{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T16:01:26Z","timestamp":1772985686490,"version":"3.50.1"},"reference-count":51,"publisher":"Informa UK Limited","issue":"10","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["04-30318"],"award-info":[{"award-number":["04-30318"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2015,10,3]]},"DOI":"10.1080\/0144929x.2015.1028448","type":"journal-article","created":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T17:57:21Z","timestamp":1428947841000},"page":"1022-1035","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":52,"title":["Determinants of online safety behaviour: towards an intervention strategy for college students"],"prefix":"10.1080","volume":"34","author":[{"given":"Jan","family":"Boehmer","sequence":"first","affiliation":[]},{"given":"Robert","family":"LaRose","sequence":"additional","affiliation":[]},{"given":"Nora","family":"Rifon","sequence":"additional","affiliation":[]},{"given":"Saleem","family":"Alhabash","sequence":"additional","affiliation":[]},{"given":"Shelia","family":"Cotten","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,4,13]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1080\/08870449808407420"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"issue":"3","key":"CIT0003","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"Anderson C. L.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0004","volume-title":"Self-efficacy: The Exercise of Control","author":"Bandura A","year":"1997"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2002.tb00820.x"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1086\/209158"},{"key":"CIT0007","unstructured":"Chenoweth, T., R. Minch, and T. Gattiker. 2009. \u201cApplication of Protection Motivation Theory to Adoption of Protective Technologies.\u201d 42nd Hawaii International Conference on System Sciences, HICSS'09, Honolulu, Hawaii, January 5\u20138."},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.023"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/s10865-012-9477-2"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910978112"},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"Herley, C. 2009. \u201cSo Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users.\u201d Proceedings of the 2009 workshop on new security paradigms, Oxford, September 8\u201311.","DOI":"10.1145\/1719030.1719050"},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"Howe, A. E., I. Ray, M. Roberts, M. Urbanska, and Z. Byrne. 2012. \u201cThe Psychology of Security for the Home Computer User.\u201d 2012 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, May 20\u201323.","DOI":"10.1109\/SP.2012.23"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076241"},{"issue":"3","key":"CIT0015","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"Johnston A. C.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.09.002"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1177\/1461444806069652"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00071.x"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/1325555.1325569"},{"key":"CIT0020","unstructured":"LaRose, R., N. Rifon, X. Liu, and D. Lee. 2005a. \u201cUnderstanding Online Safety Behavior: A Multivariate Model.\u201d Paper presented at the International Communication Association Conference, New York, NY, May 26\u201330."},{"key":"CIT0021","unstructured":"LaRose, R., N. Rifon, X. Liu, and D. Lee. 2005b. \u201cOnline Safety Strategies: A Content Analysis and Theoretical Assessment.\u201d Paper presented to the International Communication Association, Communication and Technology Division, New York, May 28."},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076243"},{"key":"CIT0023","unstructured":"Lee, D., and R. LaRose. 2004. \u201cKeeping Our Network Safe: A Model of Online Safety Behavior.\u201d Paper presented at the 2004 Annual Meeting of the Association for Education in Journalism and Mass Communication, Toronto, August 4\u20137."},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1080\/01449290600879344"},{"key":"CIT0024","doi-asserted-by":"crossref","unstructured":"LeFebvre, R. 2012. \u201cThe Human Element in Cyber Security: A Study on Student Motivation to Act.\u201d Proceedings of the 2012 Information Security Curriculum Development Conference, Kennesaw, GA, October 12\u201313.","DOI":"10.1145\/2390317.2390318"},{"key":"CIT0025","author":"Leyden J.","year":"2004","journal-title":"The Register"},{"issue":"7","key":"CIT0026","doi-asserted-by":"crossref","first-page":"394","DOI":"10.17705\/1jais.00232","volume":"11","author":"Liang H.","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.2307\/3172593"},{"issue":"3","key":"CIT0028","doi-asserted-by":"crossref","first-page":"170","DOI":"10.17705\/1thci.00032","volume":"3","author":"Marett K.","year":"2011","journal-title":"AIS Transactions on Human-Computer Interaction"},{"key":"CIT0051","unstructured":"McAfee. 2012. \u201cConsumer Alert: McAfee Finds One in Every Six Personal Computers Have Zero Protection\u201d. Accessed October 12, 2013. http:\/\/mcafee.com\/us\/about\/news\/2012\/q2\/20120530-01.aspxhttp:\/\/mcafee.com\/us\/about\/news\/2012\/q2\/20120530-01.aspx."},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01148.x"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"CIT0031","unstructured":"National Cyber Security Alliance. 2012. NCSA \/ McAfee Online Safety Survey. Accessed October 12, 2013. http:\/\/staysafeonline.org\/stay-safe-online\/resources\/http:\/\/staysafeonline.org\/stay-safe-online\/resources\/."},{"key":"CIT0032","unstructured":"National Cyber Security Alliance. 2013. Preparing Millenials to Lead in Cyberspace. Accessed April 21, 2014. http:\/\/staysafeonline.org\/ncsam\/resources\/."},{"issue":"4","key":"CIT0033","first-page":"443","volume":"4","author":"Ohanian R","year":"1989","journal-title":"Journal of Social Behavior and Personality"},{"key":"CIT0034","volume-title":"Born Digital: Understanding the First Generation of Digital Natives","author":"Palfrey J.","year":"2008"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4964-1"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1108\/10748120110424816"},{"key":"CIT0037","unstructured":"Rainie, L., S. Kiesler, R. Kang, and M. Madden. 2013. Anonymity, privacy, and security. Accessed April 27, 2014. http:\/\/www.pewinternet.org\/2013\/09\/05\/anonymity-privacy-and-security-online\/http:\/\/www.pewinternet.org\/2013\/09\/05\/anonymity-privacy-and-security-online\/."},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"CIT0039","unstructured":"Rifon, N., E. Quilliam, and R. LaRose. 2005. \u201cConsumer Perceptions of Online Safety.\u201d Paper presented at the 2005 Annual Meeting of the International Communication Association, New York, May 26\u201330."},{"key":"CIT0040","first-page":"153","volume-title":"Social Psychophysiology","author":"Rogers R. W.","year":"1983"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1988.tb00017.x"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1037\/a0033065"},{"key":"CIT0043","unstructured":"Shillair, S., J. Boehmer, S. R. Cotten, R. LaRose, and N. Rifon. 2014. \u201cCommunicating Online Safety: A Critical Content Analysis of Websites Providing Online Safety Information to Consumers Over Time.\u201d Paper presented to the International Communication Association, Seattle, WA, May\u00a025."},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.18"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076237"},{"key":"CIT0052","unstructured":"Wang, Ping An. 2013. \u201cAssessment of Cybersecurity Knowledge and Behavior: An Anti-phishing Scenario.\u201d Paper read at the eighth International Conference on Internet Monitoring and Protection (ICIMP 2013), Rome, Italy, June 23\u201328."},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1080\/03637759409376328"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076238"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2015.1028448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T07:09:39Z","timestamp":1566544179000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2015.1028448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,13]]},"references-count":51,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2015,5,8]]},"published-print":{"date-parts":[[2015,10,3]]}},"alternative-id":["10.1080\/0144929X.2015.1028448"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2015.1028448","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,13]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}