{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T05:56:29Z","timestamp":1770962189163,"version":"3.50.1"},"reference-count":92,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1080\/01449290802556021","type":"journal-article","created":{"date-parts":[[2009,1,29]],"date-time":"2009-01-29T13:57:05Z","timestamp":1233237425000},"page":"563-575","source":"Crossref","is-referenced-by-count":23,"title":["The amplification effects of procedural justice on a threat control model of information systems security behaviours"],"prefix":"10.1080","volume":"28","author":[{"given":"Michael","family":"Workman","sequence":"first","affiliation":[{"name":"Florida Institute of Technology, College of Business","place":["USA"]}]},{"given":"William H.","family":"Bommer","sequence":"additional","affiliation":[{"name":"Craig School of Business, California State University","place":["USA"]}]},{"given":"Detmar","family":"Straub","sequence":"additional","affiliation":[{"name":"J. Mack Robinson College of Business, Georgia State University","place":["USA"]}]}],"member":"301","published-online":{"date-parts":[[2009,10,22]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_1_3_1","first-page":"335","article-title":"Inequity in social exchange","volume":"62","author":"Adams J. S.","year":"1965","unstructured":"Adams , J. S. 1965 . Inequity in social exchange . Advanced Experimental Social Psychology , 62 : 335 \u2013 343 .","journal-title":"Advanced Experimental Social Psychology"},{"key":"e_1_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"e_1_3_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2002.tb00236.x"},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"e_1_3_1_7_1","first-page":"233","article-title":"Media rhetoric and public outrage: The antiphonal imperative","volume":"14","author":"Albright A. R.","year":"2007","unstructured":"Albright , A. R. 2007 . Media rhetoric and public outrage: The antiphonal imperative . Journal of Mass Media , 14 : 233 \u2013 252 .","journal-title":"Journal of Mass Media"},{"key":"e_1_3_1_8_1","volume-title":"Multiple Regression: A Primer","author":"Allison P.","year":"1999","unstructured":"Allison , P. 1999 . Multiple Regression: A Primer , NY : Pine Forge Press ."},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvb.2007.10.005"},{"key":"e_1_3_1_10_1","volume-title":"Developing management skills: What great managers know and do","author":"Baldwin T.","year":"2008","unstructured":"Baldwin , T. , Bommer , W. H. and Rubin , R. 2008 . Developing management skills: What great managers know and do , Boston, MA : McGraw-Hill\/Irwin ."},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"e_1_3_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90022-L"},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.52.1.1"},{"key":"e_1_3_1_14_1","volume-title":"Social learning and personality development","author":"Bandura A.","year":"1963","unstructured":"Bandura , A. and Walters , R. H. 1963 . Social learning and personality development , New York : Holt, Rinehart & . Winston"},{"key":"e_1_3_1_15_1","first-page":"95","volume-title":"Predicting health behavior: research and practice with social cognition models","author":"Boer H.","year":"1996","unstructured":"Boer , H. and Seydel , E. 1996 . \u201c Protection motivation theory \u201d . In Predicting health behavior: research and practice with social cognition models , Edited by: Conner , M. and Norman , P. 95 \u2013 120 . Buckingham, , UK : Open University Press ."},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1995.tb01772.x"},{"key":"e_1_3_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440380111"},{"key":"e_1_3_1_18_1","first-page":"57","article-title":"People \u2013 Often the weakest link in security, but one of the best places to start","author":"Bresz F. P.","year":"2004","unstructured":"Bresz , F. P. 2004 . People \u2013 Often the weakest link in security, but one of the best places to start . Journal of Health Care Compliance , July\u2013August : 57 \u2013 60 .","journal-title":"Journal of Health Care Compliance"},{"key":"e_1_3_1_19_1","first-page":"11","article-title":"Collaboration for Successful Prisoner Reentry: The Role of Parole and the Courts","volume":"5","author":"Burke P. B.","year":"2001","unstructured":"Burke , P. B. 2001 . Collaboration for Successful Prisoner Reentry: The Role of Parole and the Courts . Corrections Management Quarterly , 5 : 11 \u2013 22 .","journal-title":"Corrections Management Quarterly"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:BUSI.0000032658.12032.4e"},{"key":"e_1_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1108\/09576050210447046"},{"key":"e_1_3_1_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"e_1_3_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.83.3.408"},{"key":"e_1_3_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220610707430"},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/30040624"},{"key":"e_1_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7535(02)00036-X"},{"key":"e_1_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.2006.00271.x"},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2003.17.2.71"},{"key":"e_1_3_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2006.10.004"},{"key":"e_1_3_1_30_1","first-page":"7","volume-title":"Sixth Workshop on the Economics of Information Security (WEIS 2007)","author":"Grossklags J.","unstructured":"Grossklags , J. and Acquisti , A. When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information . Sixth Workshop on the Economics of Information Security (WEIS 2007) . Pittsburgh, PA. pp. 7 \u2013 18 ."},{"key":"e_1_3_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-005-8604-6"},{"key":"e_1_3_1_32_1","doi-asserted-by":"publisher","DOI":"10.2307\/249656"},{"key":"e_1_3_1_33_1","first-page":"1","article-title":"The boss has new technology to spy on you","author":"Harvey C.","year":"1998","unstructured":"Harvey , C. 1998 . The boss has new technology to spy on you . Datamation , April : 1 \u2013 5 .","journal-title":"Datamation"},{"key":"e_1_3_1_34_1","first-page":"64","article-title":"Smart executives, dumb decisions","volume":"51","author":"Hochhauser M.","year":"2004","unstructured":"Hochhauser , M. 2004 . Smart executives, dumb decisions . Journal of Risk Management , 51 : 64 \u2013 73 .","journal-title":"Journal of Risk Management"},{"key":"e_1_3_1_35_1","volume-title":"Organizational behavior and management","author":"Ivancevich J. M.","year":"2008","unstructured":"Ivancevich , J. M. , Konopaske , R. and Matteson , M. T. 2008 . Organizational behavior and management , Boston, MA : McGraw-Hill\/Irwin ."},{"key":"e_1_3_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1983.tb00138.x"},{"key":"e_1_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/44797.13.5.20041101\/84907.5"},{"key":"e_1_3_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"e_1_3_1_39_1","first-page":"22","article-title":"Disruptive technologies and the evolution of the law","volume":"23","author":"Keck R.","year":"2005","unstructured":"Keck , R. 2005 . Disruptive technologies and the evolution of the law . Legal Briefs , 23 : 22 \u2013 49 .","journal-title":"Legal Briefs"},{"key":"e_1_3_1_40_1","first-page":"170","volume-title":"Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS)","author":"Kim Y.","unstructured":"Kim , Y. and Kim , D. J. A study of online transaction self-efficacy, consumer trust, and uncertainty reduction in electronic commerce transaction . Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS) . June . pp. 170 \u2013 183 . Honolulu, HI"},{"key":"e_1_3_1_41_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010715504824"},{"key":"e_1_3_1_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2005.00017.x"},{"key":"e_1_3_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2007.04.001"},{"key":"e_1_3_1_44_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780195069945.001.0001"},{"key":"e_1_3_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00007-5"},{"key":"e_1_3_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/089124167300200301"},{"key":"e_1_3_1_47_1","first-page":"17","volume-title":"Clueless office workers help spread computer viruses","author":"Leyden J.","year":"2004","unstructured":"Leyden , J. 2004 . Clueless office workers help spread computer viruses 17 \u2013 21 . The Register"},{"key":"e_1_3_1_48_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:BUSI.0000005745.63324.79"},{"key":"e_1_3_1_49_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvbe.2001.1793"},{"key":"e_1_3_1_50_1","volume-title":"The electronic communications privacy act: United States Code","author":"Losey R. C.","year":"1998","unstructured":"Losey , R. C. 1998 . The electronic communications privacy act: United States Code Orlando, FL Available from: http:\/\/floridalawfirm.com\/privacy.html. Accessed 10 December 2007, from The Information Law"},{"key":"e_1_3_1_51_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jibs.8400300"},{"key":"e_1_3_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/0092-6566(86)90129-7"},{"key":"e_1_3_1_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/257336"},{"key":"e_1_3_1_54_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080335"},{"key":"e_1_3_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0191-8869(96)00018-9"},{"key":"e_1_3_1_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"e_1_3_1_57_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0771(200004\/06)13:2<233::AID-BDM325>3.0.CO;2-U"},{"key":"e_1_3_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.206"},{"key":"e_1_3_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.004"},{"key":"e_1_3_1_60_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03195438"},{"key":"e_1_3_1_61_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327965pli0801_1"},{"key":"e_1_3_1_62_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.3.596"},{"key":"e_1_3_1_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/jts.2490100212"},{"key":"e_1_3_1_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_1_65_1","first-page":"153","volume-title":"Social psychophysiology","author":"Rogers R. W.","year":"1983","unstructured":"Rogers , R. W. 1983 . \u201c Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation \u201d . In Social psychophysiology , Edited by: Cacioppo , J. and Petty , R. 153 \u2013 176 . NY : Guilford Press ."},{"key":"e_1_3_1_66_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0092976"},{"key":"e_1_3_1_67_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926617"},{"key":"e_1_3_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.45"},{"key":"e_1_3_1_69_1","volume-title":"How to conduct your survey","author":"Salant P.","year":"1994","unstructured":"Salant , P. and Dillman , D. A. 1994 . How to conduct your survey , New York : Wiley ."},{"key":"e_1_3_1_70_1","volume-title":"The SANS security policy project","author":"SANS","year":"2005","unstructured":"SANS . 2005 . The SANS security policy project , Bethesda, MD : SANS ."},{"key":"e_1_3_1_71_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_1_72_1","doi-asserted-by":"publisher","DOI":"10.2307\/1192014"},{"key":"e_1_3_1_73_1","first-page":"1","article-title":"The office now a major place for identity theft","author":"Shreve M.","year":"2004","unstructured":"Shreve , M. 2004 . The office now a major place for identity theft . Crains , September : 1 \u2013 4 .","journal-title":"Crains"},{"key":"e_1_3_1_74_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00095"},{"key":"e_1_3_1_75_1","first-page":"1","article-title":"Factors influencing protection motivation and IS security policy compliance","author":"Siponen M. T.","year":"2006","unstructured":"Siponen , M. T. , Pahnila , S. and Mahmood , A. 2006 . Factors influencing protection motivation and IS security policy compliance . Innovations in Information Technology , November : 1 \u2013 5 .","journal-title":"Innovations in Information Technology"},{"key":"e_1_3_1_76_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1992.4279564"},{"key":"e_1_3_1_77_1","doi-asserted-by":"publisher","DOI":"10.2307\/249307"},{"key":"e_1_3_1_78_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_3_1_79_1","first-page":"33","article-title":"Deterring cheating by student programmers: a field experiment in computer security","volume":"5","author":"Straub D. W.","year":"1993","unstructured":"Straub , D. W. , Carlson , P. J. and Jones , E. H. 1993 . Deterring cheating by student programmers: a field experiment in computer security . Journal of Management Systems , 5 : 33 \u2013 48 .","journal-title":"Journal of Management Systems"},{"key":"e_1_3_1_80_1","volume-title":"Intermediate statistics: A modern approach","author":"Stevens J.","year":"1992","unstructured":"Stevens , J. 1992 . Intermediate statistics: A modern approach , Hillsdale, NJ : Erlbaum ."},{"key":"e_1_3_1_81_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.74.1.3"},{"key":"e_1_3_1_82_1","volume-title":"Using multivariate statistics","author":"Tabachnick B. G.","year":"1996","unstructured":"Tabachnick , B. G. and Fidell , L. S. 1996 . Using multivariate statistics , NY : Harper Collins ."},{"key":"e_1_3_1_83_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.2008.00105.x"},{"key":"e_1_3_1_84_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.14.6.738.24865"},{"key":"e_1_3_1_85_1","doi-asserted-by":"publisher","DOI":"10.1093\/epirev\/mxi002"},{"key":"e_1_3_1_86_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872679905201004"},{"key":"e_1_3_1_87_1","doi-asserted-by":"publisher","DOI":"10.1006\/jesp.1999.1389"},{"key":"e_1_3_1_88_1","volume-title":"Target risk","author":"Wilde G. J.S.","year":"2001","unstructured":"Wilde , G. J.S. 2001 . Target risk , Toronto : PDE Publications ."},{"key":"e_1_3_1_89_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.247"},{"key":"e_1_3_1_90_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20474"},{"key":"e_1_3_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"e_1_3_1_92_1","doi-asserted-by":"publisher","DOI":"10.1093\/jpepsy\/jsi001"},{"key":"e_1_3_1_93_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.2007.00087.x"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01449290802556021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T14:49:36Z","timestamp":1768920576000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01449290802556021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,22]]},"references-count":92,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,11]]}},"alternative-id":["10.1080\/01449290802556021"],"URL":"https:\/\/doi.org\/10.1080\/01449290802556021","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10,22]]}}}