{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T13:21:54Z","timestamp":1768915314189,"version":"3.49.0"},"reference-count":111,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010040","name":"University of Abertay Dundee","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100010040","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2021,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Fear appeals are used in many domains. Cybersecurity researchers are also starting to experiment with fear appeals, many reporting positive outcomes. Yet there are ethical concerns related to the use of fear to motivate action. In this paper, we explore this aspect from the perspectives of cybersecurity fear appeal<jats:italic>deployers<\/jats:italic>and<jats:italic>recipients<\/jats:italic>. We commenced our investigation by considering fear appeals from three foundational ethical perspectives. We then consulted the two stakeholder groups to gain insights into the ethical concerns they consider to be pertinent. We first consulted<jats:italic>deployers<\/jats:italic>: (a) fear appeal researchers and (b) Chief Information Security Officers (CISOs), and then potential cybersecurity fear appeal<jats:italic>recipients:<\/jats:italic>members of a crowdsourcing platform. We used their responses to develop an<jats:italic>effects-reasoning matrix<\/jats:italic>, identifying the potential benefits and detriments of cybersecurity fear appeals for all stakeholders. Using these insights, we derived six ethical principles to guide cybersecurity fear appeal deployment. We then evaluated a snapshot of cybersecurity studies using the ethical principle lens. Our contribution is,<jats:italic>first<\/jats:italic>, a list of potential detriments that could result from the deployment of cybersecurity fear appeals and<jats:italic>second<\/jats:italic>, the set of six ethical principles to inform the deployment of such appeals. Both of these are intended to inform cybersecurity fear appeal design and deployment.<\/jats:p>","DOI":"10.1007\/s10676-020-09560-0","type":"journal-article","created":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T07:02:41Z","timestamp":1603177361000},"page":"265-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Scoping the ethical principles of cybersecurity fear appeals"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5303-2511","authenticated-orcid":false,"given":"Marc","family":"Dupuis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7187-6531","authenticated-orcid":false,"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"key":"9560_CR1","unstructured":"Agrafiotis, I., Bada, M., Cornish, P., Creese, S., Goldsmith, M., Ignatuschtschenko, E., Roberts, T., & Upton, D.M. Cyber harm: Concepts, taxonomy and measurement, Sa\u00efd Business School WP 23."},{"issue":"6","key":"9560_CR2","doi-asserted-by":"crossref","first-page":"856","DOI":"10.1037\/0033-2909.131.6.856","volume":"131","author":"D Albarrac\u00edn","year":"2005","unstructured":"Albarrac\u00edn, D., Gillette, J. C., Earl, A. N., Glasman, L. R., Durantini, M. R., & Ho, M.-H. (2005). A test of major assumptions about behaviorchange: A comprehensive look at the effects of passive and active HIV-prevention interventions since the beginning of the epidemic., Psychological Bulletin, 131(6), 856\u2013897.","journal-title":"Psychological Bulletin"},{"key":"9560_CR3","unstructured":"Albayram, Y., Khan, M.M.H., Jensen, T., & Nguyen, N. (2017). \u201c... Better to use a lock screen than to worry about saving a few seconds of time\u201d: Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In: Thirteenth symposium on usable privacy and security (SOUPS), Santa Clara, CA (pp. 49\u201363)."},{"key":"9560_CR4","unstructured":"American Psychological Association, Ethical Principles of Psychologists and Code of Conduct. Retrieved May 18, 2018, from http:\/\/www.apa.org\/ethics\/code\/index.aspx."},{"issue":"2","key":"9560_CR5","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10676-018-9495-z","volume":"21","author":"IF Anabo","year":"2019","unstructured":"Anabo, I. F., Elexpuru-Albizuri, I., & Villard\u00f3n-Gallego, L. (2019). Revisiting the belmont report\u2019s ethical principles in internet-mediated research: Perspectives from disciplinary associations in the social sciences. Ethics and Information Technology, 21(2), 137\u2013149.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9560_CR6","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613\u2013643.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9560_CR7","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1441-3582(03)70115-3","volume":"11","author":"D Arthur","year":"2003","unstructured":"Arthur, D., & Quester, P. (2003). The ethicality of using fear for social advertising. Australasian Marketing Journal (AMJ), 11(1), 12\u201327.","journal-title":"Australasian Marketing Journal (AMJ)"},{"issue":"2","key":"9560_CR8","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","volume":"84","author":"A Bandura","year":"1977","unstructured":"Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191\u2013215.","journal-title":"Psychological Review"},{"issue":"1","key":"9560_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1146\/annurev.psych.52.1.1","volume":"52","author":"A Bandura","year":"2001","unstructured":"Bandura, A. (2001). Social cognitive theory: An agentic perspective. Annual Review of Psychology, 52(1), 1\u201326.","journal-title":"Annual Review of Psychology"},{"key":"9560_CR10","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.jbusres.2019.01.049","volume":"103","author":"B Bartikowski","year":"2019","unstructured":"Bartikowski, B., Laroche, M., & Richard, M.-O. (2019). A content analysis of fear appeal advertising in Canada, China, and France. Journal of Business Research, 103, 232\u2013239.","journal-title":"Journal of Business Research"},{"issue":"6","key":"9560_CR11","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1136\/medethics-2016-103621","volume":"42","author":"R Bayer","year":"2016","unstructured":"Bayer, R., & Fairchild, A. L. (2016). Means, ends and the ethics of fear-based public health campaigns. Journal of Medical Ethics, 42(6), 391\u2013396.","journal-title":"Journal of Medical Ethics"},{"issue":"2","key":"9560_CR12","doi-asserted-by":"crossref","first-page":"121","DOI":"10.2224\/sbp.1984.12.2.121","volume":"12","author":"KH Beck","year":"1984","unstructured":"Beck, K. H. (1984). The effects of risk probability, outcome severity, efficacy of protection and access to protection on decision making: A further test of protection motivation theory. Social Behavior and Personality: An International Journal, 12(2), 121\u2013125.","journal-title":"Social Behavior and Personality: An International Journal"},{"issue":"1","key":"9560_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/BF01845786","volume":"12","author":"S Benet","year":"1993","unstructured":"Benet, S., Pitts, R. E., & LaTour, M. (1993). The appropriateness of fear appeal use for health care marketing to the elderly: Is it OK to scare Granny? Journal of Business Ethics, 12(1), 45\u201355. https:\/\/doi.org\/10.1007\/BF01845786.","journal-title":"Journal of Business Ethics"},{"key":"9560_CR14","volume-title":"Human behavior: An inventory of scientific findings","author":"B Berelson","year":"1964","unstructured":"Berelson, B., & Steiner, G. A. (1964). Human behavior: An inventory of scientific findings. Harcourt: Brace & World."},{"issue":"4","key":"9560_CR15","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","volume":"39","author":"SR Boss","year":"2015","unstructured":"Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837\u201364.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9560_CR16","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.jbusres.2009.02.006","volume":"63","author":"L Brennan","year":"2010","unstructured":"Brennan, L., & Binney, W. (2010). Fear, guilt, and shame appeals in social marketing. Journal of Business Research, 63(2), 140\u2013146.","journal-title":"Journal of Business Research"},{"key":"9560_CR17","volume-title":"Internet research ethics: The field and its critical issues","author":"E Buchanan","year":"2008","unstructured":"Buchanan, E., & Ess, C. (2008). Internet research ethics: The field and its critical issues. Hoboken: Wiley."},{"issue":"3","key":"9560_CR18","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1023\/A:1021372527024","volume":"4","author":"R Capurro","year":"2002","unstructured":"Capurro, R., & Pingel, C. (2002). Ethical issues of online communication research. Ethics and Information Technology, 4(3), 189\u2013194.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9560_CR19","first-page":"363","volume":"6","author":"GF Cavanagh","year":"1981","unstructured":"Cavanagh, G. F., Moberg, D. J., & Velasquez, M. (1981). The ethics of organizational politics. Academy of Management Review, 6(3), 363\u2013374.","journal-title":"Academy of Management Review"},{"issue":"1","key":"9560_CR20","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1080\/02650487.2015.1101908","volume":"35","author":"M-F Chen","year":"2016","unstructured":"Chen, M.-F. (2016). Impact of fear appeals on pro-environmental behavior and crucial determinants. International Journal of Advertising, 35(1), 74\u201392.","journal-title":"International Journal of Advertising"},{"key":"9560_CR21","first-page":"26","volume":"38","author":"R Cowan","year":"1986","unstructured":"Cowan, R. (1986). How the narcs created crack. National Review, 38, 26\u201331.","journal-title":"National Review"},{"key":"9560_CR22","doi-asserted-by":"crossref","unstructured":"Crossler, R.E. (2010). Protection motivation theory: Understanding determinants to backing up personal data. In: Proceedings of the 43rd Hawai\u2019i International Conference on System Sciences, IEEE, Honolulu, HI, USA. https:\/\/ieeexplore.ieee.org\/abstract\/document\/5428416","DOI":"10.1109\/HICSS.2010.311"},{"issue":"5","key":"9560_CR23","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1037\/h0021190","volume":"4","author":"JM Dabbs Jr","year":"1966","unstructured":"Dabbs, J. M, Jr., & Leventhal, H. (1966). Effects of varying the recommendations in a fear-arousing communication. Journal of Personality and Social Psychology, 4(5), 525\u2013531.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"6","key":"9560_CR24","doi-asserted-by":"crossref","first-page":"1739","DOI":"10.1016\/j.chb.2010.06.023","volume":"26","author":"N Davinson","year":"2010","unstructured":"Davinson, N., & Sillence, E. (2010). It won\u2019t happen to me: Promoting secure behaviour among Internet users. Computers in Human Behavior, 26(6), 1739\u20131747.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"9560_CR25","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1177\/0146167204271321","volume":"31","author":"N De Hoog","year":"2005","unstructured":"De Hoog, N., Stroebe, W., & De Wit, J. B. (2005). The impact of fear appeals on processing and acceptance of action recommendations. Personality and Social Psychology Bulletin, 31(1), 24\u201333.","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"3","key":"9560_CR26","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1037\/1089-2680.11.3.258","volume":"11","author":"N De Hoog","year":"2007","unstructured":"De Hoog, N., Stroebe, W., & De Wit, J. (2007). The impact of vulnerability to and severity of a health risk on processing and acceptance of fear-arousing communications: A meta-analysis. Review of General Psychology, 11(3), 258\u2013285.","journal-title":"Review of General Psychology"},{"issue":"4","key":"9560_CR27","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1111\/j.1468-2885.1994.tb00094.x","volume":"4","author":"JP Dillard","year":"1994","unstructured":"Dillard, J. P. (1994). Rethinking the study of fear appeals: An emotional perspective. Communication Theory, 4(4), 295\u2013323.","journal-title":"Communication Theory"},{"issue":"7","key":"9560_CR28","doi-asserted-by":"crossref","first-page":"997","DOI":"10.1177\/0093650216631097","volume":"44","author":"JP Dillard","year":"2017","unstructured":"Dillard, J. P., Li, R., Meczkowski, E., Yang, C., & Shen, L. (2017). Fear responses to threat appeals: Functional form, methodological considerations, and correspondence between static and dynamic data. Communication Research, 44(7), 997\u20131018.","journal-title":"Communication Research"},{"key":"9560_CR29","doi-asserted-by":"crossref","unstructured":"Du, H., Xu, H., Rosson, M.B., & Carroll, J.M. (2013). Effects of Fear appeals and point of reference on the persuasiveness of IT security communications. In: IEEE international conference on intelligence and security informatics, IEEE, 2013, pp. 82\u201384.","DOI":"10.1109\/ISI.2013.6578791"},{"issue":"1","key":"9560_CR30","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1177\/074391569501200112","volume":"12","author":"CR Duke","year":"1993","unstructured":"Duke, C. R., Pickett, G. M., Carlson, L., & Grove, S. J. (1993). A method for evaluating the ethics of fear appeals. Journal of Public Policy & Marketing, 12(1), 120\u2013129.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"2","key":"9560_CR31","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1111\/jcom.12083","volume":"64","author":"S Emery","year":"2014","unstructured":"Emery, S., Szczypka, G., Abril, E., Kim, Y., & Vera, L. (2014). Are you scared yet? Evaluating fear appeal messages in tweets about the tips campaign. Journal of Communication, 64(2), 278\u2013295.","journal-title":"Journal of Communication"},{"key":"9560_CR32","volume-title":"A history and theory of informed consent","author":"RR Faden","year":"1986","unstructured":"Faden, R. R., & Beauchamp, T. L. (1986). A history and theory of informed consent. New York: Oxford University Press."},{"issue":"2","key":"9560_CR33","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","volume":"30","author":"DL Floyd","year":"2000","unstructured":"Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407\u2013429.","journal-title":"Journal of Applied Social Psychology"},{"issue":"5","key":"9560_CR34","doi-asserted-by":"crossref","first-page":"718","DOI":"10.1007\/s12160-017-9895-z","volume":"51","author":"DP French","year":"2017","unstructured":"French, D. P., Cameron, E., Benton, J. S., Deaton, C., & Harvie, M. (2017). Can communicating personalised disease risk promote healthy behaviour change? A systematic review of systematic reviews. Annals of Behavioral Medicine, 51(5), 718\u2013729.","journal-title":"Annals of Behavioral Medicine"},{"issue":"2","key":"9560_CR35","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1037\/0022-3514.57.2.212","volume":"57","author":"NH Frijda","year":"1989","unstructured":"Frijda, N. H., Kuipers, P., & Ter Schure, E. (1989). Relations among emotion, appraisal, and emotional action readiness., Journal of Personality and Social Psychology, 57(2), 212\u2013228.","journal-title":"Journal of Personality and Social Psychology"},{"key":"9560_CR36","volume-title":"How fear works: Culture of fear in the twenty-first century","author":"F Furedi","year":"2018","unstructured":"Furedi, F. (2018). How fear works: Culture of fear in the twenty-first century. London: Bloomsbury Publishing."},{"key":"9560_CR37","unstructured":"Graham, C. (2019). The United States Prohibition of Alcohol. Rtrieved September 14, 2019, fromhttps:\/\/www.cato.org\/publications\/policy-analysis\/alcohol-prohibition-was-failure."},{"issue":"2","key":"9560_CR38","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1177\/1077800403262360","volume":"10","author":"M Guillemin","year":"2004","unstructured":"Guillemin, M., & Gillam, L. (2004). Ethics, reflexivity, and \u201cethically important moments\u201d in research. Qualitative Inquiry, 10(2), 261\u2013280.","journal-title":"Qualitative Inquiry"},{"issue":"1","key":"9560_CR39","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.nedt.2004.09.003","volume":"25","author":"C Haigh","year":"2005","unstructured":"Haigh, C., & Jones, N. A. (2005). An overview of the ethics of cyber-space research and the implication for nurse educators. Nurse Education Today, 25(1), 3\u20138. https:\/\/doi.org\/10.1016\/j.nedt.2004.09.003.","journal-title":"Nurse Education Today"},{"issue":"5","key":"9560_CR40","doi-asserted-by":"crossref","first-page":"419","DOI":"10.3109\/16066350009005588","volume":"8","author":"G Hamilton","year":"2000","unstructured":"Hamilton, G., Cross, D., & Resnicow, K. (2000). Occasional cigarette smokers: Cue for harm reduction smoking education. Addiction Research, 8(5), 419\u2013437.","journal-title":"Addiction Research"},{"issue":"4","key":"9560_CR41","doi-asserted-by":"crossref","first-page":"741","DOI":"10.2501\/IJA-33-4-741-765","volume":"33","author":"P Hartmann","year":"2014","unstructured":"Hartmann, P., Apaolaza, V., D\u2019souza, C., Barrutia, J. M., & Echebarria, C. (2014). Environmental threat appeals in green advertising: The role of fear arousal and coping efficacy. International Journal of Advertising, 33(4), 741\u2013765.","journal-title":"International Journal of Advertising"},{"issue":"11","key":"9560_CR42","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1002\/mar.20043","volume":"21","author":"G Hastings","year":"2004","unstructured":"Hastings, G., Stead, M., & Webb, J. (2004). Fear appeals in social marketing: Strategic and ethical reasons for concern. Psychology & Marketing, 21(11), 961\u2013986.","journal-title":"Psychology & Marketing"},{"issue":"4","key":"9560_CR43","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.chb.2009.03.005","volume":"25","author":"CA Henle","year":"2009","unstructured":"Henle, C. A., Kohut, G., & Booth, R. (2009). Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory. Computers in Human Behavior, 25(4), 902\u2013910.","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"9560_CR44","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106\u2013125.","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"9560_CR45","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1037\/h0035911","volume":"29","author":"DS Holmes","year":"1974","unstructured":"Holmes, D. S., & Bennett, D. H. (1974). Experiments to answer questions raised by the use of deceptionin psychological research: I. Role playing as an alternative to deception; II. Effectiveness of debriefing after a deception; III. Effect of informed consent on deception. Journal of Personality and Social Psychology, 29(3), 358\u2013367.","journal-title":"Journal of Personality and Social Psychology"},{"key":"9560_CR46","volume-title":"Communication and persuasion","author":"CI Hovland","year":"1953","unstructured":"Hovland, C. I., Janis, I. L., & Kelley, H. H. (1953). Communication and persuasion. London: Yale University Press."},{"issue":"2","key":"9560_CR47","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/BF00382660","volume":"9","author":"MR Hyman","year":"1990","unstructured":"Hyman, M. R., & Tansey, R. (1990). The ethics of psychoactive ads. Journal of Business Ethics, 9(2), 105\u2013114.","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"9560_CR48","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1037\/h0060732","volume":"48","author":"IL Janis","year":"1953","unstructured":"Janis, I. L., & Feshbach, S. (1953). Effects of fear-arousing communications. The Journal of Abnormal and Social Psychology, 48(1), 78\u201392.","journal-title":"The Journal of Abnormal and Social Psychology"},{"key":"9560_CR49","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.ijhcs.2018.10.004","volume":"123","author":"J Jansen","year":"2019","unstructured":"Jansen, J., & van Schaik, P. (2019). The design and evaluation of a theory-based intervention to promote security behaviour against phishing. International Journal of Human-Computer Studies, 123, 40\u201355. https:\/\/doi.org\/10.1016\/j.ijhcs.2018.10.004.","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"9560_CR50","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1080\/02681102.2013.814040","volume":"20","author":"JL Jenkins","year":"2014","unstructured":"Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, 20(2), 196\u2013213.","journal-title":"Information Technology for Development"},{"issue":"3","key":"9560_CR51","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"AC Johnston","year":"2010","unstructured":"Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549\u2013566.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9560_CR52","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1111\/deci.12328","volume":"50","author":"AC Johnston","year":"2019","unstructured":"Johnston, A. C., Warkentin, M., Dennis, A. R., & Siponen, M. (2019). Speak their language: Designing effective messages to improve employees\u2019 information security decision making. Decision Sciences, 50(2), 245\u2013284. https:\/\/doi.org\/10.1111\/deci.12328.","journal-title":"Decision Sciences"},{"issue":"1","key":"9560_CR53","doi-asserted-by":"crossref","first-page":"113","DOI":"10.25300\/MISQ\/2015\/39.1.06","volume":"39","author":"AC Johnston","year":"2015","unstructured":"Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113\u2013134.","journal-title":"MIS Quarterly"},{"issue":"6","key":"9560_CR54","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/0001-4575(82)90059-8","volume":"14","author":"PM Kohn","year":"1982","unstructured":"Kohn, P. M., Goodstadt, M. S., Cook, G. M., Sheppard, M., & Chan, G. (1982). Ineffectiveness of threat appeals about drinking and driving. Accident Analysis & Prevention, 14(6), 457\u2013464.","journal-title":"Accident Analysis & Prevention"},{"issue":"2","key":"9560_CR55","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1080\/17437199.2017.1415767","volume":"12","author":"G Kok","year":"2018","unstructured":"Kok, G., Peters, G.-J. Y., Kessels, L. T., Ten Hoor, G. A., & Ruiter, R. A. C. (2018). Ignoring theory and misinterpreting evidence: The false belief in fear appeals. Health Psychology Review, 12(2), 111\u2013125.","journal-title":"Health Psychology Review"},{"issue":"2","key":"9560_CR56","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1037\/0003-066X.59.2.105","volume":"59","author":"R Kraut","year":"2004","unstructured":"Kraut, R., Olson, J., Banaji, M., Bruckman, A., Cohen, J., & Couper, M. (2004). Psychological research online: Report of Board of Scientific Affairs\u2019 Advisory Group on the Conduct of Research on the Internet. American Psychologist, 59(2), 105\u2013117.","journal-title":"American Psychologist"},{"issue":"2","key":"9560_CR57","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1037\/h0034465","volume":"26","author":"HP Krisher","year":"1973","unstructured":"Krisher, H. P., Darley, S. A., & Darley, J. M. (1973). Fear-provoking recommendations, intentions to take preventive actions, and actual preventive actions. Journal of Personality and Social Psychology, 26(2), 301\u2013308.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"9","key":"9560_CR58","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1007\/s10461-015-1263-z","volume":"20","author":"J Lau","year":"2016","unstructured":"Lau, J., Lee, A., Wai, S., Mo, P., Fong, F., Wang, Z., et al. (2016). A randomized control trial for evaluating efficacies of two online cognitive interventions with and without fear-appeal imagery approaches in preventing unprotected anal sex among Chinese men who have sex with men. AIDS and Behavior, 20(9), 1851\u20131862.","journal-title":"AIDS and Behavior"},{"key":"9560_CR59","doi-asserted-by":"publisher","unstructured":"Lawson, S.T., Yeo, S.K., Yu, H., & Greene, E. (2016). The Cyber-Doom effect: The impact of fear appeals in the US Cyber Security Debate. In: Proceedings of the 8th international conference on cyber conflict, NATO CCO COE Publications, Tallinn, Estonia (pp. 65\u201380). https:\/\/doi.org\/10.1109\/CYCON.2016.7529427. https:\/\/ieeexplore.ieee.org\/abstract\/document\/7529427","DOI":"10.1109\/CYCON.2016.7529427"},{"key":"9560_CR60","first-page":"119","volume-title":"Advances in experimental social psychology","author":"H Leventhal","year":"1970","unstructured":"Leventhal, H. (1970). Findings and theory in the study of fear communications. In L. E. Berkowitz & E. E. Walster (Eds.), Advances in experimental social psychology (pp. 119\u2013186). Amsterdam: Elsevier."},{"issue":"2","key":"9560_CR61","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1111\/j.1467-6494.1966.tb01706.x","volume":"34","author":"H Leventhal","year":"1966","unstructured":"Leventhal, H., & Watts, J. C. (1966). Sources of resistance to fear-arousing communications on smoking and lung cancer. Journal of Personality, 34(2), 155\u2013175.","journal-title":"Journal of Personality"},{"issue":"6","key":"9560_CR62","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.trf.2008.03.003","volume":"11","author":"I Lewis","year":"2008","unstructured":"Lewis, I., Watson, B., & White, K. M. (2008). An examination of message-relevant affect in road safety messages: Should road safety advertisements aim to make us feel good or bad? Transportation Research Part F: Traffic Psychology and Behaviour, 11(6), 403\u2013417.","journal-title":"Transportation Research Part F: Traffic Psychology and Behaviour"},{"issue":"4","key":"9560_CR63","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.jretai.2012.08.001","volume":"88","author":"SB MacKenzie","year":"2012","unstructured":"MacKenzie, S. B., & Podsakoff, P. M. (2012). Common method bias in marketing: Causes, mechanisms, and procedural remedies. Journal of Retailing, 88(4), 542\u2013555.","journal-title":"Journal of Retailing"},{"issue":"12","key":"9560_CR64","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.2307\/20110660","volume":"52","author":"NK Malhotra","year":"2006","unstructured":"Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in is research: A comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865\u20131883. https:\/\/doi.org\/10.2307\/20110660.","journal-title":"Management Science"},{"key":"9560_CR65","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.cose.2018.09.004","volume":"80","author":"K Marett","year":"2019","unstructured":"Marett, K., Vedadi, A., & Durcikova, A. (2019). A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. Computers & Security, 80, 25\u201335. https:\/\/doi.org\/10.1016\/j.cose.2018.09.004.","journal-title":"Computers & Security"},{"issue":"1","key":"9560_CR66","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s10551-006-9152-z","volume":"72","author":"ER Micewski","year":"2007","unstructured":"Micewski, E. R., & Troy, C. (2007). Business ethics-deontologically revisited. Journal of Business Ethics, 72(1), 17\u201325.","journal-title":"Journal of Business Ethics"},{"issue":"11","key":"9560_CR67","doi-asserted-by":"crossref","first-page":"2199","DOI":"10.1016\/j.socscimed.2007.08.009","volume":"65","author":"T Miller","year":"2007","unstructured":"Miller, T., & Boulton, M. (2007). Changing constructions of informed consent: Qualitative research and complex social worlds. Social Science & Medicine, 65(11), 2199\u20132211.","journal-title":"Social Science & Medicine"},{"issue":"9","key":"9560_CR68","doi-asserted-by":"crossref","first-page":"0853","DOI":"10.1371\/journal.pmed.0020262","volume":"2","author":"FG Miller","year":"2005","unstructured":"Miller, F. G., Wendler, D., & Swartzman, L. C. (2005). Deception in research on the placebo effect. PLoS Medicine, 2(9), 0853\u20130859.","journal-title":"PLoS Medicine"},{"key":"9560_CR69","first-page":"7","volume":"1859","author":"JS Mill","year":"1863","unstructured":"Mill, J. S. (1863). Utilitarianism. Liberty, Representative Government, 1859, 7\u20139.","journal-title":"Liberty, Representative Government"},{"issue":"1","key":"9560_CR70","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1111\/j.1559-1816.2000.tb02308.x","volume":"30","author":"S Milne","year":"2000","unstructured":"Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106\u2013143.","journal-title":"Journal of Applied Social Psychology"},{"issue":"4","key":"9560_CR71","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1177\/1757913912445688","volume":"132","author":"V Minichiello","year":"2012","unstructured":"Minichiello, V., Rahman, S., Hawkes, G., & Pitts, M. (2012). STI epidemiology in the global older population: Emerging challenges. Perspectives in Public Health, 132(4), 178\u2013181.","journal-title":"Perspectives in Public Health"},{"key":"9560_CR72","unstructured":"Moore, M.H. (1989). Actually, prohibition was a success, the New York Times. Retrieved September 14, 2019, from https:\/\/www.nytimes.com\/1989\/10\/16\/opinion\/actually-prohibition-was-a-success.html."},{"issue":"7","key":"9560_CR73","doi-asserted-by":"publisher","first-page":"147","DOI":"10.17705\/1CAIS.04207","volume":"42","author":"F Mwagwabi","year":"2018","unstructured":"Mwagwabi, F., McGill, T. J., & Dixon, M. (2018). Short-term and long-term effects of fear appeals in improving compliance with password guidelines. Communications of the Association for Information Systems, 42(7), 147\u2013182. https:\/\/doi.org\/10.17705\/1CAIS.04207.","journal-title":"Communications of the Association for Information Systems"},{"issue":"5","key":"9560_CR74","doi-asserted-by":"crossref","first-page":"1209","DOI":"10.1097\/00000542-200311000-00030","volume":"99","author":"PS Myles","year":"2003","unstructured":"Myles, P. S., & Tan, N. (2003). Reporting of ethical approval and informed consent in clinical research published in leading anesthesia journals. Anesthesiology: The Journal of the American Society of Anesthesiologists, 99(5), 1209\u20131213.","journal-title":"Anesthesiology: The Journal of the American Society of Anesthesiologists"},{"issue":"1","key":"9560_CR75","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1207\/s15327019eb0701_6","volume":"7","author":"SD Nicks","year":"1997","unstructured":"Nicks, S. D., Korn, J. H., & Mainieri, T. (1997). The rise and fall of deception in social psychology and personality research, 1921 to 1994. Ethics & Behavior, 7(1), 69\u201377.","journal-title":"Ethics & Behavior"},{"issue":"3","key":"9560_CR76","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1177\/1075547008329201","volume":"30","author":"S O\u2019Neill","year":"2009","unstructured":"O\u2019Neill, S., & Nicholson-Cole, S. (2009). \u201cFear won\u2019t do it\u201d promoting positive engagement with climate change through visual and iconic representations. Science Communication, 30(3), 355\u2013379.","journal-title":"Science Communication"},{"issue":"sup1","key":"9560_CR77","doi-asserted-by":"crossref","first-page":"S8","DOI":"10.1080\/17437199.2012.703527","volume":"7","author":"G-JY Peters","year":"2013","unstructured":"Peters, G.-J. Y., Ruiter, R. A., & Kok, G. (2013). Threatening communication: A critical re-analysis and a revised meta-analytic test of fear appeal theory. Health Psychology Review, 7(sup1), S8\u2013S31.","journal-title":"Health Psychology Review"},{"issue":"2","key":"9560_CR78","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1002\/ijop.12000","volume":"49","author":"G-JY Peters","year":"2014","unstructured":"Peters, G.-J. Y., Ruiter, R. A. C., & Kok, G. (2014). Threatening communication: A qualitative study of fear appeal effectiveness beliefs among intervention developers, policymakers, politicians, scientists, and advertising professionals. International Journal of Psychology, 49(2), 71\u201379.","journal-title":"International Journal of Psychology"},{"issue":"5","key":"9560_CR79","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879\u2013903.","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"9560_CR80","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/07421222.2015.1138374","volume":"32","author":"C Posey","year":"2015","unstructured":"Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders\u2019 motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179\u2013214. https:\/\/doi.org\/10.1080\/07421222.2015.1138374.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"9560_CR81","doi-asserted-by":"crossref","first-page":"40","DOI":"10.2307\/3511336","volume":"28","author":"JD Ragsdale","year":"1986","unstructured":"Ragsdale, J. D., & Durham, K. R. (1986). Audience response to religious fear appeals. Review of Religious Research, 28(1), 40\u201350.","journal-title":"Review of Religious Research"},{"key":"9560_CR82","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvjf9z6v","volume-title":"A theory of justice","author":"J Rawls","year":"2005","unstructured":"Rawls, J. (2005). A theory of justice (reissue ed.). Cambridge: Harvard University Press.","edition":"reissue"},{"key":"9560_CR83","doi-asserted-by":"crossref","unstructured":"Renaud, K., & Dupuis, M. (2019). Cyber security fear appeals: Unexpectedly complicated. In: New Security Paradigms Workshop, San Carlos, Costa Rica (pp. 42\u201356), 23\u201326 September.","DOI":"10.1145\/3368860.3368864"},{"issue":"2","key":"9560_CR84","doi-asserted-by":"crossref","first-page":"275","DOI":"10.5840\/beq200414214","volume":"14","author":"SJ Reynolds","year":"2004","unstructured":"Reynolds, S. J., & Bowie, N. E. (2004). A Kantian perspective on the characteristics of ethics programs. Business Ethics Quarterly, 14(2), 275\u2013292.","journal-title":"Business Ethics Quarterly"},{"issue":"1","key":"9560_CR85","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change 1. The Journal of Psychology, 91(1), 93\u2013114.","journal-title":"The Journal of Psychology"},{"issue":"1","key":"9560_CR86","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1037\/0022-3514.34.1.54","volume":"34","author":"RW Rogers","year":"1976","unstructured":"Rogers, R. W., & Mewborn, C. R. (1976). Fear appeals and attitude change: Effects of a threat\u2019s noxiousness, probability of occurrence, and the efficacy of coping responses., Journal of Personality and Social Psychology, 34(1), 54\u201361.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"9560_CR87","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s10676-018-9452-x","volume":"20","author":"L Royakkers","year":"2018","unstructured":"Royakkers, L., Timmer, J., Kool, L., & van Est, R. (2018). Societal and ethical issues of digitization. Ethics and Information Technology, 20(2), 127\u2013142.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9560_CR88","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1002\/ijop.12042","volume":"49","author":"R Ruiter","year":"2014","unstructured":"Ruiter, R., Kessels, L., Peters, G., & Kok, G. (2014). Sixty years of fear appeal research: Current state of the evidence. International Journal of Psychology, 49(2), 63\u201370.","journal-title":"International Journal of Psychology"},{"issue":"5","key":"9560_CR89","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1037\/0022-3514.44.5.1075","volume":"44","author":"SS Smith","year":"1983","unstructured":"Smith, S. S., & Richardson, D. (1983). Amelioration of deception and harm in psychological research: The important role of debriefing. Journal of Personality and Social Psychology, 44(5), 1075\u20131082.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"9560_CR90","doi-asserted-by":"crossref","first-page":"393","DOI":"10.3109\/10826088309039356","volume":"18","author":"RD Stainback","year":"1983","unstructured":"Stainback, R. D., & Rogers, R. W. (1983). Identifying effective components of alcohol abuse prevention programs: Effects of fear appeals, message style, and source expertise. International Journal of the Addictions, 18(3), 393\u2013405.","journal-title":"International Journal of the Addictions"},{"issue":"2","key":"9560_CR91","doi-asserted-by":"crossref","first-page":"355","DOI":"10.25300\/MISQ\/2014\/38.2.02","volume":"38","author":"ZR Steelman","year":"2014","unstructured":"Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly, 38(2), 355\u2013378.","journal-title":"MIS Quarterly"},{"key":"9560_CR92","unstructured":"Sullivan, G.M. IRB 101, The Accreditation Council for Graduate Medical Education Suite, Chicago, IL, 2011. Retrieved June 6, 2019, from https:\/\/relationshipscience.com\/organization\/accreditation-council-for-graduate-medical-education-786044."},{"issue":"6","key":"9560_CR93","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1037\/a0039729","volume":"141","author":"MB Tannenbaum","year":"2015","unstructured":"Tannenbaum, M. B., Hepler, J., Zimmerman, R. S., Saul, L., Jacobs, S., Wilson, K., et al. (2015). Appealing to fear: A meta-analysis of fear appeal effectiveness and theories. Psychological Bulletin, 141(6), 1178\u20131204.","journal-title":"Psychological Bulletin"},{"issue":"2","key":"9560_CR94","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1093\/phe\/phs022","volume":"5","author":"P-A Tengland","year":"2012","unstructured":"Tengland, P.-A. (2012). Behavior change or empowerment: On the ethics of health-promotion strategies. Public Health Ethics, 5(2), 140\u2013153.","journal-title":"Public Health Ethics"},{"issue":"5","key":"9560_CR95","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1177\/1075547012459177","volume":"34","author":"PB Thompson","year":"2012","unstructured":"Thompson, P. B. (2012). Ethics and risk communication. Science Communication, 34(5), 618\u2013641.","journal-title":"Science Communication"},{"issue":"4","key":"9560_CR96","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/0148-2963(89)90008-8","volume":"19","author":"JF Tunner Jr","year":"1989","unstructured":"Tunner, J. F, Jr., Day, E., & Crask, M. R. (1989). Protection motivation theory: An extension of fear appeals theory in communication. Journal of Business Research, 19(4), 267\u2013276.","journal-title":"Journal of Business Research"},{"key":"9560_CR97","doi-asserted-by":"crossref","unstructured":"Ur, B., Alfieri, F., Aung, M., Bauer, L., Christin, N., Colnago, L., Cranor, L.F., Dixon, H., Emami\u00a0Naeini, P., & Habib, H., et\u00a0al.: Design and evaluation of a data-driven password meter. In: Proceedings of the CHI conference on human factors in computing systems, ACM, Denver, CO, 2017, pp. 3775\u20133786.","DOI":"10.1145\/3025453.3026050"},{"issue":"5","key":"9560_CR98","first-page":"1695","volume":"68","author":"HR Uviller","year":"2000","unstructured":"Uviller, H. R. (2000). Ethics in criminal advocacy, symposium, the neutral prosecutor: The obligation of dispassion in a passionate pursuit. Fordham Law Review, 68(5), 1695\u20131718.","journal-title":"Fordham Law Review"},{"key":"9560_CR99","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.ijhcs.2018.11.003","volume":"123","author":"R van Bavel","year":"2019","unstructured":"van Bavel, R., Rodr\u00edguez-Priego, N., Vila, J., & Briggs, P. (2019). Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies, 123, 29\u201339. https:\/\/doi.org\/10.1016\/j.ijhcs.2018.11.003.","journal-title":"International Journal of Human-Computer Studies"},{"key":"9560_CR100","doi-asserted-by":"crossref","unstructured":"Vance, A., Eargle, D., Ouimet, K., & Straub, D.: Enhancing password security through interactive fear appeals: A web-based field experiment, in: 46th Hawai\u2019i International Conference on System Sciences (HICSS), Hawai\u2019i, USA, 2013, pp. 2988\u20132997.","DOI":"10.1109\/HICSS.2013.196"},{"issue":"8","key":"9560_CR101","doi-asserted-by":"publisher","first-page":"103157","DOI":"10.1016\/j.im.2019.03.002","volume":"56","author":"JD Wall","year":"2019","unstructured":"Wall, J. D., & Warkentin, M. (2019). Perceived argument quality\u2019s effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Information & Management, 56(8), 103157. https:\/\/doi.org\/10.1016\/j.im.2019.03.002.","journal-title":"Information & Management"},{"issue":"2","key":"9560_CR102","doi-asserted-by":"crossref","first-page":"159","DOI":"10.22329\/il.v30i2.2868","volume":"30","author":"D Walton","year":"2010","unstructured":"Walton, D. (2010). Why fallacies appear to be better arguments than they are. Informal Logic, 30(2), 159\u2013184.","journal-title":"Informal Logic"},{"issue":"3","key":"9560_CR103","doi-asserted-by":"crossref","first-page":"194","DOI":"10.17705\/1jais.00424","volume":"17","author":"M Warkentin","year":"2016","unstructured":"Warkentin, M., Walden, E., Johnston, A., & Straub, D. (2016). Neural correlates of protection motivation for secure IT behaviors: An fMRI examination. Journal of the Association for Information Systems, 17(3), 194\u2013215.","journal-title":"Journal of the Association for Information Systems"},{"key":"9560_CR104","first-page":"11","volume-title":"Taking liberties: AIDS and cultural politics","author":"S Watney","year":"1989","unstructured":"Watney, S. (1989). Taking liberties: An introduction. In E. Carter & S. Watney (Eds.), Taking liberties: AIDS and cultural politics (pp. 11\u201357). London: Serpent\u2019s Tail."},{"key":"9560_CR105","volume-title":"An introduction to Mill\u2019s utilitarian ethics","author":"HR West","year":"2004","unstructured":"West, H. R. (2004). An introduction to Mill\u2019s utilitarian ethics. Cambridge: Cambridge University Press."},{"issue":"4","key":"9560_CR106","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1330311.1330320","volume":"51","author":"R West","year":"2008","unstructured":"West, R. (2008). The Psychology of Security. Communications of the ACM, 51(4), 34\u201340.","journal-title":"Communications of the ACM"},{"issue":"4","key":"9560_CR107","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1080\/03637759209376276","volume":"59","author":"K Witte","year":"1992","unstructured":"Witte, K. (1992). Putting the fear back into fear appeals: The extended parallel process model. Communications Monographs, 59(4), 329\u2013349.","journal-title":"Communications Monographs"},{"key":"9560_CR108","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/B978-012057770-5\/50018-7","volume-title":"Handbook of communication and emotion","author":"K Witte","year":"1996","unstructured":"Witte, K. (1996). Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures. In P. A. Andersen & L. K. Guerrero (Eds.), Handbook of communication and emotion (pp. 423\u2013450). Amsterdam: Elsevier."},{"key":"9560_CR109","doi-asserted-by":"crossref","DOI":"10.4135\/9781452233239","volume-title":"Effective health risk messages: A step-by-step guide","author":"K Witte","year":"2001","unstructured":"Witte, K., Meyer, G., & Martell, D. (2001). Effective health risk messages: A step-by-step guide. Thousand Oaks: Sage."},{"issue":"2","key":"9560_CR110","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1515\/sc-2015-0007","volume":"2","author":"\u0141P Wojciechowski","year":"2015","unstructured":"Wojciechowski, \u0141. P., & Babjakov\u00e1, V. (2015). Necromarketing in the media and marketing communications. Social Communication, 2(2), 15\u201329. https:\/\/doi.org\/10.1515\/sc-2015-0007.","journal-title":"Social Communication"},{"issue":"21","key":"9560_CR111","doi-asserted-by":"crossref","first-page":"2835","DOI":"10.1001\/jama.287.21.2835","volume":"287","author":"V Yank","year":"2002","unstructured":"Yank, V., & Rennie, D. (2002). Reporting of informed consent and ethics committee approval in clinical trials. The Journal of the American Medical Association, 287(21), 2835\u20132838.","journal-title":"The Journal of the American Medical Association"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09560-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-020-09560-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09560-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T23:37:00Z","timestamp":1669246620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-020-09560-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":111,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["9560"],"URL":"https:\/\/doi.org\/10.1007\/s10676-020-09560-0","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,20]]},"assertion":[{"value":"20 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}