{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T06:25:21Z","timestamp":1768458321741,"version":"3.49.0"},"reference-count":42,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2016,5,3]]},"DOI":"10.1080\/0144929x.2016.1160287","type":"journal-article","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T18:58:58Z","timestamp":1458586738000},"page":"368-379","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":18,"title":["Guarding against online threats: why entrepreneurs take protective measures"],"prefix":"10.1080","volume":"35","author":[{"given":"Jurjen","family":"Jansen","sequence":"first","affiliation":[]},{"given":"Sander","family":"Veenstra","sequence":"additional","affiliation":[]},{"given":"Renske","family":"Zuurveen","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Stol","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,3,21]]},"reference":[{"issue":"3","key":"CIT0001","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"Anderson C. L.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0002","volume-title":"Proceedings of the 11th Workshop on the Economics of Information Security","author":"Anderson Ross","year":"2012"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1028448"},{"key":"CIT0004","volume-title":"Achtergrondkenmerken en ontwikkelingen van zzp'ers in Nederland","author":"CBS (Statistics Netherlands)","year":"2014"},{"key":"CIT0005","first-page":"485","volume-title":"Proceedings of the 16th Americas Conference on Information Systems","author":"Chen Li-Chiou","year":"2010"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.004"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.023"},{"key":"CIT0009","first-page":"73","volume-title":"Proceedings of the 2nd Australian Information Security Management Conference","author":"Dimopoulos Vassilis","year":"2004"},{"key":"CIT0010","volume-title":"Victimisation in a Digitised Society: A Survey among Members of the Public Concerning e-Fraud, Hacking and Other High-Volume Crimes","author":"Domenie Miranda M. L.","year":"2013"},{"key":"CIT0011","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","author":"Fishbein Martin","year":"1975"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(08)70064-2"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1108\/09685220510614425"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-03-2013-0019"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1080\/01449290701679361"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"CIT0018","first-page":"120","volume-title":"Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance","author":"Jansen Jurjen","year":"2015"},{"issue":"3","key":"CIT0019","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"Johnston A. C.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.09.002"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.07.009"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1080\/01449290600879344"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"issue":"1","key":"CIT0024","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","volume":"33","author":"Liang H.","year":"2009","journal-title":"MIS Quarterly"},{"issue":"7","key":"CIT0025","doi-asserted-by":"crossref","first-page":"394","DOI":"10.17705\/1jais.00232","volume":"11","author":"Liang H.","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1177\/0266242604041314"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"CIT0028","volume-title":"SPSS Survival Manual: A Step by Step Guide to Data Analysis Using IBM SPSS","author":"Pallant Julie","year":"2013"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"issue":"4","key":"CIT0032","first-page":"205","volume":"8","author":"Sam H. K.","year":"2005","journal-title":"Journal of Educational Technology & Society"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1142\/S0218495812500148"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/07366980903132740"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.046"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1177\/0013164494054003028"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"CIT0038","volume-title":"Cybercrime onder bedrijven: Een onderzoek naar slachtofferschap van cybercrime onder het midden- en kleinbedrijf en zelfstandigen zonder personeel in Nederland","author":"Veenstra Sander","year":"2015"},{"issue":"3","key":"CIT0039","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"Venkatesh V.","year":"2003","journal-title":"MIS Quarterly"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1080\/108107396127988"},{"key":"CIT0041","volume-title":"Monitor criminaliteit bedrijfsleven 2010: Feiten en trends inzake aard en omvang van criminaliteit in het bedrijfsleven","author":"WODC (Research and Documentation Centre) and TNS NIPO","year":"2011"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1080\/01449290802556021"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2016.1160287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T16:37:19Z","timestamp":1567701439000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2016.1160287"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,21]]},"references-count":42,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2016,3,21]]},"published-print":{"date-parts":[[2016,5,3]]}},"alternative-id":["10.1080\/0144929X.2016.1160287"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2016.1160287","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}