{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:51:19Z","timestamp":1763664679470,"version":"3.37.3"},"reference-count":110,"publisher":"Informa UK Limited","issue":"15","funder":[{"DOI":"10.13039\/501100001804","name":"Canada Research Chair in Sexual and Gender Minority Health","doi-asserted-by":"publisher","award":["950-231002-2016"],"award-info":[{"award-number":["950-231002-2016"]}],"id":[{"id":"10.13039\/501100001804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences & Engineering Research Council","doi-asserted-by":"publisher","award":["Discovery Grant RGPIN 06273-2017 User Centric Cybersecurity"],"award-info":[{"award-number":["Discovery Grant RGPIN 06273-2017 User Centric Cybersecurity"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2022,11,18]]},"DOI":"10.1080\/0144929x.2021.1977849","type":"journal-article","created":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T12:59:36Z","timestamp":1633352376000},"page":"3237-3263","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":10,"title":["Understanding individual differences: factors affecting secure computer behaviour"],"prefix":"10.1080","volume":"41","author":[{"given":"Matthew","family":"Hull","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Leah","family":"Zhang-Kennedy","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]},{"given":"Khadija","family":"Baig","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]}],"member":"301","published-online":{"date-parts":[[2021,10,2]]},"reference":[{"key":"CIT0001","unstructured":"Abu-Salma, R., E. M. Redmiles, B. Ur, and M. Wei. 2018. \u201cExploring User Mental Models of End-to-End Encrypted Communication Tools.\u201d In USENIX Workshop on Free and Open Communications on the Internet. USENIX. Baltimore, MD, USA"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-12-2019-0371"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"volume-title":"Bem Sex-Role Inventory: Professional Manual","year":"1981","author":"Bem S.","key":"CIT0013"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2005.10855772"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_2"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"CIT0020","unstructured":"CrowdFlower. 2015. \u201cCrowdflower Job Settings Guide.\u201d https:\/\/success.crowdflower.com\/hc\/en-us\/articles\/201855719-Job-Settings-Guide-to-Basic-Job-Settings-Page (accessed 11 February 2015)."},{"key":"CIT0021","unstructured":"Cyveillance. 2015. \u201cThe Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks.\u201d http:\/\/docs.apwg.org\/sponsors_technical_papers\/WP_CostofPhishing_Cyveillance.pdf (accessed 28 February, 2015)."},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.002"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00289.x"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00133"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.394"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/s11238-005-4590-0"},{"volume-title":"Discovering Statistics Using IBM SPSS Statistics","year":"2013","author":"Field A.","key":"CIT0030"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(08)70064-2"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.03.001"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70082-3"},{"key":"CIT0035","unstructured":"Garg, V., and L. Camp. 2014. \u201cRisk Characteristics, Mental Models, and Perception of Security Risks.\u201d In ASE Conference. Academy of Science and Engineering, USA."},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1037\/a0033483"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.015"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1023\/B:RIAN.0000005926.03250.c0"},{"key":"CIT0039","unstructured":"Hameed, M. A., and N. A. G. Arachchilage. 2018. \u201cUnderstanding the Influence of Individual's Self-Efficacy for Information Systems Security Innovation Adoption: A Systematic Literature Review.\u201d Preprint arXiv:1809.10890."},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1623322"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.10.001"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2013.814040"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1207\/S15327906MBR3501_1"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2004.09.009"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027505"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516747"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1145\/1325555.1325569"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210424104"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.017"},{"key":"CIT0061","unstructured":"Li, Y., and M. T. Siponen. 2011. \u201cA Call for Research on Home Users' Information Security Behaviour.\u201d In Pacific Asia Conference on Information Systems PACIS, 112. AIS eLibrary. Brisbane, Australia."},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.2307\/20650279"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.01.028"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0124-6"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116634368"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.08.010"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.065"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.5130\/acis2018.co"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1037\/a0028085"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2008.00357.x"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816654465"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01148.x"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.396"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.10"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"volume-title":"Psychometric Theory","year":"1978","author":"Nunnally J.","key":"CIT0078"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.206"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"CIT0081","unstructured":"Ponemon Institute and IBM Security. 2019. \u201cCost of a Data Breach Report.\u201d https:\/\/databreachcalculator.mybluemix.net\/executive-summary (accessed 07 May, 2020)."},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2017-0020"},{"key":"CIT0083","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"CIT0084","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.1177\/109019817400200405"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.001"},{"key":"CIT0087","first-page":"895","volume":"77","author":"Sas M.","year":"2019","journal-title":"Chemical Engineering Transactions"},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"CIT0091","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.01.002"},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2006.301907"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_12"},{"key":"CIT0094","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.07.002"},{"key":"CIT0095","doi-asserted-by":"publisher","DOI":"10.2307\/249307"},{"key":"CIT0096","unstructured":"Thompson, N., and T. McGill. 2017. \u201cMining the Mind\u2013Applying Quantitative Techniques to Mental Models of Security.\u201d In Australasian Conference on Information Systems. ACIS. Hobart, Australia"},{"key":"CIT0097","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.003"},{"key":"CIT0098","doi-asserted-by":"publisher","DOI":"10.1037\/a0017735"},{"key":"CIT0099","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125805"},{"key":"CIT0100","unstructured":"Ur, B., P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. L. Mazurek, T. Passaro, R. Shay, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor. 2012. \u201cHow Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.\u201d In Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, 5\u20135. Berkeley, CA, USA: USENIX Association."},{"key":"CIT0101","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"CIT0102","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.05.038"},{"key":"CIT0103","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"CIT0104","unstructured":"Wash, R., and E. Rader. 2015. \u201cToo Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users.\u201d In Proceedings of the Eleventh Symposium On Usable Privacy and Security, 309\u2013325. USENIX. Ottawa, Canada."},{"key":"CIT0105","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2006.08.001"},{"key":"CIT0106","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.08.003"},{"key":"CIT0107","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"CIT0108","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660330"},{"key":"CIT0109","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805770"},{"key":"CIT0110","doi-asserted-by":"publisher","DOI":"10.1080\/15332860903467508"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2021.1977849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T13:50:43Z","timestamp":1671544243000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2021.1977849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,2]]},"references-count":110,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,11,18]]}},"alternative-id":["10.1080\/0144929X.2021.1977849"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2021.1977849","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2021,10,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-08-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-31","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}