{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T13:47:24Z","timestamp":1768744044063,"version":"3.49.0"},"reference-count":82,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T00:00:00Z","timestamp":1643328000000},"content-version":"vor","delay-in-days":27,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Cybersecurity breaches are on the rise. Extant literature in the development of strategies to enhance IT users\u2019 online protective behaviours has neglected users\u2019 cognitive processing of cybersecurity risk information. This study demonstrates a cause\u2013effect elaboration procedure based on the concept of construal fit to influence online users\u2019 cybersecurity risk perceptions. Using online experiments (N\u00a0=\u00a0534), the construal fit between elaboration of causes vs effects of cybersecurity risks and perceived temporal distance (distant vs near) was manipulated. The results revealed that a construal fit between the elaboration of \u2018effects\u2019 (vs \u2018causes\u2019) and temporally \u2018near\u2019 (vs \u2018distant\u2019) cybersecurity risks enhanced users\u2019 risk perceptions, which in turn predicted protective behavioural intentions. Ensuring construal fit is a novel, cognition-based approach to safeguard IT users against online threats. Our findings enrich existing staged theories used to investigate cybersecurity risk perceptions and suggest to practitioners that heightened cyber risk perception can effectively be induced by simultaneously enhancing the concreteness of IT users\u2019 construal of cybersecurity incidents and emphasizing on its negative consequences (vs causes).<\/jats:p>","DOI":"10.1093\/cybsec\/tyab026","type":"journal-article","created":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T11:57:57Z","timestamp":1643371077000},"source":"Crossref","is-referenced-by-count":5,"title":["The impact of a cause\u2013effect elaboration procedure on information security risk perceptions: a construal fit perspective"],"prefix":"10.1093","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8944-027X","authenticated-orcid":false,"given":"Zhang Hao","family":"Goh","sequence":"first","affiliation":[{"name":"Wee Kim Wee School of Communication and Information, Nanyang Technological University , 31 Nanyang Link, 637718 , Singapore"}]},{"given":"Minzheng","family":"Hou","sequence":"additional","affiliation":[{"name":"Department of Psychology, Faculty of Arts and Social Sciences, National University of Singapore , 9 Arts Link, Block AS4, Level 2, 117570 , Singapore"}]},{"given":"Hichang","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Communications and New Media, Faculty of Arts & Social Sciences, National University of Singapore , Blk AS6, #03-41, 11 Computing Drive, 117416 , Singapore"}]}],"member":"286","published-online":{"date-parts":[[2022,1,28]]},"reference":[{"key":"2023052911513878900_bib1","volume-title":"Data breaches expose 4.8 billion records in first six months of 2019","author":"Winder"},{"key":"2023052911513878900_bib2","first-page":"131","article-title":"The role of psychology in enhancing cybersecurity","volume-title":"Cyberpsychology, Behavior, and Social Networking","author":"Wiederhold","year":"2014"},{"key":"2023052911513878900_bib3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/jogss\/ogz077","article-title":"The microfoundations of state cybersecurity: cyber risk perceptions and the mass public","volume":"6","author":"Kostyuk","year":"2021","journal-title":"J Glob Secur Stud"},{"key":"2023052911513878900_bib4","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1093\/isq\/sqab034","article-title":"Breaking the myth of cyber doom: securitization and normalization of novel threats","volume":"65","author":"Gomez","year":"2021","journal-title":"Int Stud Q"},{"key":"2023052911513878900_bib5","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1111\/j.1460-2466.2003.tb03005.x","article-title":"Setting the public fear agenda: a longitudinal analysis of network TV crime reporting, public perceptions of crime, and FBI crime statistics","volume":"53","author":"Lowry","year":"2003","journal-title":"J Commun"},{"key":"2023052911513878900_bib6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/B978-0-12-819204-7.00001-4","article-title":"Cybersecurity as a social phenomenon","volume-title":"Cyber Influence and Cognitive Threats","author":"McAlaney","year":"2020"},{"key":"2023052911513878900_bib7","doi-asserted-by":"crossref","DOI":"10.4324\/9781315661773","volume-title":"The Perception of Risk","author":"Slovic","year":"2016"},{"key":"2023052911513878900_bib8","doi-asserted-by":"crossref","first-page":"113","DOI":"10.25300\/MISQ\/2015\/39.1.06","article-title":"An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric","volume":"39","author":"Johnston","year":"2015","journal-title":"MIS Q"},{"key":"2023052911513878900_bib9","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","article-title":"A survey of emerging threats in cybersecurity","volume":"80","author":"Jang-Jaccard","year":"2014","journal-title":"J Comput Syst Sci"},{"key":"2023052911513878900_bib10","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.cose.2006.11.004","article-title":"A qualitative study of users\u2019 view on information security","volume":"26","author":"Albrechtsen","year":"2007","journal-title":"Comput Secur"},{"key":"2023052911513878900_bib11","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1145\/1899503.1899525","article-title":"Sweetening the medicine: educating users about information security by means of game play","volume-title":"SAICSIT '10: 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists","author":"Monk","year":"2010"},{"key":"2023052911513878900_bib12","first-page":"2988","article-title":"Enhancing password security through interactive fear appeals: a web-based field experiment","volume-title":"46th Hawaii International Conference on System Sciences","author":"Vance","year":"2013"},{"key":"2023052911513878900_bib13","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.procs.2021.01.103","article-title":"The role of employees\u2019 information security awareness on the intention to resist social engineering","volume":"181","author":"Grassegger","year":"2021","journal-title":"Procedia Comput Sci."},{"key":"2023052911513878900_bib14","first-page":"1","article-title":"Cognitive security: a comprehensive study of cognitive science in cybersecurity","volume":"48","author":"Andrade","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"2023052911513878900_bib15","volume-title":"What is cognition?","author":"Cherry"},{"key":"2023052911513878900_bib16","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.cose.2015.04.006","article-title":"Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs","volume":"52","author":"Tsohou","year":"2015","journal-title":"Comput Secur"},{"key":"2023052911513878900_bib17","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10796-008-9138-8","article-title":"The impact of trust, risk and optimism bias on e-file adoption","volume":"12","author":"Schaupp","year":"2010","journal-title":"Inf Syst Front"},{"key":"2023052911513878900_bib18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11409-016-9154-x","article-title":"Effects of disfluency on cognitive and metacognitive processes and outcomes","volume":"11","author":"K\u00fchl","year":"2016","journal-title":"Metacogn Learn"},{"key":"2023052911513878900_bib19","doi-asserted-by":"crossref","first-page":"229","DOI":"10.3758\/s13421-012-0255-8","article-title":"When disfluency is\u2014and is not\u2014a desirable difficulty: the influence of typeface clarity on metacognitive judgments and memory","volume":"41","author":"Yue","year":"2013","journal-title":"Mem Cognit"},{"key":"2023052911513878900_bib20","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/s11002-015-9359-9","article-title":"The effect of disfluency on consumer perceptions of information security","volume":"27","author":"Park","year":"2015","journal-title":"Mark Lett"},{"key":"2023052911513878900_bib21","doi-asserted-by":"crossref","first-page":"229","DOI":"10.4135\/9781446247631.n12","article-title":"Levels of mental construal","author":"Shapira","year":"2012","journal-title":"Sage Handbook of Social Cognition"},{"key":"2023052911513878900_bib22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.chb.2020.106606","article-title":"Bridging psychological distance: the impact of immersive media on distant and proximal environmental issues","volume":"115","author":"Breves","year":"2021","journal-title":"Comput Hum Behav"},{"key":"2023052911513878900_bib23","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1037\/a0018963","article-title":"Construal-level theory of psychological distance","volume":"117","author":"Trope","year":"2010","journal-title":"Psychol Rev"},{"key":"2023052911513878900_bib24","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1037\/0033-295X.110.3.403","article-title":"Temporal construal","volume":"110","author":"Trope","year":"2007","journal-title":"Psychol Rev"},{"key":"2023052911513878900_bib25","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1080\/07421222.2020.1790187","article-title":"The effectiveness of abstract versus concrete fear appeals in information security","volume":"37","author":"Schuetz","year":"2020","journal-title":"Manag Inf Syst"},{"key":"2023052911513878900_bib26","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1108\/ITP-01-2018-0001","article-title":"Nudging with construal level theory to improve online password use and intended password choice: a security-usability tradeoff perspective","volume":"32","author":"Kaleta","year":"2019","journal-title":"Inf Technol People"},{"key":"2023052911513878900_bib27","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1111\/add.12100","article-title":"Think abstractly, smoke less: a brief construal-level intervention can promote self-control, leading to reduced cigarette consumption among current smokers","volume":"108","author":"Chiou","year":"2013","journal-title":"Addiction"},{"key":"2023052911513878900_bib28","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1177\/10755470211008192","article-title":"How effective are concrete and abstract climate change images? The moderating role of construal level in climate change visual communication","volume":"43","author":"Duan","year":"2021","journal-title":"Sci Commun"},{"key":"2023052911513878900_bib29","first-page":"47","article-title":"Knowledge-based causal induction","volume-title":"The Psychology of Learning and Motivation","author":"Waldmann","year":"1996"},{"key":"2023052911513878900_bib30","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1037\/a0031024","article-title":"What happens why? Psychological distance and focusing on causes versus consequences of events","volume":"104","author":"Rim","year":"2013","journal-title":"J Pers Soc Psychol"},{"key":"2023052911513878900_bib31","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1037\/0278-7393.29.6.1141","article-title":"A causal-model theory of conceptual representation and categorization","volume":"29","author":"Rehder","year":"2003","journal-title":"Exp Psychol Learn Mem Cogn"},{"key":"2023052911513878900_bib32","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/S0079-7421(00)80017-1","article-title":"The causal status effect in categorization: an overview","volume":"40","author":"Ahn","year":"2000","journal-title":"Psychol Learn Motiv"},{"key":"2023052911513878900_bib33","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.tics.2014.03.001","article-title":"Traversing psychological distance","volume":"18","author":"Liberman","year":"2014","journal-title":"Trends Cogn Sci"},{"key":"2023052911513878900_bib34","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.chb.2009.07.003","article-title":"The impact of perceived ease of use on Internet service adoption: the moderating effects of temporal distance and perceived risk","volume":"26","author":"Shen","year":"2010","journal-title":"Comput Hum Behav"},{"key":"2023052911513878900_bib35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3267808","article-title":"Empirical measurement of perceived privacy risk","volume":"25","author":"Bhatia","year":"2018","journal-title":"ACM Trans Comput Hum Interact"},{"key":"2023052911513878900_bib36","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1207\/S15327957PSPR0504_2","article-title":"Negativity bias, negativity dominance, and contagion","volume":"5","author":"Rozin","year":"2001","journal-title":"Pers Soc Psychol Rev"},{"key":"2023052911513878900_bib37","first-page":"175","article-title":"Behavioral experiments exploring victims\u2019 response to cyber-based financial fraud and identity theft scenario simulations","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS} 2014)","author":"Rosoff","year":"2014"},{"key":"2023052911513878900_bib38","first-page":"1","volume-title":"Overview of cyber threats in central European countries. Communication and Information Technologies (KIT)","author":"Halouzka","year":"2021"},{"key":"2023052911513878900_bib39","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/CYCON.2016.7529427","article-title":"The cyber-doom effect: the impact of fear appeals in the US cyber security debate","volume-title":"2016 8th International Conference on Cyber Conflict (CyCon)","author":"Lawson","year":"2016"},{"key":"2023052911513878900_bib40","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1080\/19331681.2012.759059","article-title":"Beyond cyber-doom: assessing the limits of hypothetical scenarios in the framing of cyber-threats","volume":"10","author":"Lawson","year":"2013","journal-title":"J Inf Technol Politics"},{"key":"2023052911513878900_bib41","volume-title":"Cyberattacks are inevitable. Is your company prepared?","author":"Pearlson"},{"key":"2023052911513878900_bib42","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-4842-3060-2_1","article-title":"Not if, but when","volume-title":"Building a HIPAA-Compliant Cybersecurity Program","author":"Thompson","year":"2017"},{"key":"2023052911513878900_bib43","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1177\/1948550610381788","article-title":"Increasing level of aspiration by matching construal level and temporal distance","volume":"2","author":"Fessel","year":"2011","journal-title":"Soc Psychol Pers Sci"},{"key":"2023052911513878900_bib44","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1080\/02650487.2014.994731","article-title":"Message framing in green advertising: the effect of construal level and consumer environmental concern","volume":"34","author":"Chang","year":"2015","journal-title":"Int J Advert"},{"key":"2023052911513878900_bib45","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1080\/00913367.2014.967425","article-title":"Attributes versus benefits: the role of construal levels and appeal type on the persuasiveness of marketing messages","volume":"44","author":"Hernandez","year":"2015","journal-title":"J Advert"},{"key":"2023052911513878900_bib46","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.ijhm.2014.04.005","article-title":"How effective are your CSR messages? The moderating role of processing fluency and construal level","volume":"41","author":"Zhang","year":"2014","journal-title":"Int J Hosp Manag"},{"key":"2023052911513878900_bib47","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1111\/j.1467-9280.2008.02062.x","article-title":"Effects of fluency on psychological distance and mental construal (or why New York is a large city, but \u201cNew York\u201d is a civilized jungle)","volume":"19","author":"Alter","year":"2008","journal-title":"Psychol Sci"},{"key":"2023052911513878900_bib48","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1521\/soco.2013.31.3.315","article-title":"The \u201ctemporal-processing-fit effect\u201d: the interplay between regulatory state, temporal distance, and construal levels","volume":"31","author":"Steinhart","year":"2013","journal-title":"Soc Cogn"},{"key":"2023052911513878900_bib49","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1509\/jmkr.48.3.472","article-title":"It's the mind-set that matters: the role of construal level and message framing in influencing consumer efficacy and conservation behaviors","volume":"48","author":"White","year":"2015","journal-title":"J Mark Res"},{"key":"2023052911513878900_bib50","first-page":"735","article-title":"Value from regulatory construal fit: the persuasive impact of fit between consumer goals and message concreteness","volume":"36","author":"Lee","year":"2010","journal-title":"J Mark Res"},{"key":"2023052911513878900_bib51","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","author":"Rogers","year":"1975","journal-title":"J Psychol"},{"key":"2023052911513878900_bib52","first-page":"394","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","author":"Liang","year":"2010","journal-title":"J Assoc Inf Syst"},{"key":"2023052911513878900_bib53","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.3758\/BRM.41.4.1149","article-title":"Statistical power analyses using G*Power 3.1: tests for correlation and regression analyses","volume":"41","author":"Faul","year":"2009","journal-title":"Behav Res Methods"},{"key":"2023052911513878900_bib54","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1177\/002224376500200413","article-title":"Are open-ended questions worth the effort?","volume":"2","author":"Payne","year":"1965","journal-title":"J Mark Res"},{"key":"2023052911513878900_bib55","first-page":"159","article-title":"Open-ended vs. close-ended questions in web questionnaires","volume":"19","author":"Reja","year":"2003","journal-title":"Dev Appl Stat"},{"key":"2023052911513878900_bib56","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1037\/0022-3514.57.4.660","article-title":"Levels of personal agency: individual variation in action identification","volume":"57","author":"Vallacher","year":"1989","journal-title":"J Pers Soc Psychol"},{"key":"2023052911513878900_bib57","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1080\/108107396127988","article-title":"Predicting risk behaviors: development and validation of a diagnostic scale","volume":"1","author":"Witte","year":"1996","journal-title":"J Health Commun"},{"key":"2023052911513878900_bib58","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/10410230903473540","article-title":"Using protection motivation theory to predict condom usage and assess HIV health communication efficacy in Singapore","volume":"25","author":"Lwin","year":"2010","journal-title":"Health Commun"},{"key":"2023052911513878900_bib59","first-page":"721","article-title":"Intention-behavior consistency: the effect of time perspective","volume-title":"NA \u2013 Advances in Consumer Research","author":"Capar","year":"2009"},{"key":"2023052911513878900_bib60","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ Behav Hum Decis Process"},{"key":"2023052911513878900_bib61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/a0037754","article-title":"The reliability, validity, and accuracy of self-reported absenteeism from work: a meta-analysis","volume":"20","author":"Johns","year":"2015","journal-title":"J Occup Health Psychol"},{"key":"2023052911513878900_bib62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13011-018-0143-8","article-title":"Evaluation of the psychometric properties of self-reported measures of alcohol consumption: a COSMIN systematic review","volume":"13","author":"McKenna","year":"2018","journal-title":"Subst Abuse Treat Prev Policy"},{"key":"2023052911513878900_bib63","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen","year":"1988"},{"key":"2023052911513878900_bib64","volume-title":"Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach","author":"Hayes","year":"2017"},{"key":"2023052911513878900_bib65","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1177\/0002764219859633","article-title":"Conditional process analysis: concepts, computation, and advances in the modeling of the contingencies of mechanisms","volume":"64","author":"Hayes","year":"2020","journal-title":"Am Behav Sci"},{"key":"2023052911513878900_bib66","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1177\/1094428116658958","article-title":"Review and recommendations for integrating mediation and moderation","volume":"20","author":"Holland","year":"2017","journal-title":"Organ Res Methods"},{"key":"2023052911513878900_bib67","first-page":"216","article-title":"Construing risk: implications for risk communication","author":"Zwickle","year":"2013","journal-title":"Effective Risk Communication"},{"key":"2023052911513878900_bib68","article-title":"Introduction to the \u201crisky everyday\u201d","volume":"24","author":"Van\u00a0Voorst","year":"2015","journal-title":"Disaster Prev Manag"},{"key":"2023052911513878900_bib69","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: a protection motivation theory perspective","volume":"59","author":"Tsai","year":"2016","journal-title":"Comput Secur"},{"key":"2023052911513878900_bib70","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.chb.2016.11.033","article-title":"Online self-disclosure: the privacy paradox explained as a temporally discounted balance between concerns and rewards","volume":"68","author":"Hallam","year":"2017","journal-title":"Comput Hum Behav"},{"key":"2023052911513878900_bib71","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1086\/422116","article-title":"When a day means more than a year: effects of temporal framing on judgments of health risk","volume":"31","author":"Chandran","year":"2004","journal-title":"J Consum Res"},{"key":"2023052911513878900_bib72","first-page":"258","article-title":"Cyber security education for children through gamification: challenges and research perspectives","volume-title":"International Conference in Methodologies and Intelligent Systems for Technology Enhanced Learning","author":"Quayyum","year":"2020"},{"key":"2023052911513878900_bib73","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2019.101586","article-title":"Evaluating the effectiveness of learner controlled information security training","volume":"87","author":"Abraham","year":"2019","journal-title":"Comput Secur"},{"key":"2023052911513878900_bib74","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1086\/655855","article-title":"No Pain, no gain? How fluency and construal level affect consumer confidence","volume":"37","author":"Tsai","year":"2011","journal-title":"J Consum Res"},{"key":"2023052911513878900_bib75","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1037\/0033-295X.84.3.231","article-title":"Telling more than we can know: verbal reports on mental processes","volume":"84","author":"Nisbett","year":"1977","journal-title":"Psychol Rev"},{"key":"2023052911513878900_bib76","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1521\/soco.2014.32.3.297","article-title":"Perceiving risk in a dangerous world: associations between life experiences and risk perceptions","volume":"32","author":"Blum","year":"2014","journal-title":"Soc Cogn"},{"key":"2023052911513878900_bib77","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1108\/ICS-11-2016-0085","article-title":"Measuring attitude towards personal data for adaptive cybersecurity","volume":"25","author":"Addae","year":"2017","journal-title":"Inf Comput Secur"},{"key":"2023052911513878900_bib78","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1177\/0018720815585906","article-title":"The role of human factors\/ergonomics in the science of security: decision making and action selection in cyberspace","volume":"57","author":"Proctor","year":"2015","journal-title":"Hum Factors"},{"key":"2023052911513878900_bib79","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.chb.2015.01.039","article-title":"Effects of cyber security knowledge on attack detection","volume":"48","author":"Ben-Asher","year":"2015","journal-title":"Comput Hum Behav"},{"key":"2023052911513878900_bib80","first-page":"1","article-title":"Re-assessing elite-public gaps in political behavior","author":"Kertzer","year":"2020","journal-title":"Am J Pol Sci"},{"key":"2023052911513878900_bib81","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1080\/23738871.2018.1546884","article-title":"Russia's vision of cyberspace: a danger to regime security, public safety, and societal norms and cohesion","volume":"4","author":"Pigman","year":"2019","journal-title":"J Cyber Policy"},{"key":"2023052911513878900_bib82","volume-title":"CDC grand rounds: improving medication adherence for chronic disease management\u2014innovations and opportunities","author":"Neiman"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyab026\/50476478\/tyab026.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyab026\/50476478\/tyab026.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T11:52:55Z","timestamp":1685361175000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyab026\/6516497"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":82,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,28]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyab026","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,1,1]]},"published":{"date-parts":[[2022,1,1]]},"article-number":"tyab026"}}