{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:50:22Z","timestamp":1759146622388,"version":"3.37.3"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T00:00:00Z","timestamp":1563408000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T00:00:00Z","timestamp":1563408000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10796-019-09942-w","type":"journal-article","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T05:07:05Z","timestamp":1563426425000},"page":"1213-1229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study"],"prefix":"10.1007","volume":"21","author":[{"given":"Emmanuel W.","family":"Ayaburi","sequence":"first","affiliation":[]},{"given":"James","family":"Wairimu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8281-9877","authenticated-orcid":false,"given":"Francis Kofi","family":"Andoh-Baidoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,18]]},"reference":[{"issue":"1","key":"9942_CR1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MSP.2007.4","volume":"5","author":"M Aime","year":"2007","unstructured":"Aime, M., Calandriello, G., & Lioy, A. (2007). Dependability in Wireless Networks: Can We Rely on WiFi? IEEE Security and Privacy Magazine, 5(1), 23\u201329.","journal-title":"IEEE Security and Privacy Magazine"},{"issue":"3","key":"9942_CR2","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1080\/07421222.2016.1243947","volume":"33","author":"BB Anderson","year":"2016","unstructured":"Anderson, B. B., Vance, A., Kirwan, C. B., Jenkins, J. L., & Eargle, D. (2016). From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. Journal of Management Information Systems, 33(3), 713\u2013743.","journal-title":"Journal of Management Information Systems"},{"key":"9942_CR3","doi-asserted-by":"crossref","unstructured":"Balachandran, A., Voelker, G. M., & Bahl, P. (2005). Wireless hotspots: current challenges and future directions. Mobile Networks and Applications, 10(3), 265\u2013274.","DOI":"10.1007\/s11036-005-6421-5"},{"key":"9942_CR4","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/0749-5978(91)90022-L","volume":"50","author":"A Bandura","year":"1991","unstructured":"Bandura, A. (1991). Social Cognitive Theory of Self-Regulation. Organizational Behavior and Human Decision Processes, 50, 248\u2013287.","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"2","key":"9942_CR5","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.paid.2008.10.007","volume":"46","author":"LK Barber","year":"2009","unstructured":"Barber, L. K., Munz, D. C., Bagsby, P. G., & Grawitch, M. J. (2009). When does time perspective matter? Self-control as a moderator between time perspective and academic achievement. Personality and Individual Differences, 46(2), 250\u2013253.","journal-title":"Personality and Individual Differences"},{"key":"9942_CR6","doi-asserted-by":"crossref","unstructured":"Bayer, J. B., & Campbell, S. W. (2012). Texting while driving on automatic: considering the frequency-independent side of habit. Computers in Human Behavior 28(6), 2083\u20132090.","DOI":"10.1016\/j.chb.2012.06.012"},{"issue":"2","key":"9942_CR7","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1111\/comt.12090","volume":"26","author":"JB Bayer","year":"2016","unstructured":"Bayer, J. B., Campbell, S. W., & Ling, R. (2016). Connection Cues: Activating the Norms and Habits of Social Connectedness: Connection Cues. Communication Theory, 26(2), 128\u2013149.","journal-title":"Communication Theory"},{"key":"9942_CR8","doi-asserted-by":"crossref","unstructured":"Bayer, J. B., Dal Cin, S., Campbell, S. W., & Panek, E. (2016). Consciousness and Self-Regulation in Mobile Communication: Consciousness in Mobile Communication. Human Communication Research, 42(1), 71\u201397.","DOI":"10.1111\/hcre.12067"},{"issue":"1","key":"9942_CR9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/1745691610393980","volume":"6","author":"M Buhrmester","year":"2011","unstructured":"Buhrmester, M., Kwang, T., & Gosling, S. D. (2011). Amazon\u2019s Mechanical Turk: A New Source of Inexpensive, Yet High-Quality, Data? Perspectives on Psychological Science, 6(1), 3\u20135.","journal-title":"Perspectives on Psychological Science"},{"issue":"5","key":"9942_CR10","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1016\/j.chb.2010.03.012","volume":"26","author":"SE Caplan","year":"2010","unstructured":"Caplan, S. E. (2010). Theory and measurement of generalized problematic Internet use: A two-step approach. Computers in Human Behavior, 26(5), 1089\u20131097.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR11","unstructured":"CBS. (2010). Dangers of Free Public Wifi. \nhttps:\/\/www.cbsnews.com\/news\/dangers-of-free-public-wifi\/\n\n. Accessed 15 March 2018."},{"issue":"1","key":"9942_CR12","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1089\/cyber.2014.0456","volume":"18","author":"H-T Chen","year":"2015","unstructured":"Chen, H.-T., & Chen, W. (2015). Couldn\u2019t or Wouldn\u2019t? The Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13\u201319.","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"9942_CR13","unstructured":"Choi, H. S., & Carpenter, D. (2013). Connecting to Unknown Wi-Fi Hotspots - A Risk Taking Perspective, 10."},{"key":"9942_CR14","unstructured":"Choi, M.-K., Robles, R. J., Hong, C.-H., & Kim, T.-H. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering 3(3), 77\u201386."},{"key":"9942_CR15","unstructured":"Cisco. (2017). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016\u2013202, 35."},{"key":"9942_CR16","unstructured":"Cisco. (2018). Five Reasons to Go Wireless. Cisco. \nhttps:\/\/www.cisco.com\/c\/en\/us\/solutions\/small-business\/resource-center\/work-anywhere\/why-go-wireless.html\n\n. Accessed 25 April 2018."},{"key":"9942_CR17","unstructured":"Dolly, J. (2018). Why you should never, ever connect to public WiFi | CSO Online. \nhttps:\/\/www.csoonline.com\/article\/3246984\/wi-fi\/why-you-should-never-ever-connect-to-public-wifi.html\n\n. Accessed 5 April 2018."},{"issue":"3","key":"9942_CR18","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1089\/cpb.2006.9935","volume":"10","author":"MS Eastin","year":"2007","unstructured":"Eastin, M. S., Glynn, C. J., & Griffiths, R. P. (2007). Psychology of Communication Technology Use in the Workplace. CyberPsychology & Behavior, 10(3), 436\u2013443.","journal-title":"CyberPsychology & Behavior"},{"key":"9942_CR19","unstructured":"EFF. (2018). Dark carakal: Cyber-espionage at a Global Scale. Lookout. \nhttps:\/\/info.lookout.com\/rs\/051-ESQ-475\/images\/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf\n\n. Accessed 5 April 2018."},{"key":"9942_CR20","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.paid.2017.04.024","volume":"116","author":"KD Ersche","year":"2017","unstructured":"Ersche, K. D., Lim, T.-V., Ward, L. H. E., Robbins, T. W., & Stochl, J. (2017). Creature of Habit: A self-report measure of habitual routines and automatic tendencies in everyday life. Personality and Individual Differences, 116, 73\u201385.","journal-title":"Personality and Individual Differences"},{"key":"9942_CR21","unstructured":"Finjan Mobile. (2018). The Dangers of Using Unsecured Wi-Fi | How Bad is it, Really? \nhttps:\/\/www.finjanmobile.com\/the-dangers-of-using-unsecured-wi-fi\/\n\n. Accessed 29 March 2018."},{"key":"9942_CR22","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.chb.2017.05.029","volume":"75","author":"C Fullwood","year":"2017","unstructured":"Fullwood, C., Quinn, S., Kaye, L. K., & Redding, C. (2017). My virtual friend: A qualitative analysis of the attitudes and experiences of Smartphone users: Implications for Smartphone attachment. Computers in Human Behavior, 75, 347\u2013355.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR23","unstructured":"Gast, M. S. (2002). 802.11 Wireless Networks: the definitive guide: [creating and administering Wireless Networks] (1st ed.). Beijing: O\u2019Reilly."},{"issue":"5","key":"9942_CR24","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1016\/j.euroneuro.2015.12.033","volume":"26","author":"CM Gillan","year":"2016","unstructured":"Gillan, C. M., Robbins, T. W., Sahakian, B. J., van den Heuvel, O. A., & van Wingen, G. (2016). The role of habit in compulsivity. European Neuropsychopharmacology, 26(5), 828\u2013840.","journal-title":"European Neuropsychopharmacology"},{"key":"9942_CR25","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1016\/j.chb.2016.05.091","volume":"63","author":"\u015e G\u00f6k\u00e7earslan","year":"2016","unstructured":"G\u00f6k\u00e7earslan, \u015e., Mumcu, F. K., Ha\u015flaman, T., & \u00c7evik, Y. D. (2016). Modelling smartphone addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students. Computers in Human Behavior, 63, 639\u2013649.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR26","doi-asserted-by":"crossref","unstructured":"Groves, P. M., & Thompson, R. F. (1970). Habituation: a dual-process theory. Psychological review, 77(5), 419\u2013450.","DOI":"10.1037\/h0029810"},{"issue":"1","key":"9942_CR27","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.chb.2012.08.006","volume":"29","author":"MC Haagsma","year":"2013","unstructured":"Haagsma, M. C., Caplan, S. E., Peters, O., & Pieterse, M. E. (2013). A cognitive-behavioral model of problematic online gaming in adolescents aged 12\u201322\u00a0years. Computers in Human Behavior, 29(1), 202\u2013209.","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"9942_CR28","first-page":"291","volume":"25","author":"BMK Hagerty","year":"1993","unstructured":"Hagerty, B. M. K., Lynch-Sauer, J., Patusky, K. L., & Bouwsema, M. (1993). An Emerging Theory of Human Relatedness. Image: the Journal of Nursing Scholarship, 25(4), 291\u2013296.","journal-title":"Image: the Journal of Nursing Scholarship"},{"issue":"3","key":"9942_CR29","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/s11747-011-0261-6","volume":"40","author":"JF Hair","year":"2012","unstructured":"Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414\u2013433.","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"4","key":"9942_CR30","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1111\/j.1460-2466.2010.01510.x","volume":"60","author":"KN Hampton","year":"2009","unstructured":"Hampton, K. N., Livio, O., & Sessions Goulet, L. (2009). The Social Life of Wireless Urban Spaces: Internet Use, Social Networks, and the Public Realm. Journal of Communication, 60(4), 701\u2013722.","journal-title":"Journal of Communication"},{"key":"9942_CR31","unstructured":"Higgins, G. E., & Makin, D. A. (2004). Does Social Learning Theory Condition the Effects of Low Self-Control on College Students\u2019 Software Piracy?, 2(2), 1\u201322."},{"issue":"2","key":"9942_CR32","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7","volume":"20","author":"Hulland","year":"1999","unstructured":"Hulland. (1999). Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies. Strategic Management Journal, 20(2), 195\u2013204.","journal-title":"Strategic Management Journal"},{"key":"9942_CR33","unstructured":"Kaspersky. (2016). Public WiFi Risks and what you can do about it | Kaspersky Lab US. \nhttps:\/\/usa.kaspersky.com\/resource-center\/preemptive-safety\/public-wifi-risks\n\n. Accessed 15 April 2018."},{"issue":"6","key":"9942_CR34","doi-asserted-by":"crossref","first-page":"2416","DOI":"10.1016\/j.chb.2013.05.027","volume":"29","author":"H Khang","year":"2013","unstructured":"Khang, H., Kim, J. K., & Kim, Y. (2013). Self-traits and motivations as antecedents of digital media flow and addiction: The Internet, mobile phones, and video games. Computers in Human Behavior, 29(6), 2416\u20132424.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR35","doi-asserted-by":"crossref","unstructured":"Kindberg, T., Bevan, C., O\u2019Neill, E., Mitchell, J., Grimmett, J., & Woodgate, D. (2009). Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access, 12.","DOI":"10.1145\/1620545.1620565"},{"issue":"1","key":"9942_CR36","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.chb.2012.07.025","volume":"29","author":"ALS King","year":"2013","unstructured":"King, A. L. S., Valen\u00e7a, A. M., Silva, A. C. O., Baczynski, T., Carvalho, M. R., & Nardi, A. E. (2013). Nomophobia: Dependency on virtual environments or social phobia? Computers in Human Behavior, 29(1), 140\u2013144.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR37","doi-asserted-by":"crossref","unstructured":"Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., & Wetherall, D. (2009). \u201cWhen I am on Wi-Fi, I am Fearless:\u201d Privacy Concerns & Practices in Everyday Wi-Fi Use, 10.","DOI":"10.1145\/1518701.1519004"},{"issue":"2","key":"9942_CR38","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1111\/j.1468-2885.2010.01360.x","volume":"20","author":"R LaRose","year":"2010","unstructured":"LaRose, R. (2010). The Problem of Media Habits. Communication Theory, 20(2), 194\u2013222.","journal-title":"Communication Theory"},{"issue":"3","key":"9942_CR39","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1207\/S1532785XMEP0503_01","volume":"5","author":"R LaRose","year":"2003","unstructured":"LaRose, R., Lin, C. A., & Eastin, M. S. (2003). Unregulated Internet Usage: Addiction, Habit, or DSR? Media Psychology, 5(3), 225\u2013253.","journal-title":"Media Psychology"},{"issue":"3","key":"9942_CR40","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1207\/s15506878jobem4803_4","volume":"48","author":"KC Lee","year":"2004","unstructured":"Lee, K. C., & Perry, S. D. (2004). Student Instant Message Use in a Ubiquitous Computing Environment: Effects of DSR. Journal of Broadcasting & Electronic Media, 48(3), 399\u2013420.","journal-title":"Journal of Broadcasting & Electronic Media"},{"issue":"2","key":"9942_CR41","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1037\/0022-0167.42.2.232","volume":"42","author":"RM Lee","year":"1995","unstructured":"Lee, R. M., & Robbins, S. B. (1995). Measuring belongingness: The social connectedness and the social assurance scales. Journal of counseling psychology, 42(2), 232.","journal-title":"Journal of counseling psychology"},{"issue":"1","key":"9942_CR42","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.janxdis.2011.11.001","volume":"26","author":"BW Lee","year":"2012","unstructured":"Lee, B. W., & Stapinski, L. A. (2012). Seeking safety on the internet: Relationship between social anxiety and problematic internet use. Journal of Anxiety Disorders, 26(1), 197\u2013205.","journal-title":"Journal of Anxiety Disorders"},{"key":"9942_CR43","doi-asserted-by":"crossref","unstructured":"Lee, R. M., Draper, M., & Lee, S. (2001). Social Connectedness, Dysfunctional Interpersonal Behaviors, and Psychological Distress: Testing a Mediator Model, 9.","DOI":"10.1037\/0022-0167.48.3.310"},{"key":"9942_CR44","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.chb.2013.10.047","volume":"31","author":"Y-K Lee","year":"2014","unstructured":"Lee, Y.-K., Chang, C.-T., Lin, Y., & Cheng, Z.-H. (2014). The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress. Computers in Human Behavior, 31, 373\u2013383.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR45","unstructured":"Lee, Z. W. Y., Cheung, C. M. K., & Chan, T. K. H. (2016). Technology-Mediated Self-Regulation: An Implication for Preventing Online Gaming Addiction. International Conference on Information Systems, 10."},{"key":"9942_CR46","unstructured":"MarketWatch. (2018). Global Wi-Fi hotspot Market Growth Expected to be Driven by Increasing Use of Mobile Devices and Smartphones Coupled with Growing Internet Penetration Across the Globe - MarketWatch. \nhttps:\/\/www.marketwatch.com\/story\/global-wi-fi-hotspot-market-growth-expected-to-be-driven-by-increasing-use-of-mobile-devices-and-smartphones-coupled-with-growing-internet-penetration-across-the-globe-2018-02-21\n\n. Accessed 15 March 2018."},{"key":"9942_CR47","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.chb.2014.01.020","volume":"34","author":"B McCord","year":"2014","unstructured":"McCord, B., Rodebaugh, T. L., & Levinson, C. A. (2014). Facebook: Social uses and anxiety. Computers in Human Behavior, 34, 23\u201327.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR48","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1016\/j.chb.2015.02.021","volume":"48","author":"E McIntyre","year":"2015","unstructured":"McIntyre, E., Wiener, K. K. K., & Saliba, A. J. (2015). Compulsive Internet use and relations between social connectedness, and introversion. Computers in Human Behavior, 48, 569\u2013574.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR49","unstructured":"Noor, M. M., & Hassan, W. H. (2013). Current threats of wireless networks. The Third International Conference on Society of Digital Information Processing and Communications, 704\u2013713."},{"key":"9942_CR50","unstructured":"Norton. 2017. Norton Wi-Fi Risk Report. \nhttps:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/2017-norton-wifi-risk-report-global-results-summary-en.pdf\n\n, Accessed 5 April 2018."},{"key":"9942_CR51","unstructured":"Norton. (2018). The Personal Impact of Cybercrime. \nhttps:\/\/us.norton.com\/internetsecurity-emerging-threats-personal-impact-cybercrime.html\n\n. Accessed 25 April 2018."},{"issue":"3","key":"9942_CR52","first-page":"18","volume":"6","author":"T Olufon","year":"2014","unstructured":"Olufon, T., Campbell, C. E.-A., Hole, S., Radhakrishnan, K., & Sedigh, A. (2014). Mitigating External Threats in Wireless Local Area Networks. International Journal of Communication Networks and Information Security, 6(3), 18.","journal-title":"International Journal of Communication Networks and Information Security"},{"issue":"5","key":"9942_CR53","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879\u2013903.","journal-title":"Journal of Applied Psychology"},{"issue":"5","key":"9942_CR54","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1080\/0960085X.2018.1457194","volume":"27","author":"GL Polites","year":"2018","unstructured":"Polites, G. L., Serrano, C., Thatcher, J. B., & Matthews, K. (2018). Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use. European Journal of Information Systems, 27(5), 600\u2013621.","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"9942_CR55","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1111\/j.1745-9125.2000.tb00911.x","volume":"38","author":"TC Pratt","year":"2000","unstructured":"Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi\u2019s general theory of crime: A meta-analysis. Criminology, 38(3), 931\u2013964.","journal-title":"Criminology"},{"key":"9942_CR56","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.chb.2016.04.003","volume":"62","author":"S Prizant-Passal","year":"2016","unstructured":"Prizant-Passal, S., Shechner, T., & Aderka, I. M. (2016). Social anxiety and internet use \u2013 A meta-analysis: What do we know? What are we missing? Computers in Human Behavior, 62, 221\u2013229.","journal-title":"Computers in Human Behavior"},{"issue":"8","key":"9942_CR57","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","volume":"28","author":"H-S Rhee","year":"2009","unstructured":"Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users\u2019 information security practice behavior. Computers & Security, 28(8), 816\u2013826.","journal-title":"Computers & Security"},{"key":"9942_CR58","unstructured":"Richardson, J. (2018). The New Science of Habit Formation and Change. Fire Uo Today. \nhttp:\/\/fireuptoday.com\/the-new-science-of-habit-formation-and-change\/\n\n. Accessed 15 April 2018."},{"issue":"02","key":"9942_CR59","doi-asserted-by":"crossref","first-page":"56","DOI":"10.5585\/remark.v13i2.2717","volume":"13","author":"CM Ringle","year":"2014","unstructured":"Ringle, C. M., Da Silva, D., & Bido, D. D. S. (2014). Structural Equation Modeling with the Smartpls. Revista Brasileira de Marketing, 13(02), 56\u201373.","journal-title":"Revista Brasileira de Marketing"},{"issue":"6","key":"9942_CR60","doi-asserted-by":"crossref","first-page":"2632","DOI":"10.1016\/j.chb.2013.07.003","volume":"29","author":"M Salehan","year":"2013","unstructured":"Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile phones become addictive. Computers in Human Behavior, 29(6), 2632\u20132639.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR61","doi-asserted-by":"crossref","unstructured":"Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms. MIS Quarterly, 27(2), 237\u2014263.","DOI":"10.2307\/30036530"},{"key":"9942_CR62","unstructured":"Sayette, M. A., & Kasey, G. M. (2004). Self-regulatory failure and addiction (Vol. 2). Handbook of self-regulation: Research, theory, and applications."},{"key":"9942_CR63","doi-asserted-by":"crossref","unstructured":"Schlenker, B. R., & Leary, M. R. (1982). Social Anxiety and Self-Presentation: A Conceptualization and Model. Social Anxiety, 29.","DOI":"10.1037\/0033-2909.92.3.641"},{"key":"9942_CR64","unstructured":"Schlesinger, J. (2016). Most people unaware of the risks of using public Wi-Fi. \nhttps:\/\/www.cnbc.com\/2016\/06\/28\/most-people-unaware-of-the-risks-of-using-public-wi-fi.html\n\n. Accessed 29 March 2018."},{"issue":"4","key":"9942_CR65","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1007\/s10796-014-9538-x","volume":"18","author":"S Sicari","year":"2016","unstructured":"Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D., & Coen-Porisini, A. (2016). A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers, 18(4), 665\u2013677.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9942_CR66","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals\u2019 Concerns about Organizational Practices. MIS Quarterly, 20(2), 167\u2013196.","journal-title":"MIS Quarterly"},{"issue":"4","key":"9942_CR67","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989\u20131016.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9942_CR68","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1146\/annurev.ph.25.030163.002553","volume":"25","author":"EN Sokolov","year":"1963","unstructured":"Sokolov, E. N. (1963). Higher Nervous Functions: The Orienting Reflex. Annual Review of Physiology, 25(1), 545\u2013580.","journal-title":"Annual Review of Physiology"},{"key":"9942_CR69","doi-asserted-by":"crossref","unstructured":"Sombatruang, N., Sasse, M. A., & Baddeley, M. (2016). Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions (pp. 61\u201372). ACM Press.","DOI":"10.1145\/3046055.3046058"},{"key":"9942_CR70","doi-asserted-by":"crossref","unstructured":"Son, J. Y., & Kim, S. S. (2008). Internet Users\u2019 Information Privacy-Protective Responses: A Taxonomy and a Nomological Model. MIS Quarterly, 32(3), 503\u2014529.","DOI":"10.2307\/25148854"},{"key":"9942_CR71","doi-asserted-by":"crossref","unstructured":"Soror, A. A., Steelman, Z. R., & Limayem, M. (2012). Discipline Yourself Before Life Disciplines You: DSR and Mobile Phone Unregulated Use. In 2012 45th Hawaii International Conference on System Sciences (pp. 849\u2013858).","DOI":"10.1109\/HICSS.2012.219"},{"issue":"4","key":"9942_CR72","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1111\/isj.12065","volume":"25","author":"AA Soror","year":"2015","unstructured":"Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective: Good habits gone bad. Information Systems Journal, 25(4), 403\u2013427.","journal-title":"Information Systems Journal"},{"issue":"4","key":"9942_CR73","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s10111-012-0231-x","volume":"15","author":"P Turner","year":"2013","unstructured":"Turner, P., & Turner, S. (2013). Emotional and aesthetic attachment to digital artefacts. Cognition, Technology & Work, 15(4), 403\u2013414.","journal-title":"Cognition, Technology & Work"},{"key":"9942_CR74","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.chb.2018.08.045","volume":"90","author":"AM Uzun","year":"2019","unstructured":"Uzun, A. M., & Kilis, S. (2019). Does persistent involvement in media and technology lead to lower academic performance? Evaluating media and technology use in relation to multitasking, self-regulation and academic performance. Computers in Human Behavior, 90, 196\u2013203.","journal-title":"Computers in Human Behavior"},{"key":"9942_CR75","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1016\/j.chb.2014.12.039","volume":"45","author":"AJAM van Deursen","year":"2015","unstructured":"van Deursen, A. J. A. M., Bolle, C. L., Hegner, S. M., & Kommers, P. A. M. (2015). Modeling habitual and addictive smartphone behavior. Computers in Human Behavior, 45, 411\u2013420.","journal-title":"Computers in Human Behavior"},{"issue":"3\u20134","key":"9942_CR76","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3\u20134), 190\u2013198.","journal-title":"Information & Management"},{"key":"9942_CR77","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.dss.2014.11.002","volume":"69","author":"C Wang","year":"2015","unstructured":"Wang, C., Lee, M. K. O., & Hua, Z. (2015). A theory of social media dependence: Evidence from microblog users. Decision Support Systems, 69, 40\u201349.","journal-title":"Decision Support Systems"},{"issue":"1","key":"9942_CR78","first-page":"13","volume":"11","author":"L Weber","year":"2018","unstructured":"Weber, L., & Rudman, R. J. (2018). Addressing the Incremental Risks Associated with Adopting Bring Your Own Device. Open Access, 11(1), 13.","journal-title":"Open Access"},{"issue":"4","key":"9942_CR79","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1037\/a0029265","volume":"32","author":"JA Weller","year":"2013","unstructured":"Weller, J. A., Shackleford, C., Dieckmann, N., & Slovic, P. (2013). Possession attachment predicts cell phone use while driving. Health Psychology, 32(4), 379\u2013387.","journal-title":"Health Psychology"},{"issue":"4","key":"9942_CR80","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1037\/0033-295X.114.4.843","volume":"114","author":"W Wood","year":"2007","unstructured":"Wood, W., & Neal, D. T. (2007). A new look at habits and the habit-goal interface. Psychological Review, 114(4), 843\u2013863.","journal-title":"Psychological Review"},{"issue":"2","key":"9942_CR81","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10660-013-9111-6","volume":"13","author":"F Xu","year":"2013","unstructured":"Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151\u2013168.","journal-title":"Electronic Commerce Research"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-019-09942-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-019-09942-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-019-09942-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T23:29:24Z","timestamp":1594942164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-019-09942-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,18]]},"references-count":81,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9942"],"URL":"https:\/\/doi.org\/10.1007\/s10796-019-09942-w","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"type":"print","value":"1387-3326"},{"type":"electronic","value":"1572-9419"}],"subject":[],"published":{"date-parts":[[2019,7,18]]},"assertion":[{"value":"18 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}