{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:23:43Z","timestamp":1775107423741,"version":"3.50.1"},"reference-count":117,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T00:00:00Z","timestamp":1714089600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T00:00:00Z","timestamp":1714089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00859-3","type":"journal-article","created":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T13:02:05Z","timestamp":1714136525000},"page":"2515-2530","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7302-2820","authenticated-orcid":false,"given":"Ahmed M.","family":"Asfahani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"859_CR1","doi-asserted-by":"publisher","first-page":"100034","DOI":"10.1016\/j.jeconc.2023.100034","volume":"2","author":"G Sarkar","year":"2023","unstructured":"Sarkar, G., Shukla, S.K.: Behavioral analysis of cybercrime: Paving the way for effective policing strategies. J. Econ. Criminol. 2, 100034 (2023). https:\/\/doi.org\/10.1016\/j.jeconc.2023.100034","journal-title":"J. Econ. Criminol."},{"key":"859_CR2","doi-asserted-by":"publisher","unstructured":"Dalal, R.S., Howard, D.J., Bennett, R.J., Posey, C., Zaccaro, S.J., Brummel, B.J.: Organizational science and cybersecurity: Abundant opportunities for research at the interface. J. Bus. Psychol. 37(1) (2022). https:\/\/doi.org\/10.1007\/s10869-021-09732-9","DOI":"10.1007\/s10869-021-09732-9"},{"key":"859_CR3","doi-asserted-by":"publisher","unstructured":"Posey, C., Folger, R.: An exploratory examination of organizational insiders\u2019 descriptive and normative perceptions of cyber-relevant rights and responsibilities. Comput. Secur. 99 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.102038","DOI":"10.1016\/j.cose.2020.102038"},{"key":"859_CR4","doi-asserted-by":"publisher","unstructured":"AlMindeel, R., Martins, J.T.: Information security awareness in a developing country context: Insights from the government sector in Saudi Arabia. Inf. Technol. People. 34(2), 770\u2013788 (Mar. 2021). https:\/\/doi.org\/10.1108\/ITP-06-2019-0269\/FULL\/XML","DOI":"10.1108\/ITP-06-2019-0269\/FULL\/XML"},{"key":"859_CR5","doi-asserted-by":"publisher","first-page":"302","DOI":"10.3390\/jcp1020017","volume":"1","author":"A Alrubaiq","year":"2021","unstructured":"Alrubaiq, A., Alharbi, T.: Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia. J. Cybersecur. Priv. 1, 302\u2013318 (2021). no. 210.3390\/jcp1020017","journal-title":"J. Cybersecur. Priv."},{"key":"859_CR6","doi-asserted-by":"publisher","unstructured":"Saeed, S., Digital Workplaces and Information Security Behavior of Business Employees: An empirical study of Saudi Arabia. Sustainability. 15, 6019 (Mar. 2023). https:\/\/doi.org\/10.3390\/SU15076019","DOI":"10.3390\/SU15076019"},{"issue":"4","key":"859_CR7","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/s40171-022-00320-1","volume":"23","author":"MC Almeida","year":"2022","unstructured":"Almeida, M.C., Yoshikuni, A.C., Dwivedi, R., Larieira, C.L.C.: Do Leadership styles Influence Employee Information systems Security Intention? A study of the Banking Industry. Glob J. Flex. Syst. Manag. 23(4), 535\u2013550 (2022). https:\/\/doi.org\/10.1007\/s40171-022-00320-1","journal-title":"Glob J. Flex. Syst. Manag"},{"key":"859_CR8","doi-asserted-by":"publisher","unstructured":"Onumo, A., Ullah-Awan, I., Cullen, A.: Assessing the moderating effect of Security Technologies on employees Compliance with Cybersecurity Control procedures. ACM Trans. Manag Inf. Syst. 12(2) (2021). https:\/\/doi.org\/10.1145\/3424282","DOI":"10.1145\/3424282"},{"key":"859_CR9","doi-asserted-by":"publisher","unstructured":"Dodge, C.E., Fisk, N., Burruss, G.W., Moule, R.K. Jr., Jaynes, C.M.: What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory. Criminol. Public. Policy. (Sep. 2023). https:\/\/doi.org\/10.1111\/1745-9133.12641","DOI":"10.1111\/1745-9133.12641"},{"key":"859_CR10","doi-asserted-by":"publisher","unstructured":"Yl\u00f6nen, M., et al.: Integrated management of safety and security in Seveso sites - sociotechnical perspectives. Saf. Sci. 151 (2022). https:\/\/doi.org\/10.1016\/j.ssci.2022.105741","DOI":"10.1016\/j.ssci.2022.105741"},{"issue":"8","key":"859_CR11","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1108\/ITP-07-2022-0515","volume":"36","author":"A Alyami","year":"2023","unstructured":"Alyami, A., Sammon, D., Neville, K., Mahony, C.: The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: A lifecycle model. Inf. Technol. People. 36(8), 94\u2013125 (2023). https:\/\/doi.org\/10.1108\/ITP-07-2022-0515","journal-title":"Inf. Technol. People"},{"key":"859_CR12","doi-asserted-by":"publisher","unstructured":"Shin, B., Lowry, P.B.: A review and theoretical explanation of the \u2018Cyberthreat-Intelligence (CTI) capability\u2019 that needs to be fostered in information security practitioners and how this can be accomplished. Comput. Secur. 92 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101761","DOI":"10.1016\/j.cose.2020.101761"},{"key":"859_CR13","unstructured":"Subach, I., Mogylevych, D., Mykytiuk, A., Kubrak, V., Korotayev, S.: Design Methodology of Cybersecurity Situational Center, in CEUR Workshop Proceedings, vol. 3187, pp. 79\u201388. [Online]. Available: (2021). https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85137143260&partnerID=40&md5=29e5ba74cf30484f4df17ddfedbcb4b2"},{"issue":"2","key":"859_CR14","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1080\/08874417.2019.1571458","volume":"61","author":"S Wang","year":"2021","unstructured":"Wang, S., Wang, H.: Knowledge Management for Cybersecurity in Business organizations: A Case Study. J. Comput. Inf. Syst. 61(2), 174\u2013181 (2021). https:\/\/doi.org\/10.1080\/08874417.2019.1571458","journal-title":"J. Comput. Inf. Syst."},{"key":"859_CR15","doi-asserted-by":"publisher","unstructured":"Davis, J.H., Schoorman, F.D., Donaldson, L.: Toward a stewardship theory of management, in Business Ethics and Strategy, Volumes I and II, University of Notre Dame, India: Taylor and Francis, pp. 473\u2013500. (2018). https:\/\/doi.org\/10.4324\/9781315261102-29","DOI":"10.4324\/9781315261102-29"},{"issue":"5","key":"859_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","volume":"19","author":"JE Maddux","year":"1983","unstructured":"Maddux, J.E., Rogers, R.W.: Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 19(5), 469\u2013479 (1983). https:\/\/doi.org\/10.1016\/0022-1031(83)90023-9","journal-title":"J. Exp. Soc. Psychol."},{"key":"859_CR17","doi-asserted-by":"publisher","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (Dec. 1991). https:\/\/doi.org\/10.1016\/0749-5978(91)90020-T","DOI":"10.1016\/0749-5978(91)90020-T"},{"issue":"5","key":"859_CR18","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/j.bushor.2021.08.001","volume":"65","author":"LM Sama","year":"2022","unstructured":"Sama, L.M., Stefanidis, A., Casselman, R.M.: Rethinking corporate governance in the digital economy: The role of stewardship. Bus. Horiz. 65(5), 535\u2013546 (2022). https:\/\/doi.org\/10.1016\/j.bushor.2021.08.001","journal-title":"Bus. Horiz"},{"issue":"2","key":"859_CR19","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1177\/0972262920987326","volume":"25","author":"M Kaur","year":"2021","unstructured":"Kaur, M., Malik, K., Sharma, S.: A note on boardroom challenge, Board effectiveness and corporate stewardship during COVID-19. Vision. 25(2), 131\u2013135 (2021). https:\/\/doi.org\/10.1177\/0972262920987326","journal-title":"Vision"},{"key":"859_CR20","doi-asserted-by":"publisher","unstructured":"Ali, R.F., Dominic, P.D.D., Ali, S.E., Rehman, M., Sohail, A.: Information Security Behavior and Information Security Policy Compliance: A systematic literature review for identifying the Transformation process from Noncompliance to Compliance. Appl. Sci. 11(8) (2021). https:\/\/doi.org\/10.3390\/app11083383","DOI":"10.3390\/app11083383"},{"key":"859_CR21","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-031-17131-4_8","volume-title":"Public-Private Stewardship: Achieving Value-for-Money in Public-Private Partnerships","author":"JM Steinfeld","year":"2023","unstructured":"Steinfeld, J.M.: Stewardship theory over Agency Theory. In: Steinfeld, J.M. (ed.) in Public-Private Stewardship: Achieving Value-for-Money in Public-Private Partnerships, pp. 123\u2013134. Springer International Publishing, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-17131-4_8"},{"key":"859_CR22","doi-asserted-by":"publisher","unstructured":"Almansoori, A., Al-Emran, M., Shaalan, K.: Exploring the frontiers of Cybersecurity Behavior: A systematic review of studies and theories. Appl. Sci. 13(9) (2023). https:\/\/doi.org\/10.3390\/app13095700","DOI":"10.3390\/app13095700"},{"key":"859_CR23","doi-asserted-by":"publisher","unstructured":"Shahbaznezhad, H., Kolini, F., Rashidirad, M.: Employees\u2019 Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter? J. Comput. Inf. Syst, vol. 61, no. 6, pp. 539\u2013550, Nov. (2021). https:\/\/doi.org\/10.1080\/08874417.2020.1812134","DOI":"10.1080\/08874417.2020.1812134"},{"issue":"3","key":"859_CR24","doi-asserted-by":"publisher","first-page":"534","DOI":"10.5465\/amr.2019.0178","volume":"46","author":"RW Gregory","year":"2021","unstructured":"Gregory, R.W., Henfridsson, O., Kaganer, E., Kyriakou, S.H.: The role of artificial intelligence and data network effects for creating user value. Acad. Manag Rev. 46(3), 534\u2013551 (2021). https:\/\/doi.org\/10.5465\/amr.2019.0178","journal-title":"Acad. Manag Rev."},{"key":"859_CR25","doi-asserted-by":"publisher","unstructured":"Banks, G.C., Woznyj, H.M., Mansfield, C.A.: Where is \u2018behavior\u2019 in organizational behavior? A call for a revolution in leadership research and beyond. Leadersh. Q. 101581 (2021). https:\/\/doi.org\/10.1016\/j.leaqua.2021.101581","DOI":"10.1016\/j.leaqua.2021.101581"},{"issue":"7","key":"859_CR26","doi-asserted-by":"publisher","first-page":"3160","DOI":"10.1002\/bse.2796","volume":"30","author":"AC Bertassini","year":"2021","unstructured":"Bertassini, A.C., Ometto, A.R., Severengiz, S., Gerolamo, M.C.: Circular economy and sustainability: The role of organizational behaviour in the transition journey. Bus. Strateg Environ. 30(7), 3160\u20133193 (2021). https:\/\/doi.org\/10.1002\/bse.2796","journal-title":"Bus. Strateg Environ."},{"key":"859_CR27","doi-asserted-by":"publisher","unstructured":"Reeves, A., Delfabbro, P., Calic, D.: Encouraging Employee Engagement with Cybersecurity: How to tackle Cyber fatigue. SAGE Open. 11(1) (2021). https:\/\/doi.org\/10.1177\/21582440211000049","DOI":"10.1177\/21582440211000049"},{"key":"859_CR28","doi-asserted-by":"publisher","unstructured":"Farshadkhah, S., Van Slyke, C., Fuller, B.: Onlooker effect and affective responses in information security violation mitigation. Comput. Secur. 100 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102082","DOI":"10.1016\/j.cose.2020.102082"},{"key":"859_CR29","doi-asserted-by":"publisher","unstructured":"Donalds, C., Osei-Bryson, K.-M.: Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. Int. J. Inf. Manage. 51 (2020). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.102056","DOI":"10.1016\/j.ijinfomgt.2019.102056"},{"key":"859_CR30","doi-asserted-by":"publisher","unstructured":"Maalem Lahcen, R.A., Caulkins, B., Mohapatra, R., Kumar, M.: Review and insight on the behavioral aspects of cybersecurity. Cybersecurity. 3(1) (2020). https:\/\/doi.org\/10.1186\/s42400-020-00050-w","DOI":"10.1186\/s42400-020-00050-w"},{"key":"859_CR31","doi-asserted-by":"publisher","first-page":"573","DOI":"10.3390\/jcp2030029","volume":"2","author":"WJ Triplett","year":"2022","unstructured":"Triplett, W.J.: Addressing human factors in Cybersecurity Leadership. J. Cybersecur. Priv. 2, 573\u2013586 (2022). no. 310.3390\/jcp2030029","journal-title":"J. Cybersecur. Priv."},{"issue":"5","key":"859_CR32","doi-asserted-by":"publisher","first-page":"102168","DOI":"10.1016\/j.ibusrev.2023.102168","volume":"32","author":"S Freeman","year":"2023","unstructured":"Freeman, S., Vissak, T., Nummela, N., Trudgen, R.: Do technology-focused fast internationalizers\u2019 performance measures change as they mature? Int. Bus. Rev. 32(5), 102168 (2023). https:\/\/doi.org\/10.1016\/j.ibusrev.2023.102168","journal-title":"Int. Bus. Rev."},{"key":"859_CR33","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.3390\/smartcities6030072","volume":"6","author":"N Alhalafi","year":"2023","unstructured":"Alhalafi, N., Veeraraghavan, P.: Exploring the challenges and issues in adopting Cybersecurity in Saudi Smart cities: Conceptualization of the Cybersecurity-based UTAUT Model. Smart Cities. 6, 1523\u20131544 (2023). no. 310.3390\/smartcities6030072","journal-title":"Smart Cities"},{"key":"859_CR34","doi-asserted-by":"publisher","first-page":"102520","DOI":"10.1016\/j.ijinfomgt.2022.102520","volume":"66","author":"L-W Wong","year":"2022","unstructured":"Wong, L.-W., Lee, V.-H., Tan, G.W.-H., Ooi, K.-B., Sohal, A.: The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. Int. J. Inf. Manage. 66, 102520 (2022). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2022.102520","journal-title":"Int. J. Inf. Manage."},{"key":"859_CR35","doi-asserted-by":"publisher","unstructured":"Castelo-Branco, I., Oliveira, T., Sim\u00f5es-Coelho, P., Portugal, J., Filipe, I.: Measuring the fourth industrial revolution through the industry 4.0 lens: The relevance of resources, capabilities and the value chain. Comput. Ind. 138 (2022). https:\/\/doi.org\/10.1016\/j.compind.2022.103639","DOI":"10.1016\/j.compind.2022.103639"},{"key":"859_CR36","doi-asserted-by":"publisher","unstructured":"Ram\u00edrez, M., Rodr\u00edguez Ariza, L., G\u00f3mez, M.E., Miranda, Vartika: The disclosures of information on cybersecurity in listed companies in Latin America\u2014proposal for a Cybersecurity Disclosure Index. Sustainability. 14(3) (2022). https:\/\/doi.org\/10.3390\/su14031390","DOI":"10.3390\/su14031390"},{"key":"859_CR37","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","volume":"45","author":"L Li","year":"2019","unstructured":"Li, L., He, W., Xu, L., Ash, I., Anwar, M., Yuan, X.: Investigating the impact of cybersecurity policy awareness on employees\u2019 cybersecurity behavior. Int. J. Inf. Manage. 45, 13\u201324 (2019). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.10.017","journal-title":"Int. J. Inf. Manage."},{"issue":"6","key":"859_CR38","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1002\/jsc.2559","volume":"32","author":"F Maurer","year":"2023","unstructured":"Maurer, F., Fritzsche, A.: Layered structures of robustness and resilience: Evidence from cybersecurity projects for critical infrastructures in Central Europe. Strateg Chang. 32(6), 195\u2013208 (2023). https:\/\/doi.org\/10.1002\/jsc.2559","journal-title":"Strateg Chang."},{"issue":"5","key":"859_CR39","doi-asserted-by":"publisher","first-page":"601","DOI":"10.22247\/ijcna\/2022\/215920","volume":"9","author":"CBE Garrido","year":"2022","unstructured":"Garrido, C.B.E., Compte, S.S., Roldan, L.R., Malacara, A.A.: Survey and testing of the IoT Cybersecurity Framework using intrusion detection systems. Int. J. Comput. Networks Appl. 9(5), 601\u2013623 (2022). https:\/\/doi.org\/10.22247\/ijcna\/2022\/215920","journal-title":"Int. J. Comput. Networks Appl."},{"issue":"1","key":"859_CR40","doi-asserted-by":"publisher","first-page":"121","DOI":"10.24846\/v29i1y202012","volume":"29","author":"D Banciu","year":"2020","unstructured":"Banciu, D., R\u0103doi, M., Belloiu, S.: Information security awareness in Romanian public administration: An exploratory case study. Stud. Inf. Control. 29(1), 121\u2013129 (2020). https:\/\/doi.org\/10.24846\/v29i1y202012","journal-title":"Stud. Inf. Control"},{"key":"859_CR41","doi-asserted-by":"publisher","unstructured":"Perera, S., Jin, X., Maurushat, A., Opoku, D.-G.J.: Factors affecting reputational damage to Organisations due to Cyberattacks. Informatics. 9(1) (2022). https:\/\/doi.org\/10.3390\/informatics9010028","DOI":"10.3390\/informatics9010028"},{"issue":"2","key":"859_CR42","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1080\/25741292.2022.2127551","volume":"6","author":"T Liebetrau","year":"2023","unstructured":"Liebetrau, T.: Organizing cyber capability across military and intelligence entities: Collaboration, separation, or centralization. Policy Des. Pract. 6(2), 131\u2013145 (2023). https:\/\/doi.org\/10.1080\/25741292.2022.2127551","journal-title":"Policy Des. Pract."},{"issue":"4","key":"859_CR43","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1080\/19393555.2021.1922786","volume":"31","author":"V Anu","year":"2022","unstructured":"Anu, V.: Information security governance metrics: A survey and taxonomy. Inf. Secur. J. 31(4), 466\u2013478 (2022). https:\/\/doi.org\/10.1080\/19393555.2021.1922786","journal-title":"Inf. Secur. J."},{"issue":"4","key":"859_CR44","doi-asserted-by":"publisher","first-page":"606","DOI":"10.3390\/network2040035","volume":"2","author":"S Khan","year":"2022","unstructured":"Khan, S., Madnick, S.: Protecting Chiller systems from Cyberattack using a systems thinking Approach. Network. 2(4), 606\u2013627 (2022). https:\/\/doi.org\/10.3390\/network2040035","journal-title":"Network"},{"key":"859_CR45","doi-asserted-by":"publisher","unstructured":"Li, L., Xu, L., He, W.: The effects of antecedents and mediating factors on cybersecurity protection behavior. Comput. Hum. Behav. Rep. 5 (2022). https:\/\/doi.org\/10.1016\/j.chbr.2021.100165","DOI":"10.1016\/j.chbr.2021.100165"},{"key":"859_CR46","doi-asserted-by":"publisher","first-page":"99339","DOI":"10.1109\/ACCESS.2021.3097144","volume":"9","author":"S Kalhoro","year":"2021","unstructured":"Kalhoro, S., Rehman, M., Ponnusamy, V., Shaikh, F.B.: Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review. IEEE Access. 9, 99339\u201399363 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3097144","journal-title":"IEEE Access."},{"key":"859_CR47","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2023.2221200","author":"G Klein","year":"2023","unstructured":"Klein, G., Zwilling, M.: The Weakest Link: Employee Cyber-defense behaviors while Working from Home. J. Comput. Inf. Syst. (2023). https:\/\/doi.org\/10.1080\/08874417.2023.2221200","journal-title":"J. Comput. Inf. Syst."},{"key":"859_CR48","doi-asserted-by":"publisher","unstructured":"Sari, P.K., Handayani, P.W., Hidayanto, A.N., Yazid, S., Aji, R.F.: Information Security Behavior in Health Information Systems: A review of Research Trends and Antecedent factors. Healthcare. 10(12) (2022). https:\/\/doi.org\/10.3390\/healthcare10122531","DOI":"10.3390\/healthcare10122531"},{"key":"859_CR49","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-031-38530-8_11","volume":"674","author":"EN Mwim","year":"2023","unstructured":"Mwim, E.N., Mtsweni, J., Chimbo, B.: Factors Associated with Cybersecurity Culture: A quantitative study of Public E-health hospitals in South Africa. IFIP Adv. Inform. Communication Technol. 674, 129\u2013142 (2023). https:\/\/doi.org\/10.1007\/978-3-031-38530-8_11","journal-title":"IFIP Adv. Inform. Communication Technol."},{"issue":"2","key":"859_CR50","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1080\/08874417.2022.2067791","volume":"63","author":"M Wilson","year":"2023","unstructured":"Wilson, M., McDonald, S., Button, D., McGarry, K.: It won\u2019t happen to me: Surveying SME attitudes to cyber-security. J. Comput. Inf. Syst. 63(2), 397\u2013409 (2023). https:\/\/doi.org\/10.1080\/08874417.2022.2067791","journal-title":"J. Comput. Inf. Syst."},{"key":"859_CR51","doi-asserted-by":"publisher","first-page":"100592","DOI":"10.1016\/j.cosrev.2023.100592","volume":"50","author":"S Chaudhary","year":"2023","unstructured":"Chaudhary, S., Gkioulos, V., Katsikas, S.: A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Comput. Sci. Rev. 50, 100592 (2023). https:\/\/doi.org\/10.1016\/j.cosrev.2023.100592","journal-title":"Comput. Sci. Rev."},{"key":"859_CR52","doi-asserted-by":"publisher","first-page":"1960","DOI":"10.4018\/978-1-7998-7705-9.ch087","volume-title":"Research Anthology on Artificial Intelligence Applications in Security","author":"L Hadlington","year":"2021","unstructured":"Hadlington, L.: The \u2018Human factor\u2019 in Cybersecurity: Exploring the Accidental Insider. in In: Research Anthology on Artificial Intelligence Applications in Security, pp. 1960\u20131977. IGI Global, Hershey, PA (2021). https:\/\/doi.org\/10.4018\/978-1-7998-7705-9.ch087"},{"key":"859_CR53","doi-asserted-by":"publisher","unstructured":"Sharma, S., Aparicio, E.: Organizational and team culture as antecedents of protection motivation among IT employees. Comput. Secur. 120 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102774","DOI":"10.1016\/j.cose.2022.102774"},{"key":"859_CR54","unstructured":"Huang, K., Pearlson, K.: For what technology can\u2019t fix: Building a model of organizational cybersecurity culture, in Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 2019-Janua, pp. 6398\u20136407. [Online]. Available: (2019). https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85108267591&partnerID=40&md5=8a90698b30858c446ed0f59f017ec31c"},{"key":"859_CR55","doi-asserted-by":"publisher","first-page":"444","DOI":"10.4018\/979-8-3693-1634-4.ch026","volume-title":"Transformational Interventions for Business, Technology, and Healthcare","author":"DN Burrell","year":"2023","unstructured":"Burrell, D.N., et al.: The managerial ethical and operational challenges of hospital cybersecurity. In: Burrell, D.N. (ed.) in Transformational Interventions for Business, Technology, and Healthcare, pp. 444\u2013458. IGI Global, Hershey (2023). https:\/\/doi.org\/10.4018\/979-8-3693-1634-4.ch026"},{"key":"859_CR56","doi-asserted-by":"publisher","unstructured":"Al-ma\u2019aitah, M.A.: Investigating the drivers of cybersecurity enhancement in public organizations: The case of Jordan. Electron. J. Inf. Syst. Dev. Ctries. 88(5) (2022). https:\/\/doi.org\/10.1002\/isd2.12223","DOI":"10.1002\/isd2.12223"},{"key":"859_CR57","doi-asserted-by":"publisher","unstructured":"Alharbi, F., et al.: The impact of Cybersecurity practices on Cyberattack damage: The perspective of Small enterprises in Saudi Arabia. Sensors. 21(20), 6901 (Oct. 2021). https:\/\/doi.org\/10.3390\/S21206901","DOI":"10.3390\/S21206901"},{"issue":"2","key":"859_CR58","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1108\/ICS-03-2018-0031","volume":"27","author":"M Malatji","year":"2019","unstructured":"Malatji, M., Von Solms, S., Marnewick, A.: Socio-technical systems cybersecurity framework. Inf. Comput. Secur. 27(2), 233\u2013272 (2019). https:\/\/doi.org\/10.1108\/ICS-03-2018-0031","journal-title":"Inf. Comput. Secur."},{"issue":"2","key":"859_CR59","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1177\/1078087420973760","volume":"58","author":"B Preis","year":"2022","unstructured":"Preis, B., Susskind, L.: Municipal cybersecurity: More work needs to be done. Urban Aff Rev. 58(2), 614\u2013629 (2022). https:\/\/doi.org\/10.1177\/1078087420973760","journal-title":"Urban Aff Rev."},{"issue":"4","key":"859_CR60","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1055\/s-0041-1735527","volume":"12","author":"D Alhuwail","year":"2021","unstructured":"Alhuwail, D., Al-Jafar, E., Abdulsalam, Y., Alduaij, S.: Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Appl. Clin. Inf. 12(4), 924\u2013932 (2021). https:\/\/doi.org\/10.1055\/s-0041-1735527","journal-title":"Appl. Clin. Inf."},{"key":"859_CR61","doi-asserted-by":"publisher","unstructured":"Ulrich, P.S., Timmermann, A., Frank, V.: Organizational aspects of cybersecurity in German family firms \u2013 Do opportunities or risks predominate? Organ. Cybersecurity J. Pract. Process People, vol. 2, no. 1, pp. 21\u201340, Jan. (2022). https:\/\/doi.org\/10.1108\/OCJ-03-2021-0010","DOI":"10.1108\/OCJ-03-2021-0010"},{"issue":"3","key":"859_CR62","doi-asserted-by":"publisher","first-page":"399","DOI":"10.4314\/njt.v42i3.13","volume":"42","author":"J Garba","year":"2023","unstructured":"Garba, J., Kaur, J., Ibrahim, E.N.M., DESIGN OF A CONCEPTUAL FRAMEWORK, FOR CYBERSECURITY CULTURE AMONGST ONLINE BANKING USERS IN NIGERIA: Niger J. Technol. 42(3), 399\u2013405 (2023). https:\/\/doi.org\/10.4314\/njt.v42i3.13","journal-title":"Niger J. Technol."},{"key":"859_CR63","unstructured":"Anawar, S., Kunasegaran, D.L., Mas\u2019Ud, M.Z., Zakaria, N.A.: Analysis of phishing susceptibility in a workplace: A big-five personality perspectives, J. Eng. Sci. Technol, vol. 14, no. 5, pp. 2865\u20132882, [Online]. Available: (2019). https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85073019806&partnerID=40&md5=e77a1b87b3ecf94aa2e3db3e72f7772d"},{"key":"859_CR64","doi-asserted-by":"publisher","first-page":"101782","DOI":"10.1016\/j.cose.2020.101782","volume":"93","author":"M Karjalainen","year":"2020","unstructured":"Karjalainen, M., Siponen, M., Sarker, S.: Toward a stage theory of the development of employees\u2019 information security behavior. Comput. Secur. 93, 101782 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101782","journal-title":"Comput. Secur."},{"issue":"3","key":"859_CR65","doi-asserted-by":"publisher","first-page":"808","DOI":"10.30630\/joiv.7.3.2081","volume":"7","author":"W Febriyani","year":"2023","unstructured":"Febriyani, W., Fathia, D., Widjajarto, A., Lubis, M.: Security awareness strategy for Phishing email scams: A Case Study one of a company in Singapore. Int. J. Inf. Vis. 7(3), 808\u2013814 (2023). https:\/\/doi.org\/10.30630\/joiv.7.3.2081","journal-title":"Int. J. Inf. Vis."},{"key":"859_CR66","doi-asserted-by":"publisher","unstructured":"Kostyuk, N., Wayne, C.: The microfoundations of State Cybersecurity: Cyber risk perceptions and the Mass Public. J. Glob Secur. Stud. 6(2) (2021). https:\/\/doi.org\/10.1093\/jogss\/ogz077","DOI":"10.1093\/jogss\/ogz077"},{"issue":"3","key":"859_CR67","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1080\/07421222.2020.1790187","volume":"37","author":"SW Schuetz","year":"2020","unstructured":"Schuetz, S.W., Benjamin Lowry, P., Pienta, D.A., Thatcher, J.B.: The effectiveness of Abstract Versus concrete fear appeals in Information Security. J. Manag Inf. Syst. 37(3), 723\u2013757 (2020). https:\/\/doi.org\/10.1080\/07421222.2020.1790187","journal-title":"J. Manag Inf. Syst."},{"issue":"1","key":"859_CR68","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/08874417.2020.1712269","volume":"62","author":"M Zwilling","year":"2022","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, \u0141., Cetin, F., Basim, H.N.: Cyber Security awareness, knowledge and behavior: A comparative study. J. Comput. Inf. Syst. 62(1), 82\u201397 (2022). https:\/\/doi.org\/10.1080\/08874417.2020.1712269","journal-title":"J. Comput. Inf. Syst."},{"key":"859_CR69","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.jbusres.2019.04.024","volume":"101","author":"S Chatterjee","year":"2019","unstructured":"Chatterjee, S., Gao, X., Sarkar, S., Uzmanoglu, C.: Reacting to the scope of a data breach: The differential role of fear and anger. J. Bus. Res. 101, 183\u2013193 (2019). https:\/\/doi.org\/10.1016\/j.jbusres.2019.04.024","journal-title":"J. Bus. Res."},{"key":"859_CR70","unstructured":"Mayer, P., Zou, Y., Schaub, F., Aviv, A.J.: \u2018Now I\u2019m a bit angry:\u2019 Individuals\u2019 awareness, perception, and responses to data breaches that affected them, in Proceedings of the 30th USENIX Security Symposium, pp. 393\u2013410. [Online]. Available: (2021). https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85114520438&partnerID=40&md5=b988ba536c438e2a00629306db4c2d0b"},{"issue":"3","key":"859_CR71","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1515\/bjes-2019-0025","volume":"9","author":"J Burton","year":"2019","unstructured":"Burton, J.: Cyber-attacks and Freedom of expression: Coercion, Intimidation and virtual Occupation. Balt J. Eur. Stud. 9(3), 116\u2013133 (2019). https:\/\/doi.org\/10.1515\/bjes-2019-0025","journal-title":"Balt J. Eur. Stud."},{"key":"859_CR72","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.jbusres.2021.06.054","volume":"135","author":"LI Labrecque","year":"2021","unstructured":"Labrecque, L.I., Markos, E., Swani, K., Pe\u00f1a, P.: When data security goes wrong: Examining the impact of stress, social contract violation, and data type on consumer coping responses following a data breach. J. Bus. Res. 135, 559\u2013571 (2021). https:\/\/doi.org\/10.1016\/j.jbusres.2021.06.054","journal-title":"J. Bus. Res."},{"issue":"4","key":"859_CR73","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11948-016-9864-0","volume":"25","author":"M Albahar","year":"2019","unstructured":"Albahar, M.: Cyber attacks and Terrorism: A twenty-First Century Conundrum. Sci. Eng. Ethics. 25(4), 993\u20131006 (2019). https:\/\/doi.org\/10.1007\/s11948-016-9864-0","journal-title":"Sci. Eng. Ethics"},{"issue":"4","key":"859_CR74","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1080\/19331681.2022.2112796","volume":"20","author":"R Shandler","year":"2023","unstructured":"Shandler, R., Gomez, M.A.: The hidden threat of cyber-attacks\u2013undermining public confidence in government. J. Inf. Technol. Polit. 20(4), 359\u2013374 (2023). https:\/\/doi.org\/10.1080\/19331681.2022.2112796","journal-title":"J. Inf. Technol. Polit"},{"key":"859_CR75","doi-asserted-by":"publisher","unstructured":"Fauzi, M.A., Yeng, P., Yang, B., Rachmayani, D.: Examining the link between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia, (2021). https:\/\/doi.org\/10.1145\/3465481.3470094","DOI":"10.1145\/3465481.3470094"},{"key":"859_CR76","doi-asserted-by":"publisher","unstructured":"Singh, T., Johnston, A.C., D\u2019Arcy, J., Harms, P.D.: Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research, Organ. Cybersecurity J. Pract. Process People, vol. ahead-of-p, no. ahead-of-print, Jan. (2023). https:\/\/doi.org\/10.1108\/OCJ-06-2022-0012","DOI":"10.1108\/OCJ-06-2022-0012"},{"key":"859_CR77","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.37394\/232015.2021.17.116","volume":"17","author":"H Ruoslahti","year":"2021","unstructured":"Ruoslahti, H., Davis, B.: Societal impacts of Cyber Security assets of Project ECHO. WSEAS Trans. Environ. Dev. 17, 1274\u20131283 (2021). https:\/\/doi.org\/10.37394\/232015.2021.17.116","journal-title":"WSEAS Trans. Environ. Dev."},{"key":"859_CR78","doi-asserted-by":"publisher","first-page":"102357","DOI":"10.1016\/j.cose.2021.102357","volume":"108","author":"SM Ho","year":"2021","unstructured":"Ho, S.M., Gross, M.: Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness. Comput. Secur. 108, 102357 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102357","journal-title":"Comput. Secur."},{"key":"859_CR79","doi-asserted-by":"publisher","first-page":"132132","DOI":"10.1109\/ACCESS.2022.3230286","volume":"10","author":"B Alkhazi","year":"2022","unstructured":"Alkhazi, B., Alshaikh, M., Alkhezi, S., Labbaci, H.: Assessment of the Impact of Information Security Awareness Training Methods on knowledge, attitude, and Behavior. IEEE Access. 10, 132132\u2013132143 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3230286","journal-title":"IEEE Access."},{"key":"859_CR80","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-319-94782-2_20","volume":"782","author":"G Shaabany","year":"2019","unstructured":"Shaabany, G., Anderl, R.: Designing an effective course to improve Cybersecurity Awareness for Engineering faculties. Adv. Intell. Syst. Comput. 782, 203\u2013211 (2019). https:\/\/doi.org\/10.1007\/978-3-319-94782-2_20","journal-title":"Adv. Intell. Syst. Comput."},{"key":"859_CR81","doi-asserted-by":"publisher","unstructured":"Hatzivasilis, G., et al.: Modern aspects of Cyber-security Training and continuous adaptation of Programmes to trainees. Appl. Sci. 10(16) (2020). https:\/\/doi.org\/10.3390\/app10165702","DOI":"10.3390\/app10165702"},{"issue":"3","key":"859_CR82","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3917\/sim.193.0007","volume":"24","author":"Y Barlette","year":"2019","unstructured":"Barlette, Y., Jaouen, A.: Information security in SMEs: Determinants of CEOs\u2019 protective and supportive behaviors. Syst. d\u2019Information Manag. 24(3), 7\u201340 (2019). https:\/\/doi.org\/10.3917\/sim.193.0007","journal-title":"Syst. d\u2019Information Manag"},{"issue":"4","key":"859_CR83","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1080\/10447318.2020.1860547","volume":"37","author":"A-M Nienaber","year":"2021","unstructured":"Nienaber, A.-M., Spundflasch, S., Soares, A., Woodcock, A.: Distrust as a hazard for future sustainable mobility planning. Rethinking employees\u2019 vulnerability when introducing New Information and Communication Technologies in local authorities. Int. J. Hum. Comput. Interact. 37(4), 390\u2013401 (2021). https:\/\/doi.org\/10.1080\/10447318.2020.1860547","journal-title":"Int. J. Hum. Comput. Interact."},{"key":"859_CR84","volume-title":"Mail and Internet Surveys: The Tailored Design Method","author":"DA Dillman","year":"2007","unstructured":"Dillman, D.A.: Mail and Internet Surveys: The Tailored Design Method. John Wiley & Sons, Ltd, New York, NY (2007)"},{"key":"859_CR85","doi-asserted-by":"publisher","unstructured":"Serdar, C.C., Cihan, M., Y\u00fccel, D., Serdar, M.A.: Sample size, power and effect size revisited: Simplified and practical approaches in pre-clinical, clinical and laboratory studies. Biochem. Med. 31(1), 1\u201327 (Feb. 2021). https:\/\/doi.org\/10.11613\/BM.2021.010502","DOI":"10.11613\/BM.2021.010502"},{"issue":"2","key":"859_CR86","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1108\/01443570210414310","volume":"22","author":"C Forza","year":"2002","unstructured":"Forza, C.: Survey research in operations management: A process-based perspective. Int. J. Oper. Prod. Manag. 22(2), 152\u2013194 (2002). https:\/\/doi.org\/10.1108\/01443570210414310\/FULL\/XML","journal-title":"Int. J. Oper. Prod. Manag"},{"key":"859_CR87","doi-asserted-by":"publisher","unstructured":"Goodyear, M.D.E., Krleza-Jeric, K., Lemmens, T.: The declaration of Helsinki, Br. Med. J, vol. 335, no. 7621, pp. 624\u2013625, (2007). https:\/\/doi.org\/10.1136\/bmj.39339.610000.BE","DOI":"10.1136\/bmj.39339.610000.BE"},{"issue":"4","key":"859_CR88","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3758\/BF03206553","volume":"36","author":"KJ Preacher","year":"2004","unstructured":"Preacher, K.J., Hayes, A.F.: SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behav. Res. Methods Instruments Comput. 36(4), 717\u2013731 (2004). https:\/\/doi.org\/10.3758\/BF03206553","journal-title":"Behav. Res. Methods Instruments Comput."},{"key":"859_CR89","doi-asserted-by":"publisher","unstructured":"Watkins, M.W.: A step-by-step guide to exploratory factor analysis with SPSS. Department of Educational Psychology, Baylor University, United States: Taylor and Francis, (2021). https:\/\/doi.org\/10.4324\/9781003149347","DOI":"10.4324\/9781003149347"},{"issue":"1","key":"859_CR90","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1080\/00273171.2019.1602503","volume":"55","author":"HW Marsh","year":"2020","unstructured":"Marsh, H.W., Guo, J., Dicke, T., Parker, P.D., Craven, R.G.: Confirmatory Factor Analysis (CFA), exploratory structural equation modeling (ESEM), and Set-ESEM: Optimal balance between goodness of fit and parsimony. Multivar. Behav. Res. 55(1), 102\u2013119 (2020). https:\/\/doi.org\/10.1080\/00273171.2019.1602503","journal-title":"Multivar. Behav. Res."},{"issue":"1","key":"859_CR91","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1080\/1091367X.2014.952370","volume":"19","author":"JL Perry","year":"2015","unstructured":"Perry, J.L., Nicholls, A.R., Clough, P.J., Crust, L.: Assessing model fit: Caveats and recommendations for confirmatory factor analysis and exploratory structural equation modeling. Meas. Phys. Educ. Exerc. Sci. 19(1), 12\u201321 (2015). https:\/\/doi.org\/10.1080\/1091367X.2014.952370","journal-title":"Meas. Phys. Educ. Exerc. Sci."},{"key":"859_CR92","doi-asserted-by":"publisher","unstructured":"Song, L., Langfelder, P., Horvath, S.: Random generalized linear model: A highly accurate and interpretable ensemble predictor. BMC Bioinform. 14 (2013). https:\/\/doi.org\/10.1186\/1471-2105-14-5","DOI":"10.1186\/1471-2105-14-5"},{"key":"859_CR93","volume-title":"Introduction to Mediation, Moderation, and Conditional Process Analysis: A regression-based Approach","author":"AF Hayes","year":"2017","unstructured":"Hayes, A.F.: Introduction to Mediation, Moderation, and Conditional Process Analysis: A regression-based Approach. Guilford, New York, NY (2017)"},{"key":"859_CR94","volume-title":"Estimation and Inference in Econometrics","author":"R Davidson","year":"1993","unstructured":"Davidson, R., MacKinnon, J.G.: Estimation and Inference in Econometrics. Oxford University Press, New York, NY (1993)"},{"key":"859_CR95","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.jom.2016.03.009","volume":"44","author":"H Liu","year":"2016","unstructured":"Liu, H., Wei, S., Ke, W., Wei, K.K., Hua, Z.: The configuration between supply chain integration and information technology competency: A resource orchestration perspective. J. Oper. Manag. 44, 13\u201329 (2016). https:\/\/doi.org\/10.1016\/j.jom.2016.03.009","journal-title":"J. Oper. Manag"},{"key":"859_CR96","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ijpe.2019.01.004","volume":"210","author":"AG Frank","year":"2019","unstructured":"Frank, A.G., Dalenogare, L.S., Ayala, N.F.: Industry 4.0 technologies: Implementation patterns in manufacturing companies. Int. J. Prod. Econ. 210, 15\u201326 (2019). https:\/\/doi.org\/10.1016\/j.ijpe.2019.01.004","journal-title":"Int. J. Prod. Econ."},{"key":"859_CR97","doi-asserted-by":"publisher","unstructured":"Boateng, G.O., Neilands, T.B., Frongillo, E.A., Melgar-Qui\u00f1onez, H.R., Young, S.L.: Best Practices for Developing and Validating Scales for Health, Social, and Behavioral Research: A Primer, Frontiers in Public Health, vol. 6. [Online]. Available: https:\/\/www.frontiersin.org\/articles\/ (2018). https:\/\/doi.org\/10.3389\/fpubh.2018.00149","DOI":"10.3389\/fpubh.2018.00149"},{"key":"859_CR98","doi-asserted-by":"publisher","unstructured":"Taber, K.S.: The Use of Cronbach\u2019s Alpha When Developing and Reporting Research Instruments in Science Education, Res. Sci. Educ, vol. 48, no. 6, pp. 1273\u20131296, Dec. (2018). https:\/\/doi.org\/10.1007\/S11165-016-9602-2\/TABLES\/1","DOI":"10.1007\/S11165-016-9602-2\/TABLES\/1"},{"issue":"3","key":"859_CR99","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33151\/ajp.8.3.93","volume":"8","author":"B Williams","year":"2010","unstructured":"Williams, B., Onsman, A., Brown, T.: Exploratory factor analysis: A five-step guide for novices. J. Emerg. Prim. Heal Care. 8(3), 1\u201313 (2010). https:\/\/doi.org\/10.33151\/ajp.8.3.93","journal-title":"J. Emerg. Prim. Heal Care"},{"issue":"4","key":"859_CR100","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1037\/1082-989X.1.4.354","volume":"1","author":"JM Wood","year":"1996","unstructured":"Wood, J.M., Tataryn, D.J., Gorsuch, R.L.: Effects of under- and overextraction on principal axis factor analysis with varimax rotation. Psychol. Methods. 1(4), 354\u2013365 (1996). https:\/\/doi.org\/10.1037\/1082-989X.1.4.354","journal-title":"Psychol. Methods"},{"issue":"3","key":"859_CR101","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3758\/s13428-015-0619-7","volume":"48","author":"C-H Li","year":"2016","unstructured":"Li, C.-H.: Confirmatory factor analysis with ordinal data: Comparing robust maximum likelihood and diagonally weighted least squares. Behav. Res. Methods. 48(3), 936\u2013949 (2016). https:\/\/doi.org\/10.3758\/s13428-015-0619-7","journal-title":"Behav. Res. Methods"},{"issue":"4","key":"859_CR102","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1037\/1082-989X.3.4.424","volume":"3","author":"L-T Hu","year":"1998","unstructured":"Hu, L.-T., Bentler, P.M.: Fit indices in Covariance structure modeling: Sensitivity to Underparameterized Model Misspecification. Psychol. Methods. 3(4), 424\u2013453 (1998). https:\/\/doi.org\/10.1037\/1082-989X.3.4.424","journal-title":"Psychol. Methods"},{"issue":"1","key":"859_CR103","first-page":"76","volume":"3","author":"SL Hoe","year":"2008","unstructured":"Hoe, S.L.: Issues and procedures in adopting structural equation modelling technique. J. Quant. Methods. 3(1), 76 (2008)","journal-title":"J. Quant. Methods"},{"issue":"2","key":"859_CR104","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1037\/0033-2909.107.2.238","volume":"107","author":"PM Bentler","year":"1990","unstructured":"Bentler, P.M.: Comparative fit indexes in structural models. Psychol. Bull. 107(2), 238\u2013246 (1990). https:\/\/doi.org\/10.1037\/0033-2909.107.2.238","journal-title":"Psychol. Bull."},{"issue":"7","key":"859_CR105","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.jbusres.2003.10.007","volume":"58","author":"S Sharma","year":"2005","unstructured":"Sharma, S., Mukherjee, S., Kumar, A., Dillon, W.R.: A simulation study to investigate the use of cutoff values for assessing model fit in covariance structure models. J. Bus. Res. 58(7), 935\u2013943 (2005). https:\/\/doi.org\/10.1016\/j.jbusres.2003.10.007","journal-title":"J. Bus. Res."},{"key":"859_CR106","doi-asserted-by":"publisher","unstructured":"Hu, L.T., Bentler, P.M.: Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives, https:\/\/doi.org10705519909540118, vol. 6, no. 1, pp. 1\u201355, (2009). https:\/\/doi.org\/10.1080\/10705519909540118","DOI":"10.1080\/10705519909540118"},{"key":"859_CR107","doi-asserted-by":"publisher","unstructured":"Ogbanufe, O., Kim, D.J., Jones, M.C.: Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures. Inf. Manag. 58(7) (2021). https:\/\/doi.org\/10.1016\/j.im.2021.103507","DOI":"10.1016\/j.im.2021.103507"},{"key":"859_CR108","doi-asserted-by":"publisher","unstructured":"Reeves, A., Calic, D., Delfabbro, P.: Get a red-hot poker and open up my eyes, it\u2019s so boring\u20191: Employee perceptions of cybersecurity training. Comput. Secur. 106 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102281","DOI":"10.1016\/j.cose.2021.102281"},{"issue":"5","key":"859_CR109","first-page":"350","volume":"15","author":"TS Mian","year":"2023","unstructured":"Mian, T.S., Alatawi, E.M.: Investigating how parental perceptions of Cybersecurity Influence Children\u2019s safety in the Cyber World: A case study of Saudi Arabia. Intell. Inf. Manag. 15(5), 350\u2013372 (2023)","journal-title":"Intell. Inf. Manag"},{"issue":"1","key":"859_CR110","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1108\/JSIT-06-2020-0105","volume":"23","author":"M Mohamed","year":"2021","unstructured":"Mohamed, M., Porterfield, T., Chakraborty, J.: Cross-cultural effects on graphical password memorability and design. J. Syst. Inf. Technol. 23(1), 82\u2013108 (2021). https:\/\/doi.org\/10.1108\/JSIT-06-2020-0105","journal-title":"J. Syst. Inf. Technol."},{"key":"859_CR111","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-030-43999-6_2","volume-title":"Studies in Systems, Decision and Control","author":"I Corradini","year":"2020","unstructured":"Corradini, I.: Security: Human nature and Behaviour. in In: Studies in Systems, Decision and Control. Themis Research Center, vol. 284, pp. 23\u201347. Springer, Rome, Italy (2020). https:\/\/doi.org\/10.1007\/978-3-030-43999-6_2"},{"issue":"2","key":"859_CR112","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1108\/ICS-12-2016-0095","volume":"27","author":"F Nel","year":"2019","unstructured":"Nel, F., Drevin, L.: Key elements of an information security culture in organisations. Inf. Comput. Secur. 27(2), 146\u2013164 (2019). https:\/\/doi.org\/10.1108\/ICS-12-2016-0095","journal-title":"Inf. Comput. Secur."},{"key":"859_CR113","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3390\/su151914327","volume":"15","author":"Y Hong","year":"2023","unstructured":"Hong, Y., Kim, M.-J., Roh, T.: Mitigating the impact of work overload on Cybersecurity Behavior: The moderating influence of corporate Ethics\u2014A mediated moderation analysis. Sustainability. 15, 19 (2023). https:\/\/doi.org\/10.3390\/su151914327","journal-title":"Sustainability"},{"key":"859_CR114","doi-asserted-by":"publisher","first-page":"103266","DOI":"10.1016\/j.cose.2023.103266","volume":"130","author":"JK Nwankpa","year":"2023","unstructured":"Nwankpa, J.K., Datta, P.M.: Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers. Comput. Secur. 130, 103266 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103266","journal-title":"Comput. Secur."},{"key":"859_CR115","doi-asserted-by":"publisher","first-page":"87970","DOI":"10.1109\/ACCESS.2023.3296580","volume":"11","author":"MU Shah","year":"2023","unstructured":"Shah, M.U., Iqbal, F., Rehman, U., Hung, P.C.K.: A comparative Assessment of human factors in Cybersecurity: Implications for Cyber Governance. IEEE Access. 11, 87970\u201387984 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3296580","journal-title":"IEEE Access."},{"key":"859_CR116","doi-asserted-by":"publisher","unstructured":"Al-Hasani, Y.S., Zain, J.M., Azrag, M.A.K., Edris, K.H.M.: Relationship Between Consumer\u2019s Social Networking Behavior and Cybercrime Victimization Among the University Students, in International Conference on Information Systems and Intelligent Applications, pp. 683\u2013694. (2023). https:\/\/doi.org\/10.1007\/978-3-031-16865-9_55","DOI":"10.1007\/978-3-031-16865-9_55"},{"key":"859_CR117","doi-asserted-by":"publisher","unstructured":"Burrell, D.N., Johnson, T., Shufutinsky, A., Ramjit, D.-M.: Organizational Dynamics of the Rise of Telework as an Adaptive Response to a Global Pandemic, L. Forces Acad. Rev, vol. 26, no. 3, pp. 209\u2013222, Sep. (2021). https:\/\/doi.org\/10.2478\/RAFT-2021-0028","DOI":"10.2478\/RAFT-2021-0028"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00859-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00859-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00859-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:11:38Z","timestamp":1721013098000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00859-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,26]]},"references-count":117,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["859"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00859-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,26]]},"assertion":[{"value":"26 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The study was conducted in accordance with the Declaration of Helsinki and approved by the Ethics Committee of the University of Business and Technology.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Informed consent was obtained from all subjects involved in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}