{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T10:38:03Z","timestamp":1762079883131,"version":"3.41.2"},"reference-count":70,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":184,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004299","name":"Secretar\u00eda de Educaci\u00f3n Superior, Ciencia, Tecnolog\u00eda e Innovaci\u00f3n","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004299","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Numerous factors determine information security-related actions (IS-actions) in the workplace. Attitudes toward following security rules and recommendations and attitudes toward specific IS actions determine intentions associated with those actions. IS research has examined the role of the instrumental aspect of attitudes. However, authors argue that attitudes toward a behavioral object are a multidimensional construct. We examined the dimensionality of attitudes toward security recommendations, hypothesized its multidimensional nature, and developed a new scale [attitudes toward security recommendations (ASR scale)]. The results indicated the multidimensional nature of attitudes toward security recommendations supporting our hypothesis. The results revealed two dimensions corresponding to the perceived legitimacy and effectiveness of security recommendations and its perceived rigor. The new ASR scale showed good psychometric properties. This work contributes to the IS research at suggesting that attitudes are a multidimensional construct in the IS context. These findings imply that the employee\u2019s evaluation of information security policy can be examined considering their instrumentality (security recommendations are important) and rigor (security recommendations are strict). Different effects of the dimensions of attitudes over IS-action suggest different interventions. Additionally, this study offers the ASR scale as a new instrument to capture employees\u2019 evaluation of security recommendations.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae011","type":"journal-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T16:21:13Z","timestamp":1720023673000},"source":"Crossref","is-referenced-by-count":4,"title":["It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations"],"prefix":"10.1093","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8699-3685","authenticated-orcid":false,"given":"Miguel A","family":"Toro-Jarrin","sequence":"first","affiliation":[{"name":"Agro-industrial Sciences Department, Yachay Tech , Hacienda San Jose, Urcuqui, 100115 ,","place":["Ecuador"]}]},{"given":"Pilar","family":"Pazos","sequence":"additional","affiliation":[{"name":"Engineering Management Department, Old Dominion University , Norfolk, VA 23529 ,","place":["United States"]}]},{"given":"Miguel A","family":"Padilla","sequence":"additional","affiliation":[{"name":"Department of Psychology, Old Dominion University , Norfolk, VA 23529 ,","place":["United States"]}]}],"member":"286","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"2024121909124913600_bib1","doi-asserted-by":"crossref","first-page":"386","DOI":"10.17705\/1jais.00133","article-title":"The centrality of awareness in the formation of user behavioral intention toward protective information technologies","volume":"8","author":"Dinev","year":"2007","journal-title":"JAIS"},{"key":"2024121909124913600_bib2","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1108\/ICS-03-2017-0018","article-title":"Comparing three models to explain precautionary online behavioural intentions","volume":"25","author":"Jansen","year":"2017","journal-title":"Inf Comput Secur"},{"key":"2024121909124913600_bib3","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information Security Policy compliance: an empirical study of rationality-based beliefs and Information security awareness","volume":"34","author":"Bulgurcu","year":"2010","journal-title":"MIS Quart"},{"key":"2024121909124913600_bib4","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.cose.2018.09.016","article-title":"Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education","volume":"80","author":"Rajab","year":"2019","journal-title":"Comput Secur"},{"key":"2024121909124913600_bib5","doi-asserted-by":"crossref","DOI":"10.1002\/9780470561119","volume-title":"Handbook of Social Psychology","author":"Fiske","year":"2010","edition":"5th edn"},{"key":"2024121909124913600_bib6","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1080\/00222216.1992.11969889","article-title":"Application of the theory of planned behavior to leisure choice","volume":"24","author":"Ajzen","year":"1992","journal-title":"J Leisure Res"},{"volume-title":"The Measurement of Meaning","year":"1957","author":"Osgood","key":"2024121909124913600_bib7"},{"key":"2024121909124913600_bib8","doi-asserted-by":"crossref","first-page":"2873","DOI":"10.1145\/2702123.2702249","article-title":"Scaling the security wall: developing a security behavior intentions scale (SEBIS)","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","author":"Egelman","year":"2015"},{"key":"2024121909124913600_bib9","first-page":"61","article-title":"A self-report measure of end-user security attitudes (SA-6)","volume-title":"Proceedings of the Fifteenth Symposium on Usable Privacy and Security","author":"Faklaris","year":"2019"},{"key":"2024121909124913600_bib10","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","article-title":"The human aspects of information security questionnaire (HAIS-Q): two further validation studies","volume":"66","author":"Parsons","year":"2017","journal-title":"Comput Secur"},{"volume-title":"Predicting and Changing Behavior the Reasoned Action Approach","year":"2010","author":"Fishbein","key":"2024121909124913600_bib11"},{"volume-title":"The Psychology of Attitudes","year":"1993","author":"Eagly","key":"2024121909124913600_bib12"},{"volume-title":"The Psychology of Attitudes and Attitude Change","year":"2018","author":"Maio","key":"2024121909124913600_bib13"},{"volume-title":"Belief, Attitude, Intention, and Behavior an Introduction to Theory and Research","year":"1975","author":"Fishbein","key":"2024121909124913600_bib14"},{"key":"2024121909124913600_bib15","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ Behav Hum Decis Process"},{"key":"2024121909124913600_bib16","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1016\/j.im.2015.07.008","article-title":"Dysfunctional information system behaviors are not all created the same: challenges to the generalizability of security-based research","volume":"52","author":"Djajadikerta","year":"2015","journal-title":"Inf Manag"},{"key":"2024121909124913600_bib17","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation and deterrence: a framework for security policy compliance in organisations","volume":"18","author":"Herath","year":"2009","journal-title":"Eur J Inf Syst"},{"key":"2024121909124913600_bib18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.2753\/MIS0742-1222280208","article-title":"Understanding nonmalicious security violations in the workplace: a composite behavior model","volume":"28","author":"Guo","year":"2011","journal-title":"J Manag Inf Syst"},{"key":"2024121909124913600_bib19","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.im.2003.12.008","article-title":"What influences IT ethical behavior intentions\u2014planned behavior, reasoned action, perceived importance, or individual characteristics?","volume":"42","author":"Leonard","year":"2004","journal-title":"Inf Manag"},{"key":"2024121909124913600_bib20","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.chb.2016.11.065","article-title":"Individual differences and information security awareness","volume":"69","author":"McCormac","year":"2017","journal-title":"Comput Hum Behav"},{"key":"2024121909124913600_bib21","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1108\/IMCS-10-2013-0078","article-title":"A study of information security awareness in Australian government organisations","volume":"22","author":"Parsons","year":"2014","journal-title":"Inf Manag Comput Secur"},{"key":"2024121909124913600_bib22","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2013.12.003","article-title":"Determining employee awareness using the Human aspects of information security questionnaire (HAIS-Q)","volume":"42","author":"Parsons","year":"2014","journal-title":"Comput Secur"},{"key":"2024121909124913600_bib23","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.cose.2015.02.008","article-title":"The design of phishing studies: challenges for researchers","volume":"52","author":"Parsons","year":"2015","journal-title":"Comput Secur"},{"key":"2024121909124913600_bib24","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","article-title":"Employees\u2019 adherence to information security policies: an exploratory field study","volume":"51","author":"Siponen","year":"2014","journal-title":"Inf Manag"},{"key":"2024121909124913600_bib25","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.cose.2015.10.006","article-title":"Information security policy compliance model in organizations","volume":"56","author":"Safa","year":"2016","journal-title":"Comput Secur"},{"key":"2024121909124913600_bib26","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.17705\/1jais.00583","article-title":"Generally speaking, context matters: making the case for a change from universal to particular ISP research","volume":"20","author":"Aurigemma","year":"2019","journal-title":"JAIS"},{"key":"2024121909124913600_bib27","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions","volume":"34","author":"Anderson","year":"2010","journal-title":"MIS Quart"},{"key":"2024121909124913600_bib28","doi-asserted-by":"crossref","first-page":"31","DOI":"10.2307\/249677","article-title":"Modeling IT ethics: a study in situational ethics","volume":"22","author":"Banerjee","year":"1998","journal-title":"MIS Quart"},{"key":"2024121909124913600_bib29","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.im.2017.01.003","article-title":"Determinants of early conformance with information security policies","volume":"54","author":"B\u00e9langer","year":"2017","journal-title":"Inf Manag"},{"key":"2024121909124913600_bib30","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","author":"Ifinedo","year":"2012","journal-title":"Comput Secur"},{"key":"2024121909124913600_bib31","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","article-title":"Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition","volume":"51","author":"Ifinedo","year":"2014","journal-title":"Inf Manag"},{"key":"2024121909124913600_bib32","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1080\/08870440701544437","article-title":"How well do the theory of reasoned action and theory of planned behaviour predict intentions and attendance at screening programmes? A meta-analysis","volume":"23","author":"Cooke","year":"2008","journal-title":"Psychol Health"},{"key":"2024121909124913600_bib33","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1123\/jsep.24.1.3","article-title":"A meta-analytic review of the theories of reasoned action and planned behavior in physical activity: predictive validity and the contribution of additional variables","volume":"24","author":"Hagger","year":"2002","journal-title":"J Sport Exer Psychol"},{"key":"2024121909124913600_bib34","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.ypmed.2015.08.020","article-title":"The Theory of Planned Behaviour and dietary patterns: a systematic review and meta-analysis","volume":"81","author":"McDermott","year":"2015","journal-title":"Prev Med"},{"key":"2024121909124913600_bib35","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1080\/17437199.2010.521684","article-title":"Prospective prediction of health-related behaviours with the Theory of Planned Behaviour: a meta-analysis","volume":"5","author":"McEachan","year":"2011","journal-title":"Health Psychol Rev"},{"key":"2024121909124913600_bib36","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1007\/s10865-015-9644-3","article-title":"Theory of Planned Behavior and adherence in chronic illness: a meta-analysis","volume":"38","author":"Rich","year":"2015","journal-title":"J Behav Med"},{"key":"2024121909124913600_bib37","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.eatbeh.2015.05.016","article-title":"A systematic literature review and meta-analysis: the Theory of Planned Behavior's application to understand and predict nutrition-related behaviors in youth","volume":"18","author":"Riebl","year":"2015","journal-title":"Eat Behav"},{"key":"2024121909124913600_bib38","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.appet.2017.02.007","article-title":"Predicting organic food consumption: a meta-analytic structural equation model based on the theory of planned behavior","volume":"112","author":"Scalco","year":"2017","journal-title":"Appetite"},{"key":"2024121909124913600_bib39","doi-asserted-by":"crossref","first-page":"1624","DOI":"10.1111\/j.1559-1816.1999.tb02045.x","article-title":"Predicting intentions to use condoms: a meta-analysis and comparison of the theories of reasoned action and planned behavior 1","volume":"29","author":"Sheeran","year":"1999","journal-title":"J Appl Soc Pyschol"},{"key":"2024121909124913600_bib40","doi-asserted-by":"crossref","first-page":"1272","DOI":"10.1080\/08870446.2016.1204449","article-title":"Predicting sun-protective intentions and behaviours using the theory of planned behaviour: a systematic review and meta-analysis","volume":"31","author":"Starfelt\u00a0Sutton","year":"2016","journal-title":"Psychol Health"},{"key":"2024121909124913600_bib41","doi-asserted-by":"crossref","first-page":"23","DOI":"10.2147\/SAR.S15168","article-title":"Theory of planned behavior and smoking: meta-analysis and SEM model","volume":"1","author":"Topa","year":"2010","journal-title":"SAR"},{"key":"2024121909124913600_bib42","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.ypmed.2013.01.013","article-title":"Social cognitive theories used to explain physical activity behavior in adolescents: a systematic review and meta-analysis","volume":"56","author":"Plotnikoff","year":"2013","journal-title":"Prev Med"},{"key":"2024121909124913600_bib43","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1037\/hea0000047","article-title":"Theory of Planned Behavior interventions for reducing heterosexual risk behaviors: a meta-analysis","volume":"33","author":"Tyson","year":"2014","journal-title":"Health Psychol"},{"key":"2024121909124913600_bib44","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1080\/17437199.2014.947547","article-title":"How well does the theory of planned behaviour predict alcohol consumption? A systematic review and meta-analysis","volume":"10","author":"Cooke","year":"2016","journal-title":"Health Psychol Rev"},{"key":"2024121909124913600_bib69_518_285124","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1037\/0278-6133.21.2.194","article-title":"The theory of planned behavior and healthy eating","volume":"21","author":"Conner","year":"2002","journal-title":"Health Psychol"},{"key":"2024121909124913600_bib45","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: an empirical study","volume":"34","author":"Johnston","year":"2010","journal-title":"MIS Quart"},{"key":"2024121909124913600_bib46","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1111\/isj.12129","article-title":"Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives: examining the influence of disgruntlement on computer abuse intentions","volume":"28","author":"Willison","year":"2018","journal-title":"Inf Syst J"},{"key":"2024121909124913600_bib47","first-page":"2998","article-title":"Explaining opposing compliance motivations towards organizational information security policies","volume-title":"Proceedings of the\u00a0Annual Hawaii International Conference on System Sciences","author":"Lowry","year":"2013"},{"key":"2024121909124913600_bib48","doi-asserted-by":"crossref","first-page":"1187","DOI":"10.17705\/1jais.00524","article-title":"A tale of two deterrents: considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research","volume":"19","author":"Willison","year":"2018","journal-title":"JAIS"},{"volume-title":"RStudio: Integrated Development for R","year":"2020","author":"RStudio Team","key":"2024121909124913600_bib49"},{"key":"2024121909124913600_bib50","volume-title":"Using Multivariate Statistics","author":"Tabachnick","year":"2001","edition":"4th edn"},{"key":"2024121909124913600_bib51","volume-title":"Psychometric Theory","author":"Nunnally","year":"1994","edition":"3rd edn"},{"key":"2024121909124913600_bib52","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1037\/0033-2909.107.2.238","article-title":"Comparative fit indexes in structural models","volume":"107","author":"Bentler","year":"1990","journal-title":"Psychol Bull"},{"article-title":"EQS 6.1 for Windows \u2013 structural equations program manual","year":"2005","author":"Bentler","key":"2024121909124913600_bib53"},{"key":"2024121909124913600_bib54","article-title":"Statistically based tests for the number of common factors","volume-title":"Annual Meeting of the Psychometric Sociality","author":"Steiger","year":"1980"},{"key":"2024121909124913600_bib67","doi-asserted-by":"crossref","first-page":"tyaa001","DOI":"10.1093\/cybsec\/tyaa001","article-title":"Developing a measure of information seeking about phishing","volume":"6","author":"Williams","year":"2020","journal-title":"J Cybersecur"},{"key":"2024121909124913600_bib55","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1177\/001316448904900315","article-title":"A five-item measure of socially desirable response set","volume":"49","author":"Hays","year":"1989","journal-title":"Educ Psychol Measur"},{"article-title":"Power analysis for structural equation models: semPower Manual","year":"2021","author":"Moshagen","key":"2024121909124913600_bib56"},{"article-title":"Employment status of the civilian population","year":"2021","author":"U.S. Bureau of Labor Statistics","key":"2024121909124913600_bib57"},{"key":"2024121909124913600_bib58","doi-asserted-by":"crossref","DOI":"10.4324\/9781315827506","volume-title":"A First Course in Factor Analysis","author":"Comrey","year":"2013"},{"key":"2024121909124913600_bib59","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1177\/0146621612445470","article-title":"Coefficient alpha bootstrap confidence interval under nonnormality","volume":"36","author":"Padilla","year":"2012","journal-title":"Appl Psychol Measur"},{"volume-title":"Principles and Practice of Structural Equation Modeling","year":"2023","author":"Kline","key":"2024121909124913600_bib60"},{"volume-title":"Latent Variable Models: An Introduction to Factor, Path, and Structural Equation Analysis","year":"2017","author":"Loehlin","key":"2024121909124913600_bib61"},{"key":"2024121909124913600_bib62","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1177\/2167696813479584","article-title":"Development of the cyberbullying experiences survey","volume":"1","author":"Doane","year":"2013","journal-title":"Emerg Adulthood"},{"key":"2024121909124913600_bib70_234_283424","doi-asserted-by":"crossref","first-page":"86","DOI":"10.4135\/9781412995627.d8","article-title":"Best Practices in Exploratory Factor Analysis","volume-title":"Best Practices in Quantitative Methods","author":"Osborne","year":"2008"},{"key":"2024121909124913600_bib63","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"Fornell","year":"1981","journal-title":"J Market Res"},{"key":"2024121909124913600_bib64","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1037\/0278-6133.22.4.424","article-title":"Some problems with social cognition models: a pragmatic and conceptual analysis","volume":"22","author":"Ogden","year":"2003","journal-title":"Health Psychol"},{"key":"2024121909124913600_bib65","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1080\/01490409109513137","article-title":"Prediction of leisure participation from behavioral, normative, and control beliefs: an application of the theory of planned behavior","volume":"13","author":"Ajzen","year":"1991","journal-title":"Leisure Sci"},{"key":"2024121909124913600_bib66","first-page":"1","article-title":"Instrumental vs. experiential attitudes in the theory of planned behaviour: two studies on intention to perform a recommended amount of physical activity","volume":"22","author":"La\u00a0Barbera","year":"2022","journal-title":"Int J Sport Exer Psychol"},{"key":"2024121909124913600_bib68","article-title":"Do they accept or resist cybersecurity measures? Development and validation of the 13-item security attitude inventory (SA-13)","volume-title":"arXiv","author":"Faklaris","year":"2022"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae011\/61182321\/tyae011.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae011\/61182321\/tyae011.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T09:13:15Z","timestamp":1734599595000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae011\/7705384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae011","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2024]]},"published":{"date-parts":[[2024]]},"article-number":"tyae011"}}