{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:43:20Z","timestamp":1774453400331,"version":"3.50.1"},"reference-count":60,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2022,1,2]]},"DOI":"10.1080\/08874417.2019.1697860","type":"journal-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T10:56:52Z","timestamp":1581677812000},"page":"50-60","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":15,"title":["Optimistic Bias and Exposure Affect Security Incidents on Home Computer"],"prefix":"10.1080","volume":"62","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4056-2852","authenticated-orcid":false,"given":"Barbara","family":"Hewitt","sequence":"first","affiliation":[{"name":"Texas State University","place":["San Marcos, USA"]}]},{"given":"Garry L.","family":"White","sequence":"additional","affiliation":[{"name":"Texas State University","place":["San Marcos, USA"]}]}],"member":"301","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845654"},{"key":"e_1_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322817"},{"key":"e_1_3_1_5_1","unstructured":"Thomas K Lessons on locking out human error. Financial Times. 2004."},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.07.008"},{"key":"e_1_3_1_7_1","first-page":"66","article-title":"Protect your business against dangerous information leaks","volume":"78","author":"Kirkpatrick J","year":"2006","unstructured":"Kirkpatrick J. Protect your business against dangerous information leaks. Mach Des. 2006;78:66.","journal-title":"Mach Des"},{"key":"e_1_3_1_8_1","volume-title":"The art of deception: controlling the human element of security","author":"Mitnick KD","year":"2002","unstructured":"Mitnick KD, Simon WL, Wozniak S. The art of deception: controlling the human element of security; 2002. Paperback ISBN 0-471-23712-4. 2006."},{"key":"e_1_3_1_9_1","first-page":"91","article-title":"Information security activities of college students: an exploratory study","volume":"14","author":"Mensch S","year":"2011","unstructured":"Mensch S, Wilkie L. Information security activities of college students: an exploratory study. Acad Inf Manage Sci J. 2011;14:91.","journal-title":"Acad Inf Manage Sci J"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.330"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701747237"},{"key":"e_1_3_1_12_1","first-page":"22","article-title":"Refining technology threat avoidance theory","volume":"44","author":"Carpenter D","year":"2019","unstructured":"Carpenter D, Young D, Barrett P, McLeod A. Refining technology threat avoidance theory. Commun Assoc Inf Syst. 2019;44:22.","journal-title":"Commun Assoc Inf Syst"},{"key":"e_1_3_1_13_1","article-title":"Refining the threat calculus of technology threat avoidance theory","author":"Boysen S","year":"2019","unstructured":"Boysen S, Hewitt B, McLeod A, Gibbs D. Refining the threat calculus of technology threat avoidance theory. Commun Assoc Inf Syst. 2019.","journal-title":"Commun Assoc Inf Syst"},{"key":"e_1_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1325555"},{"key":"e_1_3_1_15_1","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1361-3723(15)30046-4","article-title":"Making security awareness training work","volume":"2016","author":"Caldwell T","year":"2016","unstructured":"Caldwell T. Making security awareness training work. Computr Fraud Secur. 2016;2016:8\u201314.","journal-title":"Computr Fraud Secur"},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"e_1_3_1_17_1","first-page":"1","article-title":"You\u2019ve got mail and security breaches-email has become business\u2019 preferred communication tool, but how secure is it?","volume":"25","author":"Britt P","year":"2008","unstructured":"Britt P. You\u2019ve got mail and security breaches-email has become business\u2019 preferred communication tool, but how secure is it? Inf Today. 2008;25:1.","journal-title":"Inf Today"},{"key":"e_1_3_1_18_1","unstructured":"McLaughlin K. CompTIA: end-user training is critical to security. CRN. 2006."},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1108\/09670730510586986"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"key":"e_1_3_1_21_1","first-page":"10","article-title":"Successful security relies on corporate awareness training","volume":"22","author":"Sherizen S","year":"1984","unstructured":"Sherizen S. Successful security relies on corporate awareness training. Data Manage. 1984;22:10\u201312.","journal-title":"Data Manage"},{"issue":"4","key":"e_1_3_1_22_1","first-page":"4","article-title":"Breaches lead to employee training","volume":"54","author":"Wagley J.","year":"2010","unstructured":"Wagley J. Breaches lead to employee training. Security Management. 2010;54(4):4.","journal-title":"Security Management."},{"key":"e_1_3_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645769"},{"key":"e_1_3_1_24_1","volume-title":"Proceedings of the Information Systems Educators Conference","author":"White GL","year":"2012","unstructured":"White GL, Editor information security education relationships on incidents and preventions: cyber assurance literacy needs. Proceedings of the Information Systems Educators Conference; 2012 November 1\u20134, 2012.; New Orleans, LA: ISECON."},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.009"},{"key":"e_1_3_1_26_1","unstructured":"Schultz E. Family computer crimes. Wall Street Journal; 2012."},{"key":"e_1_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_3_1_29_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011095236"},{"key":"e_1_3_1_30_1","first-page":"31","article-title":"Crimes of the vault","volume":"34","author":"Brown C","year":"1990","unstructured":"Brown C. Crimes of the vault. Secur Manage. 1990;34:31.","journal-title":"Secur Manage"},{"key":"e_1_3_1_31_1","first-page":"47","article-title":"Security Awareness+ Effective Training= Safer schools","volume":"30","author":"Greenberg M","year":"1986","unstructured":"Greenberg M. Security Awareness+ Effective Training= Safer schools. Secur Manage. 1986;30:47.","journal-title":"Secur Manage"},{"key":"e_1_3_1_32_1","first-page":"24","article-title":"Companies need more security training programs, study finds","volume":"21","author":"Gage D","year":"1996","unstructured":"Gage D. Companies need more security training programs, study finds. Info World Can. 1996;21:24\u201325.","journal-title":"Info World Can"},{"key":"e_1_3_1_33_1","first-page":"25","article-title":"Security education: something to think about","volume":"28","author":"Grau J","year":"1984","unstructured":"Grau J. Security education: something to think about. Secur Manage. 1984;28:25\u201331.","journal-title":"Secur Manage"},{"key":"e_1_3_1_34_1","first-page":"49","article-title":"Survey shows high number of organizations suffered security breach in past year","volume":"8","author":"Kieke R","year":"2006","unstructured":"Kieke R. Survey shows high number of organizations suffered security breach in past year. J Health Care Compliance. 2006;8:49\u201368.","journal-title":"J Health Care Compliance"},{"key":"e_1_3_1_35_1","first-page":"12","article-title":"Sealing the breach","volume":"99","author":"Ballard C","year":"2010","unstructured":"Ballard C. Sealing the breach. Texas Banking. 2010;99:12\u20133, 20.","journal-title":"Texas Banking"},{"key":"e_1_3_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"e_1_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.2014.34.issue-6"},{"key":"e_1_3_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2010.11645471"},{"key":"e_1_3_1_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.39.5.806"},{"key":"e_1_3_1_40_1","first-page":"2","article-title":"Self-protective pessimism: optimistic bias in reverse","volume":"3","author":"Chapin JR","year":"2001","unstructured":"Chapin JR. Self-protective pessimism: optimistic bias in reverse. N Am J Psychol. 2001;3:2.","journal-title":"N Am J Psychol"},{"key":"e_1_3_1_41_1","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1996.15.1.1"},{"key":"e_1_3_1_42_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0013315"},{"key":"e_1_3_1_43_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.81.3.476"},{"key":"e_1_3_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/00221309.2011.635724"},{"key":"e_1_3_1_45_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.2008.58.issue-3"},{"key":"e_1_3_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2017.1400930"},{"key":"e_1_3_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.02.012"},{"key":"e_1_3_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.001"},{"key":"e_1_3_1_49_1","doi-asserted-by":"publisher","DOI":"10.19030\/rbis.v15i3.5398"},{"key":"e_1_3_1_50_1","doi-asserted-by":"publisher","DOI":"10.4018\/JOEUC"},{"key":"e_1_3_1_51_1","first-page":"182","article-title":"Improving protection and security awareness amongst home users. Advances in Networks","volume":"4","author":"Bryant P","year":"2008","unstructured":"Bryant P, Furnell S, Phippen A. Improving protection and security awareness amongst home users. Advances in Networks. Comput Commun. 2008;4:182.","journal-title":"Comput Commun"},{"key":"e_1_3_1_52_1","doi-asserted-by":"publisher","DOI":"10.1111\/apps.2018.67.issue-2"},{"key":"e_1_3_1_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/109467050024001"},{"key":"e_1_3_1_54_1","doi-asserted-by":"publisher","DOI":"10.1108\/09564231211208961"},{"key":"e_1_3_1_55_1","first-page":"1","article-title":"Optimistic bias: what you think, what you know, or whom you know?","volume":"11","author":"Chapin J","year":"2009","unstructured":"Chapin J, Coleman G. Optimistic bias: what you think, what you know, or whom you know? N Am J Psychol. 2009;11:1.","journal-title":"N Am J Psychol"},{"key":"e_1_3_1_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2012.11645573"},{"key":"e_1_3_1_57_1","first-page":"27","article-title":"Optimizing anti-phishing solutions based on user awareness, education and the use of the latest web security solutions","volume":"14","author":"Lungu I","year":"2010","unstructured":"Lungu I, Tabusca A. Optimizing anti-phishing solutions based on user awareness, education and the use of the latest web security solutions. Informatica Economica. 2010;14:27.","journal-title":"Informatica Economica"},{"key":"e_1_3_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1232991"},{"key":"e_1_3_1_59_1","first-page":"407","article-title":"exploring factors that influence students\u2019 behaviors in information security","volume":"23","author":"Yoon C","year":"2012","unstructured":"Yoon C, Hwang J-W, Kim R. exploring factors that influence students\u2019 behaviors in information security. J Inf Syst Educ. 2012;23:407.","journal-title":"J Inf Syst Educ"},{"key":"e_1_3_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"e_1_3_1_61_1","volume-title":"System Sciences, 2009 HICSS\u201909 42nd Hawaii International Conference on","author":"Chenoweth T","year":"2009","unstructured":"Chenoweth T, Minch R, Gattiker T. Application of protection motivation theory to adoption of protective technologies. System Sciences, 2009 HICSS\u201909 42nd Hawaii International Conference on; 2009; Big Island, HI: IEEE."}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2019.1697860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T00:57:02Z","timestamp":1770944222000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2019.1697860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,14]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,2]]}},"alternative-id":["10.1080\/08874417.2019.1697860"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2019.1697860","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-02-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}