{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:20:14Z","timestamp":1778948414178,"version":"3.51.4"},"reference-count":63,"publisher":"Informa UK Limited","issue":"8","funder":[{"DOI":"10.13039\/501100007229","name":"Bijzonder Onderzoeksfonds","doi-asserted-by":"publisher","award":["DOCPRO 2016-41\/FA040300\/FFB160241"],"award-info":[{"award-number":["DOCPRO 2016-41\/FA040300\/FFB160241"]}],"id":[{"id":"10.13039\/501100007229","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2022,6,11]]},"DOI":"10.1080\/0144929x.2021.1905066","type":"journal-article","created":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T03:22:34Z","timestamp":1617333754000},"page":"1796-1808","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":74,"title":["What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0324-8370","authenticated-orcid":false,"given":"Lies","family":"De Kimpe","sequence":"first","affiliation":[{"name":"Department of Communication Studies, University of Antwerp Antwerp, Belgium"}]},{"given":"Michel","family":"Walrave","sequence":"additional","affiliation":[{"name":"Department of Communication Studies, University of Antwerp Antwerp, Belgium"}]},{"given":"Pieter","family":"Verdegem","sequence":"additional","affiliation":[{"name":"Communication and Media Research Institute (CAMRI), University of Westminster, Northwick Park, UK."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6911-7632","authenticated-orcid":false,"given":"Koen","family":"Ponnet","sequence":"additional","affiliation":[{"name":"Department of Communication Studies, University of Antwerp Antwerp, Belgium"},{"name":"Department of Communication Studies, imec-mict-Ghent University Ghent, Belgium"}]}],"member":"301","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"CIT0005","unstructured":"Belgian Federal Police. 2019. Veiligheidsmonitor 2018. Federale Politie DGR - Informatie en ICT."},{"key":"CIT0006","volume-title":"Structural Equation Modeling with Mplus: Basic Concepts, Applications, and Programming","author":"Byrne B. M.","year":"2012"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.08.002"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2004.12.005"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.02.012"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1108\/JCRPP-01-2019-0008"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1145\/2691517.2691521"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.002"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2007.00917.x"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.044"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1428652"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.023"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1362\/0267257022872460"},{"key":"CIT0019","volume-title":"Special Eurobarometer 464a: Europeans\u2019 Attitude Towards Cyber Security","author":"Eurobarometer","year":"2017"},{"key":"CIT0019a","volume-title":"European Citizens' Digital Health Literacy","author":"European Commission","year":"2014"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0021","volume-title":"Discovering Statistics Using SPSS","author":"Field A.","year":"2009"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0015-z"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"CIT0025","unstructured":"HO RICU. 2015. Serious and organised crime protection public interventions model. https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/502960\/Gov.uk_Serious_Organised_Crime_deck_vF.pdf."},{"key":"CIT0026","volume-title":"Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses","author":"Holt T. J.","year":"2016"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1623322"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"issue":"2","key":"CIT0031","first-page":"205","volume":"6","author":"Jansen J.","year":"2018","journal-title":"Journal of Qualitative Criminal Justice and Criminology"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2016.0728"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2011.06.007"},{"key":"CIT0037","unstructured":"McGuire, M., and S. Dowling. 2013. Cyber crime: A review of the evidence (No. 75; pp. 1\u201334). https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/246749\/horr75-summary.pdf."},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.107"},{"key":"CIT0039","doi-asserted-by":"crossref","unstructured":"Montazemi, A. R., and H. Q. Saremi. 2013. \u201cFactors affecting Internet banking pre-usage expectation formation.\u201d In System Sciences (HICSS), 2013 46th Hawaii International Conference On, 4666\u20134675.","DOI":"10.1109\/HICSS.2013.231"},{"key":"CIT0040","volume-title":"Mplus User\u2019s Guide","author":"Muth\u00e9n L. K.","year":"2012"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1080\/10410230701808327"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"CIT0043","unstructured":"Norman, P., H. Boer, and E. R. Seydel. 2005. \u201cProtection Motivation Theory.\u201d In Predicting Health Behaviour: Research and Practice with Social Cognition Models, edited by M. Conner and P. Norman, 81\u2013126. Open University Press."},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044275"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1177\/1090198111418108"},{"key":"CIT0046","doi-asserted-by":"crossref","unstructured":"Raju, P. S., S. C. Lonial, and W. G. Mangold. 2015. \u201cSubjective, objective, and experience-based knowledge: A comparison in the decision-making context.\u201d In Proceedings of the 1993 Academy of Marketing Science (AMS) Annual Conference, 60\u201360.","DOI":"10.1007\/978-3-319-13159-7_14"},{"key":"CIT0047","unstructured":"Riek, M., R. B\u00f6hme, and T. Moore. 2014. \u201cUnderstanding the influence of cybercrime risk on the e-service adoption of European Internet users.\u201d Workshop on the Economics of Information Security (WEIS)."},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.3.596"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"CIT0050","first-page":"153","volume-title":"Social Psychophysiology","author":"Rogers R. W.","year":"1983"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.046"},{"key":"CIT0052","unstructured":"Statistics Netherlands. 2019. Digitale veiligheid & criminaliteit 2018. https:\/\/www.cbs.nl\/nl-nl\/publicatie\/2019\/29\/digitale-veiligheid-criminaliteit-2018."},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1734087"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.009"},{"key":"CIT0055","unstructured":"Vogels, E. A., and M. Anderson. 2019. Americans and digital knowledge. Pew Research Center, https:\/\/www.pewresearch.org\/internet\/2019\/10\/09\/americans-and-digital-knowledge\/."},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2003.11.008"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0680"},{"key":"CIT0058","first-page":"309","author":"Wash R.","year":"2015","journal-title":"SOUPS"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1996.15.1.1"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0179"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376276"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1080\/03637759409376328"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1080\/108107396127988"},{"key":"CIT0064","unstructured":"Wordsworth, R. 2017, August 16. The biggest challenge in cybersecurity? Human nature. http:\/\/www.wired.co.uk\/article\/wired-security-allison-miller-google-rachel-botsman."},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2021.1905066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T22:01:18Z","timestamp":1655762478000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2021.1905066"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,1]]},"references-count":63,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,6,11]]}},"alternative-id":["10.1080\/0144929X.2021.1905066"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2021.1905066","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,1]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-02-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}