{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:00:23Z","timestamp":1776974423502,"version":"3.51.4"},"reference-count":77,"publisher":"Informa UK Limited","issue":"12","funder":[{"name":"Australian Government Research Training Program"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1080\/0144929x.2019.1583769","type":"journal-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T16:53:28Z","timestamp":1550854408000},"page":"1290-1308","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":70,"title":["The impact of time pressure on cybersecurity behaviour: a systematic literature review"],"prefix":"10.1080","volume":"38","author":[{"given":"Noman H.","family":"Chowdhury","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computing, The University of Newcastle, Newcastle, Australia"}]},{"given":"Marc T. P.","family":"Adam","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computing, The University of Newcastle, Newcastle, Australia"}]},{"given":"Geoffrey","family":"Skinner","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computing, The University of Newcastle, Newcastle, Australia"}]}],"member":"301","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-016-0453-z"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Acar, Y., M. Backes, S. Fahl, D. Kim, M. Mazurek, and C. Stransky. 2016. \u201cYou Get Where You\u2019re Looking For \u2013 The Impact of Information Sources on Code Security.\u201d IEEE Symposium on Security and Privacy\u00a0(pp. 289\u2013305),\u00a0San Jose, CA.","DOI":"10.1109\/SP.2016.25"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2015.01.003"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415170201"},{"key":"CIT0005","unstructured":"Amoroso, E. 2018. \u201cCyber Attack Countermeasures.\u201d New\u00a0York University Tandon School of Engineering. Accessed January 2, 2018. https:\/\/www.coursera.org\/learn\/cyber-attack-countermeasures\/lecture\/Obu1F\/orange-book-compliance."},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/151220.151231"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.1.3.311"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Beautement, A., M. Sasse, and M. Wonham. 2009. \u201cThe Compliance Budget: Managing Security Behaviour in Organisations.\u201d InACM Proceedings of the 2008 New Security Paradigms Workshop(pp.\u00a047\u201358), Lake Tahoe, CA.","DOI":"10.1145\/1595676.1595684"},{"key":"CIT0009","volume-title":"Review of Human Reliability Assessment Methods","author":"Bell J.","year":"2009"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Brown, S., J. Gommers, and O. Serrano. 2015. \u201cFrom Cyber Security Information Sharing to Threat Management.\u201d InProceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security(pp.\u00a043\u201349), New\u00a0York, NY.","DOI":"10.1145\/2808128.2808133"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2017.1314612"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X09000831"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2005.10855772"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1986.4283930"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/835"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"issue":"3","key":"CIT0019","first-page":"32","volume":"30","author":"Davidson J.","year":"1989","journal-title":"Management Quarterly"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1145\/3210530.3210533"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0284"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6846-6_2"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199230167.003.0002"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0093-6"},{"key":"CIT0025","unstructured":"Forbes. 2017.Leaked GOP Data on 198 Million Americans Wasn\u2019t Even Protected by a Password. Accessed February 8, 2018. https:\/\/www.forbes.com\/sites\/leemathews\/ 2017\/06\/19\/gop-firm-leaked-info-200-million-americans\/#19d4366779ff."},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.2478\/v10059-008-0026-3"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"CIT0028","volume-title":"A Fierce Domain: Conflict in Cyberspace, 1986 to 2012","author":"Healey J.","year":"2013"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001255"},{"key":"CIT0030","unstructured":"IBM. 2014.IBM Security Services 2014: Cyber Security Intelligence Index. Accessed February 8, 2018. http:\/\/media.scmagazine.com\/documents\/82\/ibm_cyber_security_intelligenc_20450.pdf."},{"issue":"2","key":"CIT0031","first-page":"59","volume":"21","author":"Ignatiadis I.","year":"2009","journal-title":"Scandinavian Journal of Information Systems"},{"key":"CIT0032","unstructured":"ITU. 2008. \u201cSeries X: Data Networks, Open System Communications and Security.\u201d International Telecommunications Union. Accessed February 2, 2018. https:\/\/ccdcoe.org\/sites\/default\/files\/documents\/ITU-080418-RecomOverviewOfCS.pdf."},{"key":"CIT0033","unstructured":"ITU. 2016. \u201cMeasuring the Information Society Report.\u201d International Telecommunication Union. Accessed February 2, 2018 https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/publications\/misr2016\/MISR2016-w4.pdf"},{"issue":"3","key":"CIT0034","first-page":"2","volume":"27","author":"Jalali M. S.","year":"2018","journal-title":"The Journal of Strategic Information Systems"},{"key":"CIT0035","unstructured":"Jenkins, J. L., A. Durcikova, G. Ross, and J. F. Nunamaker. 2010. \u201cEncouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users\u2019 Secure Behavior.\u201dICIS 2010 Proceedings(pp.\u00a01\u201318), St.\u00a0Louis, MO."},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0938-4"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6846-6_7"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.58.9.697"},{"key":"CIT0039","doi-asserted-by":"crossref","unstructured":"Kirlappos, I., S. Parkin, and M. A. Sasse. 2014. \u201cLearning from \u2018Shadow Security\u2019: Why Understanding Non-Compliant Behaviors Provides the Basis for Effective Security.\u201d InUSEC\u201914 Workshop on Usable Security(pp.\u00a01\u201310), San Diego, SA.","DOI":"10.14722\/usec.2014.23007"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.179"},{"key":"CIT0041","volume-title":"A Guide to Practical Human Reliability Assessment","author":"Kirwan B.","year":"1994"},{"key":"CIT0042","unstructured":"Kitchenham, B., and S. Charters. 2007. \u201cGuidelines for Performing Systematic Literature Reviews in Software Engineering.\u201d EBSE Technical Report, Durham, UK."},{"key":"CIT0043","unstructured":"Knowlton, B. 2010. Military Computer Attack Confirmed. Accessed February 08, 2018. http:\/\/www.nytimes.com\/2010\/08\/26\/technology\/26cyber.html?_r=1&ref=technology."},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1037\/0096-1523.21.3.451"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1086\/597160"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.2307\/249574"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04318"},{"key":"CIT0048","unstructured":"Marett, K., and R. Wright. 2009. \u201cThe Effectiveness of Deceptive Tactics in Phishing.\u201dAMCIS 2009 Proceedings(pp.1\u20139), San\u00a0Francisco, CA."},{"key":"CIT0049","unstructured":"McNab, A. L., T. J. Hess, and J. S. Valacich. 2009. \u201cDesigning Emergency Response Applications for Better Performance.\u201dICIS 2009 Proceedings(pp.\u00a01\u201318), Phoenix, AZ."},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1176\/ajp.116.8.695"},{"key":"CIT0051","doi-asserted-by":"crossref","unstructured":"Nthala, N., and I. Flechais. 2017. \u201c\u2018If it\u2019s Urgent or it is Stopping Me from Doing Something, then I Might Just\u00a0Go Straight at It\u2019: A Study into Home Data Security\u00a0Decisions.\u201dInternational Conference on Human Aspects of Information Security, Privacy, and Trust\u00a0(pp. 123\u2013142), Vancouver, Canada.","DOI":"10.1007\/978-3-319-58460-7_9"},{"key":"CIT0052","doi-asserted-by":"crossref","unstructured":"Nthala, N., and I. Flechais. 2018. \u201cRethinking Home Network Security.\u201d InEuropean Workshop on Usable Security (EuroUSEC)(pp.\u00a01\u201311), London, UK.","DOI":"10.14722\/eurousec.2018.23011"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1997.2717"},{"key":"CIT0054","unstructured":"Ravindran, S. K., F.\u00a0F.\u00a0H. Nah, and M. X. Cheng. 2018. \u201cEffect of Probable and Guaranteed Monetary Value Gains and Losses on Cybersecurity Behavior of Users.\u201dMWAIS 2018 Proceedings(pp.\u00a01\u20135), St.\u00a0Louis, MO."},{"issue":"6","key":"CIT0055","first-page":"84","volume":"94","author":"Reid E.","year":"2016","journal-title":"Harvard Business Review"},{"key":"CIT0056","doi-asserted-by":"crossref","unstructured":"Rendell, A., M. T. P. Adam, and A. Eidels. 2019. \u201cTowards Understanding the Influence of Nature Imagery in User Interface Design.\u201dHICSS 2019 Proceedings (pp.\u00a04795\u20134804), Hawaii","DOI":"10.24251\/HICSS.2019.578"},{"key":"CIT0057","unstructured":"Rissler, R., M. Nadj, M. T. P. Adam, and A. Maedche. 2017. \u201cTowards an Integrative Theoretical Framework of IT-Mediated Interruptions.\u201dECIS 2017 Proceedings (pp.\u00a01950\u20131967)"},{"key":"CIT0058","doi-asserted-by":"crossref","DOI":"10.1093\/wentk\/9780199918096.001.0001","volume-title":"Cybersecurity: What Everyone Needs to Know","author":"Singer P. W.","year":"2014"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.2307\/25750688"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.59"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.995563"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6846-6_9"},{"key":"CIT0063","unstructured":"Symantec. 2017. \u201cInternet Security Threat Report.\u201d Accessed February 6, 2018. https:\/\/www.symantec.com\/security-center\/threat-report."},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00375"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.004"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2012.2208392"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1080\/02684527.2012.708530"},{"key":"CIT0069","unstructured":"Washington Post. 2017. \u201cMore Than 150 Countries Affected by Massive Cyberattack, Europol Says.\u201dWashington Post, Accessed December 4, 2018. http:\/\/wapo.st\/2pKyXum."},{"issue":"2","key":"CIT0070","first-page":"xiii","volume":"26","author":"Webster J.","year":"2002","journal-title":"MIS Quarterly"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.01"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1111\/j.0963-7214.2004.00288.x"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1037\/h0037186"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2012.03.005"},{"key":"CIT0075","doi-asserted-by":"crossref","unstructured":"Young, H., T. van Vliet, J. van de Ven, S. Jol, and C. Broekman. 2017. \u201cUnderstanding Human Factors in Cyber Security as a Dynamic System.\u201d InInternational Conference on Applied Human Factors and Ergonomics(pp.\u00a0244\u2013254). Los Angeles, CA.","DOI":"10.1007\/978-3-319-60585-2_23"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.17705\/1thci.00089"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2013.12.012"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2019.1583769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T11:29:44Z","timestamp":1606562984000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2019.1583769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":77,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,12,2]]}},"alternative-id":["10.1080\/0144929X.2019.1583769"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2019.1583769","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-04-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}