{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T15:52:12Z","timestamp":1765295532444,"version":"build-2065373602"},"reference-count":144,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T00:00:00Z","timestamp":1737590400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T00:00:00Z","timestamp":1737590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004705","name":"King Mongkut\u2019s University of Technology Thonburi","doi-asserted-by":"publisher","award":["Petchra Pra Jom Klao Doctoral Scholarship"],"award-info":[{"award-number":["Petchra Pra Jom Klao Doctoral Scholarship"]}],"id":[{"id":"10.13039\/501100004705","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s10639-024-13307-5","type":"journal-article","created":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T08:38:10Z","timestamp":1737621490000},"page":"13713-13777","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Developing a scale for measuring the information security awareness of stakeholders in higher education institutions"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9722-7185","authenticated-orcid":false,"given":"Rohani","family":"Rohan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8460-559X","authenticated-orcid":false,"given":"Wichian","family":"Chutimaskul","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3321-8236","authenticated-orcid":false,"given":"Rita","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Jari","family":"Hautam\u00e4ki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0352-8647","authenticated-orcid":false,"given":"Suree","family":"Funilkul","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7305-1015","authenticated-orcid":false,"given":"Debajyoti","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,23]]},"reference":[{"key":"13307_CR1","unstructured":"AACU - American Association of Community Colleges (2002). Protecting information: The role of community colleges in cybersecurity education. Avialable at https:\/\/www.aacc.nche.edu\/.\u00a0Accessed 21 Nov 2024"},{"key":"13307_CR2","doi-asserted-by":"publisher","unstructured":"Ab Hamid, M. R., Sami, W., & Mohmad Sidek, M. H. (2017). Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT Criterion. Journal of Physics: Conference Series, 890(1). https:\/\/doi.org\/10.1088\/1742-6596\/890\/1\/012163","DOI":"10.1088\/1742-6596\/890\/1\/012163"},{"issue":"1","key":"13307_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/21582440241228920","volume":"14","author":"B Ahamed","year":"2024","unstructured":"Ahamed, B., Polas, M. R. H., Kabir, A. I., Sohel-Uz-Zaman, A. S. M., Fahad, A., Al, Chowdhury, S., & Rani Dey, M. (2024). Empowering students for cybersecurity awareness management in the emerging digital era: The role of cybersecurity attitude in the 4.0 industrial revolution era. SAGE Open, 14(1), 1\u201314. https:\/\/doi.org\/10.1177\/21582440241228920","journal-title":"SAGE Open"},{"key":"13307_CR4","doi-asserted-by":"publisher","unstructured":"Ahlan, A. R., & Lubis, M. (2011). Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility. Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011, 246\u2013250. https:\/\/doi.org\/10.1109\/ISIAS.2011.6122827","DOI":"10.1109\/ISIAS.2011.6122827"},{"key":"13307_CR5","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.procs.2015.12.151","volume":"72","author":"AR Ahlan","year":"2015","unstructured":"Ahlan, A. R., Lubis, M., & Lubis, A. R. (2015). Information security awareness at the knowledge-based institution: Its antecedents and measures. Procedia Computer Science, 72, 361\u2013373. https:\/\/doi.org\/10.1016\/j.procs.2015.12.151","journal-title":"Procedia Computer Science"},{"key":"13307_CR6","doi-asserted-by":"crossref","unstructured":"Ahmad, S., Yunos, J., Zulkifly, S. S., Faiz, M., Yaakob, M., Zabkha, A., Zain, M., Hasan, N. H., & Sains, F. (2024). JTET management roles in promoting safety awareness among teaching staff in TVET Institutions, 16(2), 89\u2013102.","DOI":"10.30880\/jtet.2024.16.02.008"},{"key":"13307_CR7","doi-asserted-by":"publisher","DOI":"10.14738\/assrj.118.17412","author":"A Ahmed","year":"2024","unstructured":"Ahmed, A. (2024). Exploring Libyan Higher Education institutions employees \u2019 information exploring Libyan Higher Education institutions employees \u2019 Information Security Policy Awareness. October. https:\/\/doi.org\/10.14738\/assrj.118.17412","journal-title":"October"},{"key":"13307_CR8","doi-asserted-by":"publisher","unstructured":"Al-Janabi, S., & Al-Shourbaji, I. (2016). A study of cyber security awareness in educational environment in the Middle East. Journal of Information and Knowledge Management, 15(1). https:\/\/doi.org\/10.1142\/S0219649216500076","DOI":"10.1142\/S0219649216500076"},{"key":"13307_CR9","doi-asserted-by":"publisher","unstructured":"Alam, M. J., Shariat Ullah, M., Islam, M., & Chowdhury, T. A. (2024). Human resource management practices and employee engagement: The moderating effect of supervisory role. Cogent Business and Management, 11(1). https:\/\/doi.org\/10.1080\/23311975.2024.2318802","DOI":"10.1080\/23311975.2024.2318802"},{"issue":"June","key":"13307_CR10","doi-asserted-by":"publisher","first-page":"107376","DOI":"10.1016\/j.chb.2022.107376","volume":"136","author":"M Alanazi","year":"2022","unstructured":"Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136(June), 107376. https:\/\/doi.org\/10.1016\/j.chb.2022.107376","journal-title":"Computers in Human Behavior"},{"key":"13307_CR11","doi-asserted-by":"publisher","unstructured":"Alharbi, T., & Tassaddiq, A. (2021). Assessment of cybersecurity awareness among students of Majmaah University. Big Data and Cognitive Computing, 5(2). https:\/\/doi.org\/10.3390\/bdcc5020023","DOI":"10.3390\/bdcc5020023"},{"issue":"2","key":"13307_CR12","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.sapharm.2018.03.066","volume":"15","author":"E Almanasreh","year":"2019","unstructured":"Almanasreh, E., Moles, R., & Chen, T. F. (2019). Evaluation of methods used for estimating content validity. Research in Social and Administrative Pharmacy, 15(2), 214\u2013221. https:\/\/doi.org\/10.1016\/j.sapharm.2018.03.066","journal-title":"Research in Social and Administrative Pharmacy"},{"key":"13307_CR13","doi-asserted-by":"publisher","unstructured":"Alqahtani, M. A. (2022). Factors affecting cybersecurity awareness among University students. Applied Sciences (Switzerland), 12(5). https:\/\/doi.org\/10.3390\/app12052589","DOI":"10.3390\/app12052589"},{"issue":"2","key":"13307_CR14","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/bdcc7020073","volume":"7","author":"S Alrobaian","year":"2023","unstructured":"Alrobaian, S., Alshahrani, S., & Almaleh, A. (2023). Cybersecurity awareness assessment among trainees of the technical and vocational training corporation. Big Data and Cognitive Computing, 7(2), 73. https:\/\/doi.org\/10.3390\/bdcc7020073","journal-title":"Big Data and Cognitive Computing"},{"issue":"3","key":"13307_CR15","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1080\/08874417.2022.2101160","volume":"63","author":"I Arpaci","year":"2023","unstructured":"Arpaci, I., & Aslan, O. (2023). Development of a scale to measure cybercrime-awareness on social media. Journal of Computer Information Systems, 63(3), 695\u2013705. https:\/\/doi.org\/10.1080\/08874417.2022.2101160","journal-title":"Journal of Computer Information Systems"},{"issue":"2","key":"13307_CR16","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1177\/0266666921997512","volume":"38","author":"I Arpaci","year":"2022","unstructured":"Arpaci, I., & Sevinc, K. (2022). Development of the cybersecurity scale (CS-S): Evidence of validity and reliability. Information Development, 38(2), 218\u2013226. https:\/\/doi.org\/10.1177\/0266666921997512","journal-title":"Information Development"},{"key":"13307_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.37868\/dss.v5.id255","volume":"5","author":"IK Azzani","year":"2024","unstructured":"Azzani, I. K., Adi Purwantoro, S., & Zakky Almubarok, H. (2024). Enhancing awareness of cyber crime: A crucial element in confronting the challenges of hybrid warfare in Indonesia. Defense and Security Studies, 5, 1\u20139. https:\/\/doi.org\/10.37868\/dss.v5.id255","journal-title":"Defense and Security Studies"},{"key":"13307_CR18","unstructured":"Baezner, M., & Cordey, S. (2019). National cybersecurity strategies in comparison-challenges for Switzerland. Css Cyber Defense, March, 33. www.css.ethz.ch.\u00a0Accessed 21 Nov 2024"},{"issue":"5","key":"13307_CR19","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1080\/19393555.2022.2088428","volume":"32","author":"S Barakovi\u0107","year":"2023","unstructured":"Barakovi\u0107, S., & Barakovi\u0107 Husi\u0107, J. (2023). Cyber hygiene knowledge, awareness, and behavioral practices of university students. Information Security Journal, 32(5), 347\u2013370. https:\/\/doi.org\/10.1080\/19393555.2022.2088428","journal-title":"Information Security Journal"},{"issue":"6","key":"13307_CR20","first-page":"1","volume":"18","author":"AS Beavers","year":"2013","unstructured":"Beavers, A. S., Lounsbury, J. W., Richards, J. K., Huck, S. W., Skolits, G. J., & Esquivel, S. L. (2013). Practical considerations for using exploratory factor analysis in educational research. Practical Assessment Research and Evaluation, 18(6), 1\u201313.","journal-title":"Practical Assessment Research and Evaluation"},{"key":"13307_CR21","doi-asserted-by":"publisher","unstructured":"Biplob, B., Mohammad, K., Ahsan, M., Farabi, A. M., Konika, M. S., & Ahmed, A. (2024). From Data breaches to defense strategies: a study of cybersecurity information systems latest trends and future paradigms from data breaches to defense strategies : a study of cybersecurity information systems latest trends and future paradigms. https:\/\/doi.org\/10.20944\/preprints202409.0400.v1","DOI":"10.20944\/preprints202409.0400.v1"},{"issue":"2","key":"13307_CR22","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1027\/1614-2241\/a000057","volume":"9","author":"MJ Blanca","year":"2013","unstructured":"Blanca, M. J., Arnau, J., L\u00f3pez-Montiel, D., Bono, R., & Bendayan, R. (2013). Skewness and kurtosis in real data samples. Methodology, 9(2), 78\u201384. https:\/\/doi.org\/10.1027\/1614-2241\/a000057","journal-title":"Methodology"},{"issue":"June","key":"13307_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpubh.2018.00149","volume":"6","author":"GO Boateng","year":"2018","unstructured":"Boateng, G. O., Neilands, T. B., Frongillo, E. A., Melgar-Qui\u00f1onez, H. R., & Young, S. L. (2018). Best practices for developing and validating scales for health, social, and behavioral research: A primer. Frontiers in Public Health, 6(June), 1\u201318. https:\/\/doi.org\/10.3389\/fpubh.2018.00149","journal-title":"Frontiers in Public Health"},{"issue":"10","key":"13307_CR24","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.1080\/0144929X.2015.1028448","volume":"34","author":"J Boehmer","year":"2015","unstructured":"Boehmer, J., LaRose, R., Rifon, N., Alhabash, S., & Cotten, S. (2015). Determinants of online safety behaviour: Towards an intervention strategy for college students. Behaviour and Information Technology, 34(10), 1022\u20131035. https:\/\/doi.org\/10.1080\/0144929X.2015.1028448","journal-title":"Behaviour and Information Technology"},{"key":"13307_CR25","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.cose.2019.07.003","volume":"86","author":"I Bongiovanni","year":"2019","unstructured":"Bongiovanni, I. (2019). The least secure places in the universe? A systematic literature review on information security management in higher education. Computers and Security, 86, 350\u2013357. https:\/\/doi.org\/10.1016\/j.cose.2019.07.003","journal-title":"Computers and Security"},{"issue":"1","key":"13307_CR26","doi-asserted-by":"publisher","first-page":"161","DOI":"10.17559\/TV-20140403122930","volume":"22","author":"A Bostan","year":"2015","unstructured":"Bostan, A., & Akman, \u0130. (2015). Impact of education on security practices in ICT. Tehnicki Vjesnik, 22(1), 161\u2013168. https:\/\/doi.org\/10.17559\/TV-20140403122930","journal-title":"Tehnicki Vjesnik"},{"issue":"SPEC. ISSUE 3","key":"13307_CR27","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly: Management Information Systems, 34(SPEC. ISSUE 3), 523\u2013548. https:\/\/doi.org\/10.2307\/25750690","journal-title":"MIS Quarterly: Management Information Systems"},{"issue":"1","key":"13307_CR28","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/19312458.2017.1396583","volume":"12","author":"S Carpenter","year":"2018","unstructured":"Carpenter, S. (2018). Ten steps in scale development and reporting: A guide for researchers. Communication Methods and Measures, 12(1), 25\u201344. https:\/\/doi.org\/10.1080\/19312458.2017.1396583","journal-title":"Communication Methods and Measures"},{"issue":"4","key":"13307_CR29","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1108\/MAJ-11-2017-1693","volume":"33","author":"JR Carre","year":"2018","unstructured":"Carre, J. R., Curtis, S. R., & Jones, D. N. (2018). Ascribing responsibility for online security and data breaches. Managerial Auditing Journal, 33(4), 436\u2013446. https:\/\/doi.org\/10.1108\/MAJ-11-2017-1693","journal-title":"Managerial Auditing Journal"},{"key":"13307_CR30","doi-asserted-by":"publisher","unstructured":"Cheah, J. H., Amaro, S., & Rold\u00e1n, J. L. (2023). Multigroup analysis of more than two groups in PLS-SEM: A review, illustration, and recommendations. Journal of Business Research, 156(April 2022). https:\/\/doi.org\/10.1016\/j.jbusres.2022.113539","DOI":"10.1016\/j.jbusres.2022.113539"},{"key":"13307_CR31","doi-asserted-by":"publisher","unstructured":"Cheng, E. C. K., & Wang, T. (2022). Institutional Strategies for Cybersecurity in Higher Education Institutions. Information (Switzerland), 13(4). https:\/\/doi.org\/10.3390\/info13040192","DOI":"10.3390\/info13040192"},{"key":"13307_CR32","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.dss.2014.06.008","volume":"66","author":"AMY Chu","year":"2014","unstructured":"Chu, A. M. Y., & Chau, P. Y. K. (2014). Development and validation of instruments of information security deviant behavior. Decision Support Systems, 66, 93\u2013101. https:\/\/doi.org\/10.1016\/j.dss.2014.06.008","journal-title":"Decision Support Systems"},{"issue":"7","key":"13307_CR33","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11136-018-1847-y","volume":"27","author":"J Connell","year":"2018","unstructured":"Connell, J., Carlton, J., Grundy, A., Taylor Buck, E., Keetharuth, A. D., Ricketts, T., Barkham, M., Robotham, D., Rose, D., & Brazier, J. (2018). The importance of content and face validity in instrument development: Lessons learnt from service users when developing the recovering quality of Life measure (ReQoL). Quality of Life Research, 27(7), 1893\u20131902. https:\/\/doi.org\/10.1007\/s11136-018-1847-y","journal-title":"Quality of Life Research"},{"issue":"5","key":"13307_CR34","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1007\/s00779-021-01569-6","volume":"25","author":"S Creese","year":"2021","unstructured":"Creese, S., Dutton, W. H., & Esteve-Gonz\u00e1lez, P. (2021). The social and cultural shaping of cybersecurity capacity building: A comparative study of nations and regions. Personal and Ubiquitous Computing, 25(5), 941\u2013955. https:\/\/doi.org\/10.1007\/s00779-021-01569-6","journal-title":"Personal and Ubiquitous Computing"},{"issue":"4","key":"13307_CR35","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/2691517.2691521","volume":"45","author":"R Crossler","year":"2014","unstructured":"Crossler, R., & B\u00e9langer, F. (2014). An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument. Data Base for Advances in Information Systems, 45(4), 51\u201371. https:\/\/doi.org\/10.1145\/2691517.2691521","journal-title":"Data Base for Advances in Information Systems"},{"key":"13307_CR36","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.cose.2014.11.002","volume":"48","author":"D Dang-Pham","year":"2015","unstructured":"Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers and Security, 48, 281\u2013297. https:\/\/doi.org\/10.1016\/j.cose.2014.11.002","journal-title":"Computers and Security"},{"issue":"5","key":"13307_CR37","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1515\/itit-2016-0008","volume":"58","author":"S Das","year":"2016","unstructured":"Das, S. (2016). Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. IT - Information Technology, 58(5), 237\u2013245. https:\/\/doi.org\/10.1515\/itit-2016-0008","journal-title":"IT - Information Technology"},{"key":"13307_CR38","doi-asserted-by":"publisher","unstructured":"Denise, F., Polit, C. T., & Beck, S. V. O. (2007). Focus on research methods is the CVI an acceptable indicator of content validity? Appraisal and Recommendations, 488\u2013495. https:\/\/doi.org\/10.1002\/nur","DOI":"10.1002\/nur"},{"key":"13307_CR39","doi-asserted-by":"publisher","unstructured":"Egelman, S., & Peer, E. (2015). Scaling the security wall: Developing a security behavior intentions scale (SeBIS). Conference on Human Factors in Computing Systems - Proceedings, 2015-April, 2873\u20132882. https:\/\/doi.org\/10.1145\/2702123.2702249","DOI":"10.1145\/2702123.2702249"},{"key":"13307_CR40","doi-asserted-by":"publisher","unstructured":"Elkhannoubi, H., & Belaissaoui, M. (2017). Assess developing countries\u2019 cybersecurity capabilities through a social influence strategy. 2016 7th International Conference on Sciences of Electronics Technologies of Information and Telecommunications SETIT 2016, 19\u201323. https:\/\/doi.org\/10.1109\/SETIT.2016.7939834","DOI":"10.1109\/SETIT.2016.7939834"},{"issue":"1","key":"13307_CR41","doi-asserted-by":"publisher","first-page":"215824401452263","DOI":"10.1177\/2158244014522633","volume":"4","author":"S Elo","year":"2014","unstructured":"Elo, S., K\u00e4\u00e4ri\u00e4inen, M., Kanste, O., P\u00f6lkki, T., Utriainen, K., & Kyng\u00e4s, H. (2014). Qualitative content analysis: A focus on trustworthiness. SAGE Open, 4(1), 215824401452263. https:\/\/doi.org\/10.1177\/2158244014522633","journal-title":"SAGE Open"},{"issue":"2","key":"13307_CR42","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1108\/OIR-04-2020-0129","volume":"45","author":"F Erdo\u011fdu","year":"2021","unstructured":"Erdo\u011fdu, F., G\u00f6ko\u011flu, S., & Kara, M. (2021). What about users? Development and validation of the mobile information security awareness scale (MISAS). Online Information Review, 45(2), 406\u2013421. https:\/\/doi.org\/10.1108\/OIR-04-2020-0129","journal-title":"Online Information Review"},{"issue":"2","key":"13307_CR43","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.35445\/alishlah.v16i2.5614","volume":"16","author":"Y Evitha","year":"2024","unstructured":"Evitha, Y. (2024). Leading Digital Transformation: Strategies for higher education leaders in navigating online platforms, Administrative Services, and Cybersecurity. AL-ISHLAH: Jurnal Pendidikan, 16(2), 2645\u20132656. https:\/\/doi.org\/10.35445\/alishlah.v16i2.5614","journal-title":"AL-ISHLAH: Jurnal Pendidikan"},{"issue":"0","key":"13307_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10447318.2024.2359206","volume":"0","author":"LID Faruk","year":"2024","unstructured":"Faruk, L. I. D., Pal, D., Funilkul, S., Perumal, T., & Mongkolnam, P. (2024). Introducing CASUX: A standardized scale for measuring the user experience of Artificial Intelligence Based Conversational agents. International Journal of Human-Computer Interaction, 0(0), 1\u201325. https:\/\/doi.org\/10.1080\/10447318.2024.2359206","journal-title":"International Journal of Human-Computer Interaction"},{"key":"13307_CR45","doi-asserted-by":"publisher","unstructured":"Fertig, T., & Sch\u00fctz, A. E. (2020). About the measuring of information security awareness: A systematic literature review. Proceedings of the Annual Hawaii International Conference on System Sciences, 2020-(January), 6518\u20136527. https:\/\/doi.org\/10.24251\/hicss.2020.798","DOI":"10.24251\/hicss.2020.798"},{"issue":"7","key":"13307_CR46","doi-asserted-by":"publisher","first-page":"149","DOI":"10.12700\/aph.12.7.2015.7.9","volume":"12","author":"T Galba","year":"2015","unstructured":"Galba, T., Solic, K., & Lukic, I. (2015). An information security and privacy self-assessment (ISPSA) tool for internet users. Acta Polytechnica Hungarica, 12(7), 149\u2013162. https:\/\/doi.org\/10.12700\/aph.12.7.2015.7.9","journal-title":"Acta Polytechnica Hungarica"},{"key":"13307_CR47","unstructured":"Gan, E. (2021). Roles of leadership and non-academic staff in providing quality higher education: A review paper. In Proceedings of the Seminar on Internal External Quality Assurance (SieQA), 133. Retrieved from: https:\/\/sunwayuniversity.edu.my\/sites\/default\/files\/periodicals\/pdfs\/2024\/sunway_academic_report_2021_sieqa_1_1.pdf#page=151"},{"issue":"1","key":"13307_CR48","first-page":"64","volume":"16","author":"A Gilbert","year":"2013","unstructured":"Gilbert, A., & Churchill, J. (2013). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16(1), 64\u201373. http:\/\/www.jstor.org\/stable\/3150876","journal-title":"Journal of Marketing Research"},{"key":"13307_CR49","unstructured":"Goldberg, L. R., & Velicer, W. F. (2006). Principles of exploratory factor analysis. In S. Strack (Ed.), Differentiating normal and abnormal personality (2nd ed., pp. 209\u2013237). Springer. Retrieved from: https:\/\/www.researchgate.net\/profile\/Wayne-Velicer\/publication\/232590644_Principles_of_Exploratory_Factor_Analysis\/links\/00b7d51895afc57fe6000000\/Principles-of-Exploratory-Factor-Analysis.pdf"},{"key":"13307_CR50","unstructured":"Goliath, S., Tsibolane, P., & Snyman, D. (2024). Exploring the cybersecurity-resilience gap: An analysis of student attitudes and behaviors in Higher Education. Retrieved from:\u00a0https:\/\/arxiv.org\/pdf\/2411.03219"},{"issue":"7","key":"13307_CR51","doi-asserted-by":"publisher","first-page":"3510","DOI":"10.1007\/s12144-019-00300-2","volume":"40","author":"D Goretzko","year":"2021","unstructured":"Goretzko, D., Pham, T. T. H., & B\u00fchner, M. (2021). Exploratory factor analysis: Current use, methodological developments and recommendations for good practice. Current Psychology, 40(7), 3510\u20133521. https:\/\/doi.org\/10.1007\/s12144-019-00300-2","journal-title":"Current Psychology"},{"issue":"6","key":"13307_CR52","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1177\/1741143215587312","volume":"44","author":"AT Graham","year":"2016","unstructured":"Graham, A. T. (2016). Role of academic managers in workload and performance management of academic staff: A case study. Educational Management Administration and Leadership, 44(6), 1042\u20131063. https:\/\/doi.org\/10.1177\/1741143215587312","journal-title":"Educational Management Administration and Leadership"},{"key":"13307_CR53","unstructured":"G\u00fcld\u00fcren, C. (2021). Information security awareness scale (\u0131sas) for university students: a validity and reliability study. 14, 309\u2013326. http:\/\/acikerisim.ufuk.edu.tr:8080\/xmlui\/handle\/123456789\/2430%0A , http:\/\/acikerisim.ufuk.edu.tr:8080\/xmlui\/bitstream\/handle\/123456789\/2430\/6-%29Informationsecurityawarenessscale%28\u0131sas%29foruniversitystudents.pdf?sequence=1&isAllowed=y.\u00a0Accessed 21 Nov 2024"},{"key":"13307_CR54","unstructured":"Hatuka, T., & Carmel, E. (2021). The dynamics of the largest cybersecurity industrial clusters: Academia.Edu. https:\/\/www.academia.edu\/download\/85689885\/Cyber_20DIGITAL_20Final_20unlocked-1.pdf.\u00a0Accessed 21 Nov 2024"},{"issue":"1","key":"13307_CR55","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","volume":"43","author":"J Henseler","year":"2015","unstructured":"Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115\u2013135. https:\/\/doi.org\/10.1007\/s11747-014-0403-8","journal-title":"Journal of the Academy of Marketing Science"},{"key":"13307_CR56","doi-asserted-by":"publisher","unstructured":"Heymann, F., Henry, S., & Galus, M. (2022). Cybersecurity and resilience in the Swiss electricity sector: Status and policy options. Utilities Policy, 79(September). https:\/\/doi.org\/10.1016\/j.jup.2022.101432","DOI":"10.1016\/j.jup.2022.101432"},{"issue":"5","key":"13307_CR57","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1177\/014920639502100509","volume":"21","author":"TR Hinkin","year":"1995","unstructured":"Hinkin, T. R. (1995). A review of scale development practices in the study of organizations. Journal of Management, 21(5), 967\u2013988. https:\/\/doi.org\/10.1177\/014920639502100509","journal-title":"Journal of Management"},{"key":"13307_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11121-5","author":"WCH Hong","year":"2022","unstructured":"Hong, W. C. H., Chi, C. Y., Liu, J., Zhang, Y. F., Lei, V. N. L., & Xu, X. S. (2022). The influence of social education level on cybersecurity awareness and behaviour: A comparative study of university students and working graduates. In Education and Information Technologies. Springer US. https:\/\/doi.org\/10.1007\/s10639-022-11121-5. Issue 0123456789.","journal-title":"Springer US"},{"key":"13307_CR59","doi-asserted-by":"publisher","unstructured":"Hong, W. C. H., Chi, C. Y., Liu, J., Zhang, Y. F., Lei, V. N. L., & Xu, X. S. (2023). The influence of social education level on cybersecurity awareness and behaviour: A comparative study of university students and working graduates. In Education and Information Technologies. Issue 1) Springer US, 28. https:\/\/doi.org\/10.1007\/s10639-022-11121-5","DOI":"10.1007\/s10639-022-11121-5"},{"issue":"1","key":"13307_CR60","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1080\/13600800500283734","volume":"28","author":"D Houston","year":"2006","unstructured":"Houston, D., Meyer, L. H., & Paewai, S. (2006). Academic staff workloads and job satisfaction: Expectations and values in academe. Journal of Higher Education Policy and Management, 28(1), 17\u201330. https:\/\/doi.org\/10.1080\/13600800500283734","journal-title":"Journal of Higher Education Policy and Management"},{"issue":"2","key":"13307_CR61","doi-asserted-by":"publisher","first-page":"217","DOI":"10.7763\/ijiet.2013.v3.267","volume":"3","author":"CC Huang","year":"2013","unstructured":"Huang, C. C., Wang, Y. M., Wu, T. W., & Wang, P. A. (2013). An empirical analysis of the antecedents and performance consequences of using the Moodle platform. International Journal of Information and Education Technology, 3(2), 217\u2013221. https:\/\/doi.org\/10.7763\/ijiet.2013.v3.267","journal-title":"International Journal of Information and Education Technology"},{"issue":"4","key":"13307_CR62","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/S0020-7373(05)80092-6","volume":"35","author":"M Igbaria","year":"1991","unstructured":"Igbaria, M., & Parasuraman, S. (1991). Attitudes toward microcomputers: Development and construct validation of a measure. International Journal of Man-Machine Studies, 35(4), 553\u2013573. https:\/\/doi.org\/10.1016\/S0020-7373(05)80092-6","journal-title":"International Journal of Man-Machine Studies"},{"key":"13307_CR63","unstructured":"ITU (2020). Global Cybersecurity Index (GCI). ITU Publications."},{"key":"13307_CR64","doi-asserted-by":"publisher","first-page":"4703","DOI":"10.24251\/hicss.2018.593","volume":"2018-Janua(3)","author":"L Jaeger","year":"2018","unstructured":"Jaeger, L. (2018). Information security awareness: Literature review and integrative framework. Proceedings of the Annual Hawaii International Conference on System Sciences, 2018-Janua(3), 4703\u20134712. https:\/\/doi.org\/10.24251\/hicss.2018.593","journal-title":"Proceedings of the Annual Hawaii International Conference on System Sciences"},{"issue":"December","key":"13307_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpubh.2020.617166","volume":"8","author":"X Jin","year":"2020","unstructured":"Jin, X., Li, J., Song, W., & Zhao, T. (2020). The impact of COVID-19 and public health emergencies on consumer purchase of scarce products in China. Frontiers in Public Health, 8(December), 1\u201310. https:\/\/doi.org\/10.3389\/fpubh.2020.617166","journal-title":"Frontiers in Public Health"},{"issue":"7s","key":"13307_CR66","doi-asserted-by":"publisher","first-page":"769","DOI":"10.52783\/jes.3445","volume":"20","author":"D Joselle","year":"2024","unstructured":"Joselle, D., & Concepcion (2024). An assessment of cybersecurity awareness among academic employees at Quirino State University: Promoting Cyber Hygiene. Journal of Electrical Systems, 20(7s), 769\u2013775. https:\/\/doi.org\/10.52783\/jes.3445","journal-title":"Journal of Electrical Systems"},{"key":"13307_CR67","doi-asserted-by":"crossref","unstructured":"Joshi, H. (2024). Emerging technologies driving zero trust maturity across industries. IEEE Open Journal of the Computer Society\u00a0 (pp. 1\u201312), early access. Retrieved from: https:\/\/ieeexplore.ieee.org\/abstract\/document\/10764723","DOI":"10.36227\/techrxiv.172599552.25015466\/v1"},{"issue":"5","key":"13307_CR68","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1007\/s10796-019-09927-9","volume":"22","author":"HJ Kam","year":"2020","unstructured":"Kam, H. J., Mattson, T., & Goel, S. (2020). A cross industry study of institutional pressures on organizational effort to raise Information Security Awareness. Information Systems Frontiers, 22(5), 1241\u20131264. https:\/\/doi.org\/10.1007\/s10796-019-09927-9","journal-title":"Information Systems Frontiers"},{"issue":"10","key":"13307_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/info12100417","volume":"12","author":"M Khader","year":"2021","unstructured":"Khader, M., Karam, M., & Fares, H. (2021). Cybersecurity awareness framework for academia. Information (Switzerland), 12(10), 1\u201320. https:\/\/doi.org\/10.3390\/info12100417","journal-title":"Information (Switzerland)"},{"key":"13307_CR70","unstructured":"Khan, M. I., Arif, A., & Khan, A. R. A. (2024). AI-driven threat detection: A brief overview of AI techniques in cybersecurity. 2(2), 248\u2013261."},{"issue":"4","key":"13307_CR71","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1080\/19393555.2013.828803","volume":"22","author":"EB Kim","year":"2013","unstructured":"Kim, E. B. (2013). Information Security Awareness status of business college: Undergraduate students. Information Security Journal, 22(4), 171\u2013179. https:\/\/doi.org\/10.1080\/19393555.2013.828803","journal-title":"Information Security Journal"},{"issue":"1","key":"13307_CR72","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1108\/IMCS-01-2013-0005","volume":"22","author":"EB Kim","year":"2014","unstructured":"Kim, E. B. (2014). Recommendations for information security awareness training for college students. Information Management and Computer Security, 22(1), 115\u2013126. https:\/\/doi.org\/10.1108\/IMCS-01-2013-0005","journal-title":"Information Management and Computer Security"},{"issue":"4","key":"13307_CR73","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1108\/ITP-09-2017-0298","volume":"32","author":"HL Kim","year":"2019","unstructured":"Kim, H. L., & Han, J. (2019). Do employees in a good company comply better with information security policy? A corporate social responsibility perspective. Information Technology and People, 32(4), 858\u2013875. https:\/\/doi.org\/10.1108\/ITP-09-2017-0298","journal-title":"Information Technology and People"},{"issue":"4","key":"13307_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jksr.2011100101","volume":"2","author":"P Korovessis","year":"2011","unstructured":"Korovessis, P. (2011). Information Security Awareness in Academia. International Journal of Knowledge Society Research, 2(4), 1\u201317. https:\/\/doi.org\/10.4018\/jksr.2011100101","journal-title":"International Journal of Knowledge Society Research"},{"key":"13307_CR75","doi-asserted-by":"publisher","unstructured":"Kova\u010devi\u0107, A. N. A., Putnik, N., & To\u0161kovi\u0107, O. (2020). Factors related to cyber security behavior. 8. https:\/\/doi.org\/10.1109\/ACCESS.2020.3007867","DOI":"10.1109\/ACCESS.2020.3007867"},{"issue":"2","key":"13307_CR76","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1080\/19393555.2022.2077265","volume":"32","author":"E Kritzinger","year":"2023","unstructured":"Kritzinger, E., Da Veiga, A., & van Staden, W. (2023). Measuring organizational information security awareness in South Africa. Information Security Journal, 32(2), 120\u2013133. https:\/\/doi.org\/10.1080\/19393555.2022.2077265","journal-title":"Information Security Journal"},{"key":"13307_CR77","doi-asserted-by":"publisher","unstructured":"Latif, K. F., Tariq, R., Muneeb, D., Sahibzada, U. F., & Ahmad, S. (2022). University social responsibility and performance: The role of service quality, reputation, student satisfaction and trust. Journal of Marketing for Higher Education, 1\u201325. https:\/\/doi.org\/10.1080\/08841241.2022.2139791","DOI":"10.1080\/08841241.2022.2139791"},{"key":"13307_CR78","unstructured":"Lohani, A., & Kumar, E. S. (2024). Impact of cyber security awareness among higher studies: Case study of research questions 5. Scope of the Study, 6(1), 72\u201381."},{"issue":"6","key":"13307_CR79","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.3758\/s13428-021-01750-y","volume":"54","author":"U Lorenzo-Seva","year":"2022","unstructured":"Lorenzo-Seva, U. (2022). SOLOMON: A method for splitting a sample into equivalent subsamples in factor analysis. Behavior Research Methods, 54(6), 2665\u20132677. https:\/\/doi.org\/10.3758\/s13428-021-01750-y","journal-title":"Behavior Research Methods"},{"issue":"6","key":"13307_CR80","first-page":"1280","volume":"4","author":"MacGillivray","year":"1976","unstructured":"MacGillivray. (1976). Skewness and asymmetry: Measures and orderings. Annals of Statistics, 4(6), 1280\u20131289. http:\/\/projecteuclid.org\/euclid.aop\/1176996548","journal-title":"Annals of Statistics"},{"issue":"1","key":"13307_CR81","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1177\/002224297704100112","volume":"41","author":"JA Martilla","year":"1977","unstructured":"Martilla, J. A., & James, J. C. (1977). Importance-performance analysis. The Journal of Marketing, 41(1), 77\u201379.","journal-title":"The Journal of Marketing"},{"key":"13307_CR82","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.chb.2016.11.065","volume":"69","author":"A McCormac","year":"2017","unstructured":"McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual differences and Information Security Awareness. Computers in Human Behavior, 69, 151\u2013156. https:\/\/doi.org\/10.1016\/j.chb.2016.11.065","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"13307_CR83","doi-asserted-by":"publisher","first-page":"103","DOI":"10.29322\/ijsrp.12.01.2022.p12116","volume":"12","author":"Z Mengistu","year":"2022","unstructured":"Mengistu, Z. (2022). The non-academic staffs\u2019 performance and its impact on the students\u2019 satisfaction- in case of private higher institutions - Addis Ababa. International Journal of Scientific and Research Publications (IJSRP), 12(1), 103\u2013116. https:\/\/doi.org\/10.29322\/ijsrp.12.01.2022.p12116","journal-title":"International Journal of Scientific and Research Publications (IJSRP)"},{"issue":"3","key":"13307_CR84","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1108\/JSIT-01-2014-0007","volume":"16","author":"E Metalidou","year":"2014","unstructured":"Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N., Giannakopoulos, G., & Skourlas, C. (2014). Human factor and information security in higher education. Journal of Systems and Information Technology, 16(3), 210\u2013221. https:\/\/doi.org\/10.1108\/JSIT-01-2014-0007","journal-title":"Journal of Systems and Information Technology"},{"issue":"04","key":"13307_CR85","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.18535\/ijsrm\/v12i04.ec05","volume":"12","author":"C Mittal","year":"2024","unstructured":"Mittal, C. (2024). An empirical study on Cybersecurity Awareness, cybersecurity concern, and vulnerability to cyber-attacks. International Journal of Scientific Research and Management (IJSRM), 12(04), 1144\u20131158. https:\/\/doi.org\/10.18535\/ijsrm\/v12i04.ec05","journal-title":"International Journal of Scientific Research and Management (IJSRM)"},{"key":"13307_CR86","doi-asserted-by":"publisher","unstructured":"Mohammad, T., Mohamed Hussin, N. A., & Husin, M. H. (2022). Online safety awareness and human factors: An application of the theory of human ecology. Technology in Society, 68(July 2021), 101823. https:\/\/doi.org\/10.1016\/j.techsoc.2021.101823","DOI":"10.1016\/j.techsoc.2021.101823"},{"key":"13307_CR87","doi-asserted-by":"publisher","unstructured":"Moletsane, T., & Tsibolane, P. (2020). Mobile information security awareness among students in Higher Education: An exploratory study. 2020 Conference on Information Communications Technology and Society, ICTAS 2020 - Proceedings, November. https:\/\/doi.org\/10.1109\/ICTAS47918.2020.233978","DOI":"10.1109\/ICTAS47918.2020.233978"},{"issue":"1","key":"13307_CR88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41155-016-0057-1","volume":"30","author":"FFR Morgado","year":"2017","unstructured":"Morgado, F. F. R., Meireles, J. F. F., Neves, C. M., Amaral, A. C. S., & Ferreira, M. E. C. (2017). Scale development: Ten main limitations and recommendations to improve future research practices. Psicologia: Reflexao E Critica, 30(1), 1\u201320. https:\/\/doi.org\/10.1186\/s41155-016-0057-1","journal-title":"Psicologia: Reflexao E Critica"},{"issue":"Ii","key":"13307_CR89","doi-asserted-by":"publisher","first-page":"183","DOI":"10.48009\/2_iis_2016_183-192","volume":"17","author":"J Muhirwe","year":"2016","unstructured":"Muhirwe, J. (2016). Cybersecurity awareness and practice of next generation corporate technology users. Issues in Information Systems, 17(Ii), 183\u2013192. https:\/\/doi.org\/10.48009\/2_iis_2016_183-192","journal-title":"Issues in Information Systems"},{"key":"13307_CR90","unstructured":"Naematul Saadah Ismail, N., & Laily Hashim, N. (2024). Internet usage and cybersecurity awareness among students At Politeknik Tuanku Syed Sirajuddin (Ptss). 9(1), 45\u201357."},{"issue":"9","key":"13307_CR91","doi-asserted-by":"publisher","first-page":"e04887","DOI":"10.1016\/j.heliyon.2020.e04887","volume":"6","author":"TTN Nguyen","year":"2020","unstructured":"Nguyen, T. T. N. (2020). Developing and validating five-construct model of customer satisfaction in beauty and cosmetic E-commerce. Heliyon, 6(9), e04887. https:\/\/doi.org\/10.1016\/j.heliyon.2020.e04887","journal-title":"Heliyon"},{"key":"13307_CR92","doi-asserted-by":"publisher","unstructured":"Nifakos, S., Chandramouli, K., Nikolaou, C. K., Papachristou, P., Koch, S., Panaousis, E., & Bonacina, S. (2021). Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors (Basel, Switzerland), 21(15). https:\/\/doi.org\/10.3390\/s21155119","DOI":"10.3390\/s21155119"},{"key":"13307_CR93","doi-asserted-by":"publisher","unstructured":"Nurbojatmiko, F., Firmansyah, A., Aini, Q., Saehudin, A., & Amsariah, S. (2020). Information security awareness of students on academic information system using Kruger Approach. 2020 8th International Conference on Cyber and IT Service Management, CITSM 2020, October. https:\/\/doi.org\/10.1109\/CITSM50537.2020.9268795","DOI":"10.1109\/CITSM50537.2020.9268795"},{"issue":"5","key":"13307_CR94","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/s11135-006-9018-6","volume":"41","author":"RM O\u2019Brien","year":"2007","unstructured":"O\u2019Brien, R. M. (2007). A caution regarding rules of thumb for variance inflation factors. Quality and Quantity, 41(5), 673\u2013690. https:\/\/doi.org\/10.1007\/s11135-006-9018-6","journal-title":"Quality and Quantity"},{"key":"13307_CR95","doi-asserted-by":"publisher","unstructured":"Ofte, H. J., & Katsikas, S. (2023). Understanding situation awareness in SOCs, a systematic literature review. Computers and Security, 126. https:\/\/doi.org\/10.1016\/j.cose.2022.103069","DOI":"10.1016\/j.cose.2022.103069"},{"issue":"1","key":"13307_CR96","doi-asserted-by":"publisher","first-page":"100","DOI":"10.51594\/csitrj.v5i.708","volume":"5","author":"T Oluwaseun Abrahams","year":"2024","unstructured":"Oluwaseun Abrahams, T., Ajoke Farayola, O., Kaggwa, S., Ugomma Uwaoma, P., Olanipekun Hassan, A., Onimisi Dawodu, S., & Author, C. (2024). Cybersecurity awareness and education programs: A review of employee engagement and accountability. Computer Science & IT Research Journal, 5(1), 100\u2013119. https:\/\/doi.org\/10.51594\/csitrj.v5i.708","journal-title":"Computer Science & IT Research Journal"},{"key":"13307_CR97","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","volume":"56","author":"G \u00d6\u0287\u00fct\u00e7\u00fc","year":"2016","unstructured":"\u00d6\u0287\u00fct\u00e7\u00fc, G., Testik, \u00d6. M., & Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers and Security, 56, 83\u201393. https:\/\/doi.org\/10.1016\/j.cose.2015.10.002","journal-title":"Computers and Security"},{"key":"13307_CR98","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the human aspects of Information Security Questionnaire (HAIS-Q). Computers and Security, 42, 165\u2013176. https:\/\/doi.org\/10.1016\/j.cose.2013.12.003","journal-title":"Computers and Security"},{"key":"13307_CR99","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Computers and Security, 66, 40\u201351. https:\/\/doi.org\/10.1016\/j.cose.2017.01.004","journal-title":"Computers and Security"},{"issue":"October","key":"13307_CR100","first-page":"1301","volume":"4","author":"DA Perkasa","year":"2024","unstructured":"Perkasa, D. A., & Setiawan, B. (2024). Measuring Information Security Awareness level of high school students. 4(October), 1301\u20131308.","journal-title":"Measuring Information Security Awareness Level of High School Students"},{"issue":"4","key":"13307_CR101","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1108\/K-12-2014-0283","volume":"44","author":"NHA Rahim","year":"2015","unstructured":"Rahim, N. H. A., Hamid, S., Kiah, L. M., Shamshirband, S., & Furnell, S. (2015). A systematic review of approaches to assessing cybersecurity awareness. Kybernetes, 44(4), 606\u2013622. https:\/\/doi.org\/10.1108\/K-12-2014-0283","journal-title":"Kybernetes"},{"key":"13307_CR102","doi-asserted-by":"publisher","DOI":"10.1145\/3468784.3468789","author":"T Rahman","year":"2021","unstructured":"Rahman, T., Rohan, R., Pal, D., & Kanthamanon, P. (2021). Human factors in cybersecurity: A scoping review. ACM International Conference Proceeding Series. https:\/\/doi.org\/10.1145\/3468784.3468789","journal-title":"ACM International Conference Proceeding Series"},{"key":"13307_CR103","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.cose.2018.09.016","volume":"80","author":"M Rajab","year":"2019","unstructured":"Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers and Security, 80, 211\u2013223. https:\/\/doi.org\/10.1016\/j.cose.2018.09.016","journal-title":"Computers and Security"},{"key":"13307_CR104","doi-asserted-by":"publisher","first-page":"133","DOI":"10.23962\/10539\/23572","volume":"20","author":"Rajesh Chandarman & Brett Van Niekerk","year":"2017","unstructured":"Rajesh Chandarman & Brett Van Niekerk. (2017). Students\u2019 cybersecurity awareness at a private tertiary educational institution. The African Journal of Information and Communication (AJIC), 20, 133\u2013155. https:\/\/doi.org\/10.23962\/10539\/23572","journal-title":"The African Journal of Information and Communication (AJIC)"},{"key":"13307_CR105","unstructured":"Ranjbarian, R., & Esgandari, K. (2011). The relationship between department heads \u2019 duties and the performance of the academic staff members. American Journal of Scientific Research ISSN 1450-223X Issue, 46(July 2021), 128\u2013141. http:\/\/www.eurojournals.com\/ajsr.htm.\u00a0Accessed 21 Nov 2024"},{"issue":"17","key":"13307_CR106","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app11177880","volume":"11","author":"A Razaque","year":"2021","unstructured":"Razaque, A., Ajlan, A., Al, Melaoune, N., Alotaibi, M., Alotaibi, B., Dias, I., Oad, A., Hariri, S., & Zhao, C. (2021). Avoidance of cybersecurity threats with the deployment of a web-based blockchain-enabled cybersecurity awareness system. Applied Sciences (Switzerland), 11(17), 1\u201321. https:\/\/doi.org\/10.3390\/app11177880","journal-title":"Applied Sciences (Switzerland)"},{"issue":"3","key":"13307_CR107","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1037\/1040-3590.12.3.287","volume":"12","author":"SP Reise","year":"2000","unstructured":"Reise, S. P., Waller, N. G., & Comrey, A. L. (2000). Factor analysis and scale revision. Psychological Assessment, 12(3), 287\u2013297. https:\/\/doi.org\/10.1037\/1040-3590.12.3.287","journal-title":"Psychological Assessment"},{"key":"13307_CR108","doi-asserted-by":"publisher","unstructured":"Riahi, E., & Islam, M. S. (2024). Employees\u2019 information security awareness (ISA) in public organisations: Insights from cross-cultural studies in Sweden, France, and Tunisia. Behaviour and Information Technology, 1\u201323. https:\/\/doi.org\/10.1080\/0144929X.2024.2311734","DOI":"10.1080\/0144929X.2024.2311734"},{"issue":"9","key":"13307_CR109","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1108\/IMDS-10-2015-0449","volume":"116","author":"CM Ringle","year":"2016","unstructured":"Ringle, C. M., & Sarstedt, M. (2016). Gain more insight from your PLS-SEM results the importance-performance map analysis. Industrial Management and Data Systems, 116(9), 1865\u20131886. https:\/\/doi.org\/10.1108\/IMDS-10-2015-0449","journal-title":"Industrial Management and Data Systems"},{"key":"13307_CR110","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cose.2016.01.004","volume":"59","author":"W Rocha Flores","year":"2016","unstructured":"Rocha Flores, W., & Ekstedt, M. (2016). Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Computers and Security, 59, 26\u201344. https:\/\/doi.org\/10.1016\/j.cose.2016.01.004","journal-title":"Computers and Security"},{"key":"13307_CR111","doi-asserted-by":"publisher","unstructured":"Rohan, R., Funilkul, S., Pal, D., & Chutimaskul, W. (2021a). Understanding of human factors in cybersecurity: A systematic literature review. In 2021 International Conference on Computational Performance Evaluation (ComPE) (pp. 133\u2013140). IEEE. https:\/\/doi.org\/10.1109\/ComPE53109.2021.9752358","DOI":"10.1109\/ComPE53109.2021.9752358"},{"key":"13307_CR112","doi-asserted-by":"publisher","first-page":"108144","DOI":"10.1109\/ACCESS.2021.3102293","volume":"9","author":"R Rohan","year":"2021","unstructured":"Rohan, R., Pal, D., Funilkul, S., Chutimaskul, W., & Eamsinvattana, W. (2021b). How gamification leads to continued usage of MOOCs? A theoretical perspective. IEEE Access : Practical Innovations, Open Solutions, 9, 108144\u2013108161. https:\/\/doi.org\/10.1109\/ACCESS.2021.3102293","journal-title":"Ieee Access : Practical Innovations, Open Solutions"},{"key":"13307_CR113","doi-asserted-by":"publisher","DOI":"10.1109\/KST57286.2023.10086884","author":"R Rohan","year":"2023","unstructured":"Rohan, R., Funilkul, S., Chutimaskul, W., Kanthmanon, P., Papasratorn, B., & Pal, D. (2023a). Information Security Awareness in Higher Education Institutes: A work in progress. 15th International Conference on Knowledge and Smart Technology KST 2023. https:\/\/doi.org\/10.1109\/KST57286.2023.10086884","journal-title":"15th International Conference on Knowledge and Smart Technology KST 2023"},{"key":"13307_CR114","doi-asserted-by":"publisher","unstructured":"Rohan, R., Pal, D., Hautam\u00e4ki, J., Funilkul, S., Chutimaskul, W., & Thapliyal, H. (2023b). A systematic literature review of cybersecurity scales assessing information security awareness. Heliyon, 9(3). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e14234","DOI":"10.1016\/j.heliyon.2023.e14234"},{"issue":"1","key":"13307_CR115","first-page":"175","volume":"16","author":"JN Sales","year":"2024","unstructured":"Sales, J. N., Tiongco, R., Lu, S., Ruiz, M. J., Cruz, J., & Prudente, M. (2024). Personal privacy and cyber security: Student attitudes, awareness, and perception on the use of social media. International Journal of Curriculum and Instruction, 16(1), 175\u2013190. https:\/\/orcid.org\/0000-0003-3330-3836","journal-title":"International Journal of Curriculum and Instruction"},{"issue":"2","key":"13307_CR116","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s12208-016-0158-7","volume":"13","author":"MI S\u00e1nchez-Hern\u00e1ndez","year":"2016","unstructured":"S\u00e1nchez-Hern\u00e1ndez, M. I., & Mainardes, E. W. (2016). University social responsibility: A student base analysis in Brazil. International Review on Public and Nonprofit Marketing, 13(2), 151\u2013169. https:\/\/doi.org\/10.1007\/s12208-016-0158-7","journal-title":"International Review on Public and Nonprofit Marketing"},{"key":"13307_CR117","unstructured":"Schneckenberg, D., & Wildt, J. (2006). Understanding the concept of ecompetence for academic staff. The Challenge of Ecompetence in Academic Staff Development, January 2006, 29\u201335. http:\/\/www.ecompetence.info\/uploads\/media\/ch3.pdf%5Cninternal-pdf:\/\/schneckenberg2006-2643730176\/Schneckenberg2006.pdf"},{"key":"13307_CR118","doi-asserted-by":"publisher","unstructured":"Schoenherr, J. R., & Thomson, R. (2021). The Cybersecurity (CSEC) Questionnaire: Individual differences in unintentional insider threat behaviours. 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021. https:\/\/doi.org\/10.1109\/CyberSA52016.2021.9478213","DOI":"10.1109\/CyberSA52016.2021.9478213"},{"issue":"1","key":"13307_CR119","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.hjdsi.2017.06.004","volume":"6","author":"DF Sittig","year":"2018","unstructured":"Sittig, D. F., Belmont, E., & Singh, H. (2018). Improving the safety of health information technology requires shared responsibility: It is time we all step up. Healthcare, 6(1), 7\u201312. https:\/\/doi.org\/10.1016\/j.hjdsi.2017.06.004","journal-title":"Healthcare"},{"issue":"August","key":"13307_CR120","doi-asserted-by":"publisher","first-page":"94545","DOI":"10.1109\/ACCESS.2023.3311137","volume":"11","author":"N Soonpipatskul","year":"2023","unstructured":"Soonpipatskul, N., Pal, D., Watanapa, B., & Charoenkitkarn, N. (2023). Personality perceptions of conversational agents: A task-based analysis using thai as the conversational language. IEEE Access : Practical Innovations, Open Solutions, 11(August), 94545\u201394562. https:\/\/doi.org\/10.1109\/ACCESS.2023.3311137","journal-title":"Ieee Access : Practical Innovations, Open Solutions"},{"key":"13307_CR121","unstructured":"Steelman, S. (2024). Exploring defensive security strategies IT leaders need to safeguard their information assets in private higher education: A qualitative study (Doctoral dissertation, Colorado Technical University).Retrieved from: https:\/\/www.proquest.com\/openview\/f64f6de2172bc049260d1efe54d390c2\/1?pqorigsite=gscholar&cbl=18750&diss=y"},{"key":"13307_CR122","unstructured":"Steven, R., & Wilson (2016). Information security awareness in higher education: A qualitative case study investigation. August. https:\/\/www.proquest.com\/openview\/d85ade26a248b89503e95f7321ce81b6\/1?pq-origsite=gscholar&cbl=18750.\u00a0Accessed 21 Nov 2024"},{"issue":"1","key":"13307_CR123","first-page":"10","volume":"3","author":"F Stutzman","year":"2006","unstructured":"Stutzman, F. (2006). An evaluation of identity-sharing behavior in social network communities. International Digital and Media Arts Journal, 3(1), 10\u201318. http:\/\/scholar.google.com\/scholar?hl=en &btnG=Search&q=intitle:An+Evaluation+of+Identity-Sharing+Behavior+in+Social+Network+Communities#0.","journal-title":"International Digital and Media Arts Journal"},{"key":"13307_CR124","doi-asserted-by":"publisher","unstructured":"Sulaiman, N. S., Fauzi, M. A., Hussain, S., & Wider, W. (2022). Cybersecurity behavior among government employees: The role of protection motivation theory and responsibility in mitigating cyberattacks. Information (Switzerland), 13(9). https:\/\/doi.org\/10.3390\/info13090413","DOI":"10.3390\/info13090413"},{"key":"13307_CR125","doi-asserted-by":"publisher","unstructured":"Taha, N. & Dahabiyeh, L. (2021). College students information security awareness: A comparison between smartphones and computers. Education and Information Technologies, 26(2), 1721\u20131736. https:\/\/doi.org\/10.1007\/s10639-020-10330-0","DOI":"10.1007\/s10639-020-10330-0"},{"issue":"August","key":"13307_CR126","doi-asserted-by":"publisher","first-page":"107918","DOI":"10.1016\/j.chb.2023.107918","volume":"148","author":"Y Tang","year":"2023","unstructured":"Tang, Y., Zhang, Y., & Ning, X. (2023). Uncertainty in the platform market: The information asymmetry perspective. Computers in Human Behavior, 148(August), 107918. https:\/\/doi.org\/10.1016\/j.chb.2023.107918","journal-title":"Computers in Human Behavior"},{"issue":"February","key":"13307_CR127","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2024.3358423","volume":"12","author":"I Technology","year":"2024","unstructured":"Technology, I., Cognitive, I., Mongkut, K., Thonburi, T., Technology, I., Mongkut, K., & Thonburi, T. (2024). A review of subjective scales measuring theuser experience of voice assistants. Ieee Access\u202f: Practical Innovations, Open Solutions, 12(February), 1\u201332. https:\/\/doi.org\/10.1109\/ACCESS.2024.3358423","journal-title":"Ieee Access : Practical Innovations, Open Solutions"},{"issue":"1","key":"13307_CR128","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3390\/jcp3010005","volume":"3","author":"G Tempestini","year":"2023","unstructured":"Tempestini, G., Rovira, E., Pyke, A., & Di Nocera, F. (2023). The Cybersecurity Awareness INventory (CAIN): Early phases of development of a tool for assessing cybersecurity knowledge based on the ISO\/IEC 27032. Journal of Cybersecurity and Privacy, 3(1), 61\u201375. https:\/\/doi.org\/10.3390\/jcp3010005","journal-title":"Journal of Cybersecurity and Privacy"},{"issue":"3","key":"13307_CR129","doi-asserted-by":"publisher","first-page":"179","DOI":"10.30958\/ajmmc.8-3-3","volume":"8","author":"N Tosun","year":"2022","unstructured":"Tosun, N., & Gecer, A. (2022). A development, validity and reliability of safe social networking scale. Athens Journal of Mass Media and Communications, 8(3), 179\u2013200. https:\/\/doi.org\/10.30958\/ajmmc.8-3-3","journal-title":"Athens Journal of Mass Media and Communications"},{"issue":"5\u20136","key":"13307_CR130","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1080\/19393550802492487","volume":"17","author":"A Tsohou","year":"2008","unstructured":"Tsohou, A., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2008). Investigating information security awareness: Research and practice gaps. Information Security Journal, 17(5\u20136), 207\u2013227. https:\/\/doi.org\/10.1080\/19393550802492487","journal-title":"Information Security Journal"},{"key":"13307_CR131","doi-asserted-by":"publisher","unstructured":"Tyagi, A. K. (2023). Blockchain and artificial intelligence for cyber security in the era of internet of things and industrial internet of things applications. AI and Blockchain Applications in Industrial Robotics, 171\u2013199. https:\/\/doi.org\/10.4018\/979-8-3693-0659-8.ch007","DOI":"10.4018\/979-8-3693-0659-8.ch007"},{"issue":"4","key":"13307_CR132","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1111\/j.1365-2575.2009.00328.x","volume":"20","author":"C Urquhart","year":"2010","unstructured":"Urquhart, C., Lehmann, H., & Myers, M. D. (2010). Putting the theory back into grounded theory: Guidelines for grounded theory studies in information systems. Information Systems Journal, 20(4), 357\u2013381. https:\/\/doi.org\/10.1111\/j.1365-2575.2009.00328.x","journal-title":"Information Systems Journal"},{"issue":"1","key":"13307_CR133","doi-asserted-by":"publisher","first-page":"19","DOI":"10.32985\/ijeces.10.1.3","volume":"10","author":"T Velki","year":"2019","unstructured":"Velki, T., & \u0160oli\u0107, K. (2019). Development and validation of a new measurement instrument: The behavioral-cognitive internet security questionnaire (BCISQ). International Journal of Electrical and Computer Engineering Systems, 10(1), 19\u201324. https:\/\/doi.org\/10.32985\/ijeces.10.1.3","journal-title":"International Journal of Electrical and Computer Engineering Systems"},{"key":"13307_CR134","doi-asserted-by":"publisher","unstructured":"Velki, T., Solic, K., & Ocevcic, H. (2014). Development of Users\u2019 Information Security Awareness Questionnaire (UISAQ) - Ongoing work. 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2014 - Proceedings, 1417\u20131421. https:\/\/doi.org\/10.1109\/MIPRO.2014.6859789","DOI":"10.1109\/MIPRO.2014.6859789"},{"key":"13307_CR135","doi-asserted-by":"publisher","unstructured":"Vishwanath, A., Neo, L. S., Goh, P., Lee, S., Khader, M., Ong, G., & Chin, J. (2020). Cyber hygiene: The concept, its measure, and its initial tests. Decision Support Systems, 128(March 2019), 113160. https:\/\/doi.org\/10.1016\/j.dss.2019.113160","DOI":"10.1016\/j.dss.2019.113160"},{"key":"13307_CR136","doi-asserted-by":"publisher","first-page":"103038","DOI":"10.1016\/j.cose.2022.103038","volume":"125","author":"S Vrhovec","year":"2023","unstructured":"Vrhovec, S., Bernik, I., & Markelj, B. (2023). Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Computers and Security, 125, 103038. https:\/\/doi.org\/10.1016\/j.cose.2022.103038","journal-title":"Computers and Security"},{"issue":"6","key":"13307_CR137","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1177\/0011000006288127","volume":"34","author":"RL Worthington","year":"2006","unstructured":"Worthington, R. L., & Whittaker, T. A. (2006). Scale development research: A content analysis and recommendations for best practices. The Counseling Psychologist, 34(6), 806\u2013838. https:\/\/doi.org\/10.1177\/0011000006288127","journal-title":"The Counseling Psychologist"},{"key":"13307_CR138","doi-asserted-by":"publisher","unstructured":"Xu, X. S., Hong, W. C. H., Kolletar-Zhu, K., Zhang, Y. F., & Chi, C. Y. (2023). Validation and application of the human aspects of information security questionnaire for undergraduates: Effects of gender, discipline and grade level. Behaviour and Information Technology, 1\u201322. https:\/\/doi.org\/10.1080\/0144929X.2023.2260876","DOI":"10.1080\/0144929X.2023.2260876"},{"key":"13307_CR139","doi-asserted-by":"publisher","unstructured":"Yeng, P. K., Fauzi, M. A., & Yang, B. (2022). A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals. Information (Switzerland), 13(7). https:\/\/doi.org\/10.3390\/info13070335","DOI":"10.3390\/info13070335"},{"key":"13307_CR140","doi-asserted-by":"publisher","unstructured":"Yu, D. G., Du, Y., Chen, J., Song, W., & Zhou, T. (2023). A correlation analysis between undergraduate students\u2019 safety behaviors in the laboratory and their learning efficiencies. Behavioral Sciences, 13(2). https:\/\/doi.org\/10.3390\/bs13020127","DOI":"10.3390\/bs13020127"},{"issue":"2","key":"13307_CR141","doi-asserted-by":"publisher","first-page":"49","DOI":"10.21315\/eimj2019.11.2.6","volume":"11","author":"MSB Yusoff","year":"2019","unstructured":"Yusoff, M. S. B. (2019). ABC of content validation and content validity index calculation. Education in Medicine Journal, 11(2), 49\u201354. https:\/\/doi.org\/10.21315\/eimj2019.11.2.6","journal-title":"Education in Medicine Journal"},{"issue":"2","key":"13307_CR142","doi-asserted-by":"publisher","first-page":"165","DOI":"10.15171\/jcs.2015.017","volume":"4","author":"V Zamanzadeh","year":"2015","unstructured":"Zamanzadeh, V., Ghahramanian, A., Rassouli, M., Abbaszadeh, A., Alavi-Majd, H., & Nikanfar, A. R. (2015). Design and implementation content validity study: Development of an instrument for measuring patient-centered communication. Journal of Caring Sciences, 4(2), 165\u2013178. https:\/\/doi.org\/10.15171\/jcs.2015.017","journal-title":"Journal of Caring Sciences"},{"issue":"21","key":"13307_CR143","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics11213458","volume":"11","author":"J Zhen","year":"2022","unstructured":"Zhen, J., Dong, K., Xie, Z., & Chen, L. (2022). Factors influencing employees\u2019 information security awareness in the telework environment. Electronics (Switzerland), 11(21), 1\u201314. https:\/\/doi.org\/10.3390\/electronics11213458","journal-title":"Electronics (Switzerland)"},{"issue":"1","key":"13307_CR144","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/08874417.2020.1712269","volume":"62","author":"M Zwilling","year":"2022","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, \u0141., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82\u201397. https:\/\/doi.org\/10.1080\/08874417.2020.1712269","journal-title":"Journal of Computer Information Systems"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-024-13307-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10639-024-13307-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-024-13307-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T03:20:22Z","timestamp":1751944822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10639-024-13307-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,23]]},"references-count":144,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["13307"],"URL":"https:\/\/doi.org\/10.1007\/s10639-024-13307-5","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"type":"print","value":"1360-2357"},{"type":"electronic","value":"1573-7608"}],"subject":[],"published":{"date-parts":[[2025,1,23]]},"assertion":[{"value":"29 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}