{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T09:39:24Z","timestamp":1764581964246,"version":"3.46.0"},"reference-count":103,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":334,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Despite the effectiveness and increasing proliferation of security controls designed to protect personal and sensitive information, there is increasing recognition that humans are susceptible to cyber exploitation and thus, individual users are deemed a causal element of personal cyber risk. Exposing personal perceptions and capabilities, such as cyber awareness and knowledge, is crucial to understanding personal cyber risks and allowing a holistic interpretation of an individual\u2019s cyber risk profile. This study uses a survey comprising n\u00a0=\u00a0263 participants to explore to what extent awareness influences cyber knowledge and thereby impacts the level of personal cyber risk. We find that personal cyber awareness positively influences knowledge and personal cyber risk, whereas awareness independently fails to impact personal cyber risk, suggesting that knowledge acts as an influential mediator when determining an individual\u2019s personal cyber risk profile. Further, this paper acknowledges the importance of consistent definitions and addresses upfront a notable gap by defining personal cyberspace\u2014a critical and foundational prerequisite to any research focused on the human cyber condition. The study contributes by proposing a unique definition of personal cyberspace, a conceptual model articulating an individual\u2019s personal cyber risk profile, and extending extant knowledge about relationships among personal cyber awareness, knowledge, and risk.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf029","type":"journal-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:53:01Z","timestamp":1763470381000},"source":"Crossref","is-referenced-by-count":0,"title":["Consumer perceptions of personal cyber awareness, knowledge, and risk"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3731-9501","authenticated-orcid":false,"given":"Richard","family":"McGregor","sequence":"first","affiliation":[{"name":"College of Business, Law and Governance at James Cook University , Queensland 4811 ,","place":["Australia"]}]},{"given":"Carmen","family":"Reaiche","sequence":"additional","affiliation":[{"name":"College of Business, Law and Governance at James Cook University , Queensland 4811 ,","place":["Australia"]}]},{"given":"Stephen","family":"Boyle","sequence":"additional","affiliation":[{"name":"College of Business, Law and Governance at James Cook University , Queensland 4811 ,","place":["Australia"]}]},{"given":"Graciela Corral","family":"de\u00a0Zubielqui","sequence":"additional","affiliation":[{"name":"Adelaide Business School, Faculty of Arts, Business, Law and Economics, The University of Adelaide , South Australia 5005 ,","place":["Australia"]}]}],"member":"286","published-online":{"date-parts":[[2025,12,1]]},"reference":[{"key":"2025120103575852700_bib1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.giq.2017.02.007","article-title":"Building cybersecurity awareness: the need for evidence-based framing strategies","volume":"34","author":"de\u00a0Brulin","year":"2017","journal-title":"Govern Inform Quart"},{"key":"2025120103575852700_bib2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/app12052589","article-title":"Factors affecting cybersecurity awareness among university students","volume":"12","author":"Alqahtani","year":"2022","journal-title":"Appl Sci"},{"key":"2025120103575852700_bib3","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1111\/rmir.12169","article-title":"Cyber risk management: history and future research directions","volume":"24","author":"McShane","year":"2021","journal-title":"Risk Manage Insur Rev"},{"key":"2025120103575852700_bib4","first-page":"1","volume-title":"The Global Risks Report 2023","author":"Zahidi","year":"2023"},{"key":"2025120103575852700_bib5","first-page":"32","article-title":"Cybersecurity research from a management perspective: a systematic literature review and future research agenda","volume":"0","author":"Lohrke","year":"2023","journal-title":"J Gener Manage"},{"key":"2025120103575852700_bib6","first-page":"1","article-title":"The role of cybersecurity knowledge and awareness in cybersecurity intention and behavior in the United States","volume":"1","author":"Seungeun","year":"2023","journal-title":"Crime Delinquency"},{"key":"2025120103575852700_bib7","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/21532974.2011.10784684","article-title":"Cyberethics, cybersafety, and cybersecurity","volume":"28","author":"Pusey","year":"2011","journal-title":"J Digit Learn Teacher Edu"},{"key":"2025120103575852700_bib8","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1111\/risa.13687","article-title":"Defining cyber security and cyber security risk within a multidisciplinary context using expert elicitation","volume":"42","author":"Cains","year":"2022","journal-title":"Risk Anal"},{"key":"2025120103575852700_bib9","first-page":"27","article-title":"Cyber security management: creating governance, risk and compliance framework","volume":"14","author":"Batra","year":"2020","journal-title":"J Softw Engineer"},{"key":"2025120103575852700_bib10","doi-asserted-by":"crossref","first-page":"34","DOI":"10.37134\/jictie.vol8.2.4.2021","article-title":"Review on confidentiality, integrity and availability in information security","volume":"8","author":"Yee","year":"2021","journal-title":"J ICT Edu"},{"key":"2025120103575852700_bib11","first-page":"194","article-title":"The influence of organizational, social and personal factors on cybersecurity awareness and behavior of home computer users","volume-title":"IFIP International Conference on ICT Systems Security and Privacy Protection","author":"Simonet","year":"2019"},{"key":"2025120103575852700_bib12","doi-asserted-by":"publisher","first-page":"105615","DOI":"10.1016\/j.clsr.2021.105615","article-title":"Cybercrime awareness and victimisation in individuals over 60 years: a Portsmouth case study","volume":"43","author":"Karagiannopoulos","year":"2021","journal-title":"Comput Law Secur Rev"},{"key":"2025120103575852700_bib13","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1080\/08874417.2019.1579076","article-title":"Cybersecurity awareness and skills of Senior citizens: a motivation perspective","volume":"61","author":"Blackwood-Brown","year":"2019","journal-title":"J Comput Inform Syst"},{"key":"2025120103575852700_bib14","first-page":"1","article-title":"The relationship between cyber security knowledge, awareness and behavioural choice protection among mobile banking users in Thailand","volume":"7","author":"Limna","year":"2022","journal-title":"Int J Comput Sci Res"},{"key":"2025120103575852700_bib15","doi-asserted-by":"publisher","first-page":"417","DOI":"10.3390\/info12100417","article-title":"Cybersecurity awareness framework for academia","volume":"12","author":"Khader","year":"2021","journal-title":"Information"},{"key":"2025120103575852700_bib16","doi-asserted-by":"publisher","DOI":"10.1145\/2390317.2390318","article-title":"The human element in cyber security: a study on student motivation to act","volume-title":"Proceedings of the 2012 Information Security Curriculum Development Conference, 2012","author":"LeFebvre","year":"2012"},{"key":"2025120103575852700_bib17","doi-asserted-by":"publisher","first-page":"e12198","DOI":"10.1002\/isd2.12198","article-title":"Cyber4Dev-Q: calibrating cyber awareness in the developing country context","volume":"88","author":"da\u00a0Veiga","year":"2022","journal-title":"E J Info Sys Dev Countries"},{"key":"2025120103575852700_bib18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.ijhcs.2019.05.005","article-title":"Moving from a \u2018human-as-problem' to a \u2018human-as-solution' cybersecurity mindset","volume":"131","author":"Zimmermann","year":"2019","journal-title":"Int J Hum Comput Stud"},{"key":"2025120103575852700_bib19","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s10111-021-00683-y","article-title":"Leveraging Human factors in cybersecurity: an integrated methodological approach","volume":"24","author":"Pollini","year":"2022","journal-title":"Cogn Tech Work"},{"key":"2025120103575852700_bib20","first-page":"1","article-title":"Cyberspace and personal cyber insurance: a systematic review","author":"McGregor","year":"2023","journal-title":"J Comput Inform Syst"},{"key":"2025120103575852700_bib21","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1504\/IJCIS.2020.107265","article-title":"Information technology governance and cybersecurity at the board level","volume":"16","author":"Al-Sartawi","year":"2020","journal-title":"IJCIS"},{"key":"2025120103575852700_bib22","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1017\/S0892679418000576","article-title":"Ethical dilemmas in cyberspace","volume":"32","author":"Finnemore","year":"2018","journal-title":"Ethics Int Aff"},{"key":"2025120103575852700_bib23","first-page":"109","article-title":"Framing assumptions and cyberspace regulation: a critical reflection on differences among countries","volume":"3","author":"Kashani","year":"2019","journal-title":"J Cyberspace Stud"},{"key":"2025120103575852700_bib24","first-page":"87970","article-title":"A comparative assessment of Human factors in cybersecurity: implications for cyber governance","volume":"11","author":"Shah","year":"2023","journal-title":"IEEE"},{"key":"2025120103575852700_bib25","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1111\/rego.12281","article-title":"Using Human values-based approach to understand cross-cultural commitment toward regulation and governance of cybersecurity","volume":"15","author":"Kharlamov","year":"2021","journal-title":"Regulat Govern"},{"key":"2025120103575852700_bib26","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","author":"Liang","year":"2010","journal-title":"J Ass Informat Syst"},{"key":"2025120103575852700_bib27","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: a protection motivation theory perspective","volume":"59","author":"Tsai","year":"2016","journal-title":"Comput Secur"},{"key":"2025120103575852700_bib28","first-page":"6750","article-title":"Covid-19 and beyond: employee perceptions of the efficiency of teleworking and its cybersecurity implications","volume":"13","author":"Mihailovi\u0107","year":"2021","journal-title":"Sustain (Switzerland)"},{"key":"2025120103575852700_bib29","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1049\/ise2.12073","article-title":"The COVID-19 scamdemic: A survey of phishing attacks and their counter-measures during COVID-19","volume":"16","author":"Al-Qahtani","year":"2022","journal-title":"IET Inf Secur"},{"key":"2025120103575852700_bib30","doi-asserted-by":"crossref","first-page":"146","DOI":"10.3934\/electreng.2021008","article-title":"Cyber security during the COVID-19 Pandemic","volume":"5","author":"Lidong","year":"2021","journal-title":"AIMS Electron Electric Engineer"},{"key":"2025120103575852700_bib31","first-page":"1","article-title":"Cybersecurity when working from home during COVID-19: Considering the Human factors","volume":"1","author":"Whitty","year":"2024","journal-title":"J Cybersecur"},{"key":"2025120103575852700_bib32","first-page":"709","article-title":"Terminology. the importance of defining","volume":"38","author":"Van\u00a0Mill","year":"2016","journal-title":"Int J Clin Pharm"},{"key":"2025120103575852700_bib33","doi-asserted-by":"publisher","first-page":"48","DOI":"10.3390\/systems9030048","article-title":"Cyberspace: a digital ecosystem","volume":"9","author":"Lippert","year":"2021","journal-title":"Systems"},{"key":"2025120103575852700_bib34","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1590\/s0102-8529.2019420100002","article-title":"The fundamental conceptual trinity of cyberspace","volume":"42","author":"Medeiros","year":"2020","journal-title":"Contexto Int"},{"volume-title":"Objective Knowledge: An Evolutionary Approach. Philosophia","year":"1972","author":"Popper","key":"2025120103575852700_bib35"},{"key":"2025120103575852700_bib36","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/0040-1625(96)00050-9","article-title":"Law\u2019s mapping of cyberspace: the shape of new social space","volume":"52","author":"Gaitenby","year":"1996","journal-title":"Technolog Forecast Soc Change"},{"key":"2025120103575852700_bib37","first-page":"76","article-title":"Information in cyberspace\u2014actuality and challenges","volume":"76","author":"Mare\u0161i","year":"2020","journal-title":"Strategic Impact"},{"key":"2025120103575852700_bib38","doi-asserted-by":"publisher","first-page":"2477","DOI":"10.4028\/www.scientific.net\/AMM.427-429.2477","article-title":"Study of cyberspace factors and description methods","volume":"427-429","author":"Chen","year":"2013","journal-title":"AMM"},{"key":"2025120103575852700_bib39","doi-asserted-by":"publisher","first-page":"1599","DOI":"10.4028\/www.scientific.net\/AMM.635-637.1599","article-title":"Research on development and key technologies of cyberspace","volume":"635\u2013637","author":"Liu","year":"2014","journal-title":"AMM"},{"key":"2025120103575852700_bib40","first-page":"24","article-title":"From cyberspace to cyberpower: defining the problem","volume-title":"Cyberpower and National Security","author":"Kuehl","year":"2009"},{"key":"2025120103575852700_bib41","first-page":"2016","volume-title":"Characterising Cyberspace: Past, Present and Future","author":"Clark","year":"2010"},{"key":"2025120103575852700_bib42","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1002\/9781118562666","volume-title":"Cyber Conflict: Competing National Perspectives","author":"Ventre","year":"2012"},{"key":"2025120103575852700_bib43","first-page":"210","volume-title":"Cyberspace as\/and Space","author":"Cohen","year":"2007"},{"key":"2025120103575852700_bib44","first-page":"1843","article-title":"General cyberspace: cyberspace and cyber-enabled spaces","volume":"5","author":"Ning","year":"2018","journal-title":"Internet of Things"},{"key":"2025120103575852700_bib45","first-page":"457","article-title":"Develop and maintain a cybersecurity organisational culture","volume-title":"International Conference on Cyber Warfare and Security","author":"Van\u00a0\u2019t\u00a0Wout","year":"2019"},{"key":"2025120103575852700_bib46","doi-asserted-by":"publisher","first-page":"105143","DOI":"10.1016\/j.ssci.2020.105143","article-title":"Defining cyber risk","volume":"135","author":"Strupczewski","year":"2021","journal-title":"Saf Sci"},{"key":"2025120103575852700_bib47","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/s00146-019-00916-9","article-title":"Artificial intelligence assistance and risk: framing a connectivity risk narrative","volume":"35","author":"Cunneen","year":"2020","journal-title":"AI Soc"},{"key":"2025120103575852700_bib48","doi-asserted-by":"publisher","first-page":"305","DOI":"10.2147\/MDER.S50048","article-title":"Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem","volume":"8","author":"Williams","year":"2015","journal-title":"MDER"},{"key":"2025120103575852700_bib49","first-page":"89","article-title":"Risk management theory: the integrated perspective and its application in the public sector","volume":"21","author":"Spikin","year":"2013","journal-title":"Estado Gobierno Gesti\u00f3n P\u00fablica"},{"key":"2025120103575852700_bib50","first-page":"18","article-title":"On the concept of risk, uncertainty and black swans","volume":"67","author":"Lyons","year":"2022","journal-title":"J Am Soc Safe Profession"},{"key":"2025120103575852700_bib51","doi-asserted-by":"publisher","DOI":"10.1109\/MED59994.2023.10185686","article-title":"DRIVERS: a platform for dynamic risk assessment of emergent cyber threats for industrial control systems","volume-title":"2023 31st Mediterranean Conference on Control and Automation (MED)","author":"Nobill","year":"2023"},{"key":"2025120103575852700_bib52","first-page":"1","volume-title":"NIST Cybersecurity Framework 2.0","author":"NIST","year":"2023"},{"key":"2025120103575852700_bib53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/risks11060101","article-title":"Context-based and adaptive cybersecurity risk management framework","volume":"11","author":"Melaku","year":"2023","journal-title":"Risks"},{"key":"2025120103575852700_bib54","doi-asserted-by":"crossref","first-page":"113","DOI":"10.3389\/fpsyg.2018.00039","article-title":"Characterizing and measuring maliciousness for cybersecurity risk assessment","volume":"9","author":"King","year":"2018","journal-title":"Front Psychol"},{"key":"2025120103575852700_bib55","doi-asserted-by":"publisher","first-page":"100989","DOI":"10.1016\/j.jfs.2022.100989","article-title":"The drivers of cyber risk","volume":"60","author":"Aldasoro","year":"2022","journal-title":"J Financ Stabil"},{"key":"2025120103575852700_bib56","first-page":"13","article-title":"To share or not to share: a behavioural perspective on Human participation in security information sharing","volume":"5","author":"Mermoud","year":"2019","journal-title":"J Cyber Secur (Oxford)"},{"key":"2025120103575852700_bib57","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1111\/risa.12891","article-title":"Multicriteria decision framework for cybersecurity risk assessment and management","volume":"40","author":"Ganin","year":"2020","journal-title":"Risk Anal"},{"key":"2025120103575852700_bib58","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1108\/K-12-2014-0283","article-title":"A systematic review of approaches to assessing cybersecurity awareness","volume":"44","author":"Rahim","year":"2015","journal-title":"Kybernetes"},{"key":"2025120103575852700_bib59","first-page":"1","article-title":"Intention awareness: Improving upon situation awareness in human-centric environments","volume":"3","author":"Howard","year":"2013","journal-title":"Human-centric Comput Inform Sci"},{"key":"2025120103575852700_bib60","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach","volume":"20","author":"D\u2019Arcy","year":"2009","journal-title":"Inf Syst Res"},{"key":"2025120103575852700_bib61","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/08874417.2015.11645769","article-title":"Education and prevention relationships on security incidents for home computers","volume":"55","author":"White","year":"2015","journal-title":"J Comput Inform Syst"},{"key":"2025120103575852700_bib62","first-page":"9","article-title":"Measuring an information security awareness program","volume":"15","author":"Wolf","year":"2011","journal-title":"Rev Bus Inform Syst"},{"key":"2025120103575852700_bib63","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1111\/ijcs.12724","article-title":"Coping with crisis: the paradox of technology and consumer vulnerability","volume":"45","author":"Yap","year":"2021","journal-title":"Int J Consumer Stud"},{"key":"2025120103575852700_bib64","doi-asserted-by":"publisher","first-page":"583723","DOI":"10.3389\/fdata.2021.583723","article-title":"User, usage and usability: redefining human centric cyber security","volume":"4","author":"Grobler","year":"2021","journal-title":"Front Big Data"},{"key":"2025120103575852700_bib65","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-60585-2_23","article-title":"Understanding human factors in cyber security as a dynamic system","volume-title":"Advanced in Intelligent Systems and Computing","author":"Young","year":"2018"},{"key":"2025120103575852700_bib66","first-page":"595","article-title":"Cyberspace identity theft: the conceptual framework","volume":"6","author":"Manap","year":"2015","journal-title":"Mediterr J Soc Sci"},{"key":"2025120103575852700_bib67","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","article-title":"User preference of cyber security awareness delivery methods","volume":"33","author":"Abawajy","year":"2014","journal-title":"Behav Inform Technol"},{"key":"2025120103575852700_bib68","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.cose.2017.11.015","article-title":"Correlating Human traits and cyber security behavior intentions","volume":"73","author":"Gratian","year":"2018","journal-title":"Comput Secur"},{"key":"2025120103575852700_bib69","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","article-title":"Analysis of personal information security behavior and awareness","volume":"56","author":"\u00d6\u011f\u00fct\u00e7\u00fc","year":"2016","journal-title":"Comput Secur"},{"key":"2025120103575852700_bib70","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1177\/0018720818780472","article-title":"Hacking the human: the prevalence paradox in cybersecurity","volume":"60","author":"Sawyer","year":"2018","journal-title":"Hum Factors"},{"key":"2025120103575852700_bib71","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1080\/01639625.2011.584050","article-title":"Examining risks and protective factors of on-line identity theft","volume":"33","author":"Holt","year":"2012","journal-title":"Deviant Behavior"},{"key":"2025120103575852700_bib72","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1016\/j.chb.2012.07.008","article-title":"Information privacy concerns, antecedents and privacy measure use in Social networking sites: Evidence from Malaysia","volume":"28","author":"Mohamed","year":"2012","journal-title":"Comput Hum Behav"},{"key":"2025120103575852700_bib73","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7132932","article-title":"Expert assessment of the top platform independent cybersecurity skills for Non-IT professionals","volume-title":"Proceedings of the 2015 IEEE Southeast Con","author":"Carlton","year":"2015"},{"key":"2025120103575852700_bib74","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3389\/feduc.2021.768037","article-title":"Modelling cyberspace to determine cybersecurity training requirements","volume":"6","author":"Venables","year":"2021","journal-title":"Front Educ"},{"key":"2025120103575852700_bib75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3427920","article-title":"A systematic review of multimedia tools for cybersecurity awareness and education","volume":"54","author":"Zhang-Kennedy","year":"2021","journal-title":"ACM Comput Surv"},{"key":"2025120103575852700_bib76","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/08874417.2020.1712269","article-title":"Cyber Security awareness, knowledge and behavior: a comparative study","volume":"62","author":"Zwilling","year":"2020","journal-title":"J Comput Inform Syst"},{"key":"2025120103575852700_bib77","doi-asserted-by":"publisher","first-page":"022062","DOI":"10.1088\/1757-899X\/981\/2\/022062","article-title":"Cyber security challenges and its emerging trends on latest technologies","volume-title":"IOP Conf Ser: Mater Sci Eng","author":"Rajasekharaiah","year":"2020"},{"key":"2025120103575852700_bib78","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.chb.2015.01.039","article-title":"Effects of cyber security knowledge on attack detection","volume":"48","author":"Ben-Asher","year":"2015","journal-title":"Comput Hum Behav"},{"key":"2025120103575852700_bib79","doi-asserted-by":"publisher","first-page":"22","DOI":"10.4018\/joeuc.2004070102","article-title":"Computer security and risky computing practices: a rational choice perspective","volume":"16","author":"Aytes","year":"2004","journal-title":"J Organiz End User Comput"},{"key":"2025120103575852700_bib80","first-page":"36","article-title":"An exploratory study of cyber hygiene behaviours and knowledge","volume":"42","author":"Cain","year":"2018","journal-title":"J Inform Secur Appl"},{"key":"2025120103575852700_bib81","doi-asserted-by":"publisher","DOI":"10.1201\/9780429031908","volume-title":"Cybersecurity Awareness among Students and Faculty","author":"Moallem","year":"2019"},{"key":"2025120103575852700_bib82","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1007\/s10639-020-10330-0","article-title":"College students infomraiton security awareness: a comparison between smartphones and computers","volume":"26","author":"Taha","year":"2021","journal-title":"Educ Inf Technol"},{"key":"2025120103575852700_bib83","first-page":"28","article-title":"Validity and reliability of the research instrument; how to test the validation of a questionnaire\/survey in a research","volume":"5","author":"Taherdoost","year":"2016","journal-title":"Int J Acad Res Manage"},{"key":"2025120103575852700_bib84","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7132932","article-title":"Expert assessment of the top platform independent cybersecurity skills for Non-IT professionals","volume-title":"Proceedings of the 2015 IEEE SouthEastCon","author":"Clarlton","year":"2015"},{"key":"2025120103575852700_bib85","first-page":"1","volume-title":"Fundamentals of Survey Research Methodology","author":"Glasgow","year":"2005"},{"key":"2025120103575852700_bib86","first-page":"494","volume-title":"Principles and Practice of Structural Equation Modeling","author":"Kline","year":"2023","edition":"5th ed."},{"key":"2025120103575852700_bib87","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/BF02296338","article-title":"Maximum likelihood estimation of latent interaction effects within the LMS method","volume":"65","author":"Klein","year":"2000","journal-title":"Psychometrika"},{"key":"2025120103575852700_bib88","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985208","volume-title":"Multiple Regression in Practice","author":"Berry","year":"1985"},{"key":"2025120103575852700_bib89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10705519909540118","article-title":"Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives","volume":"6","author":"Hu","year":"1999","journal-title":"Struct Equation Model Multidiscipl J"},{"key":"2025120103575852700_bib90","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1177\/0049124192021002005","article-title":"Alterative ways of assessing model fit","volume":"21","author":"Browne","year":"1992","journal-title":"Sociologi Methods Res"},{"key":"2025120103575852700_bib91","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1037\/0033-2909.88.3.588","article-title":"Significance tests and goodness of fit in the analysis of covariance structures","volume":"88","author":"Bentler","year":"1981","journal-title":"Psychol Bull"},{"key":"2025120103575852700_bib92","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1037\/0033-2909.107.2.238","article-title":"Comparitive fit indexes in structural models","volume":"107","author":"Bentler","year":"1989","journal-title":"Psychol Bull"},{"key":"2025120103575852700_bib93","first-page":"567","volume-title":"Statistical Power Analysis for the Behavioural Sciences","author":"Cohen","year":"1988","edition":"2nd ed."},{"key":"2025120103575852700_bib94","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1108\/ICS-04-2020-0052","article-title":"The human factor: assessing individuals' perceptions related to cybersecurity","volume":"29","author":"Ramlo","year":"2021","journal-title":"ICS"},{"key":"2025120103575852700_bib95","first-page":"230","article-title":"Users are not stupid: six cyber security pitfalls overturned","volume":"6","author":"Haney","year":"2023","journal-title":"Cyber Secur"},{"key":"2025120103575852700_bib96","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/1042258717747056","article-title":"Externally acquired or internally generated? Knowledge development and perceived environmental dynamism in new venture innovation","volume":"42","author":"McKelvie","year":"2018","journal-title":"Entrepreneur Theory Pract"},{"key":"2025120103575852700_bib97","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1093\/isr\/viz022","article-title":"The Territorialization of cyberspace","volume":"22","author":"Lambach","year":"2020","journal-title":"Int Stud Rev"},{"key":"2025120103575852700_bib98","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/app13063410","article-title":"The importance of conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0","volume":"13","author":"Kioskli","year":"2023","journal-title":"Appl Sci"},{"volume-title":"International Comparison of Fixed Broadband Performance","year":"2020","author":"Australian Government","key":"2025120103575852700_bib99"},{"volume-title":"Development of Youth Information Hygiene Skills: The Gap between the Self-Assessment and Real State","year":"2025","author":"Rundenko","key":"2025120103575852700_bib100"},{"key":"2025120103575852700_bib101","first-page":"347","article-title":"Cyber hygiene knowledge, awareness and behavioural practices of university students","volume":"32","author":"Barakovic","year":"3034","journal-title":"Inform Secur J"},{"key":"2025120103575852700_bib102","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpsyg.2021.561011","article-title":"The role of user behaviour in improving cyber security management","volume":"12","author":"Moustafa","year":"2021","journal-title":"Front Psychol"},{"key":"2025120103575852700_bib103","first-page":"76","volume-title":"Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change?","author":"Blythe","year":"2020"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf029\/65663380\/tyaf029.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf029\/65663380\/tyaf029.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T09:34:38Z","timestamp":1764581678000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf029\/8361918"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":103,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf029","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf029"}}