{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:56:50Z","timestamp":1774025810695,"version":"3.50.1"},"reference-count":98,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01039-7","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T09:50:15Z","timestamp":1747648215000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Role of cybersecurity in microgrid adoption through the UTAUT for energy sustainability"],"prefix":"10.1007","volume":"24","author":[{"given":"Xiaotong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaoguang","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Xiaoguang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yanwei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"issue":"1","key":"1039_CR1","first-page":"240","volume":"46","author":"RA Acheampong","year":"2019","unstructured":"Acheampong, R.A., Siiba, A.: Modelling the determinants of car-sharing adoption intentions among young adults: the role of attitude, perceived benefits, travel expectations, and socio-demographic factors. Transportation. 46(1), 240\u2013266 (2019)","journal-title":"Transportation"},{"issue":"2","key":"1039_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen I.: The theory of planned behavior. Organ Behav Hum Decis Process.\n50(2), 179-211 (1991)","journal-title":"Organ Behav Hum Decis Process"},{"issue":"1","key":"1039_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.63180\/jcsra.thestap.2025.1.1","volume":"1","author":"AA Almuqren","year":"2025","unstructured":"Almuqren, A.A.: Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions. J. Cyber Secur. Risk Auditing. 1(1), 1\u201311 (2025)","journal-title":"J. Cyber Secur. Risk Auditing"},{"issue":"1","key":"1039_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.63180\/jcsra.thestap.2025.1.5","volume":"2025","author":"E Alotaibi","year":"2025","unstructured":"Alotaibi, E., Bin Sulaiman, R., Almaiah, M.: Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks. J. Cyber Secur. Risk Audit. 2025(1), 47\u201359 (2025)","journal-title":"J. Cyber Secur. Risk Audit."},{"issue":"1","key":"1039_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.63180\/jcsra.thestap.2025.1.4","volume":"2025","author":"A Alshuaibi","year":"2025","unstructured":"Alshuaibi, A., Almaayah, M., Ali, A.: Machine learning for cybersecurity issues: a systematic review. J. Cyber Secur. Risk Audit. 2025(1), 36\u201346 (2025)","journal-title":"J. Cyber Secur. Risk Audit."},{"issue":"2","key":"1039_CR6","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.30574\/wjarr.2024.22.2.1535","volume":"22","author":"IO Asevameh","year":"2024","unstructured":"Asevameh, I.O., Dopamu, O.M., Adesiyan, J.S.: Enhancing resilience and security in the US power grid against cyber-physical attacks. World J. Adv. Res. Rev. 22(2), 1043\u20131052 (2024)","journal-title":"World J. Adv. Res. Rev."},{"key":"1039_CR7","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1007\/s11277-015-2510-3","volume":"83","author":"S Asri","year":"2015","unstructured":"Asri, S., Pranggono, B.: Impact of distributed denial-of-service attack on advanced metering infrastructure. Wireless Pers. Commun. 83, 2211\u20132223 (2015)","journal-title":"Wireless Pers. Commun."},{"issue":"1","key":"1039_CR8","doi-asserted-by":"publisher","first-page":"325","DOI":"10.3390\/su15010325","volume":"15","author":"G Baldi","year":"2022","unstructured":"Baldi, G., Megaro, A., Carrubbo, L.: Small-town citizens\u2019 technology acceptance of smart and sustainable city development. Sustainability 15(1), 325 (2022)","journal-title":"Sustainability"},{"key":"1039_CR9","unstructured":"Bandura, A. (2014). Social-cognitive theory. In An introduction to theories of personality (pp. 341\u2013360). Psychology Press."},{"issue":"2","key":"1039_CR10","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1207\/s15327906mbr2502_3","volume":"25","author":"PM Bentler","year":"1990","unstructured":"Bentler, PM.: Fit indexes, Lagrange multipliers, constraint changes and incomplete data in structural models. Multivar. behav. res. 25(2), 163-172 (1990)","journal-title":"Multivar. behav. res."},{"issue":"8","key":"1039_CR11","doi-asserted-by":"publisher","first-page":"1982","DOI":"10.3390\/en17081982","volume":"17","author":"T Bhatia","year":"2024","unstructured":"Bhatia, T., Bharathy, G., Prasad, M.: A targeted review on revisiting and augmenting the framework for technology acceptance in the renewable energy context. Energies 17(8), 1982 (2024)","journal-title":"Energies"},{"issue":"9","key":"1039_CR12","doi-asserted-by":"publisher","first-page":"3237","DOI":"10.3390\/en15093237","volume":"15","author":"S Borenius","year":"2022","unstructured":"Borenius, S., Gopalakrishnan, P., Bertling Tjernberg, L., Kantola, R.: Expert-guided security risk assessment of evolving power grids. Energies 15(9), 3237 (2022)","journal-title":"Energies"},{"issue":"02","key":"1039_CR13","doi-asserted-by":"publisher","first-page":"367","DOI":"10.4236\/ce.2023.142024","volume":"14","author":"S Bo\u017eak","year":"2023","unstructured":"Bo\u017eak, S., Hegedi\u0161, P., Hus, V.: Ecological awareness among 3rd grade students of primary school. Creat. Educ. 14(02), 367\u2013376 (2023)","journal-title":"Creat. Educ."},{"key":"1039_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101776","volume":"92","author":"M Brunner","year":"2020","unstructured":"Brunner, M., Sauerwein, C., Felderer, M., Breu, R.: Risk management practices in information security: exploring the status quo in the DACH region. Comput. Secur. 92, 101776 (2020)","journal-title":"Comput. Secur."},{"key":"1039_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2024.123247","volume":"201","author":"MA Camilleri","year":"2024","unstructured":"Camilleri, M.A.: Factors affecting performance expectancy and intentions to use ChatGPT: using SmartPLS to advance an information technology acceptance framework. Technol. Forecast. Soc. Chang. 201, 123247 (2024)","journal-title":"Technol. Forecast. Soc. Chang."},{"issue":"5","key":"1039_CR16","doi-asserted-by":"publisher","first-page":"791","DOI":"10.3390\/electronics11050791","volume":"11","author":"S Chartier","year":"2022","unstructured":"Chartier, S., Venkiteswaran, V., Rangarajan, S., Collins, E., Senjyu, T.: Microgrid emergence, integration, and influence on the future energy generation equilibrium\u2014a review. Electronics. 11(5), 791 (2022)","journal-title":"Electronics"},{"key":"1039_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103858","volume":"142","author":"S Chaudhary","year":"2024","unstructured":"Chaudhary, S.: Driving behaviour change with cybersecurity awareness. Computers Secur. 142, 103858 (2024)","journal-title":"Computers Secur."},{"key":"1039_CR18","unstructured":"Cleveland, C. (2024, January 2). Gender diversity in the United States energy workforce. Visualizing Energy. https:\/\/visualizingenergy.org\/gender-diversity-in-the-united-states-energy-workforce\/"},{"key":"1039_CR19","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"J Cohen","year":"1988","unstructured":"Cohen, J.: Statistical Power Analysis for the Behavioral Sciences, 2nd edn. Lawrence Earlbaum Associates, Hillsdale, NJ (1988)","edition":"2"},{"key":"1039_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.121092","volume":"173","author":"G Dash","year":"2021","unstructured":"Dash, G., Paul, J.: CB-SEM vs PLS-SEM methods for research in social sciences and technology forecasting. Technol. Forecast. Soc. Chang. 173, 121092 (2021)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"1039_CR21","unstructured":"Data USA. (2022). Electric power generation, transmission, and distribution. Data USA. Retrieved from https:\/\/datausa.io\/profile\/naics\/electric-power-generation-transmission-distribution#:~:text=Demographic%20information%20on%20the%20Electric,or%20high%20school%20or%20equivalent"},{"key":"1039_CR22","unstructured":"Davis, F. D. Technology acceptance model: TAM. Al-Suqri, MN, Al-Aufi, AS: Inf Seeking Behav Technol Adoption.  205(219), 5 (1989)"},{"key":"1039_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3303205","author":"F Djebbar","year":"2023","unstructured":"Djebbar, F., Nordstr\u00f6m, K.: A comparative analysis of industrial cybersecurity standards. IEEE Access (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3303205","journal-title":"IEEE Access"},{"issue":"1","key":"1039_CR24","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1186\/s42162-022-00194-8","volume":"5","author":"S Dong","year":"2022","unstructured":"Dong, S., Cao, J., Flynn, D., Fan, Z.: Cybersecurity in smart local energy systems: requirements, challenges, and standards. Energy Inf. 5(1), 7 (2022)","journal-title":"Energy Inf."},{"key":"1039_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2022.131479","volume":"352","author":"A Dwivedi","year":"2022","unstructured":"Dwivedi, A., Dwivedi, P., Joshi, K., Sharma, V., Sengar, A., Agrawal, R., Barthwal, M.: Local leader\u2019s impact on adoption of renewable energy generation technology by rural communities in the Himalayan region. J. Clean. Prod. 352, 131479 (2022)","journal-title":"J. Clean. Prod."},{"key":"1039_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2022.113632","volume":"157","author":"YK Dwivedi","year":"2023","unstructured":"Dwivedi, Y.K., Balakrishnan, J., Das, R., Dutot, V.: Resistance to innovation: a dynamic capability model based enquiry into retailers\u2019 resistance to blockchain adaptation. J. Bus. Res. 157, 113632 (2023)","journal-title":"J. Bus. Res."},{"issue":"6","key":"1039_CR27","doi-asserted-by":"publisher","first-page":"1845","DOI":"10.51594\/estj.v5i6.1186","volume":"5","author":"DE Ekechukwu","year":"2024","unstructured":"Ekechukwu, D.E., Simpa, P.: The importance of cybersecurity in protecting renewable energy investment: a strategic analysis of threats and solutions. Eng. Sci. Technol. J. 5(6), 1845\u20131883 (2024)","journal-title":"Eng. Sci. Technol. J."},{"key":"1039_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2023.103260","volume":"104","author":"M Eklund","year":"2023","unstructured":"Eklund, M., Khalilpour, K., Voinov, A., Hossain, M.J.: Understanding the community in community microgrids: a conceptual framework for better decision-making. Energy Res. Soc. Sci. 104, 103260 (2023)","journal-title":"Energy Res. Soc. Sci."},{"key":"1039_CR29","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.apenergy.2024.123458","volume":"367","author":"M Eklund","year":"2024","unstructured":"Eklund, M., Khalilpour, K., Voinov, A., Hossain, M.J.: Community microgrids: a decision framework integrating social capital with business models for improved resiliency. Appl. Energy 367, 123 (2024)","journal-title":"Appl. Energy"},{"issue":"3","key":"1039_CR30","doi-asserted-by":"publisher","first-page":"42","DOI":"10.53555\/ephijse.v9i3.215","volume":"9","author":"G Erick","year":"2023","unstructured":"Erick, G.: Safeguarding stability: strategies for addressing dynamic system variations in power grid cybersecurity. Eph \u2013 Int. J. Sci. Eng. 9(3), 42\u201352 (2023)","journal-title":"Eph \u2013 Int. J. Sci. Eng."},{"key":"1039_CR31","unstructured":"Esmaeilzadeh P, Hemang S, Cousins K (2019) Individuals\u2019 cryptocurrency adoption: A proposed moderatedmediation model."},{"issue":"4","key":"1039_CR32","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1080\/10447318.2022.2118851","volume":"40","author":"S FakhrHosseini","year":"2024","unstructured":"FakhrHosseini, S., Chan, K., Lee, C., Jeon, M., Son, H., Rudnik, J., Coughlin, J.: User adoption of intelligent environments: a review of technology adoption models, challenges, and prospects. Int. J. of Human-Computer Interact. 40(4), 986\u2013998 (2024)","journal-title":"Int. J. of Human-Computer Interact."},{"key":"1039_CR33","unstructured":"FBI. (2021). Cyber crime: Ransomware. FBI Cyber Crime. Retrieved from https:\/\/www.fbi.gov\/investigate\/cyber"},{"key":"1039_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2024.123501","volume":"368","author":"S Ferahtia","year":"2024","unstructured":"Ferahtia, S., Houari, A., Cioara, T., Bouznit, M., Rezk, H., Djerioui, A.: Recent advances on energy management and control of direct current microgrid for smart cities and industry: a Survey. Appl. Energy 368, 123501 (2024)","journal-title":"Appl. Energy"},{"key":"1039_CR35","doi-asserted-by":"crossref","unstructured":"Ghorbani, Y., Zhang, S. E., Nwaila, G. T., Bourdeau, J. E., & Rose, D. H. (2023). Embracing a diverse approach to a globally inclusive green energy transition: Moving beyond decarbonisation and recognising realistic carbon reduction strategies. Journal of Cleaner Production, 434: 140414.","DOI":"10.1016\/j.jclepro.2023.140414"},{"issue":"2","key":"1039_CR36","doi-asserted-by":"publisher","first-page":"698","DOI":"10.3390\/su16020698","volume":"16","author":"J Gallegos","year":"2024","unstructured":"Gallegos, J., Ar\u00e9valo, P., Montaleza, C., Jurado, F.: Sustainable electrification\u2014advances and challenges in electrical-distribution networks: a review. Sustainability 16(2), 698 (2024)","journal-title":"Sustainability"},{"key":"1039_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.123050","volume":"199","author":"Q Gan","year":"2024","unstructured":"Gan, Q., Lau, R.Y.K.: Trust in a trust-free system: Blockchain acceptance in the banking and finance sector. Technol. Forecast. Soc. Chang. 199, 123050 (2024)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"1039_CR38","unstructured":"Gefen, D., Pavlou, P. A.: The moderation role of conflict on feedback mechanisms, trust, and risk in electronic marketplaces. Research Note (2004)"},{"key":"1039_CR39","doi-asserted-by":"publisher","first-page":"118275","DOI":"10.1016\/j.enconman.2024.118275","volume":"306","author":"CA Hampel","year":"2024","unstructured":"Hampel, C. A., Becker, W., Olis, D., Braun, R. J.: Evaluating the impact of off-design CHP performance on the optimal sizing and dispatch of hybrid renewable-CHP distributed energy resources. Energy Convers Manag\n306, 118275 (2024)","journal-title":"Energy Convers Manag"},{"issue":"4","key":"1039_CR40","first-page":"9","volume":"11","author":"M Hameed","year":"2019","unstructured":"Hameed, M., Consulting, T., Ltd, T., Magu, M., Arachchilage, N.: On the impact of perceived vulnerability in the adoption of information systems security innovations. Int. J. Computer Netw. Inf. Secur. 11(4), 9\u201318 (2019)","journal-title":"Int. J. Computer Netw. Inf. Secur."},{"key":"1039_CR41","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.jbusres.2019.11.069","volume":"109","author":"JF Hair Jr","year":"2020","unstructured":"Hair, J.F., Jr., Howard, M.C., Nitzl, C.: Assessing measurement model quality in PLS-SEM using confirmatory composite analysis. J. Bus. Res. 109, 101\u2013110 (2020)","journal-title":"J. Bus. Res."},{"key":"1039_CR42","volume-title":"Advanced issues in partial least squares structural equation modeling","author":"J Hair Jr","year":"2023","unstructured":"Hair, J., Jr., Hair, J.F., Jr., Sarstedt, M., Ringle, C.M., Gudergan, S.P.: Advanced issues in partial least squares structural equation modeling. Sage publications, Thousand Oaks (2023)"},{"key":"1039_CR43","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.rser.2018.03.040","volume":"90","author":"A Hirsch","year":"2018","unstructured":"Hirsch, A., Parag, Y., Guerrero, J.: Microgrids: a review of technologies, key drivers, and outstanding issues. Renew. Sustain. Energy Rev. 90, 402\u2013411 (2018)","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"1","key":"1039_CR44","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31(1), 83\u201395 (2012)","journal-title":"Comput. Secur."},{"key":"1039_CR45","unstructured":"International Energy Agency. (n.d.). International Energy Agency. Retrieved from https:\/\/www.iea.org\/"},{"issue":"12","key":"1039_CR46","doi-asserted-by":"publisher","first-page":"4590","DOI":"10.3390\/en16124590","volume":"16","author":"E Irmak","year":"2023","unstructured":"Irmak, E., Kabalci, E., Kabalci, Y.: Digital transformation of microgrids: a review of design, operation, optimization, and cybersecurity. Energies 16(12), 4590 (2023)","journal-title":"Energies"},{"issue":"1","key":"1039_CR47","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1108\/ICS-10-2023-0176","volume":"33","author":"H Jamil","year":"2024","unstructured":"Jamil, H., Zia, T., Nayeem, T., Whitty, M.T., D\u2019Alessandro, S.: Human-centric cyber security: applying protection motivation theory to analyse micro business owners\u2019 security behaviours. Inf. Computer Secur.. 33(1), 49\u201376 (2024)","journal-title":"Inf. Computer Secur.."},{"key":"1039_CR48","doi-asserted-by":"publisher","unstructured":"Jha, R. (2023). Cyber-physical security framework for critical infrastructure protection in power systems. https:\/\/doi.org\/10.21203\/rs.3.rs-3127087\/v1","DOI":"10.21203\/rs.3.rs-3127087\/v1"},{"key":"1039_CR49","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.chb.2017.01.001","volume":"70","author":"J Khalilzadeh","year":"2017","unstructured":"Khalilzadeh, J., Ozturk, A.B., Bilgihan, A.: Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry. Comput. Hum. Behav. 70, 460\u2013474 (2017)","journal-title":"Comput. Hum. Behav."},{"issue":"18","key":"1039_CR50","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.3390\/s21186225","volume":"21","author":"T Krause","year":"2021","unstructured":"Krause, T., Ernst, R., Klaer, B., Hacker, I., Henze, M.: Cybersecurity in power grids: challenges and opportunities. Sensors 21(18), 6225 (2021)","journal-title":"Sensors"},{"issue":"10","key":"1039_CR51","doi-asserted-by":"publisher","first-page":"S294","DOI":"10.1016\/j.biopsych.2024.02.975","volume":"95","author":"N Kulviwat","year":"2024","unstructured":"Kulviwat, N., Mastrodonato, A., Simpson, N. R., Bakalian, c. J., Boldrini, M., Dwork, A. J., Underwood, M. 476. CLAUDIN-5 and Blood-Brain Barrier Integrity in Prefrontal Cortex in Suicide. Biol Psychiatry, 95(10), S294-S295. (2024)","journal-title":"Biol Psychiatry"},{"key":"1039_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40866-015-0001-y","volume":"1","author":"YP Kumar","year":"2016","unstructured":"Kumar, Y.P., Ravikumar, B.: Integrating renewable energy sources to an urban building in India: challenges, opportunities, and techno-economic feasibility simulation. Technol. Econ. Smart Grids Sustain. Energy 1, 1\u201316 (2016)","journal-title":"Technol. Econ. Smart Grids Sustain. Energy"},{"key":"1039_CR53","first-page":"39","volume-title":"Mohammed Amin Almaiah","author":"M Letchumanan","year":"2024","unstructured":"Letchumanan, M., Kamaruddin, R.: Strategies to Combat Cyberattacks: A Systematic Review. In: Maleh, Y., Alkhassawneh, A. (eds.) Mohammed Amin Almaiah, pp. 39\u201361. Risk Assessment and Countermeasures for Cybersecurity, IGI Global. Pennsylvania (2024)"},{"issue":"1","key":"1039_CR54","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/12460125.2020.1798590","volume":"30","author":"X Liu","year":"2021","unstructured":"Liu, X., Prybutok, V.R.: An empirical investigation of factors that drive a user decision to continue using cloud storage services. J. Decis. Syst. 30(1), 4\u201326 (2021)","journal-title":"J. Decis. Syst."},{"issue":"1\u20132","key":"1039_CR55","first-page":"1","volume":"13","author":"X Liu","year":"2019","unstructured":"Liu, X., Prybutok, V.R., Rubino, E.: An examination of factors that affect user intentions toward cloud computing switching. Int. J. Serv. Stand. 13(1\u20132), 1\u201321 (2019)","journal-title":"Int. J. Serv. Stand."},{"key":"1039_CR56","unstructured":"Liu, X., Rubino, E., & Prybutok, V. R.: A cloud storage service quality trust model. Software Quality Professional, 20(3) (2018)"},{"key":"1039_CR57","doi-asserted-by":"publisher","DOI":"10.32535\/jcda.v6i3.2525","author":"M Maria","year":"2023","unstructured":"Maria, M.: Enhanced the role of youth in participating the success of green economic practices: behavioral perspective based model. J. Community Dev. Asia (2023). https:\/\/doi.org\/10.32535\/jcda.v6i3.2525","journal-title":"J. Community Dev. Asia"},{"key":"1039_CR58","doi-asserted-by":"publisher","first-page":"94852","DOI":"10.1109\/ACCESS.2020.2991961","volume":"8","author":"MAI Martins","year":"2020","unstructured":"Martins, M.A.I., Fernandes, R., Heldwein, M.L.: Proposals for regulatory framework modifications for microgrid insertion\u2013the Brazil use case. IEEE Access 8, 94852\u201394870 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"1039_CR59","doi-asserted-by":"publisher","first-page":"638","DOI":"10.5334\/bc.211","volume":"3","author":"M Mechlenborg","year":"2022","unstructured":"Mechlenborg, M., Gram-Hanssen, K.: Masculine roles and practices in homes with photovoltaic systems. Build. Cities 3(1), 638\u2013652 (2022)","journal-title":"Build. Cities"},{"issue":"1","key":"1039_CR60","doi-asserted-by":"publisher","first-page":"12","DOI":"10.63180\/jcsra.thestap.2025.1.2","volume":"2025","author":"RS Mousa","year":"2025","unstructured":"Mousa, R.S., Shehab, R.: Applying risk analysis for determining threats and countermeasures in workstation domain. J. Cyber Secur. Risk Audit. 2025(1), 12\u201321 (2025)","journal-title":"J. Cyber Secur. Risk Audit."},{"issue":"1","key":"1039_CR61","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1002\/cb.2163","volume":"23","author":"P Nangia","year":"2024","unstructured":"Nangia, P., Bansal, S., Thaichon, P.: Doing more with less: an integrative literature review on responsible consumption behaviour. J. Consum. Behav. 23(1), 141\u2013155 (2024)","journal-title":"J. Consum. Behav."},{"issue":"3","key":"1039_CR62","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1145\/3353401.3353408","volume":"50","author":"O Ogbanufe","year":"2019","unstructured":"Ogbanufe, O., Dinulescu, C.C., Liu, X., Kucuk, C.Y.: It\u2019s in the cloud: theorizing context-specific factors influencing the perception of mobile cloud storage. ACM SIGMIS Database: DATABASE Adv. Inf. Syst. 50(3), 116\u2013137 (2019)","journal-title":"ACM SIGMIS Database: DATABASE Adv. Inf. Syst."},{"issue":"7","key":"1039_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2021.103507","volume":"58","author":"O Ogbanufe","year":"2021","unstructured":"Ogbanufe, O., Kim, D.J., Jones, M.C.: Informing cybersecurity strategic commitment through top management perceptions: the role of institutional pressures. Inf. Manag. 58(7), 103507 (2021)","journal-title":"Inf. Manag."},{"issue":"1","key":"1039_CR64","doi-asserted-by":"publisher","first-page":"22","DOI":"10.63180\/jcsra.thestap.2025.1.3","volume":"2025","author":"S Otoom","year":"2025","unstructured":"Otoom, S.: Risk auditing for digital twins in cyber physical systems: a systematic review. J. Cyber Secur. Risk Audit. 2025(1), 22\u201335 (2025)","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"1039_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101608","volume":"88","author":"H Paananen","year":"2020","unstructured":"Paananen, H., Lapke, M., Siponen, M.: State of the art in information security policy development. Comput. Secur. 88, 101608 (2020)","journal-title":"Comput. Secur."},{"key":"1039_CR66","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/ACCESS.2015.2443119","volume":"3","author":"S Parhizi","year":"2015","unstructured":"Parhizi, S., Lotfi, H., Khodaei, A., Bahramirad, S.: State of the art in research on microgrids: a review. IEEE access 3, 890\u2013925 (2015)","journal-title":"IEEE access"},{"issue":"2","key":"1039_CR67","first-page":"245","volume":"14","author":"C Park","year":"2024","unstructured":"Park, C., Heo, W.G., Lee, M.E.: Study on consumers\u2019 perceived benefits and risks of smart energy system. Int. J. Energy Econ. Policy 14(2), 245\u2013255 (2024)","journal-title":"Int. J. Energy Econ. Policy"},{"key":"1039_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2020.111441","volume":"140","author":"R Proudlove","year":"2020","unstructured":"Proudlove, R., Finch, S., Thomas, S.: Factors influencing intention to invest in a community owned renewable energy initiative in Queensland Australia. Energy Policy 140, 111441 (2020)","journal-title":"Energy Policy"},{"issue":"1","key":"1039_CR69","first-page":"20","volume":"15","author":"G Prybutok","year":"2020","unstructured":"Prybutok, G., Ta, A.V., Liu, X., Prybutok, V.: An integrated structural equation model of ehealth behavioral intention. Int. J. Healthc. Inf. Syste. Inf. (IJHISI) 15(1), 20\u201339 (2020)","journal-title":"Int. J. Healthc. Inf. Syste. Inf. (IJHISI)"},{"issue":"4","key":"1039_CR70","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1108\/WJSTSD-05-2018-0040","volume":"15","author":"S Rahi","year":"2018","unstructured":"Rahi, S., Abd. Ghani, M.: The role of UTAUT, DOI, perceived technology security and game elements in internet banking adoption. World J. Sci., Technol. Sustainable Dev. 15(4), 338\u2013356 (2018)","journal-title":"World J. Sci., Technol. Sustainable Dev."},{"key":"1039_CR71","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1007\/s10639-020-10320-2","volume":"26","author":"P Reddy","year":"2021","unstructured":"Reddy, P., Chaudhary, K., Sharma, B., Chand, R.: The two perfect scorers for technology acceptance. Educ. Inf. Technol. 26, 1505\u20131526 (2021)","journal-title":"Educ. Inf. Technol."},{"issue":"1","key":"1039_CR72","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10207-023-00732-9","volume":"23","author":"A Rekeraho","year":"2024","unstructured":"Rekeraho, A., Cotfas, D.T., Cotfas, P.A., B\u0103lan, T.C., Tuyishime, E., Acheampong, R.: Cybersecurity challenges in IoT-based smart renewable energy. Int. J. Inf. Secur. 23(1), 101\u2013117 (2024)","journal-title":"Int. J. Inf. Secur."},{"key":"1039_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2020.102219","volume":"102","author":"R Roberts","year":"2021","unstructured":"Roberts, R., Flin, R., Millar, D., Corradi, L.: Psychological factors influencing technology adoption: a case study from the oil and gas industry. Technovation 102, 102219 (2021)","journal-title":"Technovation"},{"key":"1039_CR74","unstructured":"Rogers EM, Singhal A, Quinlan MM (2014) Diffusion of innovations. In An integrated approach to communication theory and research 432-448 Routledge"},{"key":"1039_CR75","unstructured":"S&C Electric Company, 2019, Microgrid Cybersecurity: Protecting and Building the Grid of the Future. Accessed from https:\/\/www.sandc.com\/globalassets\/sac-electric\/documents\/public---documents\/sales-manual-library---external-view\/technical-paper-100-t116.pdf?dt=638601140189972300 on August 24, 2024"},{"key":"1039_CR76","doi-asserted-by":"publisher","first-page":"166502","DOI":"10.1109\/ACCESS.2021.3135083","volume":"9","author":"MH Saeed","year":"2021","unstructured":"Saeed, M.H., Fangzong, W., Kalwar, B.A., Iqbal, S.: A review on microgrids\u2019 challenges & perspectives. IEEE Access 9, 166502\u2013166517 (2021)","journal-title":"IEEE Access"},{"key":"1039_CR77","first-page":"587","volume-title":"Handbook of market research","author":"M Sarstedt","year":"2021","unstructured":"Sarstedt, M., Ringle, C.M., Hair, J.F.: Partial least squares structural equation modeling. In: Handbook of market research, pp. 587\u2013632. Springer International Publishing, Cham (2021)"},{"key":"1039_CR78","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102974","volume":"124","author":"FA Shaikh","year":"2023","unstructured":"Shaikh, F.A., Siponen, M.: Information security risk assessments following cybersecurity breaches: the mediating role of top management attention to cybersecurity. Comput. Secur. 124, 102974 (2023)","journal-title":"Comput. Secur."},{"key":"1039_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.123087","volume":"200","author":"MA Shareef","year":"2024","unstructured":"Shareef, M.A., Das, R., Ahmed, J.U., Mishra, A., Sultana, I., Rahman, M.Z., Mukerji, B.: Mandatory adoption of technology: can UTAUT2 model capture managers behavioral intention? Technol. Forecast. Soc. Chang. 200, 123087 (2024)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"1039_CR80","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.005","volume":"87","author":"S Sharma","year":"2019","unstructured":"Sharma, S., Warkentin, M.: Do i really belong?: impact of employment status on information security policy compliance. Comput. Secur. 87, 101397 (2019)","journal-title":"Comput. Secur."},{"issue":"6","key":"1039_CR81","first-page":"38","volume":"11","author":"S Shehu","year":"2024","unstructured":"Shehu, S., Ismail, B.A., Hassan, A.S.: An assessment of armed banditry activities on rural markets in Zamfara North. Int. J. Res. Sci. Innov. 11(6), 38\u201350 (2024)","journal-title":"Int. J. Res. Sci. Innov."},{"issue":"9","key":"1039_CR82","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1177\/10591478241266524","volume":"33","author":"K Siamionava","year":"2024","unstructured":"Siamionava, K., Mitra, S., Westerman, G.: Aligning with metrics: differential impact of IT and organizational metrics on cognitive coordination in top management teams. Prod. Op. Manag. 33(9), 1875\u20131894 (2024)","journal-title":"Prod. Op. Manag."},{"issue":"3","key":"1039_CR83","first-page":"1200","volume":"13","author":"M Sheikholeslami","year":"2022","unstructured":"Sheikholeslami, M., Li, Z., Shahidehpour, M., Gering, K., Sugiarto, A., Valderrama, A., Gurung, N., Zheng, H., Vukojevic, A.: Data security in networked microgrids for transacting energy. IEEE Trans. Smart Grid 13(3), 1200\u20131212 (2022)","journal-title":"IEEE Trans. Smart Grid"},{"key":"1039_CR84","unstructured":"Soper, D.S. (2024). A-priori Sample Size Calculator for Structural Equation Models [Software]. Available from https:\/\/www.danielsoper.com\/statcalc"},{"issue":"4","key":"1039_CR85","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1108\/ICS-02-2024-0038","volume":"32","author":"E Stavrou","year":"2024","unstructured":"Stavrou, E., Piki, A.: Cultivating self-efficacy to empower professionals\u2019 re-up skilling in cybersecurity. Inf. Computer Secur.. 32(4), 523\u2013541 (2024)","journal-title":"Inf. Computer Secur.."},{"issue":"1","key":"1039_CR86","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1108\/ICS-09-2023-0156","volume":"33","author":"X Tian","year":"2024","unstructured":"Tian, X.: Unraveling the dynamics of password manager adoption: a deeper dive into critical factors. Inf. Computer Secur 33(1), 117\u2013139 (2024). https:\/\/doi.org\/10.1108\/ICS-09-2023-0156","journal-title":"Inf. Computer Secur"},{"key":"1039_CR87","doi-asserted-by":"crossref","unstructured":"Tian, X., & Liu, X.: The role of trust and data sharing willingness in users\u2019 acceptance of insurance telematics. J. Knowl. Manage. Pract. 24(2) (2024)","DOI":"10.62477\/jkmp.v24i2.399"},{"issue":"2","key":"1039_CR88","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1111\/isj.12312","volume":"31","author":"Y Tim","year":"2021","unstructured":"Tim, Y., Cui, L., Sheng, Z.: Digital resilience: how rural communities leapfrogged into sustainable development. Inf. Syst. J. 31(2), 323\u2013345 (2021)","journal-title":"Inf. Syst. J."},{"key":"1039_CR89","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102387","volume":"109","author":"B Uchendu","year":"2021","unstructured":"Uchendu, B., Nurse, J.R., Bada, M., Furnell, S.: Developing a cyber security culture: current practices and future needs. Comput. Secur. 109, 102387 (2021)","journal-title":"Comput. Secur."},{"issue":"3","key":"1039_CR90","doi-asserted-by":"publisher","first-page":"918","DOI":"10.3390\/en15030918","volume":"15","author":"R Trivedi","year":"2022","unstructured":"Trivedi, R., Patra, S., Sidqi, Y., Bowler, B., Zimmermann, F., Deconinck, G., Khadem, S.: Community-based microgrids: literature review and pathways to decarbonise the local electricity network. Energies 15(3), 918 (2022)","journal-title":"Energies"},{"issue":"3","key":"1039_CR91","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"4","key":"1039_CR92","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1108\/JSTPM-03-2020-0058","volume":"13","author":"HA Widyanto","year":"2022","unstructured":"Widyanto, H.A., Kusumawardani, K.A., Yohanes, H.: Safety first: extending UTAUT to better predict mobile payment adoption by incorporating perceived security, perceived risk and trust. J. Sci. Techno. Policy Manag. 13(4), 952\u2013973 (2022)","journal-title":"J. Sci. Techno. Policy Manag."},{"key":"1039_CR93","unstructured":"World Economic Forum. (2022). What are microgrids and how can they help communities achieve a low-carbon future? Retrieved from https:\/\/www.weforum.org\/agenda\/2022\/05\/what-are-microgrids-renewable-power\/"},{"issue":"2","key":"1039_CR94","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1111\/fcsr.12136","volume":"44","author":"Y Xu","year":"2015","unstructured":"Xu, Y., Johnson, C., Bartholomae, S., O\u2019Neill, B., Gutter, M.S.: Homeownership among millennials: the deferred American dream? Fam. Consum. Sci. Res. J. 44(2), 201\u2013212 (2015)","journal-title":"Fam. Consum. Sci. Res. J."},{"issue":"1","key":"1039_CR95","doi-asserted-by":"publisher","first-page":"8300","DOI":"10.1038\/s41598-024-58505-w","volume":"14","author":"Z Yao","year":"2024","unstructured":"Yao, Z.: A secure and highly efficient blockchain PBFT consensus algorithm for microgrid power trading. Sci. Rep. 14(1), 8300 (2024)","journal-title":"Sci. Rep."},{"key":"1039_CR96","unstructured":"Zibaeirad, A., Koleini, F., Bi, S., Hou, T., & Wang, T. (2024). A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities. arXiv preprint arXiv:2407.07966."},{"key":"1039_CR97","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2024.101429","volume":"67","author":"M Zhang","year":"2024","unstructured":"Zhang, M., Li, S.: Online promotion cooling? The influence mechanism of consumer loyalty in classic large-scale online social promotions. Electron. Commer. Res. Appl. 67, 101429 (2024)","journal-title":"Electron. Commer. Res. Appl."},{"key":"1039_CR98","doi-asserted-by":"publisher","first-page":"1664","DOI":"10.1016\/j.jclepro.2017.10.143","volume":"171","author":"R Zhao","year":"2018","unstructured":"Zhao, R., Geng, Y., Liu, Y., Tao, X., Xue, B.: Consumers\u2019 perception, purchase intention, and willingness to pay for carbon-labeled products: a case study of Chengdu in China. J. Clean. Prod. 171, 1664\u20131671 (2018)","journal-title":"J. Clean. Prod."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01039-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01039-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01039-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:02:33Z","timestamp":1750503753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01039-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":98,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1039"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01039-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,19]]},"assertion":[{"value":"12 April 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"132"}}