short-term and long-term effects of fear appeals in improving compliance with password guidelines. Commun Assoc Inf Syst 42:147\u2013182","journal-title":"Commun Assoc Inf Syst"},{"issue":"4","key":"1560_CR67","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","volume":"46","author":"BY Ng","year":"2009","unstructured":"Ng BY, Kankanhalli A, Xu Y (2009) Studying users\u2019 computer security behavior using the health belief model. Decis Support Syst 46(4):815\u2013825","journal-title":"Decis Support Syst"},{"issue":"43","key":"1560_CR68","first-page":"879","volume":"37","author":"C Okoli","year":"2015","unstructured":"Okoli C (2015) A guide to conducting a standalone systematic literature review. Commun Assoc Inf Syst 37(43):879\u2013910","journal-title":"Commun Assoc Inf Syst"},{"key":"1560_CR69","doi-asserted-by":"crossref","unstructured":"Pahnila S, Siponen M, Mahmood MA (2007) Employee\u2019s behavior towards IS security policy compliance. In: The Proceedings of 40th Hawaii International Conference on System Sciences, p 1561","DOI":"10.1109\/HICSS.2007.206"},{"key":"1560_CR70","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1037\/0033-2909.97.2.274","volume":"97","author":"LH Peters","year":"1985","unstructured":"Peters LH, Hartke DD, Pohlmann JT (1985) Fiedler\u2019s contingency theory of leadership: an application of the meta-analysis procedures of Schmidt and Hunter. Psychol Bull 97:274\u2013285","journal-title":"Psychol Bull"},{"key":"1560_CR71","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1086\/323732","volume":"28","author":"RA Peterson","year":"2001","unstructured":"Peterson RA (2001) On the use of college students in social research: insights from a second-order meta-analysis. J Consum Res 28:450\u2013461","journal-title":"J Consum Res"},{"key":"1560_CR72","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.jbusres.2013.08.010","volume":"67","author":"RA Peterson","year":"2014","unstructured":"Peterson RA, Merunka DR (2014) Convenience samples of college students and research reproducibility. J Bus Res 67:1035\u20131041","journal-title":"J Bus Res"},{"key":"1560_CR73","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.cose.2018.09.016","volume":"80","author":"M Rajab","year":"2019","unstructured":"Rajab M, Eydgahi A (2019) Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Comput Secur 80:211\u2013223","journal-title":"Comput Secur"},{"key":"1560_CR74","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","volume":"28","author":"H Rhee","year":"2009","unstructured":"Rhee H, Kim C, Ryuc YC (2009) Self-efficacy in information security: its influence on end users\u2019 information security practice behaviour. Comput Secur 28:816\u2013826","journal-title":"Comput Secur"},{"key":"1560_CR75","first-page":"153","volume-title":"Social Psychophysiology","author":"RW Rogers","year":"1983","unstructured":"Rogers RW (1983) Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo J, Petty R (eds) Social Psychophysiology. Guilford Press, New York, pp 153\u2013176"},{"key":"1560_CR76","volume-title":"Meta-analytic procedures for social research","author":"R Rosenthal","year":"1984","unstructured":"Rosenthal R (1984) Meta-analytic procedures for social research. SAGE Publication, London"},{"key":"1560_CR77","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1146\/annurev.psych.52.1.59","volume":"52","author":"R Rosenthal","year":"2001","unstructured":"Rosenthal R, DiMatteo MR (2001) Meta-analysis: recent developments in quantitative methods for literature reviews. Annu Rev Psychol 52:59\u201382","journal-title":"Annu Rev Psychol"},{"key":"1560_CR78","first-page":"1","volume":"54","author":"M Sher","year":"2017","unstructured":"Sher M, Talley PC, Yang C, Kuo K (2017) Compliance with electronic medical records privacy policy: an empirical investigation of hospital information technology staff. J Health Care Organ Provision Financ 54:1\u201312","journal-title":"J Health Care Organ Provision Financ"},{"key":"1560_CR79","doi-asserted-by":"crossref","unstructured":"Siponen MT, Pahnila S, Mahmood A (2007) Employees\u2019 adherence to information security policies: an empirical study. In: The Proceedings of the International Federation for Information Processing IFIP SEC 2007 Conference 2007","DOI":"10.1007\/978-0-387-72367-9_12"},{"key":"1560_CR80","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","volume":"51","author":"M Siponen","year":"2014","unstructured":"Siponen M, Mahmood MA, Pahnila S (2014) Employees\u2019 adherence to information security policies: an exploratory feld study. Inf Manag 51:217\u2013224","journal-title":"Inf Manag"},{"issue":"1","key":"1560_CR81","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1108\/IMCS-08-2012-0045","volume":"22","author":"T Sommestad","year":"2014","unstructured":"Sommestad T, Hallberg J, Lundholm K, Bengtsson J (2014) Variables influencing information security policy compliance. Inf Manag Comput Secur 22(1):42\u201375","journal-title":"Inf Manag Comput Secur"},{"issue":"7","key":"1560_CR82","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.im.2011.07.002","volume":"48","author":"JY Son","year":"2011","unstructured":"Son JY (2011) Out of fear or desire? Toward a better understanding of employees\u2019 motivation to follow IS security policies. Inf Manag 48(7):296\u2013302","journal-title":"Inf Manag"},{"issue":"2","key":"1560_CR83","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"J Stanton","year":"2005","unstructured":"Stanton J, Stam K, Mastrangelo P, Jolton J (2005) Analysis of end user security behaviors. Comput Secur 24(2):124\u2013133","journal-title":"Comput Secur"},{"key":"1560_CR84","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.chb.2016.02.004","volume":"59","author":"JC Sun","year":"2016","unstructured":"Sun JC, Yu S, Lin SSJ, Tseng S (2016) The mediating effect of anti-phishing self-efficacy between college students\u2019 Internet self-efficacy and anti-phishing behavior and gender difference. Comput Hum Behav 59:249\u2013257","journal-title":"Comput Hum Behav"},{"key":"1560_CR85","doi-asserted-by":"crossref","unstructured":"Tamjidyamcholo A, Baba, MSB, Gholipour R, Yamchello HT (2013a) Information security professional perceptions of knowledge-sharing intention in virtual communities under social cognitive theory. In: The Proceedings of the 3rd International Conference on Research and Innovation in Information Systems\u20132013","DOI":"10.1109\/ICRIIS.2013.6716746"},{"key":"1560_CR86","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.compedu.2013.05.010","volume":"68","author":"A Tamjidyamcholo","year":"2013","unstructured":"Tamjidyamcholo A, Baba MSB, Tamjid H, Gholipour R (2013b) Information security - professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language. Comput Educ 68:223\u2013232","journal-title":"Comput Educ"},{"key":"1560_CR87","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.cose.2017.07.003","volume":"70","author":"N Thompson","year":"2017","unstructured":"Thompson N, McGill TJ, Wan X (2017) Security begins at home: determinants of home computer and mobile device security behaviour. Comput Secur 70:376\u2013391","journal-title":"Comput Secur"},{"issue":"4","key":"1560_CR88","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1080\/014492999119039","volume":"18","author":"R Torkzadeh","year":"1999","unstructured":"Torkzadeh R, Pflughoeft K, Hall L (1999) Computer self-efficacy, training effectiveness and user attitudes. An empirical study. Behav Inform Technol 18(4):299\u2013309","journal-title":"Behav Inform Technol"},{"key":"1560_CR89","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","volume":"59","author":"HYS Tsai","year":"2016","unstructured":"Tsai HYS, Jiang M, Alhabash S, LaRose R, Rifon NJ, Cotten SR (2016) Understanding online safety behaviors: a protection motivation theory perspective. Comput Secur 59:138\u2013150","journal-title":"Comput Secur"},{"key":"1560_CR90","unstructured":"Tu CZ, Adkins J, Zhao GY (2018) Complying with BYOD security policies: a moderation model. In: The Proceedings of the Midwest United States Association for Information Systems 2018. http:\/\/aisel.aisnet.org\/mwais2018\/25"},{"key":"1560_CR91","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance A, Siponen M, Pahnila S (2012) Motivating IS security compliance: insights from habit and protection motivation theory. Inf Manag 49:190\u2013198","journal-title":"Inf Manag"},{"key":"1560_CR92","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/j.cose.2018.03.008","volume":"77","author":"SF Verkijika","year":"2018","unstructured":"Verkijika SF (2018) Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret. Comput Secur 77:860\u2013870","journal-title":"Comput Secur"},{"key":"1560_CR93","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.dss.2016.09.013","volume":"92","author":"M Warkentin","year":"2016","unstructured":"Warkentin M, Johnston AC, Shropshire J, Barnett WD (2016) Continuance of protective security behavior: a longitudinal study. Decis Support Syst 92:25\u201335","journal-title":"Decis Support Syst"},{"issue":"3","key":"1560_CR94","first-page":"348","volume":"13","author":"L Wei","year":"2008","unstructured":"Wei L, Zhang M (2008) The impact of Internet knowledge on college students\u2019 intention to continue to use the Internet. Inf Res 13(3):348","journal-title":"Inf Res"},{"issue":"4","key":"1560_CR95","first-page":"353","volume":"57","author":"G White","year":"2017","unstructured":"White G, Ekin T, Visinescu L (2017) Analysis of protective behavior and security incidents for home computers. J Comput Inf Syst 57(4):353\u2013363","journal-title":"J Comput Inf Syst"},{"key":"1560_CR96","doi-asserted-by":"publisher","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","volume":"24","author":"M Workman","year":"2008","unstructured":"Workman M, Bommer W, Straub D (2008) Security lapses and the omission of information security measures: a threat control model and empirical test. Comput Hum Behav 24:2799\u20132816","journal-title":"Comput Hum Behav"},{"issue":"4","key":"1560_CR97","first-page":"407","volume":"23","author":"C Yoon","year":"2012","unstructured":"Yoon C, Hwang JW, Kim R (2012) Exploring factors that influence students\u2019 behaviors in information security. J Inf Syst Educ 23(4):407\u2013417","journal-title":"J Inf Syst Educ"},{"key":"1560_CR98","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.im.2017.11.003","volume":"55","author":"X Zhang","year":"2018","unstructured":"Zhang X, Liu S, Chen X, Wang L, Gao B, Zhu Q (2018) Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Inf Manag 55:482\u2013493","journal-title":"Inf Manag"},{"issue":"12","key":"1560_CR99","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1287\/mnsc.28.12.1421","volume":"28","author":"RW Zmud","year":"1982","unstructured":"Zmud RW (1982) Diffusion of modern software practices: influence of centralization and formalization. Manag Sci 28(12):1421\u20131431","journal-title":"Manag Sci"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01560-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-021-01560-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01560-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T12:14:36Z","timestamp":1698840876000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-021-01560-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,31]]},"references-count":99,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1560"],"URL":"https:\/\/doi.org\/10.1007\/s00779-021-01560-1","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,31]]},"assertion":[{"value":"31 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}