{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:55:05Z","timestamp":1776830105450,"version":"3.51.2"},"reference-count":104,"publisher":"Informa UK Limited","issue":"5","funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2016M601315"],"award-info":[{"award-number":["2016M601315"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71421001,71431002"],"award-info":[{"award-number":["71421001,71431002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Ministry of Education of Humanities and Social Science project","award":["17YJC630072"],"award-info":[{"award-number":["17YJC630072"]}]},{"name":"Doctoral Scientific Research Foundation of Liaoning Province","award":["20170520435"],"award-info":[{"award-number":["20170520435"]}]},{"name":"Fundanmental Research Funds for the Central Universities","award":["DUT18RC(4)037"],"award-info":[{"award-number":["DUT18RC(4)037"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,5,4]]},"DOI":"10.1080\/0144929x.2018.1539519","type":"journal-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T08:19:27Z","timestamp":1540455567000},"page":"435-453","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":16,"title":["Keeping secure to the end: a long-term perspective to understand employees\u2019 consequence-delayed information security violation"],"prefix":"10.1080","volume":"38","author":[{"given":"Ying","family":"Li","sequence":"first","affiliation":[{"name":",","place":["P.R. People\u2019s Republic of China"]}]},{"given":"Nan","family":"Zhang","sequence":"additional","affiliation":[{"name":",","place":["P.R. People\u2019s Republic of China"]}]},{"given":"Mikko","family":"Siponen","sequence":"additional","affiliation":[{"name":",","place":["Finland"]}]}],"member":"301","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"e_1_3_3_2_1","volume-title":"Attitudes, Personality, and Behaviour","author":"Ajzen I.","year":"1988","unstructured":"Ajzen, I. 1988. Attitudes, Personality, and Behaviour. Buckingham: Open University Press."},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/2063565"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148803"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148828"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0265"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/0092070306286706"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lrp.2012.10.001"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2011.0761"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894486513508980"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"issue":"1","key":"e_1_3_3_13_1","first-page":"vii","article-title":"Issues and Opinion on Structural Equation Modeling","volume":"22","author":"Chin W. W.","year":"1998","unstructured":"Chin, W. W. 1998. \u201cIssues and Opinion on Structural Equation Modeling.\u201d MIS Quarterly 22 (1): vii\u2013xvi.","journal-title":"MIS Quarterly"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0123"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/104225879802200206"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/259223"},{"key":"e_1_3_3_19_1","volume-title":"Why We Do What We Do: The Dynamics of Personal Autonomy","author":"Deci E. L.","year":"1995","unstructured":"Deci, E. L., and R. Flaste. 1995. Why We Do What We Do: The Dynamics of Personal Autonomy. New\u00a0York: GP Putnam's Sons."},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.1991.9653137"},{"key":"e_1_3_3_21_1","unstructured":"Deloitte. 2013. \u201cBlurring the Lines: 2013 TMT global security study.\u201d Accessed March 22 2018. https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/global\/Documents\/Technology-Media-Telecommunications\/dttl_TMT_GlobalSecurityStudy_English_final_020113.pdf."},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2014.07.008"},{"key":"e_1_3_3_23_1","first-page":"165","volume-title":"Proceedings of the International Conference on the Learning Sciences","author":"Fischer G.","year":"1991","unstructured":"Fischer, G. 1991. \u201cSupporting Learning on Demand with Design Environments.\u201d In Proceedings of the International Conference on the Learning Sciences, vol. 199, edited by Lawrence Birnbaum, 165\u2013172. Charlottesville, VA: Association for the Advancement of Computing in Education."},{"key":"e_1_3_3_24_1","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","author":"Fishbein M.","year":"1975","unstructured":"Fishbein, M., and I. Ajzen. 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley."},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.08.004"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.2307\/3150980"},{"issue":"1","key":"e_1_3_3_27_1","first-page":"91","article-title":"A Practical Guide to Factorial Validity Using PLS-Graph: Tutorial and Annotated Example","volume":"16","author":"Gefen D.","year":"2005","unstructured":"Gefen, D., and D. Straub. 2005. \u201cA Practical Guide to Factorial Validity Using PLS-Graph: Tutorial and Annotated Example.\u201d Communications of the Association for Information Systems 16 (1): 91\u2013109.","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2012.00901.x"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.10.003"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMDA.2017.087624"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428114526928"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-09-2015-0382"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.Dss.2009.02.005"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2010.0363"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2011.11.002"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066x.52.12.1280"},{"key":"e_1_3_3_37_1","volume-title":"Cultures and Organizations. Intercultural Cooperation and Its Importance for Survival. Software of the Mind","author":"Hofstede G.","year":"1991","unstructured":"Hofstede, G. 1991. Cultures and Organizations. Intercultural Cooperation and Its Importance for Survival. Software of the Mind. London: Mc Iraw-Hill."},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.3.4.424"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2010.48463332"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.91.6.1307"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.47.1.593"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1207\/15324839951036498"},{"key":"e_1_3_3_45_1","volume-title":"Social Dilemmas","author":"Komorita S. S.","year":"1994","unstructured":"Komorita, S. S., and C. D. Parks. 1994. Social Dilemmas. Madison: Brown & Benchmark."},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6520.2011.00496.x"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1108\/02635570510633239"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0427"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/s1057-7408(07)70017-7"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.114"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/233977.233999"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6520.2011.00495.x"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/08985621003726218"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.4030130202"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0597"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(91)90032-2"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1993.1055"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1995.1047"},{"key":"e_1_3_3_59_1","volume-title":"Motivation and Personality","author":"Maslow A. H.","year":"1970","unstructured":"Maslow, A. H., R. Frager, J. Fadiman, C. McReynolds, and R. Cox. 1970. Motivation and Personality. New\u00a0York: Harper & Row."},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1975.tb00706.x"},{"key":"e_1_3_3_61_1","volume-title":"Managing for the Long Run: Lessons in Competitive Advantage from Great Family Businesses","author":"Miller D.","year":"2005","unstructured":"Miller, D., and I. Le Breton-Miller. 2005. Managing for the Long Run: Lessons in Competitive Advantage from Great Family Businesses. Boston: Business Press."},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.171"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894486513504434"},{"key":"e_1_3_3_64_1","volume-title":"Employee\u2014Organization Linkages: The Psychology of Commitment, Absenteeism, and Turnover","author":"Mowday R. T.","year":"2013","unstructured":"Mowday, R. T., L. W. Porter, and R. M. Steers. 2013. Employee\u2014Organization Linkages: The Psychology of Commitment, Absenteeism, and Turnover. New\u00a0York: Academic press."},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.2307\/3054102"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1111\/crim.2001.39.issue-4"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-004-5866-1"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-07-2015-0302"},{"key":"e_1_3_3_69_1","volume-title":"Psychometric Theory","author":"Nunnally J. C.","year":"1978","unstructured":"Nunnally, J. C. 1978. Psychometric Theory. New York: McGraw-Hill."},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.135.2.152"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.71.3.492"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148783"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148814"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_3_3_75_1","unstructured":"Ponemon. 2015. \u201c2014: A Year of Mega Breaches.\u201d Accessed March 22 2018. https:\/\/www.ponemon.org\/local\/upload\/file\/2014%20The%20Year%20of%20the%20Mega%20Breach%20FINAL3.pdf."},{"key":"e_1_3_3_76_1","unstructured":"Ponemon. 2018a. \u201c2018 Cost of Insider Threats Global Organizations.\u201d Accessed August 22 2018. https:\/\/www.observeit.com\/ponemon-report-cost-of-insider-threats\/."},{"key":"e_1_3_3_77_1","unstructured":"Ponemon. 2018b. \u201c2018 Cost of a Data Breach Study.\u201d Accessed August 22 2018. https:\/\/www.ibm.com\/security\/data-breach?cm_mc_uid=15296272607515349207711&cm_mc_sid_50200000=47261451534920771172&cm_mc_sid_52640000=41899621534920771174."},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250070602"},{"key":"e_1_3_3_79_1","first-page":"367","volume-title":"Taking Stock: The Status of Criminological Theory","author":"Pratt T. C.","year":"2006","unstructured":"Pratt, T. C., F. T. Cullen, K. R. Blevins, L. E. Daigle, and T. D. Madensen. 2006. \u201cThe Empirical Status of Deterrence Theory: A Meta-Analysis.\u201d In Taking Stock: The Status of Criminological Theory, vol.15, edited by Francis T. Cullen, John Paul Wright, and Kristie R. Blevins, 367\u2013396. New Brunswick, NJ: Transaction."},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.40.3.879"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428109332834"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.2307\/41410402"},{"key":"e_1_3_3_83_1","unstructured":"Ringle C. M. S. Wende and J.-M. Becker. 2015. SmartPLS 3. Boenningstedt: SmartPLS GmbH. http:\/\/www.smartpls.com."},{"issue":"2","key":"e_1_3_3_84_1","first-page":"529","article-title":"The Expected Utility Model: Its Variants, Purposes, Evidence and Limitations","volume":"20","author":"Schoemaker P.\u00a0J.\u00a0H.","year":"1982","unstructured":"Schoemaker, P.\u00a0J.\u00a0H. 1982. \u201cThe Expected Utility Model: Its Variants, Purposes, Evidence and Limitations.\u201d Journal of Economic Literature 20 (2): 529\u2013563.","journal-title":"Journal of Economic Literature"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-0377-2"},{"key":"e_1_3_3_86_1","volume-title":"Collins COBUILD English Dictionary for Advanced Learners","author":"Sinclair J.","year":"2003","unstructured":"Sinclair, J. 2003. Collins COBUILD English Dictionary for Advanced Learners. Glasgow: HarperCollins Publishers."},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750688"},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.59"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00093"},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1108\/01409171311292261"},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.66.4.742"},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJOPM-05-2015-0305"},{"key":"e_1_3_3_94_1","unstructured":"Takemura T. and A. Komatsu. 2012. \u201cWho Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness.\u201d Paper presented at the workshop on the economics of information security Berlin June 25\u201326."},{"key":"e_1_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.110.3.403"},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.04"},{"key":"e_1_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32827-8"},{"key":"e_1_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.012"},{"key":"e_1_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.1962"},{"key":"e_1_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2004070103"},{"key":"e_1_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650284"},{"key":"e_1_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428110366036"},{"key":"e_1_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1741-6248.2005.00028.x"},{"key":"e_1_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1086\/651257"},{"key":"e_1_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/s0191-8869(97)00113-x"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2018.1539519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T15:52:58Z","timestamp":1770393178000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2018.1539519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":104,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5,4]]}},"alternative-id":["10.1080\/0144929X.2018.1539519"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2018.1539519","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-03-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}