{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T04:40:49Z","timestamp":1773204049143,"version":"3.50.1"},"reference-count":74,"publisher":"Informa UK Limited","issue":"4","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1655085"],"award-info":[{"award-number":["1655085"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Austrian Science Foundation","award":["P 29765"],"award-info":[{"award-number":["P 29765"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2017,10,2]]},"DOI":"10.1080\/07421222.2017.1394083","type":"journal-article","created":{"date-parts":[[2018,1,2]],"date-time":"2018-01-02T10:41:53Z","timestamp":1514889713000},"page":"1203-1230","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":222,"title":["User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory"],"prefix":"10.1080","volume":"34","author":[{"given":"Philip","family":"Menard","sequence":"first","affiliation":[]},{"given":"Gregory J.","family":"Bott","sequence":"additional","affiliation":[]},{"given":"Robert E.","family":"Crossler","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2018,1,2]]},"reference":[{"key":"CIT0001","volume-title":"Understanding Attitudes and Predicting Social Behavior","author":"Ajzen I.","year":"1980"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Alkaldi, N., and Renaud, K. Why do people adopt, or reject, smartphone password managers?1st European Workshop on Usable Security. Darmstadt, Germany, 2016, pp. 1\u201314.","DOI":"10.14722\/eurousec.2016.23011"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2008.12"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.117.3.497"},{"key":"CIT0007","volume-title":"Social Science Research: Principles, Methods, and Practices","author":"Bhattacherjee A.","year":"2012"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1177\/0146167289154015"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001257"},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"Crossler, R.E. Protection motivation theory: Understanding determinants to backing up personal data. In43rd Hawaii International Conference on System Sciences. Honolulu, HI: IEEE, 2010, pp. 1\u201310.","DOI":"10.1109\/HICSS.2010.311"},{"key":"CIT0014","unstructured":"Crossler, R.E., and B\u00e9langer, F. Determinants of individual security behaviors. InProceedings of the 2010 International Federation of Information Processing (IFIP) 8.11\/11.13 Dewald Roode Workshop on Information Systems Security Research. Waltham, MA, 2010, pp. 78\u2013127."},{"issue":"4","key":"CIT0015","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/2691517.2691521","volume":"45","author":"Crossler R.E.","year":"2014","journal-title":"The Data Base for Advances in Information Systems"},{"key":"CIT0016","volume-title":"The quest for complete security: An empirical analysis of users\u2019 multi-layered protection from security threats","author":"Crossler R.E.","year":"2017"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2015-0018"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"issue":"12","key":"CIT0021","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1111\/j.1559-1816.1992.tb00945.x","volume":"22","author":"Davis F.D.","year":"1992","journal-title":"Journal of Applied Social Psychology"},{"key":"CIT0022","first-page":"39","volume-title":"The empirical exploration of intrinsic motivational processes","author":"Deci E.L.","year":"1980"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.53.6.1024"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193146"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1002\/job.322"},{"key":"CIT0027","doi-asserted-by":"crossref","first-page":"91","DOI":"10.17705\/1CAIS.01605","volume":"16","author":"Gefen D.","year":"2005","journal-title":"Communications of the Association for Information Systems"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.2307\/25148742"},{"issue":"11","key":"CIT0029","doi-asserted-by":"crossref","first-page":"i","DOI":"10.17705\/1jais.00382","volume":"15","author":"Gregor S.","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"key":"CIT0030","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair J.F.","year":"2016"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.2307\/25148660"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334499"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.05.021"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1029402"},{"key":"CIT0041","volume-title":"Cybersecurity in an IoT and Mobile World: Defenses, Response Plans, and Greatest Concerns","author":"Matteson S.","year":"2016"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2014.11645743"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.88.2.203"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.2307\/3149411"},{"issue":"5","key":"CIT0045","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1096\/fasebj.1.5.3315805","volume":"1","author":"Motulsky H.J.","year":"1987","journal-title":"FASEB Journal"},{"key":"CIT0046","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","author":"Mylonas A.","year":"2013","journal-title":"Computers and Security, 34"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.004"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.2307\/3054128"},{"key":"CIT0050","first-page":"1","volume":"2015","author":"Ponemon Institute","year":"2015","journal-title":"Ponemon Institute Research Report"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1177\/0146167200266002"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"CIT0055","first-page":"153","volume-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protected motivation","author":"Rogers R.W.","year":"1983"},{"key":"CIT0056","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-1-4684-8264-5_11","volume-title":"In The Self: Interdisciplinary Approaches. New York, NY: Springer","author":"Ryan R.M.","year":"1991"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1020"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1037110003-066X.55.1.68"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.4.3.199"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.70.3.104"},{"key":"CIT0061","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/S0065-2601(08)60019-2","author":"Vallerand R.J.","year":"1997","journal-title":"Advances in Experimental Social Psychology, 29"},{"issue":"4","key":"CIT0062","first-page":"312","volume":"11","author":"Vallerand R.J.","year":"2000","journal-title":"Psychological Inquiry"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.72.5.1161"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290410"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.01.029"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.2307\/249753"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"issue":"1","key":"CIT0070","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"Venkatesh V.","year":"2012","journal-title":"MIS Quarterly"},{"key":"CIT0071","volume-title":"2015 Data Breach Investigations Report","author":"Villatte N.","year":"2015"},{"key":"CIT0072","volume-title":"Control-related motivations and information security policy compliance: The effect of reflective and reactive autonomy","author":"Wall J.D.","year":"2013"},{"key":"CIT0073","volume-title":"A review and typology of security-related corruption controls: Setting an agenda for studying the behavioral effects of security countermeasures","author":"Wall J.D.","year":"2013"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1086\/209064"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810920549"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0522"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.2307\/1251446"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1172459"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2017.1394083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T19:01:45Z","timestamp":1570561305000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2017.1394083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,2]]},"references-count":74,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,1,2]]},"published-print":{"date-parts":[[2017,10,2]]}},"alternative-id":["10.1080\/07421222.2017.1394083"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2017.1394083","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}