{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:43:13Z","timestamp":1774453393311,"version":"3.50.1"},"reference-count":61,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2017,10,2]]},"DOI":"10.1080\/08874417.2016.1232991","type":"journal-article","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T10:58:30Z","timestamp":1477997910000},"page":"353-363","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":19,"title":["Analysis of Protective Behavior and Security Incidents for Home Computers"],"prefix":"10.1080","volume":"57","author":[{"given":"Garry","family":"White","sequence":"first","affiliation":[{"name":"Texas State University, San Marcos, TX, USA"}]},{"given":"Tahir","family":"Ekin","sequence":"additional","affiliation":[{"name":"Texas State University, San Marcos, TX, USA"}]},{"given":"Lucian","family":"Visinescu","sequence":"additional","affiliation":[{"name":"Texas State University, San Marcos, TX, USA"}]}],"member":"301","published-online":{"date-parts":[[2016,11]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/10650741111181580"},{"key":"e_1_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"e_1_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845654"},{"key":"e_1_3_1_5_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"issue":"7","key":"e_1_3_1_6_1","first-page":"1","article-title":"You\u2019ve got mail\u2026.and security breaches","volume":"25","author":"Britt P.","year":"2008","unstructured":"Britt P. You\u2019ve got mail\u2026.and security breaches. Inf Today 2008;25(7):1\u20131, 44.","journal-title":"Inf Today"},{"key":"e_1_3_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2012.11645573"},{"issue":"9","key":"e_1_3_1_9_1","first-page":"38","article-title":"The dollars & sense of business travel security awareness","volume":"49","author":"Crittenden P.","year":"2012","unstructured":"Crittenden P. The dollars & sense of business travel security awareness. Security. 2012;49(9):38\u201342.","journal-title":"Security"},{"issue":"2711","key":"e_1_3_1_10_1","first-page":"19a","article-title":"Cybersecurity \u2018starts at home","volume":"202","year":"2009","unstructured":"Cybersecurity \u2018starts at home. New Sci. 2009;202(2711):19a. Available from: http:\/\/search.proquest.com\/docview\/200458808?accountid=5683","journal-title":"New Sci."},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"issue":"1","key":"e_1_3_1_12_1","first-page":"94","article-title":"Computer security and the modern home","volume":"56","author":"Denning T, Kohno T, Levy HM","year":"2013","unstructured":"Denning T, Kohno T, Levy HM. Computer security and the modern home. Assoc Comput Mach. Commun ACM. 2013;56(1):94.","journal-title":"Assoc Comput Mach. Commun ACM."},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_3_1_14_1","unstructured":"Fox M Edwards E. Teens spend \u2018astounding\u2019 nine hours a day in front of screens: researchers. NBC News Health. 2015. [web access on November 24] Available from: https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__www.nbcnews.com_health_kids-2Dhealth_kids-2Dspend-2Dastounding-2Dnine-2Dhours-2Dday-2Dfront-2Dscreens-2Dresearchers-2Dn456446&d=BQIFaQ&c=OrYO-caJHQE1g_AJU3az1awi55It-bjDIQrtRiZ6WBk&r=gA9KwoVNR4Hf1oF0vRRojA&m=BngVrRSXmwtdwx2dXiDi9zsz0vtmfY5xNZh5nlLnTnY&s=ovGijM5KtBxs3DP-KuCTWYRQ5LQdcrSmNxK-fsRYz_4&e"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011095272"},{"issue":"3","key":"e_1_3_1_16_1","first-page":"24","article-title":"Companies need more security training programs, study finds","volume":"21","author":"Gage D.","year":"1996","unstructured":"Gage D. Companies need more security training programs, study finds. Inf World Can. 1996;21(3):24\u201325.","journal-title":"Inf World Can"},{"issue":"10","key":"e_1_3_1_17_1","first-page":"24","article-title":"Security education: something to think about","volume":"28","author":"Grau J.","year":"1984","unstructured":"Grau J. Security education: something to think about. Secur Manage. 1984;28(10):24.","journal-title":"Secur Manage"},{"issue":"8","key":"e_1_3_1_18_1","first-page":"47","article-title":"Security awareness + effective training = safer schools","volume":"30","author":"Greenberg M.","year":"1986","unstructured":"Greenberg M. Security awareness + effective training = safer schools. Secur Manage. 1986;30(8):47.","journal-title":"Secur Manage"},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/249656"},{"key":"e_1_3_1_20_1","volume-title":"Public participation in medical screening programs: a socio-psychological study","author":"Hochbaum GM.","year":"1958","unstructured":"Hochbaum GM. Public participation in medical screening programs: a socio-psychological study. US Department of Health, Education, and Welfare, Public Health Service, Bureau of State Services, Division of Special Health Services, Tuberculosis Program, 1958."},{"issue":"5","key":"e_1_3_1_21_1","article-title":"Survey shows high number of organizations suffered security breach in past year.","volume":"8","author":"Kieke RL.","year":"2006","unstructured":"Kieke RL. Survey shows high number of organizations suffered security breach in past year. J Health Care Compliance. 2006;8(5):49\u201350, 67\u201368.","journal-title":"J Health Care Compliance"},{"key":"e_1_3_1_22_1","volume-title":"Lessons on locking out human error: training staff not to activate viruses inadvertently is at least as important as in securing computer systems, writes Kim Thomas","author":"Kim T.","year":"2004","unstructured":"Kim T. Lessons on locking out human error: training staff not to activate viruses inadvertently is at least as important as in securing computer systems, writes Kim Thomas. Financial Times, October 13, 2004."},{"issue":"24","key":"e_1_3_1_23_1","first-page":"1","article-title":"Working from home will require more computer security precautions","volume":"83","author":"Letter Kirkplinger","year":"2006","unstructured":"Kirkplinger Letter. Working from home will require more computer security precautions. Kiplinger Lett. 2006;83(24):1.","journal-title":"Kiplinger Lett"},{"issue":"3","key":"e_1_3_1_24_1","first-page":"66","article-title":"Protect your business against dangerous information leaks","volume":"78","author":"Kirkpatrick J.","year":"2006","unstructured":"Kirkpatrick J. Protect your business against dangerous information leaks. Mach Des. 2006;78(3):66.","journal-title":"Mach Des"},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2009.03.002"},{"key":"e_1_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.06.010"},{"key":"e_1_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1325555.1325569"},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"e_1_3_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2013.11645634"},{"key":"e_1_3_1_30_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"issue":"2","key":"e_1_3_1_31_1","first-page":"27","article-title":"Optimizing anti-phishing solutions based on user awareness, education and the use of the latest web security solutions","volume":"14","author":"Lungu I","year":"2010","unstructured":"Lungu I, Tabusca A. Optimizing anti-phishing solutions based on user awareness, education and the use of the latest web security solutions. Inf Econ. 2010;14(2):27\u201336.","journal-title":"Inf Econ"},{"issue":"4","key":"e_1_3_1_32_1","first-page":"195","article-title":"Awareness education as the key to ransomware prevention","volume":"16","author":"Luo X","year":"2007","unstructured":"Luo X, Liao Q. Awareness education as the key to ransomware prevention. Inf Secur J. 2007;16(4):195\u2013202.","journal-title":"Inf Secur J"},{"key":"e_1_3_1_33_1","first-page":"35","article-title":"end-user training is critical to security","volume":"1194","author":"COMPTIA: McLaughlin K.","year":"2006","unstructured":"McLaughlin K. COMPTIA: end-user training is critical to security. CRN. 2006;1194:35.","journal-title":"CRN"},{"issue":"2","key":"e_1_3_1_34_1","first-page":"91","article-title":"Information security activities of college students: an exploratory study","volume":"14","author":"Mensch S","year":"2011","unstructured":"Mensch S, Wilkie L. Information security activities of college students: an exploratory study. Acad Inf Manage Sci J. 2011;14(2):91\u2013116.","journal-title":"Acad Inf Manage Sci J"},{"key":"e_1_3_1_35_1","volume-title":"Art of Deception","author":"The Mitnick K.","year":"2002","unstructured":"Mitnick K. The Art of Deception. Hoboken, NJ: John Wiley & Sons; 2002. p. 3."},{"key":"e_1_3_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"issue":"3","key":"e_1_3_1_37_1","first-page":"40","article-title":"Computer security: enabling the digital lifestyle","volume":"27","author":"O\u2019Dell R.","year":"2008","unstructured":"O\u2019Dell R. Computer security: enabling the digital lifestyle. Rural Telecommun. 2008;27(3):40\u201344.","journal-title":"Rural Telecommun"},{"key":"e_1_3_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701747237"},{"key":"e_1_3_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"e_1_3_1_40_1","doi-asserted-by":"publisher","DOI":"10.1108\/09670730510586986"},{"key":"e_1_3_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"issue":"1","key":"e_1_3_1_42_1","first-page":"60","article-title":"Network security: mission impossible?","volume":"17","author":"Radcliff D.","year":"1997","unstructured":"Radcliff D. Network security: mission impossible? Software Mag. 1997;17(1):60\u201366.","journal-title":"Software Mag"},{"key":"e_1_3_1_43_1","article-title":"Information security awareness in higher education: an exploratory study","volume":"27","author":"Rezui Y","year":"2008","unstructured":"Rezui Y, Marks A. Information security awareness in higher education: an exploratory study. Comput Secur. 2008;27(7\/8):241.","journal-title":"Comput Secur"},{"key":"e_1_3_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/109019817400200403"},{"key":"e_1_3_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/109019818801500203"},{"key":"e_1_3_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00102-5"},{"key":"e_1_3_1_48_1","unstructured":"Schultz E. Family computer crimes. Wall Street J (Online). 2012. Available from: http:\/\/search.proquest.com\/docview\/1038369686?accountid=5683"},{"issue":"2","key":"e_1_3_1_49_1","first-page":"10","article-title":"Successful security relies on corporate awareness training","volume":"22","author":"Sherizen S.","year":"1984","unstructured":"Sherizen S. Successful security relies on corporate awareness training. Data Manage. 1984;22(2):10.","journal-title":"Data Manage"},{"key":"e_1_3_1_50_1","unstructured":"Stanton L. Cyber security experts see need to modify reactive strategy. Cybersecur Policy Rep 1. 2010. Available from: http:\/\/search.poquest.com\/docview\/767101096?accountid=5683"},{"key":"e_1_3_1_51_1","volume-title":"An introduction to information protection and employee behavior. Chapter 1 in The Visible Employee","author":"Stanton JM","year":"2006","unstructured":"Stanton JM, Stam KR. An introduction to information protection and employee behavior. Chapter 1 in The Visible Employee, Information Today, Inc., Medford, NJ, 2006."},{"key":"e_1_3_1_52_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910944759"},{"key":"e_1_3_1_53_1","volume-title":"Symantec internet security threat report: trends for 2008","author":"Symantec","year":"2009","unstructured":"Symantec, Symantec internet security threat report: trends for 2008. Cupertino, CA: Symantec Corporation; 2009."},{"key":"e_1_3_1_54_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"issue":"4","key":"e_1_3_1_55_1","first-page":"44","article-title":"Breaches lead to employee training","volume":"54","author":"Wagley J.","year":"2010","unstructured":"Wagley J. Breaches lead to employee training. Secur Manage. 2010;54(4):44.","journal-title":"Secur Manage"},{"key":"e_1_3_1_56_1","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1996.15.1.1"},{"key":"e_1_3_1_57_1","unstructured":"White G. Evolution to global assurance. Proceedings of the International Association of Computer Information Systems \u2013 50th Annual Conference; Las Vegas NV; October 6\u20139 2010."},{"key":"e_1_3_1_58_1","unstructured":"White G. Information security education relationships on incidents and preventions: cyber assurance literacy needs. Proceedings of the 2012 Annual Information Systems Educators Conference (ISECON); New Orleans LA; November 1\u20134 2012."},{"key":"e_1_3_1_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645769"},{"key":"e_1_3_1_60_1","doi-asserted-by":"publisher","DOI":"10.19030\/rbis.v15i3.5398"},{"issue":"4","key":"e_1_3_1_61_1","first-page":"165","article-title":"Security awareness programs","volume":"16","author":"Wu Y","year":"2012","unstructured":"Wu Y, Guynes CS, Windsor J. Security awareness programs. Rev Bus Inf Syst (Online). 2012;16(4):165.","journal-title":"Rev Bus Inf Syst (Online)"},{"issue":"4","key":"e_1_3_1_62_1","first-page":"407","article-title":"Exploring factors that influence students\u2019 behaviors in information security","volume":"23","author":"Yoon C","year":"2012","unstructured":"Yoon C, Hwang JW, Kim R. Exploring factors that influence students\u2019 behaviors in information security. J Inf Syst Edu. 2012;23(4):407\u2013415.","journal-title":"J Inf Syst Edu"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2016.1232991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T23:40:45Z","timestamp":1770939645000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2016.1232991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10,2]]}},"alternative-id":["10.1080\/08874417.2016.1232991"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2016.1232991","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2016-11-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}