{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:54:03Z","timestamp":1769925243014,"version":"3.49.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T00:00:00Z","timestamp":1766880000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T00:00:00Z","timestamp":1766880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01186-x","type":"journal-article","created":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T06:32:22Z","timestamp":1766903542000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bridging the gap between cybersecurity awareness and implementation: a three-stage healthcare metaphor for cross-sector governance"],"prefix":"10.1007","volume":"25","author":[{"given":"Tainyi","family":"Luor","sequence":"first","affiliation":[]},{"given":"Jen Fu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,28]]},"reference":[{"issue":"5","key":"1186_CR1","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1108\/ICS-01-2024-0025","volume":"32","author":"R Adriko","year":"2024","unstructured":"Adriko, R., Nurse, J.R.C.: Cybersecurity, cyber insurance and small and medium-sized enterprises: a systematic review. Inf. Comput. Secur. 32(5), 691\u2013710 (2024)","journal-title":"Inf. Comput. Secur."},{"issue":"2","key":"1186_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: Theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"1186_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107376","volume":"136","author":"M Alanazi","year":"2022","unstructured":"Alanazi, M., Freeman, M., Tootell, H.: Exploring factors influencing young people\u2019s online safety behaviors. Comput. Hum. Behav. 136, 107376 (2022). https:\/\/doi.org\/10.1016\/j.chb.2022.107376","journal-title":"Comput. Hum. Behav."},{"key":"1186_CR4","unstructured":"Brundage, M. et al.: Malicious Uses of Artificial Intelligence: Prediction, Prevention, and Mitigation (2018). arXiv preprint arXiv:1802.07228. https:\/\/www.eff.org\/files\/2018\/02\/20\/malicious_ai_report_final.pdf"},{"key":"1186_CR5","volume-title":"Cybersecurity and the Politics of Threat: America's Efforts to Secure the Information Age","author":"MD Cavelty","year":"2008","unstructured":"Cavelty, M.D.: Cybersecurity and the Politics of Threat: America\u2019s Efforts to Secure the Information Age. Routledge, London (2008)"},{"key":"1186_CR6","doi-asserted-by":"crossref","unstructured":"Dambra, S., Bilge, L., Balzarotti, D.: SoK: Cybersecurity\u2014technical challenges and system security roadmap. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1367\u20131383. ISSN: 2375-1207 (2020)","DOI":"10.1109\/SP40000.2020.00019"},{"key":"1186_CR7","unstructured":"Kaplan, R.S., Mikes, A.: Risk management: A new framework. Harvard Business Review (2012)"},{"key":"1186_CR8","volume-title":"Winning the Cyber War with Zero Trust","author":"J Kindervag","year":"2020","unstructured":"Kindervag, J.: Winning the Cyber War with Zero Trust. Palo Alto Networks, Santa Clara (2020)"},{"key":"1186_CR9","first-page":"13","volume":"45","author":"L Li","year":"2019","unstructured":"Li, L., He, W., Xu, L., Ash, I., Anwar, M., Yuan, X.: Exploring the impact of cybersecurity policy awareness on employees\u2019 cybersecurity behavior. Int. J. Inf. Manag. 45, 13\u201324 (2019)","journal-title":"Int. J. Inf. Manag."},{"key":"1186_CR10","doi-asserted-by":"crossref","unstructured":"Rose, S., Borchert, O., Mitchell, S., Connelly, S.: Zero Trust Architecture. NIST Special Publication 800-207 (2020)","DOI":"10.6028\/NIST.SP.800-207-draft2"},{"key":"1186_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.cose.2016.05.001","volume":"61","author":"H Tran","year":"2016","unstructured":"Tran, H., Campos -Nanez, E., Fomin, P., Wasek, J.: Cyber resilience model for defending against zero-day malware attacks. Comput. Secur. 61, 19\u201331 (2016)","journal-title":"Comput. Secur."},{"issue":"2","key":"1186_CR12","first-page":"209","volume":"2","author":"D Woods","year":"2017","unstructured":"Woods, D., Simpson, A.: Policy measures and cyber insurance: a framework. J. Internet Policy 2(2), 209\u2013226 (2017)","journal-title":"J. Internet Policy"},{"key":"1186_CR13","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ijcip.2016.04.001","volume":"14","author":"D Young","year":"2016","unstructured":"Young, D., Lopez, J., Jr., Rice, M., Ramsey, B., McTasney, R.: Integrating insurance into critical infrastructure cyber risk strategy architecture. Int. J. Crit. Infrastruct. Prot. 14, 43\u201357 (2016)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"1","key":"1186_CR14","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/08874417.2020.1712269","volume":"62","author":"M Zwilling","year":"2020","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, \u0141, Cetin, F., Basim, H.N.: Cybersecurity awareness, knowledge, and behavior: a comparative study. J. Comput. Inf. Syst. 62(1), 82\u201397 (2020). https:\/\/doi.org\/10.1080\/08874417.2020.1712269","journal-title":"J. Comput. Inf. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01186-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01186-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01186-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:45Z","timestamp":1769875665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01186-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,28]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1186"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01186-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,28]]},"assertion":[{"value":"14 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"18"}}