{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T22:01:29Z","timestamp":1773352889164,"version":"3.50.1"},"reference-count":132,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:00:00Z","timestamp":1762214400000},"content-version":"vor","delay-in-days":307,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Despite advancements in technical defenses, phishing attacks persist due to end-user vulnerabilities and behaviors, including shadow security behaviors like bypassing established protocols. Traditional cybersecurity awareness programs often fail to change behavior effectively because they adopt generic approaches, overlooking the psychological and behavioral factors influencing security practices. To address this, the emerging field of behavioral cybersecurity aims to understand and influence human behavior in cybersecurity contexts. In particular, the Health Belief Model (HBM), traditionally applied in health contexts, has shown promise in predicting cybersecurity behaviors. This study applied an adapted HBM to examine factors influencing university students' security behaviors in response to email phishing attacks. Self-reported data were collected from 569 university students at Universitas Atma Jaya Yogyakarta, Indonesia, using convenience sampling. Confirmatory factor analysis and covariance-based structural equation modeling were employed for data analysis. The results revealed that perceived severity, perceived importance, self-efficacy, and cues to action were statistically significant predictors of security behavior. Students who perceived phishing attacks as severe, recognized the importance of security measures, responded to cues to action, and felt confident in their ability to protect themselves were more likely to engage in security behaviors. However, perceived susceptibility to phishing attacks and perceived barriers to adopting security measures did not show significant relationships with security behavior. However, due to the inherent limitations of self-reported data, the terms \u201csecurity behavior\u201d and \u201cstudent security behavior\u201d should be understood as reflective of perceived or intended actions, rather than actual observed behaviors. Despite these limitations, this study provides valuable insights into human-related cybersecurity vulnerabilities by identifying key psychological and behavioral factors influencing security behavior. In doing so, it responds to calls for studies that apply psychological frameworks and models to better understand how individuals respond to security threats and develop more effective protection strategies. Thus, the findings remain relevant and will support the creation of tailored security awareness programs designed to meet the specific needs and characteristics of the studied demographics, ultimately contributing meaningfully to the enhancement of cybersecurity resilience.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf034","type":"journal-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T13:09:57Z","timestamp":1760447397000},"source":"Crossref","is-referenced-by-count":1,"title":["University students' security behavior against email phishing attacks: insights from the health belief model"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7427-9635","authenticated-orcid":false,"given":"Anderson Kevin","family":"Gwenhure","sequence":"first","affiliation":[{"name":"Universitas Atma Jaya Yogyakarta Department of Informatics Engineering, , Yogyakarta 55281 ,","place":["Indonesia"]}]}],"member":"286","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"2025110419274299600_bib1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3469886","article-title":"Human Factors in Phishing Attacks: a Systematic Literature Review","volume":"54","author":"Desolda","year":"2022","journal-title":"ACM Comput Surv"},{"key":"2025110419274299600_bib2","first-page":"1","article-title":"The New Frontier of Cybersecurity: emerging Threats and Innovations","volume-title":"29th International Conference on Telecommunications (ICT)","author":"Dave","year":"2023"},{"key":"2025110419274299600_bib3","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s00779-024-01794-9","article-title":"A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective","volume":"28","author":"Thomopoulos","year":"2024","journal-title":"Pers Ubiquit Comput"},{"key":"2025110419274299600_bib4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3575797","article-title":"SoK: human-centered Phishing Susceptibility","volume":"26","author":"Zhuo","year":"2023","journal-title":"ACM Trans Priv Secur"},{"key":"2025110419274299600_bib5","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580985","article-title":"The Influence of Human Factors on the Intention to Report Phishing Emails","volume-title":"Conference on Human Factors in Computing Systems\u2014Proceedings","author":"Marin","year":"2023"},{"key":"2025110419274299600_bib6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.24073\/jga\/4\/02\/08","article-title":"Social Engineering Cyber Threats","volume":"4","author":"Choi","year":"2023","journal-title":"jga"},{"key":"2025110419274299600_bib7","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.11591\/ijece.v13i2.pp1943-1953","article-title":"Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian","volume":"13","author":"Yoro","year":"2023","journal-title":"IJECE"},{"key":"2025110419274299600_bib8","doi-asserted-by":"publisher","first-page":"6042","DOI":"10.3390\/app12126042","article-title":"A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures","volume":"12","author":"Siddiqi","year":"2022","journal-title":"Applied Sciences"},{"key":"2025110419274299600_bib9","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-030-21814-0_21","article-title":"Where the User Does Look When Reading Phishing Mails\u2014An Eye-Tracking Study","volume-title":"Learning and Collaboration Technologies: Designing Learning Experiences. Lecture Notes in Computer Science, Vol. 11590","author":"Pfeffel","year":"2019"},{"key":"2025110419274299600_bib10","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/978-3-319-07674-4_89","article-title":"What is the influence of users\u2019 characteristics on their ability to detect phishing emails?","volume-title":"Lecture Notes in Electrical Engineering","author":"Alseadoon","year":"2015"},{"key":"2025110419274299600_bib11","article-title":"Phishing Activity Trends Report, 4th Quarter 2023","author":"APWG Phishing Activity Trends Report","year":"2024"},{"key":"2025110419274299600_bib12","doi-asserted-by":"publisher","first-page":"103585","DOI":"10.1016\/j.cose.2023.103585","article-title":"A systematic review of current cybersecurity training methods","volume":"136","author":"Pr\u00fcmmer","year":"2024","journal-title":"Computers & Security"},{"key":"2025110419274299600_bib13","article-title":"Learning from \u201cShadow Security\u201d: understanding Non-Compliant Behaviours to Improve Information Security Management","author":"Kirlappos","year":"2016"},{"key":"2025110419274299600_bib14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.22215\/timreview\/835","article-title":"Defining Cybersecurity","volume":"4","author":"Craigen","year":"2014","journal-title":"Technology Innovation Management Review"},{"key":"2025110419274299600_bib15","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s10111-021-00683-y","article-title":"Leveraging human factors in cybersecurity: an integrated methodological approach","volume":"24","author":"Pollini","year":"2022","journal-title":"Cogn Tech Work"},{"key":"2025110419274299600_bib16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyaa009","article-title":"Categorizing human phishing difficulty: a Phish Scale","volume":"6","author":"Steves","year":"2020","journal-title":"J Cybersecur"},{"key":"2025110419274299600_bib17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/feduc.2021.807277","article-title":"Phish Derby: shoring the Human Shield Through Gamified Phishing Attacks","volume":"6","author":"Canham","year":"2022","journal-title":"Front Educ"},{"key":"2025110419274299600_bib18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10869-021-09732-9","article-title":"Organizational science and cybersecurity: abundant opportunities for research at the interface","volume":"37","author":"Dalal","year":"2021","journal-title":"J Bus Psychol"},{"key":"2025110419274299600_bib19","doi-asserted-by":"publisher","first-page":"83","DOI":"10.17083\/ijsg.v11i1.719","article-title":"Gamification of Cybersecurity Awareness for Non-IT Professionals: a Systematic Literature Review","volume":"11","author":"Gwenhure","year":"2024","journal-title":"IJSG"},{"key":"2025110419274299600_bib20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyaa019","article-title":"What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?","volume":"6","author":"van\u00a0Steen","year":"2020","journal-title":"J Cybersecur"},{"key":"2025110419274299600_bib21","doi-asserted-by":"publisher","first-page":"103741","DOI":"10.1016\/j.cose.2024.103741","article-title":"A typology of cybersecurity behavior among knowledge workers","volume":"140","author":"Baltuttis","year":"2024","journal-title":"Computers & Security"},{"key":"2025110419274299600_bib22","doi-asserted-by":"publisher","first-page":"2371","DOI":"10.1007\/s41870-021-00760-5","article-title":"A novel SETA-based gamification framework to raise cybersecurity awareness","volume":"13","author":"Abu-Amara","year":"2021","journal-title":"Int j inf tecnol"},{"key":"2025110419274299600_bib23","doi-asserted-by":"publisher","first-page":"121","DOI":"10.3390\/info11020121","article-title":"Design and evaluation of an augmented reality game for cybersecurity awareness (CybAR)","volume":"11","author":"Alqahtani","year":"2020","journal-title":"Information"},{"key":"2025110419274299600_bib24","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1108\/ICS-05-2022-0087","article-title":"Cyber Suraksha: a card game for smartphone security awareness","volume":"31","author":"Shah","year":"2023","journal-title":"ICS"},{"key":"2025110419274299600_bib25","doi-asserted-by":"publisher","first-page":"69","DOI":"10.23919\/SAIEE.2013.8531867","article-title":"Ignorance to awareness: towards an information security awareness process","volume":"104","author":"Gundu","year":"2013","journal-title":"SAIEE Afr Res J"},{"key":"2025110419274299600_bib26","first-page":"677","article-title":"Cyber-Hero: a Gamification framework for Cyber Security Awareness for High Schools Students","volume-title":"2021 IEEE 11th Annual Computing and Communication Workshop and Conference, CCWC 2021","author":"Qusa","year":"2021"},{"key":"2025110419274299600_bib27","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE55470.2022.00010","article-title":"Gamification of Cyber Security Training-EnsureSecure","volume-title":"2022 IEEE International Conference on E-Business Engineering (ICEBE)","author":"Brady","year":"2022"},{"key":"2025110419274299600_bib28","first-page":"151","article-title":"A Review of Security Awareness Approaches with Special Emphasis on Gamification","volume-title":"3rd International Conference on Advanced Science and Engineering, ICOASE 2020","author":"Sharif","year":"2020"},{"key":"2025110419274299600_bib29","first-page":"10","article-title":"Gamification of cybersecurity training","volume-title":"Gamify 2022\u2013Proceedings of the 1st International Workshop on Gamification of Software Development, Verification, and Validation, Co-Located with ESEC\/FSE 2022","author":"Decusatis","year":"2022"},{"key":"2025110419274299600_bib30","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1901.02672","article-title":"Cyber Security Awareness Campaigns: why do they fail to change behaviour?","volume-title":"International Conference on Cyber Security for Sustainable Society","author":"Bada","year":"2015"},{"key":"2025110419274299600_bib31","doi-asserted-by":"publisher","DOI":"10.4324\/9780203851425","volume-title":"Psychology for the Classroom: Behaviourism","author":"Woollard","year":"2010","edition":"1st"},{"key":"2025110419274299600_bib32","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5038\/1944-0472.4.2.2","article-title":"Modeling Human Behavior to Anticipate Insider Attacks","volume":"4","author":"Greitzer","year":"2011","journal-title":"JSS"},{"key":"2025110419274299600_bib33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-020-00050-w","article-title":"Review and insight on the behavioral aspects of cybersecurity","volume":"3","author":"Maalem\u00a0Lahcen","year":"2020","journal-title":"Cybersecur"},{"key":"2025110419274299600_bib34","first-page":"1","article-title":"Behavioral Cybersecurity: a Needed Aspect of the Security Curriculum","volume":"2016","author":"Patterson","year":"2016","journal-title":"SoutheastCon"},{"key":"2025110419274299600_bib35","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.ijhcs.2019.05.005","article-title":"Moving from a \u2018human-as-problem\u201d to a \u2018human-as-solution\u201d cybersecurity mindset","volume":"131","author":"Zimmermann","year":"2019","journal-title":"Int J Hum Comput Stud"},{"key":"2025110419274299600_bib36","doi-asserted-by":"publisher","first-page":"95","DOI":"10.25300\/MISQ\/2023\/17707","article-title":"Time Will Tell: the Case for an Idiographic Approach to Behavioral Cybersecurity Research","volume":"48","author":"Cram","year":"2024","journal-title":"MIS Q"},{"key":"2025110419274299600_bib37","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1177\/0735633117699232","article-title":"Using an Interactive Online Quiz to Recalibrate College Students\u2019 Attitudes and Behavioral Intentions About Phishing","volume":"55","author":"Perrault","year":"2018","journal-title":"Journal of Educational Computing Research"},{"key":"2025110419274299600_bib38","doi-asserted-by":"publisher","first-page":"392","DOI":"10.3390\/info13080392","article-title":"Investigation into Phishing Risk Behaviour among Healthcare Staff","volume":"13","author":"Yeng","year":"2022","journal-title":"Information"},{"key":"2025110419274299600_bib39","doi-asserted-by":"publisher","first-page":"3514","DOI":"10.3390\/ijerph20043514","article-title":"Thwarting Instant Messaging Phishing Attacks: the Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information","volume":"20","author":"Lee","year":"2023","journal-title":"Int J Environ Res Public Health"},{"key":"2025110419274299600_bib40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyae012","article-title":"The health belief model and phishing: determinants of preventative security behaviors","volume":"10","author":"Du","year":"2024","journal-title":"J Cybersecur"},{"key":"2025110419274299600_bib41","first-page":"166","article-title":"Patterns of Internet Use among Students Universiti Teknologi Malaysia: kolej Perdana Case Study","volume-title":"Proceedings of the International Conference on Student and Disable Student Development 2019 (ICoSD 2019)","author":"Murtadha","year":"2019"},{"key":"2025110419274299600_bib42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fcomp.2021.563060","article-title":"Phishing Attacks: a Recent Comprehensive Study and a New Anatomy","volume":"3","author":"Alkhalil","year":"2021","journal-title":"Front Comput Sci"},{"key":"2025110419274299600_bib43","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1177\/17488958221149581","article-title":"To pay or not to pay: an exploratory analysis of sextortion in the context of romance fraud","volume":"25","author":"Cross","year":"2023","journal-title":"Criminology & Criminal Justice"},{"key":"2025110419274299600_bib44","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/01611194.2019.1623343","article-title":"Phishing in an academic community: a study of user susceptibility and behavior","volume":"44","author":"Diaz","year":"2020","journal-title":"Cryptologia"},{"key":"2025110419274299600_bib45","doi-asserted-by":"publisher","first-page":"255","DOI":"10.18280\/ijsdp.180127","article-title":"Cybersecurity Awareness: investigating Students\u2019 Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study of a Nigerian Leading University)","volume":"18","author":"Okokpujie","year":"2023","journal-title":"IJSDP"},{"key":"2025110419274299600_bib46","first-page":"531","article-title":"Self-Reports in Organizational Research: problems and Prospects","volume":"12","author":"Podsakoff","year":"1986","journal-title":"J Manage"},{"key":"2025110419274299600_bib47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1525\/collabra.17975","article-title":"Impact of survey design features on score reliability","volume":"6","author":"Miller","year":"2020","journal-title":"Collabra Psychol"},{"key":"2025110419274299600_bib48","doi-asserted-by":"publisher","first-page":"e39488","DOI":"10.2196\/39488","article-title":"Data Quality and Study Compliance among College Students across 2 Recruitment Sources: two Study Investigation","volume":"6","author":"Braitman","year":"2022","journal-title":"JMIR Form Res"},{"key":"2025110419274299600_bib49","doi-asserted-by":"publisher","first-page":"23","DOI":"10.29140\/jaltcall.v9n1.147","article-title":"(Mis)Use of Email in Student-Faculty Interaction: implications for University Instruction in Germany, Saudi Arabia, and Japan","volume":"9","author":"Danielewicz-Betz","year":"2013","journal-title":"JALTCALL"},{"key":"2025110419274299600_bib50","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.compedu.2013.01.014","article-title":"Dynamics of email communications among university students throughout a semester","volume":"64","author":"Uddin","year":"2013","journal-title":"Computers & Education"},{"key":"2025110419274299600_bib51","doi-asserted-by":"publisher","first-page":"295","DOI":"10.2105\/AJPH.50.3_Pt_1.295","article-title":"What Research in Motivation Suggests for Public Health","volume":"50","author":"Rosenstock\u00a0Irwin","year":"1960","journal-title":"Am J Public Health Nations Health"},{"key":"2025110419274299600_bib52","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1093\/her\/1.3.153","article-title":"Protection Motivation Theory and preventive health: beyond the Health Belief Model","volume":"1","author":"Prentice-Dunn","year":"1986","journal-title":"Health Educ Res"},{"key":"2025110419274299600_bib53","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1177\/109019817400200403","article-title":"Historical Origins of the Health Belief Model","volume":"2","author":"Rosenstock","year":"1974","journal-title":"Health Educ Monogr"},{"key":"2025110419274299600_bib54","first-page":"175","article-title":"Social Learning Theory and the Health Belief Model","volume":"15","author":"Rosenstock","year":"1988","journal-title":"Health Educ Behav"},{"key":"2025110419274299600_bib55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12889-022-13355-x","article-title":"Determinants of adherence to personal preventive behaviours based on the health belief model: a cross-sectional study in South Korea during the initial stage of the COVID-19 pandemic","volume":"22","author":"Baek","year":"2022","journal-title":"BMC Public Health"},{"key":"2025110419274299600_bib56","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1080\/10410236.2013.873363","article-title":"The Health Belief Model as an Explanatory Framework in Communication Research: exploring Parallel, Serial, and Moderated Mediation","volume":"30","author":"Jones","year":"2015","journal-title":"Health Commun"},{"key":"2025110419274299600_bib57","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.1007\/s10389-023-02109-7","article-title":"An assessment of the health belief model (HBM) properties as predictors of COVID-19 preventive behaviour","volume":"33","author":"Subedi","year":"2023","journal-title":"J Public Health (Berl)"},{"key":"2025110419274299600_bib58","volume-title":"Self-Efficacy: The Exercise of Control","author":"Bandura","year":"1997","edition":"1st"},{"key":"2025110419274299600_bib59","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: a health belief perspective","volume":"46","author":"Ng","year":"2009","journal-title":"Decision Support Systems"},{"key":"2025110419274299600_bib60","doi-asserted-by":"crossref","first-page":"15","DOI":"10.4018\/IJTHI.2019010102","article-title":"Understanding Information Security Behaviours of Tanzanian Government Employees: a Health Belief Model PerspectiveInternational Journal of Technology and Human Interaction","volume":"15","author":"Daniel\u00a0Ntabagi","year":"2019","journal-title":"Int J Technol Human Interact"},{"key":"2025110419274299600_bib61","doi-asserted-by":"publisher","DOI":"10.26076\/1f44-f87a","article-title":"The Adoption of Computer Security: an Analysis of Home Personal Computer User Behavior Using the Health Belief Model","author":"Claar","year":"2011"},{"key":"2025110419274299600_bib62","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/IC3e.2014.7081237","article-title":"Exploring User\u2019s Compliance Behavior towards Health Information System Security Policies Based on Extended Health Belief Model","volume-title":"2014 IEEE Conference on E-Learning, e-Management and e-Services (IC3e)","author":"Humaidi","year":"2014"},{"key":"2025110419274299600_bib63","first-page":"187","article-title":"Health belief model and organizational employee computer abuse","volume-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"Silic","year":"2018"},{"key":"2025110419274299600_bib64","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1080\/10410236.2010.521906","article-title":"A meta-analysis of the effectiveness of health belief model variables in predicting behavior","volume":"25","author":"Carpenter","year":"2010","journal-title":"Health Commun"},{"key":"2025110419274299600_bib65","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/0148-2963(94)00080-8","article-title":"The Perceived Importance of an Ethical Issue as an Influence on the Ethical Decision-making of Ad Managers","volume":"35","author":"Robin","year":"1996","journal-title":"Journal of Business Research"},{"key":"2025110419274299600_bib66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5210\/ojphi.v4i3.4321","article-title":"Towards an Effective Health Interventions Design: an Extension of the Health Belief Model","volume":"4","author":"Orji","year":"2012","journal-title":"OJPHI"},{"key":"2025110419274299600_bib67","article-title":"Investigation of Individuals\u2019 Behavior towards Phishing Attacks Using the Health Belief Model","author":"Ehizibue","year":"2022"},{"key":"2025110419274299600_bib68","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1080\/17437199.2014.941722","article-title":"Theories of behaviour and behaviour change across the social and behavioural sciences: a scoping review","volume":"9","author":"Davis","year":"2015","journal-title":"Health Psychology Review"},{"key":"2025110419274299600_bib69","doi-asserted-by":"publisher","first-page":"111","DOI":"10.26577\/JPSS-2017-1-557","article-title":"The problems of thinking about mind, body and experience","volume":"60","author":"Tileubaeva","year":"2017","journal-title":"JPSS"},{"key":"2025110419274299600_bib70","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.cose.2012.10.003","article-title":"Security-related behavior in using information systems in the workplace: a review and synthesis","volume":"32","author":"Guo","year":"2013","journal-title":"Computers & Security"},{"key":"2025110419274299600_bib71","first-page":"231","article-title":"Factors that influence information security behavior: an australian web-based study","volume-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"Pattinson","year":"2015"},{"key":"2025110419274299600_bib72","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1108\/ICS-11-2020-0179","article-title":"Assessing information security behaviour: a self-determination theory perspective","volume":"29","author":"Gangire","year":"2021","journal-title":"ICS"},{"key":"2025110419274299600_bib73","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/S0167-4048(03)00007-5","article-title":"Improving user security behaviour","volume":"22","author":"Leach","year":"2003","journal-title":"Computers & Security"},{"key":"2025110419274299600_bib74","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1108\/JSTPM-05-2018-0053","article-title":"A multifaceted framework for adoption of cloud computing in Malaysian SMEs","volume":"10","author":"Asiaei","year":"2019","journal-title":"JSTPM"},{"key":"2025110419274299600_bib75","article-title":"A Paradigm for Developing Better Measures of Marketing Constructs","author":"Churchill","year":"1979"},{"key":"2025110419274299600_bib76","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1016\/j.fertnstert.2024.01.040","article-title":"A brief overview of pilot studies and their sample size justification","volume":"121","author":"Kunselman","year":"2024","journal-title":"Fertil Steril"},{"key":"2025110419274299600_bib77","first-page":"411","article-title":"Pilot Studies","volume":"17","author":"Connelly","year":"2008","journal-title":"Medsurg Nurs"},{"key":"2025110419274299600_bib78","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1002\/pst.185","article-title":"Sample size of 12 per group rule of thumb for a pilot study","volume":"4","author":"Julious","year":"2005","journal-title":"Pharm Stat"},{"key":"2025110419274299600_bib79","volume-title":"Statistical Rules of Thumb","author":"Van\u00a0Belle","year":"2008"},{"key":"2025110419274299600_bib80","article-title":"Evidence-Based Software Engineering and Systematic Review","author":"Ann\u00a0Kitchenham"},{"key":"2025110419274299600_bib81","doi-asserted-by":"publisher","first-page":"21","DOI":"10.32890\/jict2017.16.1.8216","article-title":"Factors influencing cloud computing adoption in small and medium enterprises","volume":"16","author":"Hassan","year":"2017","journal-title":"Journal of Information and Communication Technology"},{"key":"2025110419274299600_bib82","volume-title":"Principles and Practice of Structural Equation Modeling","author":"Kline","year":"2011","edition":"Third"},{"key":"2025110419274299600_bib83","volume-title":"Principles and Practice of Structural Equation Modeling","author":"Kline","year":"2016","edition":"Fourth"},{"key":"2025110419274299600_bib84","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1379(199711)18:6&lt;667::AID-JOB874&gt;3.0.CO;2-T","article-title":"Exploratory and Confirmatory Factor Analysis: guidelines, Issues, and Alternatives","author":"Hurley","year":"1997","journal-title":"Article in Journal of Organizational Behavior"},{"key":"2025110419274299600_bib85","doi-asserted-by":"publisher","first-page":"S5.e1","DOI":"10.1016\/j.jpeds.2009.04.045","article-title":"Stability of the Factor Structure of the Metabolic Syndrome across Pubertal Development: confirmatory Factor Analyses of Three Alternative Models","volume":"155","author":"Goodman","year":"2009","journal-title":"J Pediatr"},{"key":"2025110419274299600_bib86","doi-asserted-by":"publisher","first-page":"121092","DOI":"10.1016\/j.techfore.2021.121092","article-title":"CB-SEM vs PLS-SEM methods for research in social sciences and technology forecasting","volume":"173","author":"Dash","year":"2021","journal-title":"Technological Forecasting and Social Change"},{"key":"2025110419274299600_bib87","article-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) Third Edition","volume-title":"Fargotstein Leah.\u00a0Second","author":"Hair","year":"2017"},{"key":"2025110419274299600_bib88","doi-asserted-by":"publisher","first-page":"58","DOI":"10.21500\/20112084.844","article-title":"Outliers detection and treatment: a review","volume":"3","author":"Cousineau","year":"2010","journal-title":"Int j psychol res"},{"key":"2025110419274299600_bib89","doi-asserted-by":"publisher","first-page":"42","DOI":"10.13189\/ms.2020.080105","article-title":"Gaussian distribution on validity testing to analyze the acceptance tolerance and significance level","volume":"8","author":"Rahman","year":"2020","journal-title":"ms"},{"key":"2025110419274299600_bib90","article-title":"Multicollinearity and Regression Analysis","volume-title":"Journal of Physics: Conference Series","author":"Daoud","year":"2018"},{"key":"2025110419274299600_bib91","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common Method Biases in Behavioral Research: a Critical Review of the Literature and Recommended Remedies","volume":"88","author":"Podsakoff","year":"2003","journal-title":"J Appl Psychol"},{"key":"2025110419274299600_bib92","first-page":"473","article-title":"Estimating the Effect of Common Method Variance: the Method-Method Pair Technique with an Illustration from TAM Research","volume":"33","author":"Sharma","year":"2009","journal-title":"Source: MIS Quarterly"},{"key":"2025110419274299600_bib93","doi-asserted-by":"publisher","first-page":"7945","DOI":"10.3390\/su15107945","article-title":"The Effect of Social Capital and Organizational Health on Competitive Advantages of Culinary and Craft SMEs in Samarinda City","volume":"15","author":"Widyawati","year":"2023","journal-title":"Sustainability"},{"key":"2025110419274299600_bib94","volume-title":"Multivariate Data Analysis with Readings.\u00a0Seventh","author":"Hair","year":"2010"},{"key":"2025110419274299600_bib95","first-page":"295","article-title":"Modern Methods for Business Research","volume-title":"Modern Methods for Business Research","author":"Chin","year":"1998","edition":"1st Edition"},{"key":"2025110419274299600_bib96","doi-asserted-by":"publisher","first-page":"e179","DOI":"10.1016\/j.ecns.2012.12.001","article-title":"Reliability: measuring Internal Consistency Using Cronbach\u2019s \u03b1. Making Sense of","volume":"9","author":"Adamson","year":"2012","journal-title":"Clinical Simulation in Nursing"},{"key":"2025110419274299600_bib97","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1007\/s11165-016-9602-2","article-title":"The Use of Cronbach\u2019s Alpha When Developing and Reporting Research Instruments in Science Education","volume":"48","author":"Taber","year":"2018","journal-title":"Res Sci Educ"},{"key":"2025110419274299600_bib98","doi-asserted-by":"publisher","first-page":"19","DOI":"10.37231\/apj.2020.3.1.121","article-title":"A Review on the Internal Consistency of a Scale: the Empirical of the Example of the Influence of Human Capital Investment on Malcom Baldridge Quality Principles in TVET Institutions","volume":"3","author":"Mat\u00a0Nawi","year":"2020","journal-title":"Astrophys J"},{"key":"2025110419274299600_bib99","doi-asserted-by":"publisher","DOI":"10.4324\/9781315704562","volume-title":"The Essentials of Business Research Methods 3rd Edition","author":"Hair","year":"2015","edition":"Third"},{"key":"2025110419274299600_bib100","doi-asserted-by":"publisher","first-page":"4","DOI":"10.12691\/ajams-9-1-2","article-title":"Factor Analysis as a Tool for Survey Analysis","volume":"9","author":"Shrestha","year":"2021","journal-title":"AJAMS"},{"key":"2025110419274299600_bib101","first-page":"39","article-title":"Evaluating Structural Equation Models with Unobservable Variables and Measurement Error","volume":"18","author":"Fornell","year":"1981","journal-title":"Source: Journal of Marketing Research"},{"key":"2025110419274299600_bib102","volume-title":"Marketing Research An Applied Orientation","author":"Malhotra","year":"2020","edition":"Seventh"},{"key":"2025110419274299600_bib103","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1016\/j.jbusres.2011.10.026","article-title":"Impact of competitiveness on salespeople\u2019s commitment and performance","volume":"65","author":"Lam","year":"2012","journal-title":"Journal of Business Research"},{"key":"2025110419274299600_bib104","doi-asserted-by":"crossref","first-page":"67","DOI":"10.4103\/aca.ACA_157_18","article-title":"Descriptive statistics and normality tests for statistical data","volume":"22","author":"Mishra","year":"2019","journal-title":"Ann Card Anaesth"},{"key":"2025110419274299600_bib105","doi-asserted-by":"publisher","first-page":"52","DOI":"10.5395\/rde.2013.38.1.52","article-title":"Statistical notes for clinical researchers: assessing normal distribution (2) using skewness and kurtosis","volume":"38","author":"Kim","year":"2013","journal-title":"Restor Dent Endod"},{"key":"2025110419274299600_bib106","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-32827-8","article-title":"PLS Path Modeling: from Foundations to Recent Developments and Open Issues for Model Assessment and Improvement","volume-title":"Handbook of Partial Least Squares","author":"Vinzi","year":"2010"},{"key":"2025110419274299600_bib107","volume-title":"Confirmatory Factor Analysis for Applied Research","author":"Brown","year":"2006"},{"key":"2025110419274299600_bib108","first-page":"30","article-title":"Adoption of cloud computing by South African firms: the role of institutional forces, absorptive capacity, and top management","volume-title":"ACM International Conference Proceeding Series. Vol 28-September-2014","author":"Cohen","year":"2014"},{"key":"2025110419274299600_bib109","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10705519909540118","article-title":"Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives","volume":"6","author":"Hu","year":"1999","journal-title":"Structural Equation Modeling: A Multidisciplinary Journal"},{"key":"2025110419274299600_bib110","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.paid.2006.09.017","article-title":"Understanding the limitations of global fit assessment in structural equation modeling","volume":"42","author":"Steiger","year":"2007","journal-title":"Person Indiv Differ"},{"key":"2025110419274299600_bib111","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/B978-0-12-816203-3.00004-6","article-title":"Chapter 4\u2013The social and psychological impact of cyberattacks","volume-title":"Emerging Cyber Threats and Cognitive Vulnerabilities","author":"Bada","year":"2020"},{"key":"2025110419274299600_bib112","doi-asserted-by":"publisher","first-page":"186","DOI":"10.18060\/21312","article-title":"Contemporary Trauma Theory and Trauma-Informed Care in Substance Use Disorders: a Conceptual Model for Integrating Coping and Resilience","volume":"18","author":"Goodman","year":"2017","journal-title":"ASW"},{"key":"2025110419274299600_bib113","first-page":"64","article-title":"Review of psychological trauma: theory, practice, policy and research","volume":"56","author":"Tahan","year":"2021","journal-title":"Riv Psichiatr"},{"key":"2025110419274299600_bib114","article-title":"Psychological Trauma and Cybercrime","author":"Kamkar","year":"2021","journal-title":"Canadian Occupation Safety"},{"key":"2025110419274299600_bib115","volume-title":"The Beekeeper","author":"Ayer","year":"2024"},{"key":"2025110419274299600_bib116","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1111\/j.1467-9221.2012.00874.x","article-title":"Social identity, groups, and post-traumatic stress disorder","volume":"33","author":"Muldoon","year":"2012","journal-title":"Polit Psychol"},{"key":"2025110419274299600_bib117","volume-title":"Malicious Life: Cyber PTSD","author":"Malicious Life Podcast","year":"2022"},{"key":"2025110419274299600_bib118","article-title":"The psychological impact on the lives of cyber-attack victims","author":"Clark","year":"2023","journal-title":"PaintedBrain"},{"key":"2025110419274299600_bib119","volume-title":"Experiential Learning: Experience As The Source Of Learning And Development","author":"Kolb","year":"1984"},{"key":"2025110419274299600_bib120","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1037\/0022-3514.39.5.806","article-title":"Unrealistic Optimism About Future Life Events","volume-title":"J Pers Soc Psychol","author":"Weinstein","year":"1980"},{"key":"2025110419274299600_bib121","article-title":"Phishing Activity Report","author":"Indonesia Anti-Phishing Data Exchange (IDADX)","year":"2023"},{"key":"2025110419274299600_bib122","first-page":"15","article-title":"Identifying factors that influence security behaviors relating to phishing attacks susceptibility: a systematic literature review","volume":"15","author":"Hasan","year":"2020","journal-title":"J Theor Appl Inf Technol"},{"key":"2025110419274299600_bib123","article-title":"Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users","author":"Edwards","year":"2015"},{"key":"2025110419274299600_bib124","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1023\/A:1018682530519","article-title":"Reliability an d Validity of Self-Report Measures of HIV-Related Sexual Beh avior: progress Since 1990 an d Recom m endation s for Research an d Practice","volume":"27","author":"Weinhardt","year":"1998","journal-title":"Arch Sex Behav"},{"key":"2025110419274299600_bib125","doi-asserted-by":"publisher","first-page":"101958","DOI":"10.1016\/j.foodpol.2020.101958","article-title":"Quantity and quality food losses across the value Chain: a Comparative analysis","volume":"98","author":"Delgado","year":"2021","journal-title":"Food Policy"},{"key":"2025110419274299600_bib126","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1086\/225231","article-title":"Some Effects of \u201cSocial Desirability\u201d in Survey Studies\u2019","volume":"77","author":"Phillips","year":"1972","journal-title":"Am J Sociol"},{"key":"2025110419274299600_bib127","doi-asserted-by":"publisher","first-page":"014","DOI":"10.1363\/3901413","article-title":"Social desirability bias in sexual behavior reporting: evidence from an interview mode experiment in rural Malawi","volume":"39","author":"Kelly","year":"2013","journal-title":"IPSRH"},{"key":"2025110419274299600_bib128","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1037\/0033-295X.84.3.231","article-title":"Telling More Than We Can Know: verbal Reports on Mental Processes","volume":"84","author":"Nisbett","year":"1977","journal-title":"Psychol Rev"},{"key":"2025110419274299600_bib129","doi-asserted-by":"publisher","first-page":"441","DOI":"10.5688\/ajpe6299","article-title":"The social psychology of biased self-assessment","volume":"82","author":"Karpen","year":"2018","journal-title":"Am J Pharm Educ"},{"key":"2025110419274299600_bib130","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1037\/0003-066X.54.2.93","article-title":"How the Questions Shape the Answers","volume":"54","author":"Schwarz","year":"1999","journal-title":"Am Psychol"},{"key":"2025110419274299600_bib131","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1016\/S0191-8869(98)00115-9","article-title":"Confirmatory factor analysis of the multidimensional Students\u2019 Life Satisfaction Scale","volume":"25","author":"Greenspoon","year":"1998","journal-title":"Person Indiv Differ"},{"key":"2025110419274299600_bib132","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0925-5273(98)00007-3","article-title":"TQM impact on quality conformance and customer satisfaction: a causal model","volume":"55","author":"Forza","year":"1998","journal-title":"Int J Prod Econ"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf034\/65168311\/tyaf034.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf034\/65168311\/tyaf034.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:27:54Z","timestamp":1762302474000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf034\/8313771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":132,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf034","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf034"}}