{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:20:24Z","timestamp":1761110424628,"version":"3.40.5"},"reference-count":44,"publisher":"Informa UK Limited","issue":"11","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,11,2]]},"DOI":"10.1080\/0144929x.2019.1569163","type":"journal-article","created":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T18:09:05Z","timestamp":1548094145000},"page":"1088-1106","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":11,"title":["Behavioural threshold analysis: methodological and practical considerations for applications in information security"],"prefix":"10.1080","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7360-3214","authenticated-orcid":false,"given":"Dirk","family":"Snyman","sequence":"first","affiliation":[{"name":"School of Computer Science and Information Systems, North-West University, Potchefstroom, South Africa"}]},{"given":"Hennie","family":"Kruger","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Systems, North-West University, Potchefstroom, South Africa"}]}],"member":"301","published-online":{"date-parts":[[2019,1,21]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"CIT0002","first-page":"1","volume-title":"Proceedings of the 18th Americas Conference on Information Systems (Paper 16)","author":"Al-Omari A.","year":"2012"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.10.006"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.4103\/1117-1936.173959"},{"issue":"1","key":"CIT0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4102\/sajim.v20i1.920","volume":"20","author":"Butler R.","year":"2018","journal-title":"South African Journal of Information Management"},{"key":"CIT0006","first-page":"33","volume-title":"Proceedings of the\u00a010th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)","author":"Connolly L.","year":"2016"},{"volume-title":"The Approval Motive","year":"1964","author":"Crowne D. P.","key":"CIT0007"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2017.1397193"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1177\/1356766715577503"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.002"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.10.001"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.04.005"},{"issue":"1","key":"CIT0013","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/S0065-2601(08)60318-4","volume":"23","author":"Fazio R. H.","year":"1990","journal-title":"Advances in Experimental Social Psychology"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1086\/209351"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1086\/226707"},{"volume-title":"I Will if You Will: Individual Thresholds and Group Behavior - Applications of Algebra to Group Behavior","year":"1983","author":"Growney J. S.","key":"CIT0016"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000043"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2013.6716723"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.02.008"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.601"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1108\/09685220710831107"},{"key":"CIT0025","first-page":"57","volume-title":"Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)","author":"Pattinson M. R.","year":"2015"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2016-0009"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1002\/ir.101"},{"volume-title":"Strengthening digital society against cyber shocks - Key findings from The Global State of Information Security Survey 2018","year":"2017","author":"PWC","key":"CIT0028"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1984.9924522"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(198201)38:1<119::AID-JCLP2270380118>3.0.CO;2-I"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(16)30017-3"},{"key":"CIT0033","first-page":"361","volume-title":"Proceedings of the 21st world Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2017)","author":"Scholl M.","year":"2017"},{"key":"CIT0034","volume-title":"Research Methods for Business: A Skill Building Approach","author":"Sekaran U.","year":"2010","edition":"5"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"CIT0036","first-page":"22","volume-title":"Proceedings of the 10th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)","author":"Snyman D. P.","year":"2016"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2017-0015"},{"key":"CIT0038","first-page":"39","volume-title":"Proceedings of the International Conference on Information and Knowledge Engineering (IKE'17)","author":"Snyman D. P.","year":"2017"},{"key":"CIT0039","first-page":"91","volume-title":"Proceedings of the 11th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017)","author":"Snyman D. P.","year":"2017"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39218-4_20"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2012-0045"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.256"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2012010102"},{"issue":"4","key":"CIT0045","first-page":"40","volume":"25","author":"Van de Mortel T. F.","year":"2008","journal-title":"The Australian Journal of Advanced Nursing"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2019.1569163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T07:19:08Z","timestamp":1720941548000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2019.1569163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,21]]},"references-count":44,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2019,1,21]]},"published-print":{"date-parts":[[2019,11,2]]}},"alternative-id":["10.1080\/0144929X.2019.1569163"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2019.1569163","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2019,1,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-05-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}