{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T16:22:26Z","timestamp":1775751746507,"version":"3.50.1"},"reference-count":110,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2020,7,2]]},"DOI":"10.1080\/07421222.2020.1790187","type":"journal-article","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T08:16:31Z","timestamp":1605687391000},"page":"723-757","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":81,"title":["The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security"],"prefix":"10.1080","volume":"37","author":[{"given":"Sebastian W.","family":"Schuetz","sequence":"first","affiliation":[{"name":"Department of Information Systems and Business Analytics,  College of Business, Florida International University , Miami, FL, USA"}]},{"given":"Paul","family":"Benjamin Lowry","sequence":"additional","affiliation":[{"name":"Department of Business Information Technology,  Pamplin College of Business , Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Daniel A.","family":"Pienta","sequence":"additional","affiliation":[{"name":"Hankamer School of Business,  Baylor University , Waco, TX, USA"}]},{"given":"Jason","family":"Bennett Thatcher","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems,  Temple University , Philadelphia, PA, USA"}]}],"member":"301","published-online":{"date-parts":[[2020,11,18]]},"reference":[{"issue":"4","key":"cit0001","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.5465\/amr.2007.26586822","volume":"32","author":"Alvesson M.","year":"2007","journal-title":"Academy of Management Review"},{"key":"cit0002","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","volume":"69","author":"Anwar M.","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"cit0003","doi-asserted-by":"crossref","first-page":"839","DOI":"10.5465\/amj.2008.34789630","volume":"51","author":"Bamberger P.","year":"2008","journal-title":"Academy of Management Journal"},{"issue":"4","key":"cit0004","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1037\/0096-3445.135.4.609","volume":"135","author":"Bar-Anan Y.","year":"2006","journal-title":"Journal of Experimental Psychology"},{"key":"cit0005","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.cose.2016.05.004","volume":"61","author":"Bartnes M.","year":"2016","journal-title":"Computers & Security"},{"issue":"2","key":"cit0006","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2753\/MTP1069-6679200202","volume":"20","author":"Beitelspacher L.S.","year":"2012","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"2","key":"cit0007","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.leaqua.2014.07.011","volume":"26","author":"Berson Y.","year":"2014","journal-title":"Leadership Quarterly"},{"key":"cit0008","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.chb.2018.05.023","volume":"87","author":"Blythe J.M.","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"cit0009","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","volume":"39","author":"Boss S.R.","year":"2015","journal-title":"MIS Quarterly"},{"key":"cit0010","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.chb.2016.11.018","volume":"68","author":"Burns A.J.","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"cit0011","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1287\/isre.2019.0860","volume":"30","author":"Burns A.J.","year":"2019","journal-title":"Information Systems Research"},{"issue":"4","key":"cit0012","doi-asserted-by":"crossref","first-page":"657","DOI":"10.2307\/25148815","volume":"31","author":"Burton-Jones A.","year":"2007","journal-title":"MIS Quarterly"},{"issue":"4","key":"cit0013","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1177\/1094428116641191","volume":"20","author":"Busse C.","year":"2017","journal-title":"Organizational Research Methods"},{"key":"cit0014","volume-title":"Using construal level theory to promote HPV vaccine uptake among college males. In School of Communication, Master of Arts","author":"Cannon J."},{"issue":"1","key":"cit0015","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/TEM.2005.861804","volume":"53","author":"Chan Y.E.","year":"2006","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"2","key":"cit0016","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1086\/422116","volume":"31","author":"Chandran S.","year":"2004","journal-title":"Journal of Consumer Research"},{"issue":"1","key":"cit0017","doi-asserted-by":"crossref","first-page":"205","DOI":"10.25300\/MISQ\/2016\/40.1.09","volume":"40","author":"Chen Y.","year":"2016","journal-title":"MIS Quarterly"},{"issue":"27","key":"cit0018","author":"Choi Y.K.","year":"2017","journal-title":"Internet Research"},{"issue":"1","key":"cit0019","doi-asserted-by":"crossref","first-page":"12","DOI":"10.5465\/amr.2009.0486","volume":"36","author":"Corley K.","year":"2011","journal-title":"Academy of Management Review"},{"issue":"1","key":"cit0020","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1111\/isj.12173","volume":"29","author":"D\u2019Arcy J.","year":"2019","journal-title":"Information Systems Journal"},{"issue":"1","key":"cit0021","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1037\/adb0000049","volume":"29","author":"Dijkstra A.","year":"2015","journal-title":"Psychology of Addictive Behaviors"},{"issue":"1","key":"cit0022","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1177\/009365096023001002","volume":"23","author":"Dillard J.P.","year":"1996","journal-title":"Communication Research"},{"issue":"6","key":"cit0023","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1037\/0022-3514.86.6.781","volume":"86","author":"Eyal T.","year":"2004","journal-title":"Journal of Personality and Social Psychology"},{"issue":"4","key":"cit0024","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1016\/j.jesp.2008.03.012","volume":"44","author":"Eyal T.","year":"2008","journal-title":"Journal of Experimental Social Psychology"},{"key":"cit0025","doi-asserted-by":"crossref","first-page":"175","DOI":"10.3758\/BF03193146","volume":"39","author":"Faul F.","year":"2007","journal-title":"Behavior Research Methods"},{"key":"cit0026","volume-title":"Social Cognition","volume":"2","author":"Fiske S.T.","year":"1991"},{"issue":"2","key":"cit0027","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","volume":"30","author":"Floyd D.L.","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"key":"cit0028","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1016\/j.jesp.2004.04.003","volume":"40","author":"Freitas A.L.","year":"2004","journal-title":"Journal of Experimental Social Psychology"},{"issue":"3","key":"cit0029","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1016\/j.jesp.2007.10.005","volume":"44","author":"Fujita K.","year":"2008","journal-title":"Journal of Experimental Social Psychology"},{"issue":"3","key":"cit0030","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1108\/IMDS-04-2016-0130","volume":"117","author":"Hair J.","year":"2017","journal-title":"Industrial Management & Data Systems"},{"issue":"3","key":"cit0031","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1093\/jcr\/ucw036","volume":"43","author":"Han D","year":"2016","journal-title":"Journal of Consumer Research"},{"issue":"11","key":"cit0032","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1177\/0146167210386238","volume":"36","author":"Hansen J.","year":"2010","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"3","key":"cit0033","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1108\/IMR-09-2014-0304","volume":"33","author":"Henseler J.","year":"2016","journal-title":"International Marketing Review"},{"issue":"2","key":"cit0034","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"Herath T.","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"cit0035","first-page":"1","volume":"44","author":"Hernandez J.M.D.C.","year":"2014","journal-title":"Journal of Advertising"},{"issue":"87","key":"cit0036","author":"Hina S.","year":"2019","journal-title":"Computers & Security"},{"issue":"4","key":"cit0037","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1002\/smj.582","volume":"28","author":"Hoetker G.","year":"2007","journal-title":"Strategic Management Journal"},{"issue":"1","key":"cit0038","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/2063176.2063197","volume":"55","author":"Hong J.","year":"2012","journal-title":"Communications of the ACM"},{"issue":"1","key":"cit0039","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1287\/isre.2013.0501","volume":"25","author":"Hong W.","year":"2014","journal-title":"Information Systems Research"},{"issue":"3","key":"cit0040","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s10683-011-9273-9","volume":"14","author":"Horton J.J.","year":"2011","journal-title":"Experimental Economics"},{"key":"cit0041","doi-asserted-by":"crossref","DOI":"10.1002\/9781118548387","volume-title":"Applied Logistic Regression","author":"Hosmer D.W.","year":"2013"},{"issue":"4","key":"cit0042","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1016\/j.jcps.2016.03.001","volume":"26","author":"Huang N.","year":"2016","journal-title":"Journal of Consumer Psychology"},{"issue":"5","key":"cit0043","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1111\/isj.12234","volume":"29","author":"Hull D.M.","year":"2019","journal-title":"Information Systems Journal"},{"issue":"10","key":"cit0044","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"Jagatic T.N.","year":"2007","journal-title":"Communications of the ACM"},{"issue":"2","key":"cit0045","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1080\/07421222.2017.1334499","volume":"34","author":"Jensen M.L.","year":"2017","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"cit0046","doi-asserted-by":"crossref","first-page":"386","DOI":"10.5465\/amr.2006.20208687","volume":"32","author":"Johns G.","year":"2006","journal-title":"Academy of Management Review"},{"issue":"3","key":"cit0047","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"Johnston A.C.","year":"2010","journal-title":"MIS Quarterly"},{"issue":"2","key":"cit0048","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1111\/deci.12328","volume":"50","author":"Johnston A.C.","year":"2019","journal-title":"Decision Sciences"},{"issue":"3","key":"cit0049","first-page":"231","volume":"25","author":"Johnston A.C.","year":"2016","journal-title":"EJIS"},{"issue":"1","key":"cit0050","doi-asserted-by":"crossref","first-page":"113","DOI":"10.25300\/MISQ\/2015\/39.1.06","volume":"39","author":"Johnston A.C.","year":"2015","journal-title":"MIS Quarterly"},{"issue":"3","key":"cit0051","doi-asserted-by":"crossref","first-page":"667","DOI":"10.25300\/MISQ\/2015\/39.3.07","volume":"39","author":"Kankanhalli A.","year":"2015","journal-title":"MIS Quarterly"},{"issue":"1","key":"cit0052","first-page":"90","volume":"77","author":"Kaufman R.L.","year":"1996","journal-title":"Social Science Quarterly"},{"issue":"3","key":"cit0053","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1080\/10410236.2016.1266579","volume":"33","author":"Kim K.","year":"2018","journal-title":"Health Communication"},{"issue":"5","key":"cit0054","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1037\/0278-6133.10.5.323","volume":"10","author":"Klohn L.S.","year":"1991","journal-title":"Health Psychology"},{"issue":"4","key":"cit0055","doi-asserted-by":"crossref","first-page":"231","DOI":"10.2753\/MIS0742-1222270408","volume":"27","author":"K\u00f6hler C.F.","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"cit0056","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1754393.1754396","volume":"10","author":"Kumaraguru P.","year":"2010","journal-title":"ACM Transactions on Internet Technology"},{"issue":"2","key":"cit0057","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1037\/a0015671","volume":"97","author":"Liberman N.","year":"2009","journal-title":"Journal of Personality and Social Psychology"},{"issue":"25","key":"cit0058","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.jsis.2016.06.002","volume":"3","author":"Lowry P.B.","year":"2016","journal-title":"Journal of Strategic Information Systems"},{"issue":"6","key":"cit0059","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1057\/s41303-017-0066-x","volume":"26","author":"Lowry P.B.","year":"2017","journal-title":"European Journal of Information Systems"},{"issue":"6","key":"cit0060","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1080\/10810730.2011.551991","volume":"16","author":"Lutchyn Y.","year":"2011","journal-title":"Journal of Health Communication"},{"issue":"2","key":"cit0061","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/23044045","volume":"35","author":"MacKenzie S.B.","year":"2011","journal-title":"MIS Quarterly"},{"issue":"5","key":"cit0062","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","volume":"19","author":"Maddux J.E.","year":"1983","journal-title":"Journal of Experimental Social Psychology"},{"issue":"4","key":"cit0063","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"Malhotra N.K.","year":"2004","journal-title":"Information Systems Research"},{"issue":"3","key":"cit0064","doi-asserted-by":"crossref","first-page":"170","DOI":"10.17705\/1thci.00032","volume":"3","author":"Marett K.","year":"2011","journal-title":"AIS Transactions on Human-Computer Interactions"},{"issue":"1","key":"cit0065","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3758\/s13428-011-0124-6","volume":"44","author":"Mason W.","year":"2012","journal-title":"Behavior Research Methods"},{"issue":"4","key":"cit0066","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1080\/07421222.2017.1394083","volume":"34","author":"Menard P.","year":"2017","journal-title":"Journal of Management Information Systems"},{"key":"cit0067","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.cose.2018.01.020","volume":"75","author":"Menard P.","year":"2018","journal-title":"Computers & Security"},{"issue":"1","key":"cit0068","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1111\/j.1559-1816.2000.tb02308.x","volume":"30","author":"Milne S.","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"issue":"4","key":"cit0069","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1111\/j.1468-2958.2007.00309.x","volume":"33","author":"Nan X.","year":"2007","journal-title":"Human Communication Research"},{"issue":"4","key":"cit0070","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1atrr.00007","volume":"1","author":"Niederman F.","year":"2015","journal-title":"AIS Transactions on Replication Research"},{"issue":"2","key":"cit0071","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1177\/1536867X0400400206","volume":"4","author":"Norton E.C.","year":"2004","journal-title":"The Stata Journal"},{"issue":"5","key":"cit0072","first-page":"411","volume":"5","author":"Paolacci G.","year":"2010","journal-title":"Judgment and Decision Making"},{"issue":"1","key":"cit0073","first-page":"1","volume":"96","author":"Peng C-Y.J.","year":"2002","journal-title":"The Journal of Educational Research"},{"issue":"4","key":"cit0074","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1177\/002224378602300401","volume":"23","author":"Perdue B.C.","year":"1986","journal-title":"Journal of Marketing Research"},{"issue":"4","key":"cit0075","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1287\/isre.2015.0599","volume":"26","author":"Phang C.W.","year":"2015","journal-title":"Information Systems Research"},{"issue":"5","key":"cit0076","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"Podsakoff P.M.","year":"2003","journal-title":"The Journal of Applied Psychology"},{"issue":"4","key":"cit0077","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1080\/07421222.2015.1138374","volume":"32","author":"Posey C.","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"cit0078","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"Puhakainen P.","year":"2010","journal-title":"MIS Quarterly"},{"issue":"8","key":"cit0079","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","volume":"28","author":"Rhee H-S.S.","year":"2009","journal-title":"Computers & Security"},{"issue":"1","key":"cit0080","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"Rogers R.W.","year":"1975","journal-title":"Journal of Psychology"},{"key":"cit0081","unstructured":"Rogers, R.W.   Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social Psychophysiology: A Sourcebook, 19. New York, NY: Guilford Press, 1983, pp. 153\u2013176."},{"key":"cit0082","unstructured":"Rogers, R.W.  ; and Prentice-Dunn, S. Protection motivation theory. In D.S. Gochman (ed.), Handbook of Health Behavior Research I: Personal and Social Determinants . New York, NY: Plenum Press, 1997, pp. 113\u2013132."},{"issue":"57","key":"cit0083","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1016\/S0148-2963(02)00345-4","volume":"9","author":"Rohm A.J.","year":"2004","journal-title":"J. of Business Research"},{"issue":"1","key":"cit0084","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1037\/0022-3514.89.1.36","volume":"89","author":"Semin G.R.","year":"2005","journal-title":"Journal of Personality and Social Psychology"},{"key":"cit0085","unstructured":"Shewan, D.   How much does Google ads cost? 2019. https:\/\/www.wordstream.com\/blog\/ws\/2015\/05\/21\/how-much-does-adwords-cost (accessed September 1, 2019)."},{"key":"cit0086","volume":"92","author":"Shin B.","journal-title":"Computers & Security"},{"key":"cit0087","unstructured":"Shmueli, L. \n                     Benbasat, I. ; and \n                     Cenfetelli, R.T.   A construal-level approach to persuasion by personalization. Presented at International Conference of Information Systems , Dublin, Ireland, pp. 1\u201319."},{"issue":"1","key":"cit0088","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/07421222.2019.1705512","volume":"37","author":"Silic M.","year":"2020","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"cit0089","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"Siponen M.","year":"2000","journal-title":"Information Management & Computer Security"},{"key":"cit0090","unstructured":"Smith, E.R.   Mental representation and memory. In D.T. Gilbert, S.T. Fiske, and G. Lindzey (eds.), The Handbook of Social Psychology, 1. New York, NY: McGraw-Hill, 1998, pp. 391\u2013445."},{"issue":"2","key":"cit0091","doi-asserted-by":"crossref","first-page":"355","DOI":"10.25300\/MISQ\/2014\/38.2.02","volume":"38","author":"Steelman Z.R.","year":"2014","journal-title":"MIS Quarterly"},{"issue":"3","key":"cit0092","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1027\/1864-9335\/a000061","volume":"42","author":"Steidle A.","year":"2011","journal-title":"Social Psychology"},{"key":"cit0093","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/j.jesp.2010.11.001","volume":"47","author":"Stephan E.","year":"2011","journal-title":"Journal of Experimental Social Psychology"},{"key":"cit0094","first-page":"303","volume":"1982","author":"Sutton S.R.","year":"1982","journal-title":"Social Psychology and Behavioral Medicine"},{"issue":"6","key":"cit0095","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1037\/a0039729","volume":"141","author":"Tannenbaum M.B.","year":"2015","journal-title":"Psychiatric Bulletin"},{"issue":"2","key":"cit0096","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1037\/a0018963","volume":"117","author":"Trope Y.","year":"2010","journal-title":"Psychological Review"},{"issue":"2","key":"cit0097","first-page":"1","volume":"32","author":"Vance A.","year":"2018","journal-title":"MIS Quarterly"},{"issue":"13","key":"cit0098","doi-asserted-by":"crossref","first-page":"277","DOI":"10.17705\/1CAIS.04113","volume":"41","author":"Wall J.D.","year":"2017","journal-title":"Communications of the Association for Information Systems"},{"issue":"4","key":"cit0099","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TPC.2012.2208392","volume":"55","author":"Wang J.","year":"2012","journal-title":"IEEE Transactions on Professional Communication"},{"issue":"2","key":"cit0100","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1287\/isre.2016.0680","volume":"28","author":"Wang J.","year":"2017","journal-title":"Information Systems Research"},{"issue":"3","key":"cit0101","doi-asserted-by":"crossref","first-page":"194","DOI":"10.17705\/1jais.00424","volume":"17","author":"Warkentin M.","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"key":"cit0102","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1509\/jmkr.48.3.472","volume":"48","author":"White K.","year":"2011","journal-title":"Journal of Marketing Research"},{"issue":"3","key":"cit0103","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.intmar.2014.02.002","volume":"28","author":"White T.B.","year":"2014","journal-title":"J. of Interactive Marketing"},{"issue":"6","key":"cit0104","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1086\/674212","volume":"40","author":"Williams L.E.","year":"2014","journal-title":"Journal of Consumer Research"},{"issue":"4","key":"cit0105","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1080\/03637759209376276","volume":"59","author":"Witte K.","year":"1992","journal-title":"Communication Monographs"},{"issue":"2","key":"cit0106","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1080\/03637759409376328","volume":"61","author":"Witte K.","year":"1994","journal-title":"Communication Monographs"},{"issue":"5","key":"cit0107","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1177\/109019810002700506","volume":"27","author":"Witte K.","year":"2000","journal-title":"Health Education & Behavior"},{"issue":"2","key":"cit0108","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1287\/isre.2014.0522","volume":"25","author":"Wright R.T.","year":"2014","journal-title":"ISR"},{"issue":"1","key":"cit0109","doi-asserted-by":"crossref","first-page":"273","DOI":"10.2753\/MIS0742-1222270111","volume":"27","author":"Wright R.T.","year":"2010","journal-title":"J. of Management Information Systems"},{"key":"cit0110","unstructured":"Yu, A.   Elaborate phishing scams increasingly target universities, 2019. https:\/\/whyy.org\/articles\/elaborate-phishing-scams-increasingly-target-universities\/(accessed September 1, 2019)."}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2020.1790187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T08:23:04Z","timestamp":1605687784000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2020.1790187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,2]]},"references-count":110,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7,2]]}},"alternative-id":["10.1080\/07421222.2020.1790187"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2020.1790187","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}