{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:05:00Z","timestamp":1774364700598,"version":"3.50.1"},"reference-count":117,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["112-2410-H-006 -017 -MY2"],"award-info":[{"award-number":["112-2410-H-006 -017 -MY2"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.cose.2026.104858","type":"journal-article","created":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T15:40:56Z","timestamp":1770565256000},"page":"104858","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Impact of cybersecurity recommendations from smart home vendors\u2019 chatbots on user\u2019s cybersecurity coping process"],"prefix":"10.1016","volume":"165","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5247-3139","authenticated-orcid":false,"given":"Jengchung Victor","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yang-Suen","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8637-7754","authenticated-orcid":false,"given":"Thanh-Minh Ha","family":"Le","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3702321","article-title":"They didn\u2019t buy their Smart TV to watch me with the kids\u201d: comparing nannies\u2019 and parents\u2019 Privacy threat models for smart home devices","volume":"32","author":"Abu-Salma","year":"2025","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0002","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1287\/isre.2020.0962","article-title":"Demand effects of the internet-of-things sales channel: evidence from automating the purchase process","volume":"32","author":"Adamopoulos","year":"2020","journal-title":"Inf. Syst. Res."},{"key":"10.1016\/j.cose.2026.104858_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.chb.2023.107702","article-title":"Examining the effect of regulatory factors on avoiding online blackmail threats on social media: a structural equation modeling approach","volume":"144","author":"AlGhanboosi","year":"2023","journal-title":"Comput Hum. Behav"},{"key":"10.1016\/j.cose.2026.104858_bib0004","first-page":"139","article-title":"Smart homes under siege: assessing the robustness of physical security against wireless network attacks","author":"Allen","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0005","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.cose.2019.05.001","article-title":"Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts","volume":"85","author":"Alomar","year":"2019","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0006","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/1525822X14526838","article-title":"Hidden populations, online purposive sampling, and external validity: taking off the blindfold","volume":"27","author":"Barratt","year":"2015","journal-title":"Field. Methods"},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0007","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1080\/10447318.2022.2124358","article-title":"Understanding coping intentions of fitness tracker users: an empirical investigation using fear appeals","volume":"40","author":"Baskaran","year":"2024","journal-title":"Int. J. Hum.\u2013Comput. Interact."},{"key":"10.1016\/j.cose.2026.104858_bib0008","series-title":"Communicating Artificial Intelligence (AI)","first-page":"41","article-title":"A bot and a smile: interpersonal impressions of chatbots and humans using emoji in computer-mediated communication","author":"Beattie","year":"2020"},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0009","doi-asserted-by":"crossref","first-page":"689","DOI":"10.2307\/25750701","article-title":"The other side of acceptance: studying the direct and indirect effects of emotions on information technology use","volume":"34","author":"Beaudry","year":"2010","journal-title":"MIS. Q."},{"issue":"6","key":"10.1016\/j.cose.2026.104858_bib0010","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1111\/isj.12243","article-title":"Mitigating the intrusive effects of smart home assistants by using anthropomorphic design features: a multimethod investigation","volume":"30","author":"Benlian","year":"2020","journal-title":"Inf. Syst. J."},{"key":"10.1016\/j.cose.2026.104858_bib0011","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.cose.2017.10.015","article-title":"Taxonomy of mobile users' security awareness","volume":"73","author":"Bitton","year":"2018","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0012","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1177\/00936502231177786","article-title":"How can we increase privacy protection behavior? A longitudinal experiment testing three intervention strategies","volume":"51","author":"Boerman","year":"2024","journal-title":"Communic Res"},{"issue":"7","key":"10.1016\/j.cose.2026.104858_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.respol.2023.104788","article-title":"Another pathway to complementarity: how users and intermediaries identify and create new combinations in innovation ecosystems","volume":"52","author":"Borner","year":"2023","journal-title":"Res. Policy."},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0014","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","article-title":"What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors","volume":"39","author":"Boss","year":"2015","journal-title":"MIS. Q."},{"key":"10.1016\/j.cose.2026.104858_bib0015","first-page":"95","article-title":"Refining the threat calculus of technology threat avoidance theory","volume":"45","author":"Boysen","year":"2019","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"10.1016\/j.cose.2026.104858_bib0016","series-title":"ECIS 2009 Proceedings","article-title":"Reconstructing the giant: on the importance of rigour in documenting the literature search process","author":"Brocke","year":"2009"},{"key":"10.1016\/j.cose.2026.104858_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103858","article-title":"Driving behaviour change with cybersecurity awareness","author":"Chaudhary","year":"2024","journal-title":"Comput. Secur."},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0018","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1109\/TEM.2018.2835461","article-title":"Wishful thinking and IT threat avoidance: an extension to the technology threat avoidance theory","volume":"66","author":"Chen","year":"2019","journal-title":"IEEe Trans. Eng. Manage"},{"key":"10.1016\/j.cose.2026.104858_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2024.103320","article-title":"Different dimensions of anthropomorphic design cues: how visual appearance and conversational style influence users\u2019 information disclosure tendency towards chatbots","volume":"190","author":"Chen","year":"2024","journal-title":"Int J Hum Comput Stud"},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0020","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/s11280-024-01276-1","article-title":"When large language models meet personalization: perspectives of challenges and opportunities","volume":"27","author":"Chen","year":"2024","journal-title":"World Wide Web."},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0021","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1108\/INTR-11-2019-0447","article-title":"Understanding automated conversational agent as a decision aid: matching agent's conversation with customer's shopping task","volume":"31","author":"Chen","year":"2021","journal-title":"Internet Res."},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0022","doi-asserted-by":"crossref","first-page":"1470","DOI":"10.1287\/isre.2021.1041","article-title":"Measuring product type and purchase uncertainty with online product ratings: a theoretical model and empirical application","volume":"32","author":"Chen","year":"2021","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0023","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1108\/ITP-10-2021-0764","article-title":"Would an AI chatbot persuade you: an empirical answer from the elaboration likelihood model","volume":"38","author":"Chen","year":"2025","journal-title":"Inf. Technol. People"},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0024","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1287\/isre.2021.1014","article-title":"Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model","volume":"32","author":"Chen","year":"2021","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0025","article-title":"Beyond adaptive security coping behaviors: theory and empirical evidence","volume":"59","author":"Chen","year":"2022","journal-title":"Inf. Manage"},{"issue":"6","key":"10.1016\/j.cose.2026.104858_bib0026","article-title":"Investigating perceived risks and benefits of information privacy disclosure in IT-enabled ride-sharing","volume":"58","author":"Cheng","year":"2021","journal-title":"Inf. Manage"},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0027","article-title":"How GoGet CarShare's product-service system is facilitating collaborative consumption","volume":"16","author":"Chian Tan","year":"2017","journal-title":"MIS Q. Exec."},{"issue":"6","key":"10.1016\/j.cose.2026.104858_bib0028","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1080\/10410236.2020.1864098","article-title":"When health organization answers the question: differential effects of dialogic messages in website and twitter through social presence and psychological distance","volume":"37","author":"Chung","year":"2022","journal-title":"Health Commun."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0029","first-page":"96","article-title":"On the design of and interaction with conversational agents: an organizing and assessing review of human-computer interaction research","volume":"23","author":"Diederich","year":"2022","journal-title":"J. Assoc. Inf. Syst."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0030","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s10796-024-10496-9","article-title":"A taxonomy of home automation: expert perspectives on the future of smarter homes","volume":"27","author":"FakhrHosseini","year":"2025","journal-title":"Inf. Syst. Front."},{"key":"10.1016\/j.cose.2026.104858_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103812","article-title":"Optimism amid risk: how non-IT employees\u2019 beliefs affect cybersecurity behavior","volume":"141","author":"Fatoki","year":"2024","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0032","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1037\/0022-3514.48.1.150","article-title":"If it changes it must be a process: study of emotion and coping during three stages of a college examination","volume":"48","author":"Folkman","year":"1985","journal-title":"J. Pers. Soc. Psychol."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0033","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"Fornell","year":"1981","journal-title":"J. Mark. Res."},{"key":"10.1016\/j.cose.2026.104858_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2020.102571","article-title":"Older adults' perspectives of smart home technology: are we developing the technology that older people want?","volume":"147","author":"Ghorayeb","year":"2021","journal-title":"Int J Hum Comput Stud"},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0035","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1287\/isre.1100.0343","article-title":"Research note\u2014The impact of external word-of-mouth sources on retailer sales of high-involvement products","volume":"23","author":"Gu","year":"2012","journal-title":"Inf. Syst. Res."},{"issue":"7","key":"10.1016\/j.cose.2026.104858_bib0036","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1080\/0144929X.2022.2054357","article-title":"How should my family assistant be?\u2019: initial perceptions about prospective and anticipated use of in-home virtual assistants in an emerging context","volume":"42","author":"G\u00fcnay","year":"2023","journal-title":"Behav Inf Technol"},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0037","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","article-title":"When to use and how to report the results of PLS-SEM","volume":"31","author":"Hair","year":"2019","journal-title":"Eur. Bus. Rev."},{"key":"10.1016\/j.cose.2026.104858_bib0038","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.jbusres.2019.11.069","article-title":"Assessing measurement model quality in PLS-SEM using confirmatory composite analysis","volume":"109","author":"Hair","year":"2020","journal-title":"J. Bus. Res."},{"key":"10.1016\/j.cose.2026.104858_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.chb.2022.107471","article-title":"An empirical study for blockchain-based information sharing systems in electronic health records: a mediation perspective","volume":"138","author":"Hajian","year":"2023","journal-title":"Comput Hum. Behav"},{"key":"10.1016\/j.cose.2026.104858_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102677","article-title":"Survey on smart homes: vulnerabilities, risks, and countermeasures","volume":"117","author":"Hammi","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0041","article-title":"Smart Home: market data & analysis","author":"Han","year":"2024","journal-title":"Statista"},{"key":"10.1016\/j.cose.2026.104858_bib0042","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101827","article-title":"Riskio: a serious game for cyber security awareness and education","volume":"95","author":"Hart","year":"2020","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2022.102788","article-title":"Understanding the user experience of customer service chatbots: an experimental study of chatbot interaction design","volume":"161","author":"Haugeland","year":"2022","journal-title":"Int J Hum Comput Stud"},{"key":"10.1016\/j.cose.2026.104858_bib0044","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.103067","article-title":"Penetration testing of connected households","volume":"126","author":"Heiding","year":"2023","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0045","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1111\/j.1365-2575.2012.00420.x","article-title":"Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service","volume":"24","author":"Herath","year":"2012","journal-title":"Inf. Syst. J."},{"key":"10.1016\/j.cose.2026.104858_bib0046","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.102132","article-title":"Investigating the effect of security and privacy on IoT device purchase behaviour","volume":"102","author":"Ho-Sam-Sooi","year":"2021","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0047","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.future.2015.09.003","article-title":"A risk analysis of a smart home automation system","volume":"56","author":"Jacobsson","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0048","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1111\/isj.12317","article-title":"Eyes wide open: the role of situational information security awareness for security-related behaviour","volume":"31","author":"Jaeger","year":"2021","journal-title":"Inf. Syst. J."},{"key":"10.1016\/j.cose.2026.104858_bib0049","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.cose.2014.03.003","article-title":"An exploratory investigation of message-person congruence in information security awareness campaigns","volume":"43","author":"Kajzer","year":"2014","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2019.101571","article-title":"How perceived security risk affects intention to use smart home devices: a reasoned action explanation","volume":"87","author":"Klobas","year":"2019","journal-title":"Comput. Secur."},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0051","first-page":"1","article-title":"Common method bias in PLS-SEM: a full collinearity assessment approach","volume":"11","author":"Kock","year":"2015","journal-title":"Int. J. e-Collab. (ijec)"},{"key":"10.1016\/j.cose.2026.104858_bib0052","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2023.103138","article-title":"It becomes more of an abstract idea, this privacy\u201d\u2014Informing the design for communal privacy experiences in smart homes","volume":"180","author":"Kraemer","year":"2023","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"8","key":"10.1016\/j.cose.2026.104858_bib0053","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.cose.2010.08.001","article-title":"Cyber security for home users: a new way of protection through awareness enforcement","volume":"29","author":"Kritzinger","year":"2010","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0054","author":"Lazarus","year":"1966","journal-title":"Psychol. stress coping process"},{"key":"10.1016\/j.cose.2026.104858_bib0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102832","article-title":"Investigating perceptions about risk of data breaches in financial institutions: a routine activity-approach","volume":"121","author":"Lee","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0056","doi-asserted-by":"crossref","DOI":"10.1016\/j.dss.2025.114420","article-title":"Understanding physicians' noncompliance use of AI-aided diagnosis\u2014A mixed-methods approach","author":"Li","year":"2025","journal-title":"Decis. Support. Syst."},{"key":"10.1016\/j.cose.2026.104858_bib0057","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103156","article-title":"I will only know after using it: the repeat purchasers of smart home appliances and the privacy paradox problem","volume":"128","author":"Li","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0058","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2025.104500","article-title":"The Security Awareness Adventure: a serious game for security awareness training utilizing a state transition system and a probabilistic model","author":"Li","year":"2025","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0059","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1080\/07421222.2022.2063549","article-title":"Assessing and enhancing adversarial robustness of predictive analytics: an empirically tested design framework","volume":"39","author":"Li","year":"2022","journal-title":"J. Manage Inf. Syst."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0060","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","article-title":"Avoidance of information technology threats: a theoretical perspective","volume":"33","author":"Liang","year":"2009","journal-title":"MIS. Q."},{"issue":"07","key":"10.1016\/j.cose.2026.104858_bib0061","first-page":"394","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","author":"Liang","year":"2010","journal-title":"J. Assoc. Inf. Syst."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0062","doi-asserted-by":"crossref","first-page":"373","DOI":"10.25300\/MISQ\/2019\/14360","article-title":"What users do besides problem-focused coping when facing IT security threats: an emotion-focused coping perspective","volume":"43","author":"Liang","year":"2019","journal-title":"MIS. Q."},{"issue":"9","key":"10.1016\/j.cose.2026.104858_bib0063","doi-asserted-by":"crossref","first-page":"1766","DOI":"10.1080\/0144929X.2024.2374889","article-title":"Building trust in remote attestation through transparency\u2013a qualitative user study on observable attestation","volume":"44","author":"Linsner","year":"2025","journal-title":"Behav Inf Technol"},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0064","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.jsis.2016.06.002","article-title":"Cargo Cult\u201d science in traditional organization and information systems survey research: a case for using nontraditional methods of data collection, including Mechanical Turk and online panels","volume":"25","author":"Lowry","year":"2016","journal-title":"J. Strateg. Inf. Syst."},{"issue":"6","key":"10.1016\/j.cose.2026.104858_bib0065","first-page":"937","article-title":"Frontiers: machines vs. humans: the impact of artificial intelligence chatbot disclosure on customer purchases","volume":"38","author":"Luo","year":"2019","journal-title":"Mark. Sci."},{"issue":"5","key":"10.1016\/j.cose.2026.104858_bib0066","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1080\/0960085X.2019.1614739","article-title":"Technostress and the hierarchical levels of personality: a two-wave study with multiple data samples","volume":"28","author":"Maier","year":"2019","journal-title":"Eur. J. Inf. Syst."},{"key":"10.1016\/j.cose.2026.104858_bib0067","article-title":"Cross-sectional research: a critical perspective, use cases, and recommendations for IS research","volume":"70","author":"Maier","year":"2023","journal-title":"Int. J. Inf. Manage"},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0068","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1108\/ITP-07-2019-0357","article-title":"Unlocking the smart home: exploring key factors affecting the smart lock adoption intention","volume":"34","author":"Mamonov","year":"2021","journal-title":"Inf. Technol. People"},{"key":"10.1016\/j.cose.2026.104858_bib0069","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102526","article-title":"Information security policy non-compliance: can capitulation theory explain user behaviors?","volume":"112","author":"McLeod","year":"2022","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0070","first-page":"1","article-title":"Purposive sampling: a review and guidelines for quantitative research","volume":"9","author":"Memon","year":"2025","journal-title":"J. Appl. Struct. Equ. Model."},{"issue":"5","key":"10.1016\/j.cose.2026.104858_bib0071","first-page":"545","article-title":"Animated conversational agents and e-consumer productivity: the roles of agents and individual characteristics","volume":"54","author":"Mimoun","year":"2017","journal-title":"Inf. Manage"},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0072","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1080\/07421222.2022.2127449","article-title":"Approaching IT security & avoiding threats in the smart home context","volume":"39","author":"Nehme","year":"2022","journal-title":"J. Manage Inf. Syst."},{"issue":"8","key":"10.1016\/j.cose.2026.104858_bib0073","article-title":"Appropriation of accounting information system use under the new IFRS: impacts on accounting process performance","volume":"58","author":"Nguyen","year":"2021","journal-title":"Inf. Manage"},{"key":"10.1016\/j.cose.2026.104858_bib0074","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104276","article-title":"Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis","volume":"150","author":"Oroni","year":"2025","journal-title":"Comput. Secur."},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0075","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1515\/jhsem-2014-0035","article-title":"From weakest link to security hero: transforming staff security behavior","volume":"11","author":"Pfleeger","year":"2014","journal-title":"J. Homel. Secur. Emerg. Manage"},{"key":"10.1016\/j.cose.2026.104858_bib0076","doi-asserted-by":"crossref","DOI":"10.1016\/j.chb.2022.107551","article-title":"There's No place like home: understanding users' intentions toward securing internet-of-things (IoT) smart home networks","volume":"139","author":"Philip","year":"2023","journal-title":"Comput Hum. Behav"},{"key":"10.1016\/j.cose.2026.104858_bib0077","article-title":"Defence against the dark artefacts: smart home cybercrimes and cybersecurity standards","volume":"42","author":"Piasecki","year":"2021","journal-title":"Comput. Law Secur. Rev."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0078","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1146\/annurev-orgpsych-110721-040030","article-title":"Common method bias: it's bad, it's complex, it's widespread, and it's not easy to fix","volume":"11","author":"Podsakoff","year":"2024","journal-title":"Annu. Rev. Organ. Psychol. Organ. Behav."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0079","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/0144929X.2024.2314255","article-title":"Understanding security behaviour among healthcare professionals by comparing results from technology threat avoidance theory and protection motivation theory","volume":"44","author":"Raj Sreenath","year":"2025","journal-title":"Behav Inf Technol"},{"issue":"19","key":"10.1016\/j.cose.2026.104858_bib0080","doi-asserted-by":"crossref","first-page":"6027","DOI":"10.1080\/10447318.2023.2247596","article-title":"How do people ascribe humanness to chatbots? An analysis of real-world human-agent interactions and a theoretical model of humanness","volume":"40","author":"Rapp","year":"2024","journal-title":"Int. J. Hum.\u2013Comput. Interact."},{"key":"10.1016\/j.cose.2026.104858_bib0081","article-title":"SmartPLS 4","author":"Ringle","year":"2022","journal-title":"SmartPLS GmbH"},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0082","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change1","volume":"91","author":"Rogers","year":"1975","journal-title":"J. Psychol."},{"key":"10.1016\/j.cose.2026.104858_bib0083","doi-asserted-by":"crossref","first-page":"224","DOI":"10.2307\/2392563","article-title":"A social information processing approach to job attitudes and task design","author":"Salancik","year":"1978","journal-title":"Adm. Sci. Q."},{"key":"10.1016\/j.cose.2026.104858_bib0084","doi-asserted-by":"crossref","DOI":"10.1016\/j.dss.2023.114132","article-title":"How do system and user characteristics, along with anthropomorphism, impact cognitive absorption of chatbots\u2013Introducing SUCCAST through a mixed methods study","volume":"178","author":"Sarraf","year":"2024","journal-title":"Decis. Support. Syst."},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0085","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ausmj.2019.05.003","article-title":"How to specify, estimate, and validate higher-order constructs in PLS-SEM","volume":"27","author":"Sarstedt","year":"2019","journal-title":"Australas. Mark. J."},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0086","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1287\/isre.2021.1015","article-title":"Estimating the impact of \u201chumanizing\u201d customer service chatbots","volume":"32","author":"Schanke","year":"2021","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0087","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1080\/07421222.2020.1790204","article-title":"The impact of chatbot conversational skill on engagement and perceived humanness","volume":"37","author":"Schuetzler","year":"2020","journal-title":"J. Manage Inf. Syst."},{"issue":"1","key":"10.1016\/j.cose.2026.104858_bib0088","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1093\/jcr\/ucx053","article-title":"MTurk character misrepresentation: assessment and solutions","volume":"44","author":"Sharpe Wessling","year":"2017","journal-title":"J. Consum. Res."},{"key":"10.1016\/j.cose.2026.104858_bib0089","first-page":"1","article-title":"Sociable robots or focused speakers? Transforming customer experience with communication style and embodiment type in smart home devices adoption","author":"Shi","year":"2025","journal-title":"Behav Inf Technol"},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0090","doi-asserted-by":"crossref","first-page":"779","DOI":"10.25300\/MISQ\/2018\/11914","article-title":"Social presence in virtual world collaboration","volume":"42","author":"Srivastava","year":"2018","journal-title":"MIS. Q."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0091","doi-asserted-by":"crossref","first-page":"355","DOI":"10.25300\/MISQ\/2014\/38.2.02","article-title":"Data collection in the digital age: innovative alternatives to student samples","volume":"38","author":"Steelman","year":"2014","journal-title":"MIS. Q."},{"key":"10.1016\/j.cose.2026.104858_bib0092","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104129","article-title":"Security awareness, decision style, knowledge, and phishing email detection: moderated mediation analyses","volume":"148","author":"Sturman","year":"2025","journal-title":"Comput. Secur."},{"issue":"CSCW1","key":"10.1016\/j.cose.2026.104858_bib0093","first-page":"1","article-title":"Unfulfilled promises of child safety and privacy: portrayals and use of children in smart home marketing","volume":"8","author":"Sun","year":"2024","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"issue":"CSCW2","key":"10.1016\/j.cose.2026.104858_bib0094","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3479858","article-title":"Child safety in the smart home: parents' perceptions, needs, and mitigation strategies","volume":"5","author":"Sun","year":"2021","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"10.1016\/j.cose.2026.104858_bib0095","doi-asserted-by":"crossref","first-page":"865","DOI":"10.2307\/25148757","article-title":"Understanding the impact of web personalization on user information processing and decision outcomes","author":"Tam","year":"2006","journal-title":"MIS. Q."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0096","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1002\/jcpy.1198","article-title":"A review and conceptual framework for understanding personalized matching effects in persuasion","volume":"31","author":"Teeny","year":"2021","journal-title":"J. Consum. Psychol."},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0097","article-title":"Cultivating security culture for information security success: a mixed-methods study based on anthropological perspective","volume":"60","author":"Tejay","year":"2023","journal-title":"Inf. Manage"},{"key":"10.1016\/j.cose.2026.104858_bib0098","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s11747-019-00704-3","article-title":"Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing","volume":"48","author":"Thomaz","year":"2020","journal-title":"J. Acad. Mark. Sci."},{"key":"10.1016\/j.cose.2026.104858_bib0099","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103897","article-title":"No point worrying\"\u2013The role of threat devaluation in information security behavior","volume":"143","author":"Thompson","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104858_bib0100","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.cose.2017.09.001","article-title":"A survey on technical threat intelligence in the age of sophisticated cyber attacks","volume":"72","author":"Tounsi","year":"2018","journal-title":"Comput. Secur."},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0101","first-page":"460","article-title":"How chatbots' social presence communication enhances consumer engagement: the mediating role of parasocial interaction and dialogue","volume":"15","author":"Tsai","year":"2021","journal-title":"J. Res. Interact. Mark."},{"key":"10.1016\/j.cose.2026.104858_bib0102","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104112","article-title":"Doing cybersecurity at home: a human-centred approach for mitigating attacks in AI-enabled home devices","volume":"148","author":"Vasalou","year":"2025","journal-title":"Comput. Secur."},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0103","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1111\/jcc4.12066","article-title":"Virtual customer service agents: using social presence and personalization to shape online service encounters","volume":"19","author":"Verhagen","year":"2014","journal-title":"J. Comput.-Mediat. Commun."},{"key":"10.1016\/j.cose.2026.104858_bib0104","first-page":"391","article-title":"Social information processing theory","author":"Walther","year":"1992","journal-title":"Engag. theor. interpers. commun.: Mult. perspect."},{"issue":"4","key":"10.1016\/j.cose.2026.104858_bib0105","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1080\/07421222.2023.2267319","article-title":"Information Technology innovativeness and data-breach risk: a longitudinal study","volume":"40","author":"Wang","year":"2023","journal-title":"J. Manage Inf. Syst."},{"key":"10.1016\/j.cose.2026.104858_bib0106","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103429","article-title":"The mediating role of security anxiety in internet threat avoidance behavior","volume":"134","author":"Wang","year":"2023","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0107","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1080\/08934215.2014.971838","article-title":"Telepresence and exemplification in health messages: the relationships among spatial and social presence and exemplars and exemplification effects","volume":"28","author":"Westerman","year":"2015","journal-title":"Commun. Rep."},{"key":"10.1016\/j.cose.2026.104858_bib0108","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.jbusres.2022.08.012","article-title":"Interacting with chatbots: message type and consumers' control","volume":"153","author":"Whang","year":"2022","journal-title":"J. Bus. Res."},{"key":"10.1016\/j.cose.2026.104858_bib0109","unstructured":"World Economic Forum. (2025). Global Cybersecurity Outlook 2025."},{"key":"10.1016\/j.cose.2026.104858_bib0110","doi-asserted-by":"crossref","DOI":"10.1016\/j.chb.2023.107878","article-title":"How does anthropomorphism improve human-AI interaction satisfaction: a dual-path model","volume":"148","author":"Xie","year":"2023","journal-title":"Comput. Hum. Behav."},{"issue":"13","key":"10.1016\/j.cose.2026.104858_bib0111","doi-asserted-by":"crossref","first-page":"2835","DOI":"10.1080\/0144929X.2021.1954242","article-title":"Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats","volume":"41","author":"Xin","year":"2022","journal-title":"Behav. Inf. Technol."},{"key":"10.1016\/j.cose.2026.104858_bib0112","doi-asserted-by":"crossref","DOI":"10.1016\/j.techfore.2024.123322","article-title":"Aftermath on COVID-19 technological and socioeconomic changes: a meta-analytic review","volume":"202","author":"Yao","year":"2024","journal-title":"Technol. Forecast. Soc. Change"},{"issue":"3","key":"10.1016\/j.cose.2026.104858_bib0113","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1111\/isj.12417","article-title":"Employee responses to information security related stress: coping and violation intention","volume":"33","author":"Yazdanmehr","year":"2023","journal-title":"Inf. Syst. J."},{"key":"10.1016\/j.cose.2026.104858_bib0114","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103388","article-title":"Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring","volume":"133","author":"Zakariyya","year":"2023","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.cose.2026.104858_bib0115","article-title":"AIoT-enabled smart surveillance for personal data digitalization: contextual personalization-privacy paradox in smart home","volume":"60","author":"Zhang","year":"2023","journal-title":"Inf. Manage"},{"issue":"8","key":"10.1016\/j.cose.2026.104858_bib0116","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1108\/ITP-08-2023-0745","article-title":"When chatbots fail: exploring user coping following a chatbots-induced service failure","volume":"37","author":"Zhang","year":"2024","journal-title":"Inf. Technol. People"},{"key":"10.1016\/j.cose.2026.104858_bib0117","first-page":"1","article-title":"Evaluation on affordance of smart home products adopted by elderly people","author":"Zhu","year":"2025","journal-title":"Behav. Inf. Technol."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000349?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000349?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T14:19:47Z","timestamp":1774361987000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404826000349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":117,"alternative-id":["S0167404826000349"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2026.104858","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Impact of cybersecurity recommendations from smart home vendors\u2019 chatbots on user\u2019s cybersecurity coping process","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2026.104858","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104858"}}