{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:36:45Z","timestamp":1773859005713,"version":"3.50.1"},"reference-count":40,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1080\/01449290600879344","type":"journal-article","created":{"date-parts":[[2006,12,21]],"date-time":"2006-12-21T14:55:41Z","timestamp":1166712941000},"page":"445-454","source":"Crossref","is-referenced-by-count":125,"title":["Keeping our network safe: a model of online protection behaviour"],"prefix":"10.1080","volume":"27","author":[{"given":"Doohwang","family":"Lee","sequence":"first","affiliation":[{"name":"Michigan State University","place":["USA"]}]},{"given":"Robert","family":"Larose","sequence":"additional","affiliation":[{"name":"Michigan State University","place":["USA"]}]},{"given":"Nora","family":"Rifon","sequence":"additional","affiliation":[{"name":"Michigan State University","place":["USA"]}]}],"member":"301","published-online":{"date-parts":[[2008,9,9]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/10556699.1991.10616231"},{"key":"e_1_3_1_3_1","volume-title":"Understanding Attitudes and Predicting Social Behavior","author":"Ajzen I.","year":"1980","unstructured":"Ajzen , I. and Fishbein , M. 1980 . Understanding Attitudes and Predicting Social Behavior , Englewood Cliffs : Prentice-Hall ."},{"key":"e_1_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-7717.00067"},{"key":"e_1_3_1_5_1","first-page":"459","article-title":"Preventing nuclear war: beliefs and attitudes as predictors of disarmist and deterrentist behaviour","volume":"133","author":"Axelrod J. J.","year":"1991","unstructured":"Axelrod , J. J. and Newton , J. W. 1991 . Preventing nuclear war: beliefs and attitudes as predictors of disarmist and deterrentist behaviour . Journal of Applied Social Psychology , 133 : 459 \u2013 467 .","journal-title":"Journal of Applied Social Psychology"},{"key":"e_1_3_1_6_1","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","author":"Bandura A.","year":"1986","unstructured":"Bandura , A. 1986 . Social Foundations of Thought and Action: A Social Cognitive Theory , Englewood Cliffs : Prentice-Hall ."},{"key":"e_1_3_1_7_1","volume-title":"Self-Efficacy: The Exercise of Control","author":"Bandura A.","year":"1997","unstructured":"Bandura , A. 1997 . Self-Efficacy: The Exercise of Control , New York : W.H. Freeman and Company ."},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1989.8.3.304"},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0021189"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0021190"},{"key":"e_1_3_1_11_1","unstructured":"Federal Trade Commission . 2005 . FTC bars bogus anti-spyware claims . Available online at: http:\/\/www.ftc.gov\/opa\/2005\/03\/maxtheater.htm"},{"key":"e_1_3_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1995.14.1.61"},{"key":"e_1_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0060732"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1086\/209461"},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsr.2003.09.020"},{"key":"e_1_3_1_17_1","first-page":"34","article-title":"Virtual social distance and adoption of interactive telecommunication technologies","volume":"6","author":"LaRose R.","year":"1990","unstructured":"LaRose , R. and Bates , B. 1990 . Virtual social distance and adoption of interactive telecommunication technologies . Southwestern Mass Communication Journal , 6 : 34 \u2013 43 .","journal-title":"Southwestern Mass Communication Journal"},{"key":"e_1_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/00218499.1996.12466523"},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0021222"},{"key":"e_1_3_1_20_1","unstructured":"Leyden J. 2004 . Clueless office workers help spread computer viruses . Available online at: http:\/\/www.theregister.co.uk\/content\/55\/35393.html"},{"key":"e_1_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"e_1_3_1_22_1","unstructured":"MessageLabs . 2005 . Email threats . Available online at: http:\/\/www.messagelabs.co.uk\/emailthreats\/default.asp"},{"key":"e_1_3_1_23_1","doi-asserted-by":"publisher","DOI":"10.3109\/02770909409061314"},{"key":"e_1_3_1_24_1","unstructured":"National Cyber Security Alliance . 2004 . AOL\/NCSA online safety study . available online at: http:\/\/www.staysafeonline.info\/news\/safety_study_v04.pdf"},{"key":"e_1_3_1_25_1","unstructured":"Netratings . 2004 . Will broadband penetration peak at 75%? . Available online at: http:\/\/www.websiteoptimization.com\/bw\/0405\/"},{"key":"e_1_3_1_26_1","unstructured":"Pew Research Center . 2003 . Spam: How is it hurting email and degrading life on the Internet . Available online at: http:\/\/www.pewinternet.org\/reports\/toc.asp?Report=102 (accessed 28 October 2003)"},{"key":"e_1_3_1_27_1","volume-title":"The Media Equation: How People Treat Computers, Television, and New Media as Real People and Place","author":"Reeves B.","year":"1996","unstructured":"Reeves , B. and Nass , C. I. 1996 . The Media Equation: How People Treat Computers, Television, and New Media as Real People and Place , Cambridge, , UK : Cambridge University Press ."},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_1_29_1","first-page":"153","volume-title":"Social Psychophysiology","author":"Rogers R. W.","year":"1983","unstructured":"Rogers , R. W. 1983 . \u201c Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation \u201d . In Social Psychophysiology , 153 \u2013 176 . New York : Guilford Press ."},{"key":"e_1_3_1_30_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0029437"},{"key":"e_1_3_1_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1993.tb01094.x"},{"key":"e_1_3_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/004728759803700209"},{"key":"e_1_3_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224299105500304"},{"key":"e_1_3_1_34_1","volume-title":"The Second Self: Computers and Human Spirit","author":"Turkle S.","year":"1984","unstructured":"Turkle , S. 1984 . The Second Self: Computers and Human Spirit , NY : Simon & Schuster ."},{"key":"e_1_3_1_35_1","volume-title":"Life on the Screen: Identity in the Age of the Internet","author":"Turkle S.","year":"1995","unstructured":"Turkle , S. 1995 . Life on the Screen: Identity in the Age of the Internet , NY : Simon & Schuster ."},{"key":"e_1_3_1_36_1","unstructured":"Turow J. 2003 . Americans and online privacy . Available online at: http:\/\/www.appcpenn.org\/reports\/2003\/turow-privacy-no-cover.pdf"},{"key":"e_1_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.12.1.74"},{"key":"e_1_3_1_38_1","unstructured":"Websense . 2005 . Security Labs Resource Center . Available online at: http:\/\/www.websensesecuritylabs.com\/resource\/"},{"key":"e_1_3_1_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.39.5.806"},{"key":"e_1_3_1_40_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.3.5.431"},{"key":"e_1_3_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376276"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01449290600879344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T17:11:18Z","timestamp":1769706678000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01449290600879344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2008,9]]}},"alternative-id":["10.1080\/01449290600879344"],"URL":"https:\/\/doi.org\/10.1080\/01449290600879344","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9]]}}}