{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:18:17Z","timestamp":1773778697455,"version":"3.50.1"},"reference-count":112,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00918-9","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:42:30Z","timestamp":1730302950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Citizens\u2019 engagement with cybersecurity measures in Bangladesh: a cross-sectional study"],"prefix":"10.1007","volume":"24","author":[{"given":"Md Shafiul","family":"Alam","sequence":"first","affiliation":[]},{"given":"Saif","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Mohsin","family":"Dhali","sequence":"additional","affiliation":[]},{"given":"Syed Shah","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,30]]},"reference":[{"key":"918_CR1","unstructured":"Matthew, P-Y.: Bangladesh hopes to lead to a \u201cZero Digital Divide\u201d world. Forbes. https:\/\/www.forbes.com\/sites\/zengernews\/2023\/08\/09\/bangladesh-hopes-to-lead-to-a-zero-digital-divide-world\/?sh=6b1adaac2496 (2023)"},{"key":"918_CR2","unstructured":"Kuldosheva, G.: ADBI Working Paper Series challenges and opportunities of digital transformation in the public sector in transition economies: examination of the case of Uzbekistan Asian Development Bank Institute. https:\/\/www.adb.org\/publications\/challenges-opportunities-digital-transformation-uzbekistan (2021)"},{"key":"918_CR3","unstructured":"Harris, R., Apikul, C., Mahiuddin, K.M., Mostafa, M.: Report on the mid-term evaluation of the access to information-II project (a2i) For United Nations Development Programme Bangladesh. (2015)"},{"key":"918_CR4","doi-asserted-by":"publisher","unstructured":"Hoque, Md. R., & Palvia, P.: Information Technology Issues in Bangladesh. pp. 29\u201341. https:\/\/doi.org\/10.1142\/9789811208645_0003 (2020)","DOI":"10.1142\/9789811208645_0003"},{"key":"918_CR5","doi-asserted-by":"crossref","unstructured":"Traian, E., & Popescu, M.: Contributions to cybersecurity risk management: IoT security risk management strategy reference model (IoTSRM2). https:\/\/dspace.upt.ro\/xmlui\/handle\/123456789\/4299 (2021)","DOI":"10.3390\/fi13060148"},{"key":"918_CR6","unstructured":"UN: UN E-Government Survey 2022. UN e-government survey report (2023)"},{"key":"918_CR7","unstructured":"Press Xpress.: How Bangladesh remained resilient in minimizing the coordinated cyber attack? Press Xpress . https:\/\/pressxpress.org\/2023\/08\/17\/how-bangladesh-remained-resilient-in-minimizing-the-coordinated-cyber-attack\/ (2023)"},{"key":"918_CR8","unstructured":"Aktar, F., Tasnim, Z.: E-Governance in Bangladesh: public service delivery challenges. In: Jahangirnagar University Journal of Government and Politics (Issue 40). (2021)"},{"key":"918_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/2507490","volume":"2022","author":"E Lulaj","year":"2022","unstructured":"Lulaj, E., Zarin, I., Rahman, S.: A novel approach to improving E-government performance from budget challenges in complex financial systems. Complexity 2022, 1\u201316 (2022). https:\/\/doi.org\/10.1155\/2022\/2507490","journal-title":"Complexity"},{"issue":"4","key":"918_CR10","doi-asserted-by":"publisher","first-page":"144","DOI":"10.3390\/fi15040144","volume":"15","author":"M Gazzan","year":"2023","unstructured":"Gazzan, M., Sheldon, F.T.: Opportunities for early detection and prediction of ransomware attacks against industrial control systems. Future Internet 15(4), 144 (2023). https:\/\/doi.org\/10.3390\/fi15040144","journal-title":"Future Internet"},{"issue":"4","key":"918_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3469821","volume":"24","author":"S Maqsood","year":"2021","unstructured":"Maqsood, S., Chiasson, S.: Design, development, and evaluation of a cybersecurity, privacy, and digital literacy game for tweens. ACM Trans. Priv. Secur. 24(4), 1\u201337 (2021). https:\/\/doi.org\/10.1145\/3469821","journal-title":"ACM Trans. Priv. Secur."},{"key":"918_CR12","doi-asserted-by":"publisher","first-page":"102840","DOI":"10.1016\/J.COSE.2022.102840","volume":"121","author":"M Gale","year":"2022","unstructured":"Gale, M., Bongiovanni, I., Slapnicar, S.: Governing cybersecurity from the boardroom: challenges, drivers, and ways ahead. Comput. Secur. 121, 102840 (2022). https:\/\/doi.org\/10.1016\/J.COSE.2022.102840","journal-title":"Comput. Secur."},{"key":"918_CR13","doi-asserted-by":"publisher","DOI":"10.1080\/09584935.2020.1793912","author":"A Aziz","year":"2020","unstructured":"Aziz, A.: Digital inclusion challenges in Bangladesh: the case of the National ICT Policy. Contemp. South Asia (2020). https:\/\/doi.org\/10.1080\/09584935.2020.1793912","journal-title":"Contemp. South Asia"},{"issue":"2","key":"918_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.21511\/ppm.21(2).2023.21","volume":"21","author":"K Aswar","year":"2023","unstructured":"Aswar, K., Julianto, W., Sumardjo, M., Panjaitan, I., Nasir, A.: An investigation of the factors affecting citizens\u2019 adoption of e-government in Indonesia. Probl. Perspect. Manag. 21(2), 187\u2013197 (2023). https:\/\/doi.org\/10.21511\/ppm.21(2).2023.21","journal-title":"Probl. Perspect. Manag."},{"issue":"2\u20133","key":"918_CR15","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1080\/02681102.2022.2123770","volume":"29","author":"PI Akpan-Obong","year":"2023","unstructured":"Akpan-Obong, P.I., Trinh, M.P., Ayo, C.K., Oni, A.: E-Governance as good governance? Evidence from 15 West African countries. Inf. Technol. Dev. 29(2\u20133), 256\u2013275 (2023). https:\/\/doi.org\/10.1080\/02681102.2022.2123770","journal-title":"Inf. Technol. Dev."},{"key":"918_CR16","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy006","author":"I Agrafiotis","year":"2018","unstructured":"Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S., Upton, D.: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. (2018). https:\/\/doi.org\/10.1093\/cybsec\/tyy006","journal-title":"J. Cybersecur."},{"issue":"2","key":"918_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.17645\/PAG.V6I2.1324","volume":"6","author":"J Collier","year":"2018","unstructured":"Collier, J.: Cyber security assemblages: a framework for understanding the dynamic and contested nature of security provision. Polit. Gov. 6(2), 13\u201321 (2018). https:\/\/doi.org\/10.17645\/PAG.V6I2.1324","journal-title":"Polit. Gov."},{"issue":"2","key":"918_CR18","first-page":"136","volume":"19","author":"SH Kok","year":"2019","unstructured":"Kok, S.H., Abdullah, A., Jhanjhi, N.Z., Supramaniam, M.: Ransomware, threat and detection techniques: a review. In IJCSNS Int. J. Comput. Sci. Netw. Secur. 19(2), 136 (2019)","journal-title":"In IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"918_CR19","unstructured":"Tina, B., Princess, G., Jesse, H., Jeremy, J., Scott, K., Samantha, M., Sara, P., Maureen, R., Harley, R., Burak, S., Shani, S., James, S., Oliver, T., Richard, V.: Increasing threats of deepfake identities. (2023)"},{"key":"918_CR20","doi-asserted-by":"crossref","unstructured":"Sarker, M.N.I., Wu, M., Liu, R., Ma, C.: (2019). Challenges and opportunities for information resource management for e-governance in Bangladesh. pp. 675\u2013688","DOI":"10.1007\/978-3-319-93351-1_53"},{"key":"918_CR21","doi-asserted-by":"publisher","unstructured":"Hossain, M: Human capital, labor market outcomes, and skills gap in the ICT Sector. In: Digital transformation and economic development in Bangladesh pp. 171\u2013194. Springer Nature Singapore. https:\/\/doi.org\/10.1007\/978-981-19-2753-9_9 (2022)","DOI":"10.1007\/978-981-19-2753-9_9"},{"key":"918_CR22","unstructured":"Bada, M., Sasse, A.M, Nurse, J.R.C.: Cyber security awareness campaigns: Why do they fail to change behaviour? https:\/\/arxiv.org\/abs\/1901.02672v1 (2019)"},{"key":"918_CR23","doi-asserted-by":"publisher","first-page":"28","DOI":"10.47577\/TSSJ.V7I1.509","volume":"7","author":"SU Doullah","year":"2020","unstructured":"Doullah, S.U., Uddin, N.: Public trust building through electronic governance: an analysis on electronic services in Bangladesh. Tech. Soc. Sci. J. 7, 28\u201335 (2020). https:\/\/doi.org\/10.47577\/TSSJ.V7I1.509","journal-title":"Tech. Soc. Sci. J."},{"key":"918_CR24","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/J.IJHCS.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: User strategies for combating phishing attacks. Int. J. Hum Comput Stud. 82, 69\u201382 (2015). https:\/\/doi.org\/10.1016\/J.IJHCS.2015.05.005","journal-title":"Int. J. Hum Comput Stud."},{"key":"918_CR25","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1016\/j.procs.2022.09.180","volume":"207","author":"A Ubowska","year":"2022","unstructured":"Ubowska, A., Kr\u00f3likowski, T.: Building a cybersecurity culture of public administration system in Poland. Proced. Comput. Sci. 207, 1242\u20131250 (2022). https:\/\/doi.org\/10.1016\/j.procs.2022.09.180","journal-title":"Proced. Comput. Sci."},{"key":"918_CR26","unstructured":"Perry, C.: Why security culture is key to cybersecurity resilience. Forbes Business Council. https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2023\/02\/21\/why-security-culture-is-key-to-cybersecurity-resilience\/?sh=7745405d7f8f (2023)"},{"key":"918_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04371-1","author":"A Pawlicka","year":"2022","unstructured":"Pawlicka, A., Tomaszewska, R., Krause, E., Jaroszewska-Chora\u015b, D., Pawlicki, M., Chora\u015b, M.: Has the pandemic made us more digitally literate? J. Ambient. Intell. Humaniz. Comput. (2022). https:\/\/doi.org\/10.1007\/s12652-022-04371-1","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"918_CR28","doi-asserted-by":"publisher","unstructured":"Alam, M., Ahmed, K: se-governance initiatives in Bangladesh. In: Proceedings of the 2nd international conference on theory and practice of electronic governance, 291\u2013295. https:\/\/doi.org\/10.1145\/1509096.1509157(2008)","DOI":"10.1145\/1509096.1509157"},{"key":"918_CR29","unstructured":"Rahman, S., Rashid, N., Yadlapalli, A., Yiqun, L.: Determining factors of E-Government implementation: a multi-criteria decision-making approach. In: Pacific Asia conference on information systems, 302. http:\/\/aisel.aisnet.org\/pacis2014 (2014)"},{"key":"918_CR30","doi-asserted-by":"publisher","DOI":"10.57240\/DUJMJUNE11","author":"M Rana","year":"2022","unstructured":"Rana, M., Rahman, A.: Attitude of citizens towards e-Government services in digital Bangladesh. Dhaka Univ. J. Manag. (2022). https:\/\/doi.org\/10.57240\/DUJMJUNE11","journal-title":"Dhaka Univ. J. Manag."},{"issue":"2","key":"918_CR31","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1080\/23276665.2018.1483051","volume":"40","author":"S Chowdhury","year":"2018","unstructured":"Chowdhury, S.: Do government web portals matter for citizen engagement in governance? A study of rural local government digital centres in Bangladesh. Asia Pacific J. of Public Adm. 40(2), 132\u2013141 (2018). https:\/\/doi.org\/10.1080\/23276665.2018.1483051","journal-title":"Asia Pacific J. of Public Adm."},{"key":"918_CR32","doi-asserted-by":"publisher","DOI":"10.47191\/ijsshr\/v7-i04-07","author":"S Jebunnessa","year":"2024","unstructured":"Jebunnessa, S., Rahman, M., Ashrafun, N.: E governance for smart Bangladesh: prospects for implementing the vision in public administration. Int. J. Soc. Sci. Hum. Res. (2024). https:\/\/doi.org\/10.47191\/ijsshr\/v7-i04-07","journal-title":"Int. J. Soc. Sci. Hum. Res."},{"issue":"2","key":"918_CR33","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1177\/24551333211034082","volume":"6","author":"H Zafarullah","year":"2021","unstructured":"Zafarullah, H., Ferdous, J.: Cyberspace at the grassroots: E-Governance and Citizen\/Stakeholder perceptions at the local level in Bangladesh. J. Dev. Policy Pract. 6(2), 168\u2013187 (2021). https:\/\/doi.org\/10.1177\/24551333211034082","journal-title":"J. Dev. Policy Pract."},{"key":"918_CR34","unstructured":"Patel, H., Jacobson, D.: factors influencing citizen adoption of e-government: a review and critical assessment. In: European conference on information systems. (2008)"},{"issue":"1","key":"918_CR35","first-page":"70","volume":"6","author":"M Shareef","year":"2009","unstructured":"Shareef, M., Kumar, U., Kumar, V., Dwivedi, Y.K.: Identifying critical factors for adoption of e-government. Electron. Gov. an Int. J. 6(1), 70\u201396 (2009)","journal-title":"Electron. Gov. an Int. J."},{"key":"918_CR36","unstructured":"Carter, L., Liu, D.: Technology humanness, trust and e-government adoption. In Australasian conference on information systems 2018. University of Technology, Sydney. (2018)"},{"key":"918_CR37","unstructured":"Rehman, M., Kamal, M., Esichaikul, V.: determinants of trust in e-government adoption: a case study of Pakistan. In: Americas conference on information systems. (2012)."},{"key":"918_CR38","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.chb.2015.06.025","volume":"53","author":"O Al-Hujran","year":"2015","unstructured":"Al-Hujran, O., Al-Debei, M.M., Chatfield, A., Migdadi, M.: The imperative of influencing citizen attitude toward e-government adoption and use. Comput. Hum. Behav. 53, 189\u2013203 (2015)","journal-title":"Comput. Hum. Behav."},{"issue":"6","key":"918_CR39","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1080\/0144929X.2016.1269198","volume":"36","author":"N Alharbi","year":"2016","unstructured":"Alharbi, N., Papadaki, M., Dowland, P.: The impact of security and its antecedents in behaviour intention of using e-government services. Behav. Inform. Technol. 36(6), 620\u2013636 (2016)","journal-title":"Behav. Inform. Technol."},{"issue":"2","key":"918_CR40","doi-asserted-by":"publisher","first-page":"314","DOI":"10.52131\/jom.2022.0402.0081","volume":"4","author":"I Shahzadi","year":"2022","unstructured":"Shahzadi, I., Rafiq, S., Ali, U.: Investigating the influence of flexible work arrangements on work-life balance in south Asian gig workers: Does Ryff\u2019s six-factor model of psychological well-being moderates? IRASD Journal of Management 4(2), 314\u2013327 (2022)","journal-title":"IRASD Journal of Management"},{"key":"918_CR41","doi-asserted-by":"publisher","DOI":"10.1108\/JIDT-09-2023-0016","author":"N Aleisa","year":"2024","unstructured":"Aleisa, N.: Key factors influencing the e-government adoption: a systematic literature review. J. Innov. Digit. Transform. (2024). https:\/\/doi.org\/10.1108\/JIDT-09-2023-0016","journal-title":"J. Innov. Digit. Transform."},{"issue":"4","key":"918_CR42","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1108\/17506161111173568","volume":"5","author":"L Carter","year":"2011","unstructured":"Carter, L., Christian Shaupp, L., Hobbs, J., Campbell, R.: The role of security and trust in the adoption of online tax filing. Transform. Gov.: People Process Policy 5(4), 303\u2013318 (2011)","journal-title":"Transform. Gov.: People Process Policy"},{"issue":"1","key":"918_CR43","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/J.GIQ.2018.10.007","volume":"36","author":"R Santa","year":"2019","unstructured":"Santa, R., MacDonald, J.B., Ferrer, M.: The role of trust in e-Government effectiveness, operational effectiveness and user satisfaction: lessons from Saudi Arabia in e-G2B. Gov. Inf. Q. 36(1), 39\u201350 (2019). https:\/\/doi.org\/10.1016\/J.GIQ.2018.10.007","journal-title":"Gov. Inf. Q."},{"issue":"3","key":"918_CR44","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709 (1995). https:\/\/doi.org\/10.2307\/258792","journal-title":"Acad. Manag. Rev."},{"issue":"2","key":"918_CR45","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1177\/S0038038501000190","volume":"35","author":"G M\u00f6llering","year":"2001","unstructured":"M\u00f6llering, G.: The nature of trust: from Georg Simmel to a theory of expectation. Interpret. Suspens. Soc. 35(2), 403\u2013420 (2001). https:\/\/doi.org\/10.1177\/S0038038501000190","journal-title":"Interpret. Suspens. Soc."},{"key":"918_CR46","volume-title":"Turning point policymaking in the era of artificial intelligence","author":"DM West","year":"2020","unstructured":"West, D.M., Allen, J.R.: Turning point policymaking in the era of artificial intelligence, 1st edn. Brookings Institution Press, Washington (2020)","edition":"1"},{"issue":"1","key":"918_CR47","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change1. J. Psychol. 91(1), 93\u2013114 (1975). https:\/\/doi.org\/10.1080\/00223980.1975.9915803","journal-title":"J. Psychol."},{"key":"918_CR48","doi-asserted-by":"publisher","first-page":"e1219","DOI":"10.7717\/peerj-cs.1219","volume":"9","author":"D Qui\u00f1ones","year":"2023","unstructured":"Qui\u00f1ones, D., Rojas, L.: Understanding the customer experience in human-computer interaction: a systematic literature review. PeerJ. Comput. Sci. 9, e1219 (2023). https:\/\/doi.org\/10.7717\/peerj-cs.1219","journal-title":"PeerJ. Comput. Sci."},{"key":"918_CR49","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R von Solms","year":"2013","unstructured":"von Solms, R., van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.04.004","journal-title":"Comput. Secur."},{"issue":"1","key":"918_CR50","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1080\/19416520802211644","volume":"2","author":"WJ Orlikowski","year":"2008","unstructured":"Orlikowski, W.J., Scott, S.V.: 10 sociomateriality: challenging the separation of technology, work and organization. Acad. Manag. Ann. 2(1), 433\u2013474 (2008). https:\/\/doi.org\/10.1080\/19416520802211644","journal-title":"Acad. Manag. Ann."},{"key":"918_CR51","doi-asserted-by":"publisher","first-page":"100523","DOI":"10.1016\/j.rssm.2020.100523","volume":"68","author":"B Kye","year":"2020","unstructured":"Kye, B., Hwang, S.-J.: Social trust in the midst of pandemic crisis: Implications from COVID-19 of South Korea. Res. Soc. Stratif. Mobil. 68, 100523 (2020). https:\/\/doi.org\/10.1016\/j.rssm.2020.100523","journal-title":"Res. Soc. Stratif. Mobil."},{"key":"918_CR52","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/J.CHB.2018.11.002","volume":"92","author":"M Martens","year":"2019","unstructured":"Martens, M., De Wolf, R., De Marez, L.: Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Comput. Hum. Behav. 92, 139\u2013150 (2019). https:\/\/doi.org\/10.1016\/J.CHB.2018.11.002","journal-title":"Comput. Hum. Behav."},{"key":"918_CR53","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/J.IJINFOMGT.2018.11.014","volume":"46","author":"A Khan","year":"2019","unstructured":"Khan, A., Krishnan, S.: Conceptualizing the impact of corruption in national institutions and national stakeholder service systems on e-government maturity. Int. J. Inf. Manage. 46, 23\u201336 (2019). https:\/\/doi.org\/10.1016\/J.IJINFOMGT.2018.11.014","journal-title":"Int. J. Inf. Manage."},{"issue":"5","key":"918_CR54","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1108\/IJPSM-03-2018-0081","volume":"32","author":"KMG Lopes","year":"2019","unstructured":"Lopes, K.M.G., Macadar, M.A., Luciano, E.M.: Key drivers for public value creation enhancing the adoption of electronic public services by citizens. Int. J. Public Sect. Manag. 32(5), 546\u2013561 (2019). https:\/\/doi.org\/10.1108\/IJPSM-03-2018-0081","journal-title":"Int. J. Public Sect. Manag."},{"issue":"10","key":"918_CR55","doi-asserted-by":"publisher","first-page":"1568","DOI":"10.1080\/0144929X.2022.2092030","volume":"42","author":"NH Chowdhury","year":"2023","unstructured":"Chowdhury, N.H., Adam, M.T.P., Teubner, T.: Rushed to crack\u2014On the perceived effectiveness of cybersecurity measures for secure behaviour under time pressure. Behav. Inform. Technol. 42(10), 1568\u20131589 (2023). https:\/\/doi.org\/10.1080\/0144929X.2022.2092030","journal-title":"Behav. Inform. Technol."},{"key":"918_CR56","doi-asserted-by":"crossref","unstructured":"Alkaldi, N., Renaud, K.: Why do people adopt, or reject, smartphone security tools? . In: International symposium on human aspects of information security and assurance (HAISA 2016), pp. 135\u2013144. (2016)","DOI":"10.14722\/eurousec.2016.23011"},{"issue":"5","key":"918_CR57","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","volume":"19","author":"JE Maddux","year":"1983","unstructured":"Maddux, J.E., Rogers, R.W.: Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 19(5), 469\u2013479 (1983). https:\/\/doi.org\/10.1016\/0022-1031(83)90023-9","journal-title":"J. Exp. Soc. Psychol."},{"issue":"4","key":"918_CR58","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1177\/00472875211004761","volume":"61","author":"EJ Jordan","year":"2022","unstructured":"Jordan, E.J., Prayag, G.: Residents\u2019 cognitive appraisals, emotions, and coping strategies at local dark tourism sites. J. Travel Res. 61(4), 887\u2013902 (2022). https:\/\/doi.org\/10.1177\/00472875211004761","journal-title":"J. Travel Res."},{"issue":"2","key":"918_CR59","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TEM.2008.919728","volume":"55","author":"MM Hossain","year":"2008","unstructured":"Hossain, M.M., Prybutok, V.R.: Consumer acceptance of RFID technology: an exploratory study. IEEE Trans. Eng. Manage. 55(2), 316\u2013328 (2008). https:\/\/doi.org\/10.1109\/TEM.2008.919728","journal-title":"IEEE Trans. Eng. Manage."},{"issue":"5","key":"918_CR60","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.chb.2010.03.013","volume":"26","author":"A Beldad","year":"2010","unstructured":"Beldad, A., de Jong, M., Steehouder, M.: How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Comput. Hum. Behav. 26(5), 857\u2013869 (2010). https:\/\/doi.org\/10.1016\/j.chb.2010.03.013","journal-title":"Comput. Hum. Behav."},{"key":"918_CR61","first-page":"1","volume-title":"Digital governance and e government principles applied to public procurement","author":"KJ Bwalya","year":"2017","unstructured":"Bwalya, K.J., Mutula, S.: Digital governance and e government principles applied to public procurement, pp. 1\u2013355. IGI Global, Pennsylvania (2017)"},{"issue":"1","key":"918_CR62","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1017\/S2045381718000023","volume":"7","author":"I Pernice","year":"2018","unstructured":"Pernice, I.: Global cybersecurity governance: a constitutionalist analysis. Global Const. 7(1), 112\u2013141 (2018). https:\/\/doi.org\/10.1017\/S2045381718000023","journal-title":"Global Const."},{"issue":"2","key":"918_CR63","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1007\/S13132-021-00749-2","volume":"13","author":"C Castro","year":"2022","unstructured":"Castro, C., Lopes, C.: Digital government and sustainable development. J. Knowl. Econ. 13(2), 880 (2022). https:\/\/doi.org\/10.1007\/S13132-021-00749-2","journal-title":"J. Knowl. Econ."},{"issue":"1","key":"918_CR64","first-page":"1","volume":"12","author":"MI Hossain","year":"2019","unstructured":"Hossain, M.I., Azam, M.S.: Towards e-Governance: an exploratory analysis of e-tax filing adoption in Bangladesh. J. Bus. Stud. 12(1), 1\u201317 (2019)","journal-title":"J. Bus. Stud."},{"key":"918_CR65","unstructured":"Harasty, C., Ostermeier, M.: POPULATION AGEING: Alternative measures of dependency and implications for the future of work. (2020)"},{"issue":"1","key":"918_CR66","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.tele.2016.05.001","volume":"34","author":"EA Abu-Shanab","year":"2017","unstructured":"Abu-Shanab, E.A.: E-government familiarity influence on Jordanians\u2019 perceptions. Telematics Inform. 34(1), 103\u2013113 (2017). https:\/\/doi.org\/10.1016\/j.tele.2016.05.001","journal-title":"Telematics Inform."},{"key":"918_CR67","unstructured":"Byron, H., Phillip, O.: Population trends and issues: Bangladesh. (2019)"},{"key":"918_CR68","volume-title":"Business research methods","author":"Z Babin","year":"2019","unstructured":"Babin, Z., Griffin, C.: Business research methods, 2nd edn. Cengage Learning EMEA, Noida (2019)","edition":"2"},{"issue":"1","key":"918_CR69","doi-asserted-by":"publisher","first-page":"816","DOI":"10.51983\/ajms-2022.11.1.3087","volume":"11","author":"H Taherdoost","year":"2022","unstructured":"Taherdoost, H.: Designing a questionnaire for a research paper A comprehensive guide to design and develop an effective questionnaire. Asian J. Manag. Sci. 11(1), 816 (2022). https:\/\/doi.org\/10.51983\/ajms-2022.11.1.3087","journal-title":"Asian J. Manag. Sci."},{"issue":"1","key":"918_CR70","first-page":"1","volume":"33","author":"R Atkinson","year":"2001","unstructured":"Atkinson, R., Flint, J.: Accessing hidden and hard-to-reach populations: snowball research strategies. Soc. Res. 33(1), 1\u20134 (2001)","journal-title":"Soc. Res."},{"issue":"3","key":"918_CR71","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1111\/wvn.12209","volume":"14","author":"S Crane","year":"2017","unstructured":"Crane, S., Broome, M.E.: Understanding ethical issues of research participation from the perspective of participating children and adolescents: a systematic review. Worldviews Evid. Based Nurs 14(3), 200\u2013209 (2017). https:\/\/doi.org\/10.1111\/wvn.12209","journal-title":"Worldviews Evid. Based Nurs"},{"issue":"1","key":"918_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2021.e06016","volume":"7","author":"A Alzubaidi","year":"2021","unstructured":"Alzubaidi, A.: Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon 7(1), e06016 (2021). https:\/\/doi.org\/10.1016\/j.heliyon.2021.e06016","journal-title":"Heliyon"},{"key":"918_CR73","volume-title":"Questionnaire design & administration: a practical guide","author":"L Frazer","year":"2001","unstructured":"Frazer, L., Lawley, M.: Questionnaire design & administration: a practical guide. Wiley, Hoboken (2001)"},{"key":"918_CR74","volume-title":"The handbook of social research ethics","author":"DM Mertens","year":"2008","unstructured":"Mertens, D.M., Ginsberg, P.E.: The handbook of social research ethics. SAGE Publications Inc, New York (2008)"},{"issue":"2","key":"918_CR75","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1111\/ijcs.12700","volume":"46","author":"J Kim","year":"2022","unstructured":"Kim, J., Yang, K., Min, J., White, B.: Hope, fear, and consumer behavioral change amid COVID-19: application of protection motivation theory. Int. J. Consum. Stud. 46(2), 558\u2013574 (2022). https:\/\/doi.org\/10.1111\/ijcs.12700","journal-title":"Int. J. Consum. Stud."},{"key":"918_CR76","volume-title":"Stress, appraisal, and coping","author":"RS Lazarus","year":"1984","unstructured":"Lazarus, R.S., Folkman, S.: Stress, appraisal, and coping, 2nd edn. Springer Publishing Company, Berlin (1984)","edition":"2"},{"key":"918_CR77","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.patrec.2021.10.002","volume":"152","author":"H Mehraj","year":"2021","unstructured":"Mehraj, H., Jayadevappa, D., Haleem, S.L.A., Parveen, R., Madduri, A., Ayyagari, M.R., Dhabliya, D.: Protection motivation theory using multi-factor authentication for providing security over social networking sites. Pattern Recogn. Lett. 152, 218\u2013224 (2021). https:\/\/doi.org\/10.1016\/j.patrec.2021.10.002","journal-title":"Pattern Recogn. Lett."},{"key":"918_CR78","doi-asserted-by":"crossref","unstructured":"Barkin, J.S., Chase, V.M., van Wees, S.: Interpretive methodologies, quantitative methods, and comparative environmental politics. In The Oxford handbook of comparative environmental politics. (2021)","DOI":"10.1093\/oxfordhb\/9780197515037.013.11"},{"key":"918_CR79","unstructured":"Ringle, C.M., Wende, S., & Becker, J.-Michael.: Higher-order Models, SmartPLS 4. Oststeinbek: SmartPLS. https:\/\/www.smartpls.com (2022)"},{"key":"918_CR80","doi-asserted-by":"publisher","first-page":"113323","DOI":"10.1016\/j.dss.2020.113323","volume":"135","author":"R Mousavi","year":"2020","unstructured":"Mousavi, R., Chen, R., Kim, D.J., Chen, K.: Effectiveness of privacy assurance mechanisms in users\u2019 privacy protection on social networking sites from the perspective of protection motivation theory. Decis. Support Syst. 135, 113323 (2020). https:\/\/doi.org\/10.1016\/j.dss.2020.113323","journal-title":"Decis. Support Syst."},{"key":"918_CR81","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.ijhcs.2018.11.003","volume":"123","author":"R van Bavel","year":"2019","unstructured":"van Bavel, R., Rodr\u00edguez-Priego, N., Vila, J., Briggs, P.: Using protection motivation theory in the design of nudges to improve online security behavior. Int. J. Hum. Comput. Stud. 123, 29\u201339 (2019). https:\/\/doi.org\/10.1016\/j.ijhcs.2018.11.003","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"4","key":"918_CR82","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/03637759209376276","volume":"59","author":"K Witte","year":"1992","unstructured":"Witte, K.: Putting the fear back into fear appeals: The extended parallel process model. Commun. Monogr. 59(4), 329\u2013349 (1992). https:\/\/doi.org\/10.1080\/03637759209376276","journal-title":"Commun. Monogr."},{"issue":"2","key":"918_CR83","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1108\/ICS-03-2018-0031","volume":"27","author":"M Malatji","year":"2019","unstructured":"Malatji, M., Von Solms, S., Marnewick, A.: Socio-technical systems cybersecurity framework. Inform. Comput. Secur. 27(2), 233\u2013272 (2019). https:\/\/doi.org\/10.1108\/ICS-03-2018-0031","journal-title":"Inform. Comput. Secur."},{"issue":"1","key":"918_CR84","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MSEC.2021.3117471","volume":"20","author":"D Bringhenti","year":"2022","unstructured":"Bringhenti, D., Valenza, F., Basile, C.: Toward cybersecurity personalization in smart homes. IEEE Secur. Priv. 20(1), 45\u201353 (2022). https:\/\/doi.org\/10.1109\/MSEC.2021.3117471","journal-title":"IEEE Secur. Priv."},{"issue":"5","key":"918_CR85","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1111\/puar.13362","volume":"81","author":"S Degli Esposti","year":"2021","unstructured":"Degli Esposti, S., Ball, K., Dibb, S.: What\u2019s in it for us? Benevolence, national security, and digital surveillance. Public Adm. Rev. 81(5), 862\u2013873 (2021). https:\/\/doi.org\/10.1111\/puar.13362","journal-title":"Public Adm. Rev."},{"key":"918_CR86","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.ijinfomgt.2018.01.001","volume":"40","author":"YJ Moon","year":"2018","unstructured":"Moon, Y.J., Choi, M., Armstrong, D.J.: The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations. Int. J. Inf. Manage. 40, 54\u201366 (2018). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.01.001","journal-title":"Int. J. Inf. Manage."},{"issue":"4","key":"918_CR87","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.dss.2009.04.009","volume":"47","author":"J Lee","year":"2009","unstructured":"Lee, J., Rao, H.R.: Task complexity and different decision criteria for online service acceptance: a comparison of two e-government compliance service domains. Decis. Support Syst. 47(4), 424\u2013435 (2009). https:\/\/doi.org\/10.1016\/j.dss.2009.04.009","journal-title":"Decis. Support Syst."},{"issue":"3","key":"918_CR88","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1080\/02602938.2020.1784392","volume":"46","author":"CKY Chan","year":"2021","unstructured":"Chan, C.K.Y., Luk, L.Y.Y.: Development and validation of an instrument measuring undergraduate students\u2019 perceived holistic competencies. Assess. Eval. High. Educ. 46(3), 467\u2013482 (2021). https:\/\/doi.org\/10.1080\/02602938.2020.1784392","journal-title":"Assess. Eval. High. Educ."},{"issue":"3","key":"918_CR89","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"C Bulgurcu","year":"2010","unstructured":"Bulgurcu, C., Benbasat, I.: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523 (2010). https:\/\/doi.org\/10.2307\/25750690","journal-title":"MIS Q."},{"issue":"8","key":"918_CR90","doi-asserted-by":"publisher","first-page":"1796","DOI":"10.1080\/0144929X.2021.1905066","volume":"41","author":"L De Kimpe","year":"2022","unstructured":"De Kimpe, L., Walrave, M., Verdegem, P., Ponnet, K.: What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context. Behav. Inform. Technol. 41(8), 1796\u20131808 (2022). https:\/\/doi.org\/10.1080\/0144929X.2021.1905066","journal-title":"Behav. Inform. Technol."},{"issue":"2","key":"918_CR91","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1057\/jibs.2009.88","volume":"41","author":"S-J Chang","year":"2010","unstructured":"Chang, S.-J., van Witteloostuijn, A., Eden, L.: From the Editors: Common method variance in international business research. J. Int. Bus. Stud. 41(2), 178\u2013184 (2010). https:\/\/doi.org\/10.1057\/jibs.2009.88","journal-title":"J. Int. Bus. Stud."},{"issue":"4","key":"918_CR92","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/J.JRETAI.2012.08.001","volume":"88","author":"SB MacKenzie","year":"2012","unstructured":"MacKenzie, S.B., Podsakoff, P.M.: Common method bias in marketing: causes, mechanisms, and procedural remedies. J. Retail. 88(4), 542\u2013555 (2012). https:\/\/doi.org\/10.1016\/J.JRETAI.2012.08.001","journal-title":"J. Retail."},{"key":"918_CR93","unstructured":"Hair, J., Sarstedt, M., Ringle, C. PLS-SEM: looking back and moving forward. In Elsevier. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S002463011400020X (2017)"},{"key":"918_CR94","doi-asserted-by":"publisher","DOI":"10.1287\/ISRE.14.2.189.16018","author":"WW Chin","year":"2003","unstructured":"Chin, W.W., Marcelin, B.L., Newsted, P.R.: A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion\/adoption study. Inform. Syst. Res. (2003). https:\/\/doi.org\/10.1287\/ISRE.14.2.189.16018","journal-title":"Inform. Syst. Res."},{"issue":"1","key":"918_CR95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10705519909540118","volume":"6","author":"LT Hu","year":"1999","unstructured":"Hu, L.T., Bentler, P.M.: Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct. Equ. Model. 6(1), 1\u201355 (1999). https:\/\/doi.org\/10.1080\/10705519909540118","journal-title":"Struct. Equ. Model."},{"issue":"3","key":"918_CR96","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1111\/jedm.12050","volume":"51","author":"JH Bolin","year":"2014","unstructured":"Bolin, J.H.: Hayes Andrew F (2013) introduction to mediation moderation and conditional process analysis a regression based approach New York NY. The Guilford Press. J. Edu. Meas. 51(3), 335\u2013337 (2014). https:\/\/doi.org\/10.1111\/jedm.12050","journal-title":"J. Edu. Meas."},{"key":"918_CR97","volume-title":"Multivariate data analysis","author":"JF Hair","year":"2016","unstructured":"Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E.: Multivariate data analysis, 7th edn. Pearson, London (2016)","edition":"7"},{"key":"918_CR98","unstructured":"Risher, J. The robustness of PLS across disciplines the robustness of PLS across disciplines. Search.Proquest.Com, January 2017, 47\u201356. https:\/\/search.proquest.com\/openview\/617c8dcdad9cdd1e96ed3daf8a8b1cc4\/1?pq-origsite=gscholar&cbl=2044545 (2020)"},{"issue":"2","key":"918_CR99","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/J.CLSR.2015.12.017","volume":"32","author":"N Van Dijk","year":"2016","unstructured":"Van Dijk, N., Gellert, R., Rommetveit, K.: A risk to a right? Beyond data protection risk assessments. Comput. Law Secur. Rev. 32(2), 286\u2013306 (2016). https:\/\/doi.org\/10.1016\/J.CLSR.2015.12.017","journal-title":"Comput. Law Secur. Rev."},{"key":"918_CR100","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/J.COSE.2017.07.003","volume":"70","author":"N Thompson","year":"2017","unstructured":"Thompson, N., McGill, T.J., Wang, X.: Security begins at home: determinants of home computer and mobile device security behavior. Comput. Secur. 70, 376\u2013391 (2017). https:\/\/doi.org\/10.1016\/J.COSE.2017.07.003","journal-title":"Comput. Secur."},{"key":"918_CR101","volume-title":"Social learning theory","author":"A Bandura","year":"1977","unstructured":"Bandura, A.: Social learning theory. Prentice-Hall, Hoboken (1977)"},{"issue":"3","key":"918_CR102","doi-asserted-by":"publisher","first-page":"361","DOI":"10.2307\/258173","volume":"14","author":"R Wood","year":"1989","unstructured":"Wood, R., Bandura, A.: Social cognitive theory of organizational management. Acad. Manag. Rev. 14(3), 361\u2013384 (1989)","journal-title":"Acad. Manag. Rev."},{"key":"918_CR103","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.dss.2019.02.010","volume":"119","author":"M Grimes","year":"2019","unstructured":"Grimes, M., Marquardson, J.: Quality matters: evoking subjective norms and coping appraisals by system design to increase security intentions. Decis. Support Syst. 119, 23\u201334 (2019). https:\/\/doi.org\/10.1016\/j.dss.2019.02.010","journal-title":"Decis. Support Syst."},{"key":"918_CR104","doi-asserted-by":"publisher","DOI":"10.1016\/J.CHB.2016.10.028","author":"B Wu","year":"2017","unstructured":"Wu, B., Chen, X.: Continuance intention to use MOOCs: Integrating the technology acceptance model (TAM) and task technology fit (TTF) model. Comput. Hum. Behav. (2017). https:\/\/doi.org\/10.1016\/J.CHB.2016.10.028","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"918_CR105","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage. Sci. 46(2), 186\u2013204 (2000). https:\/\/doi.org\/10.1287\/mnsc.46.2.186.11926","journal-title":"Manage. Sci."},{"issue":"18\u201320","key":"918_CR106","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1080\/10447318.2022.2070107","volume":"38","author":"ES Vorm","year":"2022","unstructured":"Vorm, E.S., Combs, D.J.Y.: Integrating transparency, trust, and acceptance: the intelligent systems technology acceptance model (ISTAM). Int. J. Hum Comput. Interact. 38(18\u201320), 1828\u20131845 (2022). https:\/\/doi.org\/10.1080\/10447318.2022.2070107","journal-title":"Int. J. Hum Comput. Interact."},{"issue":"3","key":"918_CR107","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart. 13(3), 319\u2013340 (1989). https:\/\/doi.org\/10.2307\/249008","journal-title":"MIS Quart."},{"key":"918_CR108","doi-asserted-by":"publisher","first-page":"101421","DOI":"10.1016\/J.TECHSOC.2020.101421","volume":"63","author":"SC Robinson","year":"2020","unstructured":"Robinson, S.C.: Trust, transparency, and openness: How inclusion of cultural values shapes Nordic national public policy strategies for artificial intelligence (AI). Technol. Soc. 63, 101421 (2020). https:\/\/doi.org\/10.1016\/J.TECHSOC.2020.101421","journal-title":"Technol. Soc."},{"issue":"4","key":"918_CR109","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10799-017-0280-1","volume":"19","author":"L Khansa","year":"2018","unstructured":"Khansa, L., Barkhi, R., Ray, S., Davis, Z.: Cyberloafing in the workplace: mitigation tactics and their impact on individuals\u2019 behavior. Inf. Technol. Manage. 19(4), 197\u2013215 (2018). https:\/\/doi.org\/10.1007\/s10799-017-0280-1","journal-title":"Inf. Technol. Manage."},{"key":"918_CR110","doi-asserted-by":"publisher","first-page":"110321","DOI":"10.1016\/j.pnpbp.2021.110321","volume":"110","author":"S \u00c7elik","year":"2021","unstructured":"\u00c7elik, S., K\u00f6se, G.G.: Mediating effect of intolerance of uncertainty in the relationship between coping styles with stress during pandemic (COVID-19) process and compulsive buying behavior. Prog. Neuropsychopharmacol. Biol. Psychiatry 110, 110321 (2021). https:\/\/doi.org\/10.1016\/j.pnpbp.2021.110321","journal-title":"Prog. Neuropsychopharmacol. Biol. Psychiatry"},{"issue":"5","key":"918_CR111","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1111\/radm.12531","volume":"52","author":"J D\u0105browska","year":"2022","unstructured":"D\u0105browska, J., Almpanopoulou, A., Brem, A., Chesbrough, H., Cucino, V., Di Minin, A., Giones, F., Hakala, H., Marullo, C., Mention, A., Mortara, L., N\u00f8rskov, S., Nylund, P.A., Oddo, C.M., Radziwon, A., Ritala, P.: Digital transformation, for better or worse: a critical multi-level research agenda. R&D Manag. 52(5), 930\u2013954 (2022). https:\/\/doi.org\/10.1111\/radm.12531","journal-title":"R&D Manag."},{"issue":"4","key":"918_CR112","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1007\/s40808-020-00815-9","volume":"6","author":"A Sarkar","year":"2020","unstructured":"Sarkar, A., Chouhan, P.: Modeling spatial determinants of urban expansion of Siliguri a Metropolitan City of India using Logistic Regression. Model. Earth Syst. Environ. 6(4), 2317\u20132331 (2020). https:\/\/doi.org\/10.1007\/s40808-020-00815-9","journal-title":"Model. Earth Syst. Environ."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00918-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00918-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00918-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:13:37Z","timestamp":1739337217000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00918-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,30]]},"references-count":112,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["918"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00918-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,30]]},"assertion":[{"value":"16 October 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Ethical review and approval were waived for this study due to fact that there is no institutional review board or committee in Bangladesh. Additionally, the study was conducted as per the guidelines of the Declaration of Helsinki. The research questionnaire was anonymous, and no personal information was gathered.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"4"}}