{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:10:02Z","timestamp":1761059402111,"version":"build-2065373602"},"reference-count":82,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The rapid escalation of cybercrime has become a global cybersecurity concern, one that requires enacting safety precautions and urgent attention from managers, industry partners, governments, experts, and the international research community. Consequently, this study aimed to investigate managers\u2019 risk-driven cybersecurity adoption determinants within SMEs in Switzerland using an extended protection motivation theory. It explores the significance of four broad categories of potential determinants that significantly affect behavioural intentions and influence risk-driven cybersecurity adoption intention in SMEs: managerial perceived cybersecurity efficacy, response efficacy, implementation expectancy, and preparedness. A conceptual research model was formulated, and the ensuing hypotheses were tested using a partial least squares structural equation modelling approach. It was shown that four predictors significantly contribute to managers adopting protective cybersecurity measures, explaining 40% of the variance (R2) in behavioural intention. These findings highlight novel insights into managers\u2019 acceptance of cybersecurity adoption and the institutionalization of favourable policy guidelines as early guidance for expanding prosperous SMEs in developed economies and beyond.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf027","type":"journal-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T14:56:43Z","timestamp":1761058603000},"source":"Crossref","is-referenced-by-count":0,"title":["How much more will it need? Determinants of risk-driven cybersecurity adoption in Swiss SMEs: a structural equation modelling approach"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2897-0389","authenticated-orcid":false,"given":"Marc K","family":"Peter","sequence":"first","affiliation":[{"name":"School of Management, University of Applied Sciences and Arts of Western Switzerland HES-SO , 3960 Sierre, VS ,","place":["Switzerland"]},{"name":"Simon Business School, University of Rochester , Rochester, NY 14627 ,","place":["United States"]},{"name":"School of Business, Charles Sturt University , Bathurst, NSW 2795 ,","place":["Australia"]}]},{"given":"Khondker Mohammad","family":"Zobair","sequence":"additional","affiliation":[{"name":"Griffith Business School, Griffith University , Nathan, QLD 4111 ,","place":["Australia"]}]},{"given":"Johan P","family":"Lindeque","sequence":"additional","affiliation":[{"name":"School of Business, University of Applied Sciences and Arts Northwestern Switzerland FHNW , 4600 Olten, SO ,","place":["Switzerland"]}]},{"given":"Karin","family":"M\u00e4ndli\u00a0Lerch","sequence":"additional","affiliation":[{"name":"YouGov , 8048 Zurich, ZH ,","place":["Switzerland"]}]},{"given":"Luke","family":"Houghton","sequence":"additional","affiliation":[{"name":"Griffith Business School, Griffith University , Nathan, QLD 4111 ,","place":["Australia"]}]}],"member":"286","published-online":{"date-parts":[[2025,10,21]]},"reference":[{"key":"2025102110563859000_bib1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.17083\/ijsg.v8i1.413","article-title":"Cysecescape 2.0\u2014a virtual escape room to raise cybersecurity awareness","volume":"8","author":"L\u00f6ffler","year":"2021","journal-title":"IJSG"},{"key":"2025102110563859000_bib2","first-page":"165","article-title":"Cybersecurity of small and medium enterprises in the era of internet of things","volume":"8","author":"Kasl","year":"2018","journal-title":"Lawyer Quarter"},{"key":"2025102110563859000_bib3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-77392-2_22","article-title":"It\u2019s not my problem: how healthcare models relate to SME cybersecurity awareness","volume-title":"Paper presented at the International Conference on Human-Computer Interaction","author":"Pickering","year":"2021"},{"key":"2025102110563859000_bib4","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1108\/JSMA-05-2019-0070","article-title":"Strategic action fields of digital transformation: an exploration of the strategic action fields of Swiss SMEs and large enterprises","volume":"13","author":"Peter","year":"2020","journal-title":"JSMA"},{"key":"2025102110563859000_bib5","doi-asserted-by":"publisher","first-page":"1796","DOI":"10.1080\/0144929X.2021.1905066","article-title":"What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context","volume":"41","author":"De\u00a0Kimpe","year":"2022","journal-title":"Behaviour Inform Technol"},{"key":"2025102110563859000_bib6","first-page":"43","article-title":"DICE-E: a Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics","author":"Benjamin","year":"2019","journal-title":"MIS Quarter"},{"key":"2025102110563859000_bib7","article-title":"Guidelines and tool support for building a cybersecurity awareness program for smes","volume-title":"Paper presented at the International Conference on Information Systems Security and Privacy","author":"Ponsard","year":"2019"},{"key":"2025102110563859000_bib8","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1108\/ICS-07-2018-0080","article-title":"Developing cybersecurity education and awareness programmes for small-and medium-sized enterprises (SMEs)","volume":"27","author":"Bada","year":"2019","journal-title":"ICS"},{"key":"2025102110563859000_bib9","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.bushor.2020.03.010","article-title":"Calculated risk? A cybersecurity evaluation tool for SMEs","volume":"63","author":"Benz","year":"2020","journal-title":"Bus Horiz"},{"key":"2025102110563859000_bib10","doi-asserted-by":"publisher","first-page":"102520","DOI":"10.1016\/j.ijinfomgt.2022.102520","article-title":"The role of cybersecurity and policy awareness in shifting employee compliance attitudes: building supply chain capabilities","volume":"66","author":"Wong","year":"2022","journal-title":"Int J Inf Manage"},{"key":"2025102110563859000_bib11","first-page":"124","article-title":"A closer look at organizational cybersecurity research trending topics and limitations","volume":"2","author":"Johnston","year":"2022","journal-title":"Organiz Cybersecur J Pract Process People"},{"key":"2025102110563859000_bib12","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1177\/0170840607075267","article-title":"Product strategies and survival in Schumpeterian environments: evidence from the US security software industry","volume":"28","author":"Giarratana","year":"2007","journal-title":"Organiz Stud"},{"key":"2025102110563859000_bib13","first-page":"24","article-title":"A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs","volume":"1","author":"Renaud","year":"2021","journal-title":"Organiz Cybersecur J Pract Process People"},{"key":"2025102110563859000_bib14","first-page":"4","article-title":"Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense","volume":"20","author":"Kabanov","year":"2021","journal-title":"MIS Quarter Execut"},{"key":"2025102110563859000_bib15","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/computers10110150","article-title":"Machine learning cybersecurity adoption in small and medium enterprises in developed countries","volume":"10","author":"Rawindaran","year":"2021","journal-title":"Computers"},{"key":"2025102110563859000_bib16","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1108\/ICS-01-2020-0014","article-title":"SME executives\u2019 perceptions and the information security preparedness model","volume":"29","author":"Saban","year":"2021","journal-title":"ICS"},{"key":"2025102110563859000_bib17","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change1","volume":"91","author":"Rogers","year":"1975","journal-title":"J Psychol"},{"key":"2025102110563859000_bib18","doi-asserted-by":"publisher","first-page":"103099","DOI":"10.1016\/j.cose.2023.103099","article-title":"Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model","volume":"127","author":"Bekkers","year":"2023","journal-title":"Comput Secur"},{"key":"2025102110563859000_bib19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.4018\/IJISP.2015010102","article-title":"A meta-analysis of studies on protection motivation theory and information security behaviour","volume":"9","author":"Sommestad","year":"2015","journal-title":"Int J Inform Secur Privacy (IJISP)"},{"key":"2025102110563859000_bib20","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1093\/her\/1.3.153","article-title":"Protection motivation theory and preventive health: beyond the health belief model","volume":"1","author":"Prentice-Dunn","year":"1986","journal-title":"Health Educ Res"},{"key":"2025102110563859000_bib21","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","article-title":"Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change","volume":"19","author":"Maddux","year":"1983","journal-title":"J Exp Soc Psychol"},{"key":"2025102110563859000_bib22","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","article-title":"Self-efficacy: toward a unifying theory of behavioral change","volume":"84","author":"Bandura","year":"1977","journal-title":"Psychol Rev"},{"key":"2025102110563859000_bib23","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1108\/09685220510589299","article-title":"An empirical study of the effect of perceived risk upon intention to use online applications","volume":"13","author":"Lu","year":"2005","journal-title":"Info Mngmnt Comp Secur"},{"article-title":"A socio-behavioral study of home computer users' intention to practice security","year":"2005","author":"Ng","key":"2025102110563859000_bib24"},{"volume-title":"Computer security behaviors of home PC users: A diffusion of innovation approach","year":"2006","author":"Conklin","key":"2025102110563859000_bib25"},{"key":"2025102110563859000_bib26","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11257-019-09236-5","article-title":"Exploring user behavioral data for adaptive cybersecurity","volume":"29","author":"Addae","year":"2019","journal-title":"User Model User-Adap Inter"},{"key":"2025102110563859000_bib27","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1037\/0022-3514.60.6.941","article-title":"Self-regulatory mechanisms governing the impact of social comparison on complex decision making","volume":"60","author":"Bandura","year":"1991","journal-title":"J Pers Soc Psychol"},{"key":"2025102110563859000_bib28","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","article-title":"Theories in online information privacy research: a critical review and an integrated framework","volume":"54","author":"Li","year":"2012","journal-title":"Decision Support Syst"},{"key":"2025102110563859000_bib29","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1057\/ejis.2011.23","article-title":"A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings","volume":"20","author":"D\u2019arcy","year":"2011","journal-title":"Euro J Inform Syst"},{"key":"2025102110563859000_bib30","first-page":"4","article-title":"Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense","volume":"20","author":"Kabanov","year":"2021","journal-title":"MIS Quarter Execut"},{"key":"2025102110563859000_bib31","doi-asserted-by":"publisher","first-page":"103380","DOI":"10.1016\/j.cose.2023.103380","article-title":"Empirically evaluating the effect of security precautions on cyber incidents","volume":"133","author":"Gandal","year":"2023","journal-title":"Comput Secur"},{"key":"2025102110563859000_bib32","doi-asserted-by":"publisher","first-page":"101995","DOI":"10.1016\/j.cose.2020.101995","article-title":"Latent groups of cybersecurity preparedness in Europe: sociodemographic factors and country-level contexts","volume":"97","author":"Lee","year":"2020","journal-title":"Comput Secur"},{"key":"2025102110563859000_bib33","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1037\/0022-3514.53.3.563","article-title":"Perceived Self-Efficacy and Pain Control: opioid and Nonopioid Mechanisms","volume":"53","author":"Bandura","year":"1987","journal-title":"J Pers Soc Psychol"},{"key":"2025102110563859000_bib34","first-page":"13","article-title":"Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses","volume":"22","author":"Raineri","year":"2020","journal-title":"J Appl Bus Econom"},{"key":"2025102110563859000_bib35","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1080\/10919392.2018.1484598","article-title":"Exploring SME cybersecurity practices in developing countries","volume":"28","author":"Kabanda","year":"2018","journal-title":"J Organiz Comput Electron Comm"},{"key":"2025102110563859000_bib36","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1016\/j.respol.2010.04.001","article-title":"How top management team diversity affects innovativeness and performance via the strategic choice to focus on innovation fields","volume":"39","author":"Talke","year":"2010","journal-title":"Res Policy"},{"key":"2025102110563859000_bib37","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.5465\/amj.2006.23478718","article-title":"Empowering leadership in management teams: effects on knowledge sharing, efficacy, and performance","volume":"49","author":"Srivastava","year":"2006","journal-title":"AMJ"},{"key":"2025102110563859000_bib38","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2753\/MIS0742-1222240202","article-title":"Overcoming online information privacy concerns: an information-processing theory approach","volume":"24","author":"Hann","year":"2007","journal-title":"J Manage Inform Syst"},{"key":"2025102110563859000_bib39","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1080\/J075v05n01_05","article-title":"Self-efficacy beliefs and sales performance","volume":"5","author":"Barling","year":"1983","journal-title":"J Organiz Behav Manage"},{"key":"2025102110563859000_bib40","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1080\/0144929X.2016.1269198","article-title":"The impact of security and its antecedents in behaviour intention of using e-government services","volume":"36","author":"Alharbi","year":"2017","journal-title":"Behav Inform Technol"},{"key":"2025102110563859000_bib41","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.ejor.2011.05.050","article-title":"Information security trade-offs and optimal patching policies","volume":"216","author":"Ioannidis","year":"2012","journal-title":"Eur J Oper Res"},{"key":"2025102110563859000_bib42","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3390\/info13090413","article-title":"Cybersecurity Behavior among Government Employees: the Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks","volume":"13","author":"Sulaiman","year":"2022","journal-title":"Information"},{"key":"2025102110563859000_bib43","doi-asserted-by":"publisher","first-page":"101122","DOI":"10.1016\/j.techsoc.2019.03.005","article-title":"Understanding the gap between perceived threats to and preparedness for cybersecurity","volume":"58","author":"Nam","year":"2019","journal-title":"Technol Soc"},{"key":"2025102110563859000_bib44","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.25147\/ijcsr.2017.001.1.123","article-title":"The relationship between cyber security knowledge, awareness and behavioural choice protection among mobile banking users in Thailand","volume":"7","author":"Limna","year":"2023","journal-title":"IJCSR"},{"key":"2025102110563859000_bib45","doi-asserted-by":"publisher","first-page":"798","DOI":"10.17705\/1jais.00281","article-title":"Information privacy concerns: linking individual perceptions with institutional privacy assurances","volume":"12","author":"Xu","year":"2011","journal-title":"JAIS"},{"key":"2025102110563859000_bib46","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1108\/ICS-02-2018-0024","article-title":"Mitigating e-services avoidance: the role of government cybersecurity preparedness","volume":"27","author":"Abdelhamid","year":"2019","journal-title":"ICS"},{"volume-title":"Structural business statistics STATENT 2017","year":"2019","author":"Federal Statistical Office (FSO)","key":"2025102110563859000_bib47"},{"key":"2025102110563859000_bib48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.47263\/JASEM.2(1)02","article-title":"Should bootstrapping be used in PLS-SEM? Toward stable P-Value calculation methods","volume":"2","author":"Kock","year":"2018","journal-title":"JASEM"},{"key":"2025102110563859000_bib49","doi-asserted-by":"publisher","first-page":"292","DOI":"10.3390\/su10020292","article-title":"Examining the role of childhood experiences in developing altruistic and knowledge sharing behaviors among children in their later life: a partial least squares (PLS) path modeling approach","volume":"10","author":"Ali","year":"2018","journal-title":"Sustainability"},{"key":"2025102110563859000_bib50","doi-asserted-by":"publisher","first-page":"103168","DOI":"10.1016\/j.im.2019.05.003","article-title":"How to perform and report an impactful analysis using partial least squares: guidelines for confirmatory and explanatory IS research","volume":"57","author":"Benitez","year":"2020","journal-title":"Inform Manage"},{"key":"2025102110563859000_bib51","doi-asserted-by":"publisher","first-page":"123702","DOI":"10.1016\/j.jclepro.2020.123702","article-title":"Alley cropping systems as Ecological Focus Areas: a PLS-analysis of German farmers\u2019 acceptance behaviour","volume":"280","author":"Otter","year":"2021","journal-title":"J Cleaner Prod"},{"key":"2025102110563859000_bib52","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.jfbs.2013.12.002","article-title":"A comparative study of CB-SEM and PLS-SEM for theory development in family firm research","volume":"5","author":"Astrachan","year":"2014","journal-title":"J Family Bus Strat"},{"key":"2025102110563859000_bib53","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-80519-7","volume-title":"Partial least squares structural equation modeling (PLS-SEM) using R: A workbook","author":"Hair","year":"2021"},{"volume-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","year":"2016","author":"Hair","key":"2025102110563859000_bib54"},{"volume-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","year":"2017","author":"Hair","key":"2025102110563859000_bib55"},{"key":"2025102110563859000_bib56","doi-asserted-by":"publisher","first-page":"4604","DOI":"10.1016\/j.jbusres.2016.03.052","article-title":"The PLS agent: predictive modeling with PLS-SEM and agent-based simulation","volume":"69","author":"Schubring","year":"2016","journal-title":"J Bus Res"},{"key":"2025102110563859000_bib57","first-page":"7","article-title":"Structural equation modeling and regression: guidelines for research practice","volume":"4","author":"Gefen","year":"2000","journal-title":"Commun Ass Inform Syst"},{"key":"2025102110563859000_bib58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-74817-7_1","article-title":"Analysing the Relationships Between Digital Literacy and Self-Regulated Learning of Undergraduates\u2014A Preliminary Investigation","volume-title":"Advances in Information Systems Development","author":"Muthupoltotage","year":"2018"},{"key":"2025102110563859000_bib59","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-64069-3","article-title":"Partial least squares path modeling: updated guidelines","volume-title":"Partial Least Squares Path Modeling","author":"Henseler","year":"2017"},{"key":"2025102110563859000_bib60","first-page":"193","article-title":"Variance-based structural equation modeling: guidelines for using partial least squares","author":"Rold\u00e1n","year":"2012","journal-title":"Res Methodol Innovat Philos Softw Syst Engineer Inform Syst"},{"key":"2025102110563859000_bib61","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","article-title":"When to use and how to report the results of PLS-SEM","volume":"31","author":"Hair","year":"2019","journal-title":"EBR"},{"key":"2025102110563859000_bib62","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1007\/s11165-016-9602-2","article-title":"The use of Cronbach\u2019s alpha when developing and reporting research instruments in science education","volume":"48","author":"Taber","year":"2018","journal-title":"Res Sci Educ"},{"key":"2025102110563859000_bib63","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"Fornell","year":"1981","journal-title":"J Market Res"},{"key":"2025102110563859000_bib64","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/S1474-7979(2009)0000020014","article-title":"The use of partial least squares path modeling in international marketing","volume-title":"New challenges to international marketing","author":"Henseler","year":"2009"},{"key":"2025102110563859000_bib65","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.jbusres.2019.11.069","article-title":"Assessing measurement model quality in PLS-SEM using confirmatory composite analysis","volume":"109","author":"Hair","year":"2020","journal-title":"J Bus Res"},{"key":"2025102110563859000_bib66","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11135-016-0401-7","article-title":"Partial least squares path modeling using ordinal categorical indicators","volume":"52","author":"Schuberth","year":"2018","journal-title":"Qual Quant"},{"key":"2025102110563859000_bib67","doi-asserted-by":"publisher","first-page":"107678","DOI":"10.1016\/j.chb.2023.107678","article-title":"A complementary SEM and deep ANN approach to predict the adoption of cryptocurrencies from the perspective of cybersecurity","volume":"143","author":"Arpaci","year":"2023","journal-title":"Comput Hum Behav"},{"key":"2025102110563859000_bib68","doi-asserted-by":"publisher","first-page":"5043","DOI":"10.3390\/su15065043","article-title":"Exploring the adoption of cyber (digital) technology for sustainable construction: a structural equation modeling of critical success factors","volume":"15","author":"Kineber","year":"2023","journal-title":"Sustainability"},{"key":"2025102110563859000_bib69","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.ijinfomgt.2015.04.003","article-title":"How do small firms learn to develop a social media competence?","volume":"35","author":"Braojos-Gomez","year":"2015","journal-title":"Int J Inf Manage"},{"key":"2025102110563859000_bib70","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-540-32827-8","article-title":"Using PLS to investigate interaction effects between higher order branding constructs","volume-title":"Handbook of partial least squares","author":"Wilson","year":"2010"},{"key":"2025102110563859000_bib71","doi-asserted-by":"publisher","first-page":"e0257300","DOI":"10.1371\/journal.pone.0257300","article-title":"Forecasting care seekers satisfaction with telemedicine using machine learning and structural equation modeling","volume":"16","author":"Zobair","year":"2021","journal-title":"PLoS One"},{"key":"2025102110563859000_bib72","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1002\/nvsm.1491","article-title":"The relevance of reputation in the nonprofit sector: the moderating effect of socio-demographic characteristics","volume":"19","author":"Schloderer","year":"2014","journal-title":"J Philanth Mktg"},{"key":"2025102110563859000_bib73","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1108\/IMDS-10-2015-0449","article-title":"Gain more insight from your PLS-SEM results: the importance-performance map analysis","volume":"116","author":"Ringle","year":"2016","journal-title":"IMDS"},{"key":"2025102110563859000_bib74","first-page":"5","article-title":"Effort expectancy, performance expectancy, social influence and facilitating conditions as predictors of behavioural intentions to use ATMs with fingerprint authentication in Ugandan banks","volume":"17","author":"Catherine","year":"2017","journal-title":"Glob J Comput Sci Technol"},{"key":"2025102110563859000_bib75","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: a protection motivation theory perspective","volume":"59","author":"Tsai","year":"2016","journal-title":"Comput Secur"},{"key":"2025102110563859000_bib76","doi-asserted-by":"publisher","first-page":"394","DOI":"10.17705\/1jais.00232","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","author":"Liang","year":"2010","journal-title":"JAIS"},{"article-title":"mixup: beyond empirical risk minimization","year":"2017","author":"Zhang","key":"2025102110563859000_bib77"},{"key":"2025102110563859000_bib78","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.jsis.2019.01.003","article-title":"Understanding digital transformation: a review and a research agenda","volume":"28","author":"Vial","year":"2019","journal-title":"J Strateg Inform Syst"},{"key":"2025102110563859000_bib79","doi-asserted-by":"publisher","first-page":"21582440211047576","DOI":"10.1177\/21582440211047576","article-title":"Digital transformation: an overview of the current state of the art of research","volume":"11","author":"Kraus","year":"2021","journal-title":"Sage Open"},{"key":"2025102110563859000_bib80","article-title":"Praxisleitfaden: handlungsfelder und Vorgehensmodell der Digitalen Transformation","volume-title":"KMU-Transformation: Als KMU die Digitale Transformation erfolgreich umsetzen. Forschungsresultate und Praxisleitfaden","author":"Peter","year":"2017"},{"key":"2025102110563859000_bib81","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1016\/j.jbusres.2019.09.022","article-title":"Digital transformation: a multidisciplinary reflection and research agenda","volume":"122","author":"Verhoef","year":"2021","journal-title":"J Bus Res"},{"key":"2025102110563859000_bib82","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","volume":"295","author":"Chin","year":"1998","journal-title":"Modern Methods Bus Res"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf027\/64829267\/tyaf027.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf027\/64829267\/tyaf027.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T14:56:48Z","timestamp":1761058608000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf027\/8294158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":82,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf027","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf027"}}