{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:40:59Z","timestamp":1762252859839,"version":"3.41.2"},"reference-count":83,"publisher":"Emerald","issue":"8","license":[{"start":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T00:00:00Z","timestamp":1567382400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["K"],"published-print":{"date-parts":[[2019,9,2]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to investigate the impact of perceived price level and information security awareness on computer users\u2019 attitude. Moreover, this study aims to investigate the effect of attitude, subjective norms and perceived behavioral control (PBC) on intention to use anti-malware software.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Data were collected using a structured questionnaire from 225 students of five public universities in Malaysia. Purposive sampling technique was used in this study. AMOS 24 was used to test the research framework using a two-step approach.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Findings give support to some of the hypotheses developed with R2 values of 0.521 for attitude and 0.740 for intention. Perceived price level had a negative effect on attitude while information security awareness had a positive effect on attitude and intention. Attitude, subjective norms and PBC were all positively related to intention, but perceived price level did not affect intention. This suggests that benefits of using anti-malware are more than its price value. Therefore, the price has no direct effect on intention to use.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>University computer networks are as open and inviting as their campuses. Therefore, this research can be helpful to the universities to safeguard their networks and encourage the students to use anti-malware. However, using anti-malware software will enable an individual to identify and prioritize security risks, quickly detect and mitigate security breaches, improve the understanding of security gaps and safeguard the sensitive data by minimizing the risks related to malware.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This study ventured to model the information security behavior of anti-malware usage by individual users by using the theory of planned behavior with the addition of two new variables, perceived price level and information security awareness to explain the behavior better.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/k-05-2018-0226","type":"journal-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T03:57:25Z","timestamp":1540353445000},"page":"1565-1585","source":"Crossref","is-referenced-by-count":30,"title":["Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior"],"prefix":"10.1108","volume":"48","author":[{"given":"Ali","family":"Vafaei-Zadeh","sequence":"first","affiliation":[]},{"given":"Ramayah","family":"Thurasamy","sequence":"additional","affiliation":[]},{"given":"Haniruzila","family":"Hanifah","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"3","key":"key2019092314100050700_ref001","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","article-title":"User preference of cyber security awareness delivery methods","volume":"33","year":"2014","journal-title":"Behaviour & Information Technology"},{"volume-title":"From Intentions to Actions: A Theory of Planned Behavior","year":"1985","key":"key2019092314100050700_ref002"},{"issue":"2","key":"key2019092314100050700_ref003","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"volume-title":"Understanding Attitudes and Predicting Social Behavior","year":"1980","key":"key2019092314100050700_ref004"},{"issue":"5","key":"key2019092314100050700_ref005","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/0022-1031(86)90045-4","article-title":"Prediction of goal-directed behavior: attitudes, intentions, and perceived behavioral control","volume":"22","year":"1986","journal-title":"Journal of Experimental Social Psychology"},{"key":"key2019092314100050700_ref006","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.jnca.2014.10.009","article-title":"Man-At-The-End attacks: analysis, taxonomy, human aspects, motivation and future directions","volume":"48","year":"2015","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"key2019092314100050700_ref007","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.cose.2009.12.005","article-title":"Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study","volume":"29","year":"2010","journal-title":"Computers & Security"},{"issue":"3","key":"key2019092314100050700_ref008","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2019092314100050700_ref009","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1348\/014466601164939","article-title":"Efficacy of the theory of planned behaviour: a meta\u2010analytic review","volume":"40","year":"2001","journal-title":"British Journal of Social Psychology"},{"key":"key2019092314100050700_ref010","unstructured":"Aruna, P. (2015), \u201cMalware has affected four out of every 10 Malaysians\u201d, The Star, available at: www.thestar.com.my\/news\/nation\/2015\/04\/17\/4-in-10-msians-kena-malwaare\/ (accessed 2 March 2016)."},{"key":"key2019092314100050700_ref011","unstructured":"AV-TEST (2017), \u201cMalware\u201d, available at: www.av-test.org\/en\/statistics\/malware\/"},{"key":"key2019092314100050700_ref012","unstructured":"AVAST (2017), \u201cAvast statistics by country\u201d, available at: www.avast.com\/stats"},{"key":"key2019092314100050700_ref013","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-74320-0","article-title":"Automated Classification and Analysis of Internet Malware","volume-title":"Recent Advances in Intrusion Detection","year":"2007"},{"issue":"1","key":"key2019092314100050700_ref014","doi-asserted-by":"crossref","first-page":"31","DOI":"10.2307\/249677","article-title":"Modeling IT ethics: a study in situational ethics","volume":"22","year":"1998","journal-title":"Mis Quarterly"},{"issue":"3","key":"key2019092314100050700_ref015","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0092-6566(91)90021-H","article-title":"Predicting dishonest actions using the theory of planned behavior","volume":"25","year":"1991","journal-title":"Journal of Research in Personality"},{"issue":"7","key":"key2019092314100050700_ref016","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.im.2017.01.003","article-title":"Determinants of early conformance with information security policies","volume":"54","year":"2017","journal-title":"Information & Management"},{"key":"key2019092314100050700_ref017","doi-asserted-by":"crossref","unstructured":"Brown, S. and Venkatesh, V. (2005), \u201cA model of adoption of technology in the household: a baseline model test and extension incorporating household life cycle\u201d, Management Information Systems Quarterly, available at: http:\/\/aisel.aisnet.org\/misq\/vol29\/iss3\/4 (accessed 21 February 2016).","DOI":"10.2307\/25148690"},{"key":"key2019092314100050700_ref018","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.chb.2013.09.012","article-title":"The role of disclosure of personal information in the evaluation of risk and trust in young peoples\u2019 online interactions","volume":"30","year":"2014","journal-title":"Computers in Human Behavior"},{"key":"key2019092314100050700_ref019","first-page":"419","article-title":"Roles of information security awareness and perceived fairness in information security policy compliance","volume-title":"AMCIS 2009 Proceedings","year":"2009"},{"issue":"3","key":"key2019092314100050700_ref020","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2019092314100050700_ref021","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1080\/1097198X.2008.10856466","article-title":"User attitude towards instant messaging: the effect of espoused national cultural values on awareness and privacy","volume":"11","year":"2008","journal-title":"Journal of Global Information Technology Management"},{"issue":"2","key":"key2019092314100050700_ref022","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1057\/jibs.2009.88","article-title":"From the editors: common method variance in international business research","volume":"41","year":"2010","journal-title":"Journal of International Business Studies"},{"key":"key2019092314100050700_ref023","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.cose.2013.09.009","article-title":"Understanding the violation of IS security policy in organizations: an integrated model based on social control and deterrence theory","volume":"39","year":"2013","journal-title":"Computers & Security"},{"key":"key2019092314100050700_ref024","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.chb.2016.07.047","article-title":"Wearable technologies: the role of usefulness and visibility in Smartwatch adoption","volume":"65","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"key2019092314100050700_ref025","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1016\/j.chb.2012.05.003","article-title":"Information systems user security: a structured model of the knowing\u2013doing gap","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"key":"key2019092314100050700_ref026","unstructured":"CyberSecurity Malaysia (2015), \u201cCyber security trends & strategy for business (digital?)\u201d, available at: www.bitas.asia\/files\/bitas2015\/presentation-slides\/MohamedAnwer-Trend&StrategyfortheDigitalBusiness.pdf"},{"key":"key2019092314100050700_ref027","unstructured":"DHS (2015), \u201cNational strategy to secure cyberspace, official website of the department of homeland security\u201d, available at: www.dhs.gov\/national-strategy-secure-cyberspace"},{"issue":"7","key":"key2019092314100050700_ref028","doi-asserted-by":"crossref","first-page":"386","DOI":"10.17705\/1jais.00133","article-title":"The centrality of awareness in the formation of user behavioral intention toward protective information technologies","volume":"8","year":"2007","journal-title":"Journal of the Association for Information Systems. Association for Information Systems"},{"issue":"3","key":"key2019092314100050700_ref029","first-page":"307","article-title":"Effects of price, brand, and store information on buyers\u2019 product evaluations","volume":"28","year":"1991","journal-title":"Journal of Marketing Research"},{"key":"key2019092314100050700_ref030","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jenvp.2014.03.003","article-title":"An extended theory of planned behaviour model of the psychological factors affecting commuters\u2019 transport mode use","volume":"40","year":"2014","journal-title":"Journal of Environmental Psychology"},{"issue":"4","key":"key2019092314100050700_ref031","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.istr.2013.03.004","article-title":"Toward web-based information security knowledge sharing","volume":"17","year":"2013","journal-title":"Information Security Technical Report"},{"key":"key2019092314100050700_ref032","unstructured":"Fishbein, M. and Ajzen, I. (1975), \u201cBelief, attitude, intention and behavior: an introduction to theory and research\u201d, available at: http:\/\/trid.trb.org\/view.aspx?id=1150648 (accessed 6 January 2016)."},{"issue":"3","key":"key2019092314100050700_ref033","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/0022-1031(81)90032-9","article-title":"On construct validity: a critique of Miniard and Cohen\u2019s paper","volume":"17","year":"1981","journal-title":"Journal of Experimental Social Psychology"},{"key":"key2019092314100050700_ref034","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.cose.2016.01.004","article-title":"Shaping intention to resist social engineering through transformational leadership, information security culture and awareness","volume":"59","year":"2016","journal-title":"Computers & Security"},{"issue":"1","key":"key2019092314100050700_ref035","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"5","key":"key2019092314100050700_ref036","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.cose.2007.03.001","article-title":"Assessing the security perceptions of personal Internet users","volume":"26","year":"2007","journal-title":"Computers & Security"},{"issue":"1","key":"key2019092314100050700_ref037","first-page":"93","article-title":"Consumers\u2019 purchasing behavior towards green products in New Zealand","volume":"4","year":"2008","journal-title":"Innovative Marketing"},{"article-title":"Information security awareness: its antecedents and mediating effects on security compliant behavior","volume-title":"Thirty Fourth International Conference on Information Systems","year":"2013","key":"key2019092314100050700_ref038"},{"issue":"2","key":"key2019092314100050700_ref039","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1108\/10662240510590324","article-title":"Mobile internet acceptance in Korea","volume":"15","year":"2005","journal-title":"Internet Research"},{"issue":"1","key":"key2019092314100050700_ref040","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijmedinf.2014.08.008","article-title":"Physicians\u2019 acceptance of electronic medical records exchange: an extension of the decomposed TPB model with institutional trust and perceived risk","volume":"84","year":"2015","journal-title":"International Journal of Medical Informatics"},{"issue":"8","key":"key2019092314100050700_ref041","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1076211.1076241","article-title":"Is spyware an Internet nuisance or public menace?","volume":"48","year":"2005","journal-title":"Communications of the ACM"},{"issue":"1","key":"key2019092314100050700_ref042","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","year":"2012","journal-title":"Computers & Security"},{"issue":"1","key":"key2019092314100050700_ref043","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","article-title":"Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition","volume":"51","year":"2014","journal-title":"Information & Management"},{"key":"key2019092314100050700_ref044","unstructured":"IWS (2016), \u201cInternet users in the world by regions\u201d, Internet World Stats, available at: www.internetworldstats.com\/stats.htm"},{"key":"key2019092314100050700_ref045","unstructured":"Kaspersky (2015), \u201cFinancial cyberthreats in 2014\u201d, available at: https:\/\/securelist.com\/files\/2015\/02\/KSN_Financial_Threats_Report_2014_eng.pdf"},{"issue":"3","key":"key2019092314100050700_ref046","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1325555.1325569","article-title":"Promoting personal responsibility for internet safety","volume":"51","year":"2008","journal-title":"Communications of the ACM"},{"issue":"2","key":"key2019092314100050700_ref047","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.im.2008.01.002","article-title":"An empirical investigation of anti-spyware software adoption: a multitheoretical perspective","volume":"45","year":"2008","journal-title":"Information & Management"},{"key":"key2019092314100050700_ref048","doi-asserted-by":"crossref","unstructured":"Leonard, L.N.K. and Cronan, T.P. (2001), \u201cIllegal, inappropriate, and unethical behavior in an information technology context: a study To explain influences\u201d, Journal of the Association for Information Systems, available at: http:\/\/aisel.aisnet.org\/jais\/vol1\/iss1\/12 (accessed 17 February 2016).","DOI":"10.17705\/1jais.00012"},{"issue":"2","key":"key2019092314100050700_ref049","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1108\/IMDS-07-2014-0223","article-title":"Understanding broadband television users\u2019 continuance intention to use","volume":"115","year":"2015","journal-title":"Industrial Management & Data Systems"},{"key":"key2019092314100050700_ref050","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.chb.2016.11.065","article-title":"Individual differences and information security awareness","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"key2019092314100050700_ref051","unstructured":"Means, S. (2016), \u201cJacksonville state university investigating possible hack\u201d, WAFF, available at: www.waff.com\/story\/31297165\/jacksonville-state-university-investigating-possible-hack (accessed 8 March 2016)."},{"key":"key2019092314100050700_ref052","unstructured":"Microsoft (2016), \u201cMicrosoft security intelligence report\u201d, available at: www.microsoft.com\/security\/sir\/default.aspx"},{"key":"key2019092314100050700_ref053","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.amc.2013.12.059","article-title":"Capturing the interplay between malware and anti-malware in a computer network","volume":"229","year":"2014","journal-title":"Applied Mathematics and Computation"},{"issue":"2","key":"key2019092314100050700_ref054","doi-asserted-by":"crossref","first-page":"576","DOI":"10.3102\/0034654308326083","article-title":"Learning with computer-based learning environments: a literature review of computer self-efficacy","volume":"79","year":"2009","journal-title":"Review of Educational Research"},{"key":"key2019092314100050700_ref055","doi-asserted-by":"crossref","unstructured":"Ng, B.Y. and Rahim, M. (2005), \u201cA socio-behavioral study of home computer users\u2019 intention to practice security\u201d, PACIS 2005 Proceedings, available at: http:\/\/aisel.aisnet.org\/pacis2005\/20 (accessed 18 February 2016).","DOI":"10.1016\/S1361-3723(05)70223-2"},{"key":"key2019092314100050700_ref056","unstructured":"OPSWAT (2015), \u201cAntivirus and threat report: august 2015\u201d, available at: www.opswat.com\/resources\/reports\/anti-malware-market-share-security-august-2015"},{"issue":"4","key":"key2019092314100050700_ref057","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1108\/IMCS-10-2013-0078","article-title":"A study of information security awareness in Australian government organisations","volume":"22","year":"2014","journal-title":"Information Management & Computer Security"},{"issue":"2","key":"key2019092314100050700_ref058","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1108\/ICS-01-2016-0009","article-title":"Assessing information security attitudes: a comparison of two studies","volume":"24","year":"2016","journal-title":"Information and Computer Security"},{"issue":"4","key":"key2019092314100050700_ref059","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1177\/014920638601200408","article-title":"Self-reports in organizational research: problems and prospects","volume":"12","year":"1986","journal-title":"Journal of Management"},{"issue":"5","key":"key2019092314100050700_ref060","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","year":"2003","journal-title":"Journal of Applied Psychology"},{"key":"key2019092314100050700_ref061","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.chb.2015.12.037","article-title":"An information security knowledge sharing model in organizations","volume":"57","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2019092314100050700_ref062","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","article-title":"Information security conscious care behaviour formation in organizations","volume":"53","year":"2015","journal-title":"Computers & Security"},{"key":"key2019092314100050700_ref063","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.techfore.2015.08.012","article-title":"Individual information security, user behaviour and cyber victimisation: an empirical study of social networking users","volume":"102","year":"2016","journal-title":"Technological Forecasting and Social Change"},{"issue":"3","key":"key2019092314100050700_ref064","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.im.2015.10.004","article-title":"Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach","volume":"53","year":"2016","journal-title":"Information & Management"},{"issue":"3","key":"key2019092314100050700_ref065","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0378-7206(03)00079-X","article-title":"An empirical study on predicting user acceptance of e-shopping on the Web","volume":"41","year":"2004","journal-title":"Information & Management"},{"issue":"1","key":"key2019092314100050700_ref066","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.im.2008.05.004","article-title":"Determinants of customer acceptance of multi-service network: an implication forIP-based technologies","volume":"46","year":"2009","journal-title":"Information & Management"},{"key":"key2019092314100050700_ref067","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.cose.2015.01.002","article-title":"Personality, attitudes, and intentions: predicting initial adoption of information security behavior","volume":"49","year":"2015","journal-title":"Computers & Security"},{"issue":"4","key":"key2019092314100050700_ref068","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1080\/08911762.2012.743203","article-title":"Explaining the role of perceived risk, knowledge, price, and cost in dry fish consumption within the theory of planned behavior","volume":"25","year":"2012","journal-title":"Journal of Global Marketing"},{"issue":"1","key":"key2019092314100050700_ref069","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1108\/IMCS-08-2012-0045","article-title":"Variables influencing information security policy compliance","volume":"22","year":"2014","journal-title":"Information Management & Computer Security"},{"key":"key2019092314100050700_ref070","unstructured":"Sophos (2013), \u201cSecurity Threat Report 2013\u201d, available at: www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophossecuritythreatreport2013.pdf"},{"issue":"2","key":"key2019092314100050700_ref071","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1177\/1094428110369842","article-title":"Methodological urban legends: the misuse of statistical control variables","volume":"14","year":"2011","journal-title":"Organizational Research Methods"},{"issue":"3","key":"key2019092314100050700_ref072","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/ijthi.2014070102","article-title":"Consumer intention to use anti-spyware software: an application of structural equation modeling","volume":"10","year":"2014","journal-title":"International Journal of Technology and Human Interaction"},{"key":"key2019092314100050700_ref073","unstructured":"Symantec (2015), \u201cSymantec intelligence report\u201d, available at: www.symantec.com\/security_response\/publications\/monthlythreatreport.jsp"},{"key":"key2019092314100050700_ref074","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.cose.2014.02.010","article-title":"Evaluation model for knowledge sharing in information security professional virtual community","volume":"43","year":"2014","journal-title":"Computers & Security"},{"issue":"11","key":"key2019092314100050700_ref075","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1108\/00070700510629760","article-title":"Subjective norms, attitudes and intentions of Finnish consumers in buying organic food","volume":"107","year":"2005","journal-title":"British Food Journal"},{"issue":"2","key":"key2019092314100050700_ref076","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","article-title":"Understanding information technology usage: a test of competing models","volume":"6","year":"1995","journal-title":"Information Systems Research"},{"issue":"1","key":"key2019092314100050700_ref077","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/VJIKMS-09-2016-0052","article-title":"Modelling internet security software usage among undergraduate students","volume":"48","year":"2018","journal-title":"VINE Journal of Information and Knowledge Management Systems"},{"issue":"2","key":"key2019092314100050700_ref078","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","article-title":"A theoretical extension of the technology acceptance model: four longitudinal field studies","volume":"46","year":"2000","journal-title":"Management Science"},{"issue":"5","key":"key2019092314100050700_ref079","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.im.2004.07.001","article-title":"What drives mobile commerce? An empirical evaluation of the revised technology acceptance model","volume":"42","year":"2005","journal-title":"Information and Management"},{"key":"key2019092314100050700_ref080","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1016\/j.jclepro.2016.06.120","article-title":"Young consumers\u2019 intention towards buying green products in a developing nation: extending the theory of planned behavior","volume":"135","year":"2016","journal-title":"Journal of Cleaner Production"},{"key":"key2019092314100050700_ref081","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.jclepro.2015.02.071","article-title":"Application of the theory of planned behaviour to predict Iranian students\u2019 intention to purchase organic food","volume":"107","year":"2015","journal-title":"Journal of Cleaner Production"},{"issue":"3","key":"key2019092314100050700_ref082","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1177\/002224298805200302","article-title":"Consumer perceptions of price, quality, and value: a means-end model and synthesis of evidence","volume":"52","year":"1988","journal-title":"The Journal of Marketing"},{"key":"key2019092314100050700_ref083","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.cose.2016.01.002","article-title":"Causality reasoning about network events for detecting stealthy malware activities","volume":"58","year":"2016","journal-title":"Computers & Security"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-05-2018-0226\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-05-2018-0226\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:48:12Z","timestamp":1753393692000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/48\/8\/1565-1585\/259538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,2]]},"references-count":83,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,9,2]]}},"alternative-id":["10.1108\/K-05-2018-0226"],"URL":"https:\/\/doi.org\/10.1108\/k-05-2018-0226","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2019,9,2]]}}}