{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T18:24:04Z","timestamp":1778264644714,"version":"3.51.4"},"reference-count":45,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1080\/01449290701679361","type":"journal-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T08:09:23Z","timestamp":1226390963000},"page":"221-232","source":"Crossref","is-referenced-by-count":74,"title":["Perception of information security"],"prefix":"10.1080","volume":"29","author":[{"given":"Ding-Long","family":"Huang","sequence":"first","affiliation":[{"name":"Tsinghua University","place":["China"]}]},{"given":"Pei-Luen Patrick","family":"Rau","sequence":"additional","affiliation":[{"name":"Tsinghua University","place":["China"]}]},{"given":"Gavriel","family":"Salvendy","sequence":"additional","affiliation":[{"name":"Tsinghua University","place":["China"]},{"name":"School of Industrial Engineering, Purdue University","place":["USA"]}]}],"member":"301","published-online":{"date-parts":[[2008,11,11]]},"reference":[{"key":"e_1_3_1_2_1","unstructured":"Berinato S. 2005 . The Global State of Information Security 2005 . Available online at: http:\/\/www.csoonline.com\/read\/100105\/survey.html) (accessed 16 April 2006)"},{"key":"e_1_3_1_3_1","volume-title":"Informing Science and Information Technology Conference Pro","author":"Chai S.","unstructured":"Chai , S. , Bagchi-Sen , S. , Morrell , C. , Rao , H. R. and Upadhyaya , S. . Role of perceived importance of information security: an exploratory study of middle school children's information security behavior . Informing Science and Information Technology Conference Pro . 2006 , Greater Manchester, England."},{"key":"e_1_3_1_4_1","unstructured":"China Internet Network Information Center . 2006 . The statistics report of the development of Internet in China . Available online at: http:\/\/www.cnnic.net.cn\/index\/0E\/00\/11\/index.htm (accessed 17 April 2006)"},{"key":"e_1_3_1_5_1","first-page":"39","article-title":"Psychology, risk & safety: understanding how personality & perception can influence risk taking","volume":"48","author":"Cooper D.","year":"2003","unstructured":"Cooper , D. 2003 . Psychology, risk & safety: understanding how personality & perception can influence risk taking . Professional Safety , 48 : 39 \u2013 46 .","journal-title":"Professional Safety"},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0040-1625(83)90032-X"},{"key":"e_1_3_1_7_1","first-page":"359","volume-title":"Communication Yearbook","author":"Covello V. T.","year":"1992","unstructured":"Covello , V. T. 1992 . \u201c Risk communication: an emerging area of health communication research \u201d . In Communication Yearbook , 15th ed. , Edited by: Deetz , S. 359 \u2013 373 . Beverly Hills : Sage .","edition":"15"},{"key":"e_1_3_1_8_1","volume-title":"Risk assessment methods","author":"Covello V. T.","year":"1994","unstructured":"Covello , V. T. and Merkhofer , M. W. 1994 . Risk assessment methods , New York : Plenum ."},{"key":"e_1_3_1_9_1","volume-title":"Risk and culture","author":"Douglas M.","year":"1982","unstructured":"Douglas , M. and Wildavsky , A. 1982 . Risk and culture , Berkeley : University of California Press ."},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00111-3"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00143739"},{"key":"e_1_3_1_12_1","volume-title":"Proceedings of the 2002 WSEAS International Conference on Information Security (ICIS'02)","author":"Gonzalez J. J.","unstructured":"Gonzalez , J. J. and Sawicka , A. . A framework for human factors in information security . Proceedings of the 2002 WSEAS International Conference on Information Security (ICIS'02) . Rio de Janeiro."},{"key":"e_1_3_1_13_1","unstructured":"Gorden L. A. Loeb M. P. Lucyshyn W. and Richardson R. 2006 . 2006 CSI\/FBI computer crime and security survey . Available online at: http:\/\/www.gocsi.com (accessed 9 January 2007)"},{"key":"e_1_3_1_14_1","volume-title":"Human Factors and Information Security","author":"Hassel L.","year":"2004","unstructured":"Hassel , L. and Wiedenbeck , S. 2004 . Human Factors and Information Security DIMACS Workshop on Usable Privacy and Security Software, 7\u20138 July 2004, DIMACS Centre, CORE Building, Rutges University, Piscataway, NJ"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1993.tb00014.x"},{"key":"e_1_3_1_16_1","volume-title":"Trust and Crime in Information Societies","author":"Jackson J.","year":"2005","unstructured":"Jackson , J. , Allum , N. and Gaskell , G. 2005 . \u201c Perceptions of risk in cyberspace \u201d . In Trust and Crime in Information Societies , Edited by: Mansell , R. and Collins , B. S. Cheltenham : Edward Elgar . Available online at http:\/\/www\/lse.ac.uk\/collections\/methodologyInstitute\/pdf\/JonJackson\/perceptions%2007%20risk%20in%20cyberspace.pdf"},{"key":"e_1_3_1_17_1","doi-asserted-by":"publisher","DOI":"10.4018\/jebr.2005010105"},{"key":"e_1_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-4223(03)00025-5"},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1680\/cien.159.6.51"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1995.tb00754.x"},{"key":"e_1_3_1_21_1","unstructured":"Musekura J. B. and Ekh R. 2004 . \u201c Information security issues\u00a0\u2013\u00a0difference between perception and practice in organizations \u201d . Available online at: http:\/\/www.oru.se\/templates\/oruExtNormal____19402.aspx (accessed 6 January 2007). Department of Business Economics Statistics and Informatics Orebro University Sweden"},{"key":"e_1_3_1_22_1","volume-title":"National Training Standard for Information Systems Security (Infosec) Professionals","author":"NSTISSC","year":"1994","unstructured":"NSTISSC . 1994 . National Training Standard for Information Systems Security (Infosec) Professionals , National Security Telecommunications and Information Systems Security Committee ."},{"key":"e_1_3_1_23_1","volume-title":"Psychometric theory","author":"Nunnally J. C.","year":"1978","unstructured":"Nunnally , J. C. 1978 . Psychometric theory , New York : McGraw-Hill ."},{"key":"e_1_3_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662240410542652"},{"key":"e_1_3_1_25_1","volume-title":"Handbook of human factors and ergonomics","author":"Salvendy G.","year":"1997","unstructured":"Salvendy , G. 1997 . Handbook of human factors and ergonomics , New York : Wiley-Interscience ."},{"key":"e_1_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00712-X"},{"key":"e_1_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2005.00634.x"},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0272-4332.2005.00580.x"},{"key":"e_1_3_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.00001"},{"key":"e_1_3_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/1366987032000088847"},{"key":"e_1_3_1_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1991.tb00650.x"},{"key":"e_1_3_1_32_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.3563507"},{"key":"e_1_3_1_33_1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-1-4899-0445-4_9","volume-title":"Societal Risk Assessment\u00a0\u2013\u00a0How Safe is Safe Enough?","author":"Slovic P.","year":"1980","unstructured":"Slovic , P. , Fischhoff , B. and Lichtenstein , S. 1980 . \u201c Facts and fears\u00a0\u2013\u00a0understanding risk \u201d . In Societal Risk Assessment\u00a0\u2013\u00a0How Safe is Safe Enough? , Edited by: Schwing , R. C. and Albers , W. A. 181 \u2013 218 . New York : Plenum ."},{"key":"e_1_3_1_34_1","first-page":"261","article-title":"Young people's risk perception of nuclear power\u00a0\u2013\u00a0a European viewpoint","volume":"7","author":"Stainer A.","year":"1995","unstructured":"Stainer , A. and Stainer , L. 1995 . Young people's risk perception of nuclear power\u00a0\u2013\u00a0a European viewpoint . International Journal of Global Energy Issues , 7 : 261 \u2013 270 .","journal-title":"International Journal of Global Energy Issues"},{"key":"e_1_3_1_35_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.165.3899.1232"},{"key":"e_1_3_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.05.003"},{"key":"e_1_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044270"},{"key":"e_1_3_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.10.005"},{"key":"e_1_3_1_39_1","unstructured":"Turner D. Entwisle S. Fossi M. Blackbird J. McKinney D. Conneff T. and Whitehouse O. 2006 . \u201c Symantec Internet security threat report\u00a0\u2013\u00a0trends for January 06 to June 06 \u201d . Available online at: http:\/\/www.symantec.com (17 January 2007)"},{"key":"e_1_3_1_40_1","unstructured":"UNCTAD . 2005 . \u201c Information economy report (United Nations Conference on Trade and Development) \u201d . Available online at: http:\/\/www.unctad.org (accessed 17 April 2006)"},{"key":"e_1_3_1_41_1","first-page":"107","volume-title":"2nd Working Conference on Security and Control of Information Technology in Security","author":"Vyskoc J.","unstructured":"Vyskoc , J. and Fibikova , L. . IT users' perception of information security . 2nd Working Conference on Security and Control of Information Technology in Security . Bratislava, Slovakia. pp. 107 Bratislava : Comenius University ."},{"key":"e_1_3_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859675"},{"key":"e_1_3_1_43_1","volume-title":"Principles of information security","author":"Whitman M. E.","year":"2004","unstructured":"Whitman , M. E. and Mattford , H. J. 2004 . Principles of information security , Boston, MA : Thomson Learning ."},{"key":"e_1_3_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-4375(91)90015-N"},{"key":"e_1_3_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2004.11.003"},{"key":"e_1_3_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929042000320992"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01449290701679361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T00:03:45Z","timestamp":1770941025000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01449290701679361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,11]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["10.1080\/01449290701679361"],"URL":"https:\/\/doi.org\/10.1080\/01449290701679361","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,11]]}}}