{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:03:43Z","timestamp":1774364623339,"version":"3.50.1"},"reference-count":84,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:00:00Z","timestamp":1772582400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.cose.2026.104872","type":"journal-article","created":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T08:45:28Z","timestamp":1772095528000},"page":"104872","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["\u201cNot all bad\u201d: Determinants and impacts of emotion-focused and problem-focused coping in information security behavior"],"prefix":"10.1016","volume":"165","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4272-1757","authenticated-orcid":false,"given":"Tanya","family":"McGill","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0783-1371","authenticated-orcid":false,"given":"Nik","family":"Thompson","sequence":"additional","affiliation":[]},{"given":"Nidhi","family":"Narula","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2026.104872_bib0001","series-title":"2016 IEEE Conference on Intelligence and Security Informatics (ISI)","first-page":"169","article-title":"Phishing susceptibility: the good, the bad, and the ugly","author":"Abbasi","year":"2016"},{"key":"10.1016\/j.cose.2026.104872_bib0002","doi-asserted-by":"crossref","unstructured":"Alrawhani, E.M., Binti, R.A., A, A.-S.M., & and Alkawsi, G. (2025). Integrating information security culture and protection motivation to enhance compliance with information security policies in banking: evidence from PLS-SEM and fsQCA. Int. J. Hum.\u2013Comput. Interact., 1\u201322. 10.1080\/10447318.2025.2464900.","DOI":"10.1080\/10447318.2025.2464900"},{"issue":"3","key":"10.1016\/j.cose.2026.104872_bib0003","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions","volume":"34","author":"Anderson","year":"2010","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2026.104872_bib0004","year":"2024","journal-title":"Phishing Act. Trends Rep.: 4th Quart. 2024"},{"key":"10.1016\/j.cose.2026.104872_bib0005","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1016\/j.chb.2012.12.018","article-title":"A game design framework for avoiding phishing attacks","volume":"29","author":"Arachchilage","year":"2013","journal-title":"Comput Hum. Behav"},{"key":"10.1016\/j.cose.2026.104872_bib0006","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.chb.2016.02.065","article-title":"Phishing threat avoidance behaviour: an empirical investigation","volume":"60","author":"Arachchilage","year":"2016","journal-title":"Comput Hum. Behav"},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0007","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1080\/02699930600562276","article-title":"Emotional approach and problem-focused coping: a comparison of potentially adaptive strategies","volume":"21","author":"Baker","year":"2007","journal-title":"Cogn. emot."},{"key":"10.1016\/j.cose.2026.104872_bib0008","series-title":"Self-efficacy: The exercise of Control","author":"Bandura","year":"1997"},{"key":"10.1016\/j.cose.2026.104872_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102278","article-title":"Maladaptive behaviour in response to email phishing threats: the roles of rewards and response costs","volume":"106","author":"Bax","year":"2021","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0010","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/0010-0277(94)90018-3","article-title":"Insensitivity to future consequences following damage to human prefrontal cortex","volume":"50","author":"Bechara","year":"1994","journal-title":"Cognition"},{"key":"10.1016\/j.cose.2026.104872_bib0011","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","article-title":"What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors","volume":"39","author":"Boss","year":"2015","journal-title":"MIS Q."},{"issue":"2","key":"10.1016\/j.cose.2026.104872_bib0012","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1037\/0022-3514.56.2.267","article-title":"Assessing coping strategies: a theoretically based approach","volume":"56","author":"Carver","year":"1989","journal-title":"J. Pers. Soc. Psychol."},{"issue":"4","key":"10.1016\/j.cose.2026.104872_bib0013","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1109\/TEM.2018.2835461","article-title":"Wishful thinking and IT threat avoidance: an extension to the technology threat avoidance theory","volume":"66","author":"Chen","year":"2019","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"2","key":"10.1016\/j.cose.2026.104872_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2021.103575","article-title":"Beyond adaptive security coping behaviors: theory and empirical evidence","volume":"59","author":"Chen","year":"2022","journal-title":"Inf. Manag."},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0015","doi-asserted-by":"crossref","first-page":"205","DOI":"10.25300\/MISQ\/2016\/40.1.09","article-title":"Individuals' Internet security perceptions and behaviors: polycontextual contrasts between the United States and China","volume":"40","author":"Chen","year":"2016","journal-title":"MIS Q."},{"issue":"4","key":"10.1016\/j.cose.2026.104872_bib0016","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1111\/j.1467-6494.2005.00331.x","article-title":"Cognitive processes underlying coping flexibility: differentiation and integration","volume":"73","author":"Cheng","year":"2005","journal-title":"J. Pers."},{"key":"10.1016\/j.cose.2026.104872_bib0017","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1080\/10580530.2018.1553647","article-title":"Adaptive and maladaptive coping with an IT threat","volume":"36","author":"Chenoweth","year":"2019","journal-title":"Inf. Syst. Manag."},{"key":"10.1016\/j.cose.2026.104872_bib0018","series-title":"42nd Hawaii International Conference on System Sciences","article-title":"Application of protection Motivation Theory to adoption of protective technologies","author":"Chenoweth","year":"2009"},{"key":"10.1016\/j.cose.2026.104872_bib0019","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3412367","article-title":"Privacy risks, emotions, and social media","volume":"27","author":"Cho","year":"2020","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"issue":"4","key":"10.1016\/j.cose.2026.104872_bib0020","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1016\/0191-8869(93)90146-T","article-title":"A comparison of three cognitive appraisal strategies: the role of threat devaluation in problem-focussed coping","volume":"14","author":"Davey","year":"1993","journal-title":"Pers. Individ. Dif."},{"issue":"3","key":"10.1016\/j.cose.2026.104872_bib0021","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/s11031-022-09927-4","article-title":"Positive cognitive reappraisal is beneficial for women\u2019s but not for men\u2019s IGT decision-making","volume":"46","author":"Flores-Torres","year":"2022","journal-title":"Motiv. Emot."},{"key":"10.1016\/j.cose.2026.104872_bib0022","series-title":"Ways of Coping Questionnaire, Sampler set, Manual, Test Booklet, Scoring Key","author":"Folkman","year":"1988"},{"issue":"3","key":"10.1016\/j.cose.2026.104872_bib0023","doi-asserted-by":"crossref","first-page":"219","DOI":"10.2307\/2136617","article-title":"An analysis of coping in a middle-aged community sample","volume":"21","author":"Folkman","year":"1980","journal-title":"J. Health Soc. Behav."},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0024","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1037\/0022-3514.48.1.150","article-title":"If it changes it must be a process: a study of emotion and coping during three stages of a college examination","volume":"48","author":"Folkman","year":"1985","journal-title":"J. Pers. Soc. Psychol."},{"issue":"5","key":"10.1016\/j.cose.2026.104872_bib0025","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1037\/0022-3514.50.5.992","article-title":"Dynamics of a stressful encounter: cognitive appraisal, coping, and encounter outcomes","volume":"50","author":"Folkman","year":"1986","journal-title":"J. Pers. Soc. Psychol."},{"issue":"2","key":"10.1016\/j.cose.2026.104872_bib0026","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1037\/0882-7974.2.2.171","article-title":"Age differences in stress and coping processes","volume":"2","author":"Folkman","year":"1987","journal-title":"Psychol. Aging"},{"issue":"6","key":"10.1016\/j.cose.2026.104872_bib0027","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1037\/0003-066X.55.6.647","article-title":"Positive affect and the other side of coping","volume":"55","author":"Folkman","year":"2000","journal-title":"Am. psychol."},{"key":"10.1016\/j.cose.2026.104872_bib0028","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1146\/annurev.psych.55.090902.141456","article-title":"Coping: pitfalls and promise","volume":"55","author":"Folkman","year":"2004","journal-title":"Annu. Rev. Psychol."},{"key":"10.1016\/j.cose.2026.104872_bib0029","doi-asserted-by":"crossref","DOI":"10.3389\/fpsyg.2020.00841","article-title":"Coping strategies and self-efficacy in university students: a person-centered approach","volume":"11","author":"Freire","year":"2020","journal-title":"Front. Psychol."},{"key":"10.1016\/j.cose.2026.104872_bib0030","first-page":"117","article-title":"Instincts and their vicissitudes","volume":"14","author":"Freud","year":"1915"},{"issue":"4","key":"10.1016\/j.cose.2026.104872_bib0031","doi-asserted-by":"crossref","first-page":"177","DOI":"10.17711\/SM.0185-3325.2021.023","article-title":"Positive reappraisal as a stress coping strategy during the COVID-19 pandemic","volume":"44","author":"Garza Varela","year":"2021","journal-title":"Salud ment."},{"key":"10.1016\/j.cose.2026.104872_bib0032","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.cose.2017.11.015","article-title":"Correlating human traits and cyber security behavior intentions","volume":"73","author":"Gratian","year":"2018","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.cose.2026.104872_bib0033","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/3462766.3462770","article-title":"Protection motivation theory in information systems security research: a review of the past and a road map for the future","volume":"52","author":"Haag","year":"2021","journal-title":"ACM SIGMIS Database: DATABASE Adv. Inf. Syst."},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0034","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","article-title":"When to use and how to report the results of PLS-SEM","volume":"31","author":"Hair","year":"2019","journal-title":"Eur. Bus. Rev."},{"key":"10.1016\/j.cose.2026.104872_bib0035","series-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair","year":"2017"},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0036","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1037\/h0087069","article-title":"Parental affect and coping","volume":"31","author":"Hakim-Larson","year":"1999","journal-title":"Can. J. Behav. Sci."},{"key":"10.1016\/j.cose.2026.104872_bib0037","series-title":"ECIS 2020 Research Papers","article-title":"Information security behaviour: a critical review and research directions","author":"Hassandoust","year":"2020"},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0038","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/S0304-3959(98)00078-5","article-title":"Pain coping strategies predict perceived control over pain","volume":"77","author":"Haythornthwaite","year":"1998","journal-title":"Pain."},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0039","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","article-title":"A new criterion for assessing discriminant validity in variance-based structural equation modeling","volume":"43","author":"Henseler","year":"2015","journal-title":"J. Acad. Mark. Sci."},{"key":"10.1016\/j.cose.2026.104872_bib84","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1146\/annurev-orgpsych-032117-104640","article-title":"Conservation of resources in the organizational context: The reality of resources and their consequences","volume":"5","author":"Hobfoll","year":"2018","journal-title":"Annu. Rev. Organ. Psychol. Organ. Behav."},{"issue":"2","key":"10.1016\/j.cose.2026.104872_bib0040","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1017\/S0140525X13000290","article-title":"The selfish goal: autonomously operating motivational structures as the proximate cause of human judgment and behavior","volume":"37","author":"Huang","year":"2014","journal-title":"Behav. Brain Sci."},{"issue":"10","key":"10.1016\/j.cose.2026.104872_bib0041","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","article-title":"Social phishing","volume":"50","author":"Jagatic","year":"2007","journal-title":"Commun ACM"},{"issue":"3","key":"10.1016\/j.cose.2026.104872_bib0042","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1108\/ICS-03-2018-0038","article-title":"Persuading end users to act cautiously online: a fear appeals study on phishing","volume":"26","author":"Jansen","year":"2018","journal-title":"Inf. Comput. Secur."},{"key":"10.1016\/j.cose.2026.104872_bib0043","series-title":"Psychological Stress and the Coping Process","author":"Lazarus","year":"1966"},{"key":"10.1016\/j.cose.2026.104872_bib0044","series-title":"Stress, appraisal, and Coping","author":"Lazarus","year":"1984"},{"key":"10.1016\/j.cose.2026.104872_bib0045","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/S0065-2601(08)60091-X","article-title":"Findings and theory in the study of fear communications","volume":"5","author":"Leventhal","year":"1970","journal-title":"Adv. Exp. Soc. Psychol."},{"issue":"6","key":"10.1016\/j.cose.2026.104872_bib0046","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.2105\/AJPH.61.6.1208","article-title":"Fear appeals and persuasion: the differentiation of a motivational construct","volume":"61","author":"Leventhal","year":"1971","journal-title":"Am. J. Public Health"},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0047","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","article-title":"Avoidance of information technology threats: a theoretical perspective","volume":"33","author":"Liang","year":"2009","journal-title":"MIS Q."},{"issue":"2","key":"10.1016\/j.cose.2026.104872_bib0048","doi-asserted-by":"crossref","first-page":"373","DOI":"10.25300\/MISQ\/2019\/14360","article-title":"What users do besides problem-focused coping when facing IT security threats: an emotion-focused coping perspective","volume":"43","author":"Liang","year":"2019","journal-title":"MIS Q."},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0049","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1037\/0021-9010.86.1.114","article-title":"Accounting for common method variance in cross-sectional research designs","volume":"86","author":"Lindell","year":"2001","journal-title":"J. appl. psychol."},{"issue":"3","key":"10.1016\/j.cose.2026.104872_bib0050","doi-asserted-by":"crossref","first-page":"170","DOI":"10.17705\/1thci.00032","article-title":"Social networking websites and posting personal information: an evaluation of protection Motivation theory","volume":"3","author":"Marett","year":"2011","journal-title":"AIS Trans. Hum.-Comput. Interact."},{"key":"10.1016\/j.cose.2026.104872_bib0051","series-title":"Proceedings of HICSS 2021","first-page":"6691","article-title":"The impact of threat and efficacy on information security behavior: applying an extended parallel process model to the fear of ransomware","author":"Masuch","year":"2021"},{"issue":"7","key":"10.1016\/j.cose.2026.104872_bib0052","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1016\/j.paid.2004.01.010","article-title":"Gender differences in stress and coping styles","volume":"37","author":"Matud","year":"2004","journal-title":"Pers. Individ. Dif."},{"issue":"3","key":"10.1016\/j.cose.2026.104872_bib0053","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/ICS-03-2018-0032","article-title":"The effect of resilience and job stress on information security awareness","volume":"26","author":"McCormac","year":"2018","journal-title":"Inf. Comput. Secur."},{"issue":"5","key":"10.1016\/j.cose.2026.104872_bib0054","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1108\/ICS-07-2020-0125","article-title":"Exploring potential gender differences in information security and privacy","volume":"29","author":"McGill","year":"2021","journal-title":"Inf. Comput. Secur."},{"key":"10.1016\/j.cose.2026.104872_bib0055","series-title":"Revised Health and Daily Living form Manual","author":"Moos","year":"1987"},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0056","first-page":"196","article-title":"A test of protection motivation theory in the information security literature: a meta-analytic structural equation modeling approach","volume":"23","author":"Mou","year":"2022","journal-title":"J. Assoc. Inf. Syst."},{"key":"10.1016\/j.cose.2026.104872_bib0057","first-page":"147","article-title":"Short-term and long-term effects of fear appeals in improving compliance with password guidelines","volume":"42","author":"Mwagwabi","year":"2018","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"6","key":"10.1016\/j.cose.2026.104872_bib0058","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1080\/13607863.2014.954528","article-title":"Positive reappraisal in older adults: a systematic literature review","volume":"19","author":"Nowlan","year":"2015","journal-title":"Aging Ment. Health"},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0059","doi-asserted-by":"crossref","first-page":"2","DOI":"10.2307\/2136319","article-title":"The structure of coping","volume":"19","author":"Pearlin","year":"1978","journal-title":"J. Health Soc. Behav."},{"issue":"5","key":"10.1016\/j.cose.2026.104872_bib0060","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","author":"Podsakoff","year":"2003","journal-title":"J. appl. psychol."},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0061","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1146\/annurev-psych-120710-100452","article-title":"Sources of method bias in social science research and recommendations on how to control it","volume":"63","author":"Podsakoff","year":"2012","journal-title":"Annu. Rev. Psychol."},{"key":"10.1016\/j.cose.2026.104872_bib0062","article-title":"SmartPLS 4","author":"Ringle","year":"2024","journal-title":"In SmartPLS"},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0063","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","author":"Rogers","year":"1975","journal-title":"J. Psychol."},{"key":"10.1016\/j.cose.2026.104872_bib0064","series-title":"Social psychophysiology: A source Book","first-page":"153","article-title":"Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation","author":"Rogers","year":"1983"},{"issue":"6","key":"10.1016\/j.cose.2026.104872_bib0065","doi-asserted-by":"crossref","first-page":"1257","DOI":"10.1037\/0022-3514.51.6.1257","article-title":"Coping with stress: divergent strategies of optimists and pessimists","volume":"51","author":"Scheier","year":"1986","journal-title":"J. Pers. Soc. Psychol."},{"issue":"6","key":"10.1016\/j.cose.2026.104872_bib0066","first-page":"539","article-title":"Employees\u2019 behavior in phishing attacks: what individual, organizational, and technological factors matter?","volume":"61","author":"Shahbaznezhad","year":"2020","journal-title":"J. Comput. Inf. Syst."},{"key":"10.1016\/j.cose.2026.104872_bib0067","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"372","article-title":"Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions","author":"Sheng","year":"2010"},{"key":"10.1016\/j.cose.2026.104872_bib0068","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1037\/0033-2909.129.2.216","article-title":"Searching for the structure of coping: a review and critique of category systems for classifying ways of coping","volume":"129","author":"Skinner","year":"2003","journal-title":"Psychol. Bull."},{"key":"10.1016\/j.cose.2026.104872_bib0069","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104110","article-title":"Towards a cybersecurity culture-behaviour framework: a rapid evidence review","volume":"148","author":"Sutton","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104872_bib0070","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103897","article-title":"No point worrying\" \u2013 The role of threat devaluation in information security behavior","volume":"143","author":"Thompson","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104872_bib0071","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.cose.2017.07.003","article-title":"Security begins at home\u201d: determinants of home computer and mobile device security behavior","volume":"70","author":"Thompson","year":"2017","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104872_bib0072","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/BF01173478","article-title":"The hierarchical factor structure of the Coping Strategies Inventory","volume":"13","author":"Tobin","year":"1989","journal-title":"Cogn. Ther Res"},{"issue":"4","key":"10.1016\/j.cose.2026.104872_bib0073","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1177\/1754073919862617","article-title":"Reappraising reappraisal","volume":"11","author":"Uusberg","year":"2019","journal-title":"Emot. Rev."},{"issue":"sup1","key":"10.1016\/j.cose.2026.104872_bib0074","doi-asserted-by":"crossref","first-page":"S104","DOI":"10.1080\/17437199.2011.606782","article-title":"Defensive reactions to health-promoting information: an overview and implications for future research","volume":"7","author":"van \u2018t Riet","year":"2013","journal-title":"Health Psychol. Rev."},{"key":"10.1016\/j.cose.2026.104872_bib0075","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.chb.2019.07.034","article-title":"If you know what to do, will you take action to avoid mobile phishing attacks\u201d: self-efficacy, anticipated regret, and gender","volume":"101","author":"Verkijika","year":"2019","journal-title":"Comput Hum. Behav"},{"issue":"11","key":"10.1016\/j.cose.2026.104872_bib0076","article-title":"Overconfidence in phishing email detection","volume":"17","author":"Wang","year":"2016","journal-title":"J. Assoc. Inf. Syst."},{"issue":"2","key":"10.1016\/j.cose.2026.104872_bib0077","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1287\/isre.2016.0680","article-title":"Coping responses in phishing detection: an investigation of antecedents and consequences","volume":"28","author":"Wang","year":"2017","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"10.1016\/j.cose.2026.104872_bib0078","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/cybsec\/tyaa001","article-title":"Developing a measure of information seeking about phishing","volume":"6","author":"Williams","year":"2020","journal-title":"J. Cybersecur."},{"issue":"4","key":"10.1016\/j.cose.2026.104872_bib0079","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1080\/03637759209376276","article-title":"Putting the fear back into fear appeals: the extended parallel process model","volume":"59","author":"Witte","year":"1992","journal-title":"Commun. Monogr."},{"issue":"2","key":"10.1016\/j.cose.2026.104872_bib0080","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1080\/03637759409376328","article-title":"Fear control and danger control: a test of the extended parallel process model (EPPM)","volume":"61","author":"Witte","year":"1994","journal-title":"Commun. Monogr."},{"key":"10.1016\/j.cose.2026.104872_bib0081","series-title":"Proceedings of the Twenty-Sixth International Conference on Information Systems","first-page":"367","article-title":"A protection motivation theory approach to home wireless security","author":"Woon","year":"2005"},{"key":"10.1016\/j.cose.2026.104872_bib0082","doi-asserted-by":"crossref","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","article-title":"Security lapses and the omission of information security measures: a threat control model and empirical test","volume":"24","author":"Workman","year":"2008","journal-title":"Comput Hum. Behav"},{"issue":"13","key":"10.1016\/j.cose.2026.104872_bib0083","doi-asserted-by":"crossref","first-page":"2835","DOI":"10.1080\/0144929X.2021.1954242","article-title":"Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats","volume":"41","author":"Xin","year":"2021","journal-title":"Behav Inf Technol"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000489?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000489?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T14:17:55Z","timestamp":1774361875000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404826000489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":84,"alternative-id":["S0167404826000489"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2026.104872","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"\u201cNot all bad\u201d: Determinants and impacts of emotion-focused and problem-focused coping in information security behavior","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2026.104872","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104872"}}