{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T15:41:12Z","timestamp":1772638872164,"version":"3.50.1"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T00:00:00Z","timestamp":1656547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T00:00:00Z","timestamp":1656547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"2021 Zhejiang Province Philosophy and Social Science Planning Project","award":["21NDJC308YBM"],"award-info":[{"award-number":["21NDJC308YBM"]}]},{"name":"\u540e\u75ab\u60c5\u65f6\u4ee3\u201c\u4fa8\u4f01\u901a\u624d\u201d\u53d1\u5c55\u6a21\u5f0f\u7814\u7a76","award":["RZWKZX-TS005P01"],"award-info":[{"award-number":["RZWKZX-TS005P01"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s10639-022-11121-5","type":"journal-article","created":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T13:13:51Z","timestamp":1656594831000},"page":"439-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9858-2015","authenticated-orcid":false,"given":"Wilson Cheong Hin","family":"Hong","sequence":"first","affiliation":[]},{"given":"ChunYang","family":"Chi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3806-4072","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9995-8432","authenticated-orcid":false,"given":"YunFeng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3330-9122","authenticated-orcid":false,"given":"Vivian Ngan-Lin","family":"Lei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0667-4511","authenticated-orcid":false,"given":"XiaoShu","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,30]]},"reference":[{"key":"11121_CR1","doi-asserted-by":"crossref","unstructured":"Aikins, A. D. G., Boynton, P., & Atanga, L. L. (2010). Developing effective chronic disease interventions in Africa: Insights from Ghana and Cameroon. Globalization and Health, 6(1), 1\u201315.\u00a0http:\/\/www.globalizationandhealth.com\/content\/6\/1\/6. Accessed 21 July 2016.","DOI":"10.1186\/1744-8603-6-6"},{"key":"11121_CR2","doi-asserted-by":"publisher","unstructured":"Aivazpour, Z., & Rao, V. S. (2020). Information disclosure and privacy paradox: the role of impulsivity. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 51(1), 14\u201336. https:\/\/doi.org\/10.1145\/3380799.3380803","DOI":"10.1145\/3380799.3380803"},{"issue":"2","key":"11121_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179\u2013211. https:\/\/doi.org\/10.1016\/0749-5978(91)90020-T","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"4","key":"11121_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1890\/12-2010.1","volume":"83","author":"MJ Anderson","year":"2013","unstructured":"Anderson, M. J., & Walsh, D. C. (2013). PERMANOVA, ANOSIM, and the mantel test in the face of heterogeneous dispersions: What null hypothesis are you testing? Ecological Monographs, 83(4), 557\u2013574. https:\/\/doi.org\/10.1890\/12-2010.1","journal-title":"Ecological Monographs"},{"key":"11121_CR5","doi-asserted-by":"publisher","DOI":"10.21125\/edulearn.2017.1591","volume-title":"Comparative study of cyber-security knowledge in higher education Institutes of Five Countries","author":"E Berki","year":"2017","unstructured":"Berki, E., Kandel, C. S., Zhao, Y., & Chaudhary, S. A. (2017). Comparative study of cyber-security knowledge in higher education Institutes of Five Countries. Proceedings of EDULEARN17 Conference 3rd-5th."},{"issue":"1","key":"11121_CR6","doi-asserted-by":"publisher","first-page":"161","DOI":"10.17559\/TV-20140403122930","volume":"22","author":"A Bostan","year":"2015","unstructured":"Bostan, A., & Akman, \u0130. (2015). Impact of education on security practices in ICT. Tehni\u010dki Vjesnik, 22(1), 161\u2013168. https:\/\/doi.org\/10.17559\/TV-20140403122930","journal-title":"Tehni\u010dki Vjesnik"},{"key":"11121_CR7","doi-asserted-by":"publisher","first-page":"101607","DOI":"10.1016\/j.cose.2019.101607","volume":"88","author":"A Brilingait\u0117","year":"2020","unstructured":"Brilingait\u0117, A., Bukauskas, L., & Juozapavi\u010dius, A. (2020). A framework for competence development and assessment in hybrid cybersecurity exercises. Computers & Security, 88, 101607. https:\/\/doi.org\/10.1016\/j.cose.2019.101607","journal-title":"Computers & Security"},{"key":"11121_CR8","doi-asserted-by":"publisher","DOI":"10.4324\/9781410600219","volume-title":"Structural equation modeling with Mplus: Basic concepts, applications, and programming","author":"BM Byrne","year":"2013","unstructured":"Byrne, B. M. (2013). Structural equation modeling with Mplus: Basic concepts, applications, and programming. Routledge."},{"key":"11121_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.jisa.2018.08.002","volume":"42","author":"AA Cain","year":"2018","unstructured":"Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviours and knowledge. Journal of Information Security and Applications, 42, 36\u201345. https:\/\/doi.org\/10.1016\/j.jisa.2018.08.002","journal-title":"Journal of Information Security and Applications"},{"key":"11121_CR10","unstructured":"Carstens, D., Sater, M. C.-B., Pamela, R., et al. (2004). Evaluation of the human impact of password authentication practices on information security. Informing Science, 7, 67\u201385.\u00a0http:\/\/s.dic.cool\/S\/qeUrlL1R. Accessed 20 July 2021."},{"key":"11121_CR11","doi-asserted-by":"publisher","first-page":"133","DOI":"10.23962\/10539\/23572","volume":"20","author":"R Chandarman","year":"2017","unstructured":"Chandarman, R., & Van Niekerk, B. (2017). Students' cybersecurity awareness at a private tertiary educational institution. The African Journal of Information and Communication, 20, 133\u2013155. https:\/\/doi.org\/10.23962\/10539\/23572","journal-title":"The African Journal of Information and Communication"},{"key":"11121_CR12","unstructured":"Chaudhary, S., Zhao, Y., Berki, E., Valtanen, J., Li, L., Helenius, M., & Mystakidis, S. (2015). A cross-cultural and gender-based perspective for online security: Exploring knowledge, skills and attitudes of higher education students. IADIS International Journal on WWW\/Internet, 13(1), 57\u201371.\u00a0http:\/\/s.dic.cool\/S\/qOiTYTQw. Accessed 20 July 2021."},{"issue":"1","key":"11121_CR13","doi-asserted-by":"publisher","first-page":"205","DOI":"10.25300\/MISQ\/2016\/40.1.09","volume":"40","author":"Y Chen","year":"2016","unstructured":"Chen, Y., & Zahedi, F. (2016). Individual's internet security perceptions and behaviours: Polycontextual contrasts between the United States and China. Management Information Systems Quarterly, 40(1), 205\u2013222.","journal-title":"Management Information Systems Quarterly"},{"key":"11121_CR14","unstructured":"China Internet Network Information Centre. (2021). The 47th Statistical Report on China\u2019s Internet Development (Report).\u00a0https:\/\/www.cnnic.com.cn\/IDR\/ReportDownloads\/202104\/P020210420557302172744.pdf. Accessed 11 July 2021."},{"key":"11121_CR15","unstructured":"Choi, M., Levy, Y., & Hovav, A. (2013). The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse. In Proceedings of the Pre-International Conference of Information Systems (ICIS) SIGSEC\u2013Workshop on Information Security and Privacy (WISP). https:\/\/www.researchgate.net\/publication\/318710121_The_Role_of_User_Computer_Self-Efficacy_Cybersecurity_Countermeasures_Awareness_and_Cybersecurity_Skills_Influence_on_Computer_Misuse"},{"issue":"6","key":"11121_CR16","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1016\/j.tele.2018.05.005","volume":"35","author":"HN Chua","year":"2018","unstructured":"Chua, H. N., Wong, S. F., Low, Y. C., & Chang, Y. (2018). Impact of employees\u2019 demographic characteristics on the awareness and compliance of information security policy in organizations. Telematics and Informatics, 35(6), 1770\u20131780. https:\/\/doi.org\/10.1016\/j.tele.2018.05.005","journal-title":"Telematics and Informatics"},{"issue":"5","key":"11121_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1515\/itit-2016-0008","volume":"58","author":"S Das","year":"2016","unstructured":"Das, S. (2016). Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. It-information. Technology, 58(5), 237\u2013245. https:\/\/doi.org\/10.1515\/itit-2016-0008","journal-title":"Technology"},{"key":"11121_CR18","unstructured":"Das, S., Kim, T. H. J., Dabbish, L. A., & Hong, J. I. (2014). The effect of social influence on security sensitivity. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014) (pp. 143\u2013157). https:\/\/www.usenix.org\/system\/files\/conference\/soups2014\/soups14-paper-das.pdfg\/system\/files\/conference\/soups2014\/soups14-paper-das.pdf"},{"issue":"400","key":"11121_CR19","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1080\/01621459.1987.10478551","volume":"82","author":"DC Hoaglin","year":"1987","unstructured":"Hoaglin, D. C., & Iglewicz, B. (1987). Fine-Tuning Some Resistant Rules for Outlier Labeling. Journal of the American Statistical Association, 82(400), 1147\u20131149. https:\/\/doi.org\/10.1080\/01621459.1987.10478551","journal-title":"Journal of the American Statistical Association"},{"issue":"2","key":"11121_CR20","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1017\/S0813483900007634","volume":"6","author":"G Eifert","year":"1989","unstructured":"Eifert, G., & Craill, L. (1989). The relationship between affect, behaviour, and cognition in Behavioural and cognitive treatments of depression and phobic anxiety. Behaviour Change, 6(2), 96\u2013103. https:\/\/doi.org\/10.1017\/S0813483900007634","journal-title":"Behaviour Change"},{"key":"11121_CR21","doi-asserted-by":"publisher","unstructured":"Elkhannoubi, H., & Belaissaoui, M. (2016). Assess developing countries' cybersecurity capabilities through a social influence strategy. In 2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT) (pp. 19\u201323). IEEE.\u00a0https:\/\/doi.org\/10.1109\/SETIT.2016.7939834","DOI":"10.1109\/SETIT.2016.7939834"},{"key":"11121_CR22","doi-asserted-by":"crossref","unstructured":"Fu, Y., & Kamenou, N. (2013). The impact of Chinese cultural values on human resource policies and practices within transnational corporations in China. In Society and HRM in China (pp. 56\u201375). Routledge.\u00a0https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9780203723456-7\/impact-chinese-cultural-values-human-resource-policies-practices-within-transnational-corporations-china-yu-fu-nicolina-kamenou","DOI":"10.4324\/9780203723456-7"},{"issue":"3","key":"11121_CR23","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1080\/03601270903183065","volume":"36","author":"GA Grimes","year":"2010","unstructured":"Grimes, G. A., Hough, M. G., Mazur, E., & Signorella, M. L. (2010). Older adults' knowledge of internet hazards. Educational Gerontology, 36(3), 173\u2013192. https:\/\/doi.org\/10.1080\/03601270903183065","journal-title":"Educational Gerontology"},{"issue":"9","key":"11121_CR24","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1089\/cyber.2017.0239","volume":"20","author":"L Hadlington","year":"2017","unstructured":"Hadlington, L., & Parsons, K. (2017). Can cyberloafing and internet addiction affect organizational information security? Cyberpsychology, Behaviour and Social Networking, 20(9), 567\u2013571. https:\/\/doi.org\/10.1089\/cyber.2017.0239","journal-title":"Cyberpsychology, Behaviour and Social Networking"},{"key":"11121_CR25","volume-title":"Multivariate data analysis: Global edition, 7th edition","author":"J Hair","year":"2010","unstructured":"Hair, J., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis: Global edition, 7th edition. Pearson Education International."},{"issue":"4","key":"11121_CR26","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1016\/j.tele.2016.01.002","volume":"33","author":"W Heirman","year":"2016","unstructured":"Heirman, W., Walrave, M., Vermeulen, A., Ponnet, K., Vandebosch, H., & Hardies, K. (2016). Applying the theory of planned behaviour to adolescents\u2019 acceptance of online friendship requests sent by strangers. Telematics and Informatics, 33(4), 1119\u20131129. https:\/\/doi.org\/10.1016\/j.tele.2016.01.002","journal-title":"Telematics and Informatics"},{"issue":"2","key":"11121_CR27","doi-asserted-by":"publisher","first-page":"57","DOI":"10.12677\/SA.2014.32009","volume":"3","author":"X Huang","year":"2014","unstructured":"Huang, X., He, W., Hua, C., & Shang, Y. (2014). The statistical analysis about status and influencing factors of university students\u2019 safety accidents. Statistical and Application [\u9ad8\u6821\u5b66\u751f\u5b89\u5168\u4e8b\u6545\u53d1\u751f\u72b6\u51b5\u53ca\u5176\u5f71\u54cd\u56e0\u7d20\u7684\u7edf\u8ba1\u5206\u6790], 3(2), 57\u201367. https:\/\/doi.org\/10.12677\/SA.2014.32009","journal-title":"Statistical and Application [\u9ad8\u6821\u5b66\u751f\u5b89\u5168\u4e8b\u6545\u53d1\u751f\u72b6\u51b5\u53ca\u5176\u5f71\u54cd\u56e0\u7d20\u7684\u7edf\u8ba1\u5206\u6790]"},{"key":"11121_CR28","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/OIR-11-2015-0358","volume":"41","author":"I Hwang","year":"2017","unstructured":"Hwang, I., Kim, D., Kim, T., & Kim, S. (2017). Why not comply with information security? An empirical approach for the causes of non-compliance. Online Information Review, 41, 2\u201318. https:\/\/doi.org\/10.1108\/OIR-11-2015-0358","journal-title":"Online Information Review"},{"issue":"1","key":"11121_CR29","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory. Computers & Security, 31(1), 83\u201395. https:\/\/doi.org\/10.1016\/j.cose.2011.10.007","journal-title":"Computers & Security"},{"key":"11121_CR30","unstructured":"International Monetary Fund. (2021). World Economic Outlook Database.\u00a0https:\/\/www.imf.org\/en\/Publications\/WEO\/weo-database\/2021\/April\/. Accessed 11 July 2021."},{"key":"11121_CR31","volume-title":"Determining sample size","author":"GD Israel","year":"1992","unstructured":"Israel, G. D. (1992). Determining sample size. University of Florida, University of Florida Cooperative Extension Service, Institute of Food and Agriculture Sciences, EDIS."},{"issue":"5","key":"11121_CR32","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1007\/s10796-019-09927-9","volume":"22","author":"HJ Kam","year":"2020","unstructured":"Kam, H. J., Mattson, T., & Goel, S. (2020). A cross industry study of institutional pressures on organizational effort to raise information security awareness. Information Systems Frontiers, 22(5), 1241\u20131264. https:\/\/doi.org\/10.1007\/s10796-019-09927-9","journal-title":"Information Systems Frontiers"},{"key":"11121_CR33","doi-asserted-by":"publisher","unstructured":"Karjalainen, M., & Siponen, M. (2011). Toward a new meta-theory for designing information systems (IS) security training approaches. Journal of the Association forInformation Systems, 12(8), 3. https:\/\/doi.org\/10.17705\/1jais.00274","DOI":"10.17705\/1jais.00274"},{"issue":"4","key":"11121_CR34","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1080\/19393555.2013.828803","volume":"22","author":"EB Kim","year":"2013","unstructured":"Kim, E. B. (2013). Information security awareness status of business college: Undergraduate students. Information Security Journal: A Global Perspective, 22(4), 171\u2013179. https:\/\/doi.org\/10.1080\/19393555.2013.828803","journal-title":"Information Security Journal: A Global Perspective"},{"issue":"4","key":"11121_CR35","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.cose.2006.02.008","volume":"25","author":"HA Kruger","year":"2006","unstructured":"Kruger, H. A., & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers & security, 25(4), 289\u2013296. https:\/\/doi.org\/10.1016\/j.cose.2006.02.008","journal-title":"Computers & security"},{"issue":"2","key":"11121_CR36","first-page":"90","volume":"7","author":"EK Kwaa-Aidoo","year":"2018","unstructured":"Kwaa-Aidoo, E. K., & Agbeko, M. (2018). An analysis of information system security of a Ghanaian university. International Journal of Information Security Science, 7(2), 90\u201399.","journal-title":"International Journal of Information Security Science"},{"key":"11121_CR37","unstructured":"Li, Y.-L., Li, Y., & Li, A. (2014). A study on college Students' internet information ethics cognition and influencing factors [\u5927\u5b66\u751f\u7f51\u7edc\u4fe1\u606f\u4f26\u7406\u8ba4\u77e5\u4e0e\u5f71\u54cd\u56e0\u7d20\u7814\u7a76]. Information and Documentation Work, 35(2), 10\u201316.\u00a0http:\/\/qbzl.ruc.edu.cn\/EN\/abstract\/abstract669.shtml. Accessed 20 July 2021."},{"issue":"1","key":"11121_CR38","doi-asserted-by":"publisher","first-page":"81","DOI":"10.2307\/2348619","volume":"44","author":"S Lipsitz","year":"1995","unstructured":"Lipsitz, S., & Parzen, M. (1995). Sample size calculations for non-randomized studies. Journal of the Royal Statistical Society. Series D (The Statistician), 44(1), 81\u201390. https:\/\/doi.org\/10.2307\/2348619","journal-title":"Journal of the Royal Statistical Society. Series D (The Statistician)"},{"issue":"3","key":"11121_CR39","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1177\/17540739211014946","volume":"13","author":"NJ MacKinnon","year":"2021","unstructured":"MacKinnon, N. J., & Hoey, J. (2021). Operationalizing the relation between affect and cognition with the somatic transform. Emotion Review, 13(3), 245\u2013256. https:\/\/doi.org\/10.1177\/17540739211014946","journal-title":"Emotion Review"},{"key":"11121_CR40","doi-asserted-by":"publisher","unstructured":"McCormac, A., Calic, D., Butavicius, M., Parsons, K., Zwaans, T., & Pattinson, M. (2017). A reliable measure of information security awareness and the identification of bias in responses. Australasian Journal of Information Systems, 21. https:\/\/doi.org\/10.3127\/ajis.v21i0.1697","DOI":"10.3127\/ajis.v21i0.1697"},{"issue":"3","key":"11121_CR41","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/ICS-03-2018-0032","volume":"26","author":"A McCormac","year":"2018","unstructured":"McCormac, A., Calic, D., Parsons, K., Butavicius, M., Pattinson, M., & Lillie, M. (2018). The effect of resilience and job stress on information security awareness. Information and Computer Security, 26(3), 277\u2013289. https:\/\/doi.org\/10.1108\/ICS-03-2018-0032","journal-title":"Information and Computer Security"},{"issue":"6","key":"11121_CR42","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1177\/0894439317729340","volume":"36","author":"B Mei","year":"2018","unstructured":"Mei, B., & Brown, G. T. (2018). Conducting online surveys in China. Social Science Computer Review, 36(6), 721\u2013734. https:\/\/doi.org\/10.1177\/0894439317729340","journal-title":"Social Science Computer Review"},{"key":"11121_CR43","unstructured":"Ministry of Education of the People\u2019s Republic of China. (2020). \u6bdb\u5165\u5b66\u7387\u8fbe51.6% \u9ad8\u7b49\u6559\u80b2\u66f4\u666e\u53ca\u4e86 [Gross admission rate at 51.6%, Tertiary Education is more prevalent].\u00a0http:\/\/www.moe.gov.cn\/fbh\/live\/2019\/50340\/mtbd\/201902\/t20190227_371425.html. Accessed 2 Aug 2021."},{"key":"11121_CR44","doi-asserted-by":"publisher","unstructured":"Moody, G. D., Siponen, M., Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly: Management Information Systems, 42(1), 285\u2013311. https:\/\/doi.org\/10.25300\/MISQ\/2018\/13853","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"11121_CR45","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47\u201366. https:\/\/doi.org\/10.1016\/j.cose.2012.11.004","journal-title":"Computers & Security"},{"key":"11121_CR46","unstructured":"National Bureau of Statistics of China. (2021). 2020 China statistical yearbook. China Statistics Press.\u00a0http:\/\/www.stats.gov.cn\/tjsj\/ndsj\/2020\/indexeh.htm. Accessed 2 Aug 2021."},{"key":"11121_CR47","doi-asserted-by":"publisher","unstructured":"Nyblom, P. J. B., Wangen, G., Kianpour, M., & \u00d8stby, G. (2020).\u00a0The root causes of compromised accounts at the University. In ICISSP (pp. 540\u2013551). https:\/\/doi.org\/10.5220\/0008972305400551","DOI":"10.5220\/0008972305400551"},{"key":"11121_CR48","doi-asserted-by":"publisher","unstructured":"Ong, L., & Chong, C. (2014). January). Information security awareness: An application of psychological factors\u2013a study in Malaysia. In 2014 International Conference on Computer, Communications and Information Technology (CCIT 2014). Atlantis Press.\u00a0https:\/\/doi.org\/10.2991\/ccit-14.2014.27","DOI":"10.2991\/ccit-14.2014.27"},{"key":"11121_CR49","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): Two further validation studies. Computers & Security, 66, 40\u201351. https:\/\/doi.org\/10.1016\/j.cose.2017.01.004","journal-title":"Computers & Security"},{"key":"11121_CR50","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Computers & Security, 42, 165\u2013176. https:\/\/doi.org\/10.1016\/j.cose.2013.12.003","journal-title":"Computers & Security"},{"key":"11121_CR51","unstructured":"Parsons, K., McCormac, A., Pattinson, M. R., Butavicius, M. A., & Jerram, C. (2013). In Furnell, S. M., Clarke, N. L. & Katos, V (Eds), An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations (pp. 34\u201344).\u00a0https:\/\/www.researchgate.net\/publication\/286612263_An_analysis_of_information_security_vulnerabilities_at_three_Australian_government_organisations"},{"issue":"2","key":"11121_CR52","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1108\/ICS-03-2017-0017","volume":"25","author":"M Pattinson","year":"2017","unstructured":"Pattinson, M., Butavicius, M., Parsons, K., McCormac, A., & Calic, D. (2017). Managing information security awareness at an Australian bank: A comparative study. Information & Computer Security, 25(2), 181\u2013189. https:\/\/doi.org\/10.1108\/ICS-03-2017-0017","journal-title":"Information & Computer Security"},{"key":"11121_CR53","unstructured":"PwC's Threat Intelligence Centre. (2020). Cyber Security in Times of Crisis, Asia Pacific SME Survey [\u5371\u6a5f\u6642\u523b\u7684\u7db2\u7d61\u5b89\u5168--\u4e9e\u592a\u5730\u5340\u4e2d\u5c0f\u4f01\u696d\u8abf\u67e5\u5831\u544a].\u00a0https:\/\/www.pwccn.com\/zh\/issues\/cybersecurity-and-privacy\/research-report-on-the-safety-of-small-and-medium-sized-enterprises-in-the-asia-pacific-region-aug2020.html. Accessed 11 July 2021."},{"key":"11121_CR54","doi-asserted-by":"publisher","unstructured":"Rader, E., Wash, R., & Brooks, B. (2012). Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security (pp. 1\u201317).\u00a0https:\/\/doi.org\/10.1145\/2335356.2335364","DOI":"10.1145\/2335356.2335364"},{"issue":"4","key":"11121_CR55","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1108\/K-12-2014-0283","volume":"44","author":"NHA Rahim","year":"2015","unstructured":"Rahim, N. H. A., Hamid, S., Mat Kiah, M. L., Shamshirband, S., & Furnell, S. (2015). A systematic review of approaches to assessing cybersecurity awareness. Kybernetes, 44(4), 606\u2013622. https:\/\/doi.org\/10.1108\/K-12-2014-0283","journal-title":"Kybernetes"},{"issue":"1","key":"11121_CR56","first-page":"21","volume":"2","author":"NM Razali","year":"2011","unstructured":"Razali, N. M., & Wah, Y. B. (2011). Power comparisons of shapiro-wilk, kolmogorov-smirnov, lilliefors and Anderson-darling tests. Journal of Statistical Modeling and Analytics, 2(1), 21\u201333.","journal-title":"Journal of Statistical Modeling and Analytics"},{"issue":"7\u20138","key":"11121_CR57","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.cose.2008.07.008","volume":"27","author":"Y Rezgui","year":"2008","unstructured":"Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7\u20138), 241\u2013253. https:\/\/doi.org\/10.1016\/j.cose.2008.07.008","journal-title":"Computers & Security"},{"key":"11121_CR58","unstructured":"Risk Based Security. (2020). The 2019 Year-End Report Data Breach QuickView (Report).\u00a0https:\/\/edtechmagazine.com\/higher\/article\/2020\/08\/tips-reducing-key-remote-learning-security-risks-perfcon. Accessed 10 July 2021."},{"key":"11121_CR59","unstructured":"Roberts, S. A. (2021). Exploring the Relationships Between User Cybersecurity Knowledge, Cybersecurity and Cybercrime Attitudes, and Online Risky Behaviors. Doctoral dissertation, Northcentral University."},{"key":"11121_CR60","first-page":"113","volume-title":"Handbook of health behaviour research 1: Personal and social determinants","author":"RW Rogers","year":"1997","unstructured":"Rogers, R. W., & Prentice-Dunn, S. (1997). Protection motivation theory. In D. S. Gochman (Ed.), Handbook of health behaviour research 1: Personal and social determinants (pp. 113\u2013132). Plenum Press."},{"key":"11121_CR61","doi-asserted-by":"publisher","unstructured":"Sawaya, Y., Sharif, M., Christin, N., Kubota, A., Nakarai, A., & Yamada, A. (2017). Self-confidence trumps knowledge: A cross-cultural study of security behaviour. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 2202\u20132214). https:\/\/doi.org\/10.1145\/3025453.3025926","DOI":"10.1145\/3025453.3025926"},{"issue":"9","key":"11121_CR62","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1002\/pfi.4140430905","volume":"43","author":"PG Schrader","year":"2004","unstructured":"Schrader, P. G., & Lawless, K. A. (2004). The knowledge, attitudes, & behaviours approach how to evaluate performance and learning in complex environments. Performance Improvement, 43(9), 8\u201315. https:\/\/doi.org\/10.1002\/pfi.4140430905","journal-title":"Performance Improvement"},{"key":"11121_CR63","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J. (2010). Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 373\u2013382).","DOI":"10.1145\/1753326.1753383"},{"issue":"1","key":"11121_CR64","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"MT Siponen","year":"2000","unstructured":"Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31\u201341. https:\/\/doi.org\/10.1108\/09685220010371394","journal-title":"Information Management & Computer Security"},{"key":"11121_CR65","unstructured":"Sun, W. (2018). investigation of safety consciousness of university students in Dalian city [\u5927\u8fde\u5e02\u5927\u5b66\u751f\u7f51\u7edc\u5b89\u5168\u610f\u8bc6\u8c03\u67e5\u7814\u7a76]. Master's thesis, Dalian University of Technology."},{"issue":"2","key":"11121_CR66","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/fi13020039","volume":"13","author":"JB Ulven","year":"2021","unstructured":"Ulven, J. B., & Wangen, G. (2021). A systematic review of cyber security risks in higher education. Future Internet, 13(2), 39. https:\/\/doi.org\/10.3390\/fi13020039","journal-title":"Future Internet"},{"key":"11121_CR67","doi-asserted-by":"crossref","unstructured":"United Nations Development Programme. (2020). Human Development Report 2020\u2014The next frontier: Human Development and the Anthropocene.\u00a0http:\/\/hdr.undp.org\/sites\/default\/files\/hdr2020.pdf. Accessed 12 July 2021.","DOI":"10.18356\/9789210055161"},{"issue":"3","key":"11121_CR68","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1111\/j.1468-2958.1998.tb00421.x","volume":"24","author":"TW Valente","year":"1998","unstructured":"Valente, T. W., Paredes, P., & Poppe, P. R. (1998). Matching the message to the process: The relative ordering of knowledge, attitudes, and practices in behaviour change research. Human Communication Research, 24(3), 366\u2013385. https:\/\/doi.org\/10.1111\/j.1468-2958.1998.tb00421.x","journal-title":"Human Communication Research"},{"key":"11121_CR69","unstructured":"Van der Linden, S. (2014). Towards a New Model for Communicating Climate Change. In Cohen, S. A. et al. (Eds) Understanding and Governing Sustainable Tourism Mobility: Psychological and Behavioural Approaches (pp. 243\u2013275).\u00a0http:\/\/s.dic.cool\/S\/FsDq5KQh. Accessed 18 July 2021."},{"key":"11121_CR70","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.dss.2016.09.013","volume":"92","author":"M Warkentin","year":"2016","unstructured":"Warkentin, M., Johnston, A. C., Shropshire, J., & Barnett, W. D. (2016). Continuance of protective security behavior: A longitudinal study. Decision Support Systems, 92, 25\u201335. https:\/\/doi.org\/10.1016\/j.dss.2016.09.013","journal-title":"Decision Support Systems"},{"key":"11121_CR71","doi-asserted-by":"publisher","unstructured":"Watson, H., Moju-Igbene, E., Kumari, A., & Das, S. (2020).\u00a0 We hold each other accountable: Unpacking how social groups approach cybersecurity and privacy together. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp 1\u201312). https:\/\/doi.org\/10.1145\/3313831.3376605","DOI":"10.1145\/3313831.3376605"},{"key":"11121_CR72","doi-asserted-by":"publisher","first-page":"101640","DOI":"10.1016\/j.cose.2019.101640","volume":"88","author":"A Wiley","year":"2020","unstructured":"Wiley, A., McCormac, A., & Calic, D. (2020). More than the individual: Examining the relationship between culture and information security awareness. Computers & Security, 88, 101640. https:\/\/doi.org\/10.1016\/j.cose.2019.101640","journal-title":"Computers & Security"},{"key":"11121_CR73","doi-asserted-by":"publisher","first-page":"S579","DOI":"10.1046\/j.1440-6047.11.supp3.7.x","volume":"11","author":"A Worsley","year":"2002","unstructured":"Worsley, A. (2002). Nutrition knowledge and food consumption: Can nutrition knowledge change food behaviour? Asia Pacific Journal of Clinical Nutrition, 11, S579\u2013S585. https:\/\/doi.org\/10.1046\/j.1440-6047.11.supp3.7.x","journal-title":"Asia Pacific Journal of Clinical Nutrition"},{"key":"11121_CR74","doi-asserted-by":"publisher","unstructured":"Wu, D. (2014). An Introduction to ICT in Education in China. In Huang, R., Kinshuk, & Price, J. (Eds.),\u00a0ICT in Education in Global Context. Lecture Notes in Educational Technology (pp. 65-84). Springer. https:\/\/doi.org\/10.1007\/978-3-662-43927-2_5","DOI":"10.1007\/978-3-662-43927-2_5"},{"issue":"3","key":"11121_CR75","doi-asserted-by":"publisher","first-page":"306","DOI":"10.16418\/j.issn.1000-3045.20200229002","volume":"35","author":"J Wu","year":"2020","unstructured":"Wu, J., Zhang, F., Sun, Y., Zhu, Y. B., & Liu, C. X. (2020). Fight against COVID-19 promotes China\u2019s digital transformation: Opportunities and challenges [\u6297\u75ab\u60c5\u52a9\u63a8\u6211\u56fd\u6570\u5b57\u5316\u8f6c\u578b: \u673a\u9047\u4e0e\u6311\u6218]. Journal of Chinese Academy of Sciences, 35(3), 306\u2013311. https:\/\/doi.org\/10.16418\/j.issn.1000-3045.20200229002","journal-title":"Journal of Chinese Academy of Sciences"},{"issue":"1","key":"11121_CR76","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/s11516-010-0006-1","volume":"5","author":"J Zhao","year":"2010","unstructured":"Zhao, J., & Xu, F. (2010). The state of ICT education in China: A literature review. Frontiers of Education in China, 5(1), 50\u201373. https:\/\/doi.org\/10.1007\/s11516-010-0006-1","journal-title":"Frontiers of Education in China"},{"key":"11121_CR77","doi-asserted-by":"publisher","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, \u0141., Cetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 1\u201316. https:\/\/doi.org\/10.1080\/08874417.2020.1712269","DOI":"10.1080\/08874417.2020.1712269"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-022-11121-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10639-022-11121-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-022-11121-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:17:58Z","timestamp":1744201078000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10639-022-11121-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,30]]},"references-count":77,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["11121"],"URL":"https:\/\/doi.org\/10.1007\/s10639-022-11121-5","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"value":"1360-2357","type":"print"},{"value":"1573-7608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,30]]},"assertion":[{"value":"25 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicting interests"}}]}}