{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:43:38Z","timestamp":1774453418786,"version":"3.50.1"},"reference-count":73,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Systems Management"],"published-print":{"date-parts":[[2016,1,2]]},"DOI":"10.1080\/10580530.2015.1117842","type":"journal-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T19:53:32Z","timestamp":1448913212000},"page":"2-16","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":160,"title":["Impact of Users\u2019 Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective"],"prefix":"10.1080","volume":"33","author":[{"given":"Bartlomiej","family":"Hanus","sequence":"first","affiliation":[]},{"given":"Yu \u201cAndy\u201d","family":"Wu","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,11,30]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1080\/08870449408407485"},{"key":"CIT0002","volume-title":"Attitudes, personality and behavior","author":"Ajzen I.","year":"2005","edition":"2"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"issue":"3","key":"CIT0004","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"Anderson C. L.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1348\/014466601164939"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2307\/258555"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/BF01173354"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1177\/109019817400200407"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"CIT0012","volume-title":"Modern methods for Business Research (pp. 295\u2013358)","author":"Chin, W. W.","year":"1998"},{"key":"CIT0013","volume-title":"Security awareness: Applying practical security in your world","author":"Ciampa M.","year":"2010","edition":"3"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"CIT0015","volume-title":"Protection motivation theory: Understanding determinants to backing up personal data","author":"Crossler R. E.","year":"2010"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"issue":"7","key":"CIT0017","doi-asserted-by":"crossref","first-page":"386","DOI":"10.17705\/1jais.00133","volume":"8","author":"Dinev T.","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"key":"CIT0018","volume-title":"Computerization and controversy\u2014value conflicts and social change","author":"Dunlop C.","year":"1992"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.4.1149"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.2307\/3150980"},{"issue":"2","key":"CIT0021","doi-asserted-by":"crossref","first-page":"iii","DOI":"10.2307\/23044042","volume":"35","author":"Gefen D.","year":"2011","journal-title":"MIS Quarterly"},{"issue":"1","key":"CIT0022","first-page":"109","volume":"16","author":"Gefen D.","year":"2005","journal-title":"Communications of the Association for Information Systems"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910978112"},{"key":"CIT0024","volume-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","author":"Hair J. F.","year":"2014"},{"key":"CIT0025","volume-title":"CISSP all-in-one exam guide","author":"Harris S.","year":"2008","edition":"4"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1093\/her\/7.1.107"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1108\/S1474-7979(2009)0000020014"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1201\/9781439815465"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00403-5"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/08870449808406749"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-012-0147-4"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1177\/0092070398261002"},{"issue":"3","key":"CIT0034","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"Johnston A. C.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0035","volume-title":"Multiple regression and beyond","author":"Keith T. Z.","year":"2005"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/45099.22.2.20050301\/87273.2"},{"key":"CIT0037","volume-title":"Correlation and causality","author":"Kenny D. A.","year":"1979"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.06.010"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1145\/1754393"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1145\/1325555"},{"issue":"1","key":"CIT0042","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","volume":"31","author":"Liang H.","year":"2007","journal-title":"MIS Quarterly"},{"issue":"7","key":"CIT0043","doi-asserted-by":"crossref","first-page":"394","DOI":"10.17705\/1jais.00232","volume":"11","author":"Liang H.","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1111\/jasp.2000.30.issue-1"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.58.3.472"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.206"},{"key":"CIT0051","volume-title":"The social system","author":"Parsons T.","year":"1991","edition":"2"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1201\/9780203325438.ch97"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1093\/her\/1.3.153"},{"issue":"4","key":"CIT0055","doi-asserted-by":"crossref","first-page":"767","DOI":"10.2307\/25750704","volume":"34","author":"Puhakainen P.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"CIT0058","volume-title":"Social psychophysiology","author":"Rogers R. W.","year":"1983"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.2307\/3348967"},{"key":"CIT0061","volume-title":"The fifth discipline: The art & practice of the learning organization","author":"Senge P. M.","year":"1994"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1002\/pam.10129"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1145\/503345.503348"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1080\/10580530802384639"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1111\/jasp.1998.28.issue-15"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.27"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1108\/09685229810227649"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"issue":"3","key":"CIT0074","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"Venkatesh V.","year":"2003","journal-title":"MIS Quarterly"},{"key":"CIT0075","volume-title":"Impact of protection motivation and deterrence on IS security policy compliance: A multi-cultural view (Paper 20)","author":"Warkentin M.","year":"2012"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.7.4.355"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.12.4.324"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1177\/001316447403400104"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1177\/109019810002700506"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1080\/108107396127988"},{"key":"CIT0081","volume-title":"A protection motivation theory approach to home wireless security","author":"Woon I.","year":"2005"}],"container-title":["Information Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10580530.2015.1117842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T02:35:43Z","timestamp":1567391743000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10580530.2015.1117842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,30]]},"references-count":73,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,11,30]]},"published-print":{"date-parts":[[2016,1,2]]}},"alternative-id":["10.1080\/10580530.2015.1117842"],"URL":"https:\/\/doi.org\/10.1080\/10580530.2015.1117842","relation":{},"ISSN":["1058-0530","1934-8703"],"issn-type":[{"value":"1058-0530","type":"print"},{"value":"1934-8703","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}