{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:27Z","timestamp":1750220727996,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,15]]},"DOI":"10.1145\/3404663.3404685","type":"proceedings-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T22:10:11Z","timestamp":1594419011000},"page":"65-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Effect of Fear on Behavioral Intention to Comply"],"prefix":"10.1145","author":[{"given":"Salman M.","family":"Faizi","sequence":"first","affiliation":[{"name":"Capella University, St Minneapolis, MN, USA"}]},{"given":"Shawon S. M.","family":"Rahman","sequence":"additional","affiliation":[{"name":"Computer Science University of Hawaii-Hilo, Hilo, HI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Motivation and opportunity based model to reduce information security insider threats in organisations","volume":"0","author":"Safa N. S.","year":"2018","unstructured":"N. S. Safa , C. Maple , T. Watson , and R. Von Solms , \" Motivation and opportunity based model to reduce information security insider threats in organisations ,\" Journal of Information Security and Applications , vol. 0 , pp. 1 -- 11 , 2018 , doi: 10.1016\/j.jisa.2017.11.001. 10.1016\/j.jisa.2017.11.001 N. S. Safa, C. Maple, T. Watson, and R. Von Solms, \"Motivation and opportunity based model to reduce information security insider threats in organisations,\" Journal of Information Security and Applications, vol. 0, pp. 1--11, 2018, doi: 10.1016\/j.jisa.2017.11.001.","journal-title":"Journal of Information Security and Applications"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.006"},{"volume-title":"Enterprise data breach: Causes, challenges, prevention, and future directions","author":"Cheng L.","key":"e_1_3_2_1_4_1","unstructured":"L. Cheng , F. Liu , and D. Yao , \" Enterprise data breach: Causes, challenges, prevention, and future directions ,\" vol. 7 , no. 5, p. e1211, 2017, doi:10.1002\/widm.1211. 10.1002\/widm.1211 L. Cheng, F. Liu, and D. Yao, \"Enterprise data breach: Causes, challenges, prevention, and future directions,\" vol. 7, no. 5, p. e1211, 2017, doi:10.1002\/widm.1211."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.018"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"e_1_3_2_1_7_1","volume-title":"Can individuals' neutralization techniques be overcome? A field experiment on password policy,\" Computers & Security","author":"Siponen M.","year":"2020","unstructured":"M. Siponen , P. Puhakainen , and A. Vance , \" Can individuals' neutralization techniques be overcome? A field experiment on password policy,\" Computers & Security , vol. 88 , 2020 , doi: 10.1016\/j.cose.2019.101617. 10.1016\/j.cose.2019.101617 M. Siponen, P. Puhakainen, and A. Vance, \"Can individuals' neutralization techniques be overcome? A field experiment on password policy,\" Computers & Security, vol. 88, 2020, doi: 10.1016\/j.cose.2019.101617."},{"key":"e_1_3_2_1_8_1","unstructured":"Cybersecurity Ventures \"2019 Official Annual Cybercrime Report \" in \"Cybersecurity Ventures \" 2020. [Online]. Available: https:\/\/www.herjavecgroup.com\/wp-content\/uploads\/2018\/12\/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf  Cybersecurity Ventures \"2019 Official Annual Cybercrime Report \" in \"Cybersecurity Ventures \" 2020. [Online]. Available: https:\/\/www.herjavecgroup.com\/wp-content\/uploads\/2018\/12\/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"Ponemon Institute LLC \"2020 cost of insider threats global report \" 2020. [Online]. Available: https:\/\/153j3ttjub71nfe89mc7r5gb-wpengine.netdna-ssl.com\/wp-content\/uploads\/2020\/02\/2020-Global-Cost-of-Insider-Threats-Ponemon-Report_UTD.pdf  Ponemon Institute LLC \"2020 cost of insider threats global report \" 2020. [Online]. Available: https:\/\/153j3ttjub71nfe89mc7r5gb-wpengine.netdna-ssl.com\/wp-content\/uploads\/2020\/02\/2020-Global-Cost-of-Insider-Threats-Ponemon-Report_UTD.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Verizon \"Insider threat report out of sight should never be out of mind \" 2019. [Online]. Available: https:\/\/enterprise.verizon.com\/resources\/reports\/insider-threat-report.pdf  Verizon \"Insider threat report out of sight should never be out of mind \" 2019. [Online]. Available: https:\/\/enterprise.verizon.com\/resources\/reports\/insider-threat-report.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"Online Trust Alliance \"2018 Cyber Incident & Breach Trends Report \" 2019. [Online]. Available: https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/07\/OTA-Incident-Breach-Trends-Report_2019.pdf  Online Trust Alliance \"2018 Cyber Incident & Breach Trends Report \" 2019. [Online]. Available: https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/07\/OTA-Incident-Breach-Trends-Report_2019.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.03.009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00491"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017478"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.11.003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"e_1_3_2_1_18_1","first-page":"367","article-title":"A protection motivation theory approach to home wireless security","author":"Woon I. M. Y.","year":"2005","unstructured":"I. M. Y. Woon , G. W. Tan , and R. T. Low , \" A protection motivation theory approach to home wireless security ,\" International Conference on Information Systems (ICIS) , pp. 367 -- 380 , 2005 . [Online]. Available: http:\/\/130.18.86.27\/faculty\/warkentin\/SecurityPapers\/Merrill\/WoonTanLow2005_ICIS_ProtectionMotivation.pdf. I. M. Y. Woon, G. W. Tan, and R. T. Low, \"A protection motivation theory approach to home wireless security,\" International Conference on Information Systems (ICIS), pp. 367--380, 2005. [Online]. Available: http:\/\/130.18.86.27\/faculty\/warkentin\/SecurityPapers\/Merrill\/WoonTanLow2005_ICIS_ProtectionMotivation.pdf.","journal-title":"International Conference on Information Systems (ICIS)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017481"},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"Protection motivation theory: Understanding determinants to backing up personal data","author":"Crossler R. E.","year":"2010","unstructured":"R. E. Crossler , \" Protection motivation theory: Understanding determinants to backing up personal data ,\" Proceedings of the 43rd Hawaii International Conference on System Sciences , pp. 1 -- 10 , 2010 , DOI: 10.1109\/HICSS.2010.311. 10.1109\/HICSS.2010.311 R. E. Crossler, \"Protection motivation theory: Understanding determinants to backing up personal data,\" Proceedings of the 43rd Hawaii International Conference on System Sciences, pp. 1--10, 2010, DOI: 10.1109\/HICSS.2010.311.","journal-title":"Proceedings of the 43rd Hawaii International Conference on System Sciences"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017475"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.205065"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50704"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376276"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/109019810002700506"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04113"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.84.5.888"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2006.00053.x"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208923.2208926"},{"issue":"5","key":"e_1_3_2_1_39_1","first-page":"6","article-title":"Rethinking partial least squares path modeling: In praise of simple methods","volume":"45","author":"Rigdon E. E.","year":"2012","unstructured":"E. E. Rigdon , \" Rethinking partial least squares path modeling: In praise of simple methods ,\" Long Range Planning , vol. 45 , no. 5 -- 6 , pp. 341--358, 2012 , DOI: 10.1016\/j.lrp.2012.09.010. 10.1016\/j.lrp.2012.09.010 E. E. Rigdon, \"Rethinking partial least squares path modeling: In praise of simple methods,\" Long Range Planning, vol. 45, no. 5--6, pp. 341--358, 2012, DOI: 10.1016\/j.lrp.2012.09.010.","journal-title":"Long Range Planning"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1108\/EBR-11-2018-0203"},{"key":"e_1_3_2_1_41_1","volume-title":"The use of partial least squares path modeling in international marketing,\" in New challenges to international marketing: Emerald Group Publishing Limited","author":"Henseler J.","year":"2009","unstructured":"J. Henseler , C. M. Ringle , and R. R. Sinkovics , \" The use of partial least squares path modeling in international marketing,\" in New challenges to international marketing: Emerald Group Publishing Limited , 2009 . J. Henseler, C. M. Ringle, and R. R. Sinkovics, \"The use of partial least squares path modeling in international marketing,\" in New challenges to international marketing: Emerald Group Publishing Limited, 2009."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.03.012"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-04-2016-0130"},{"key":"e_1_3_2_1_44_1","volume-title":"Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion,\" in Journal of Physics: Conference Series","author":"Hamid M. R. A.","year":"2017","unstructured":"M. R. A. Hamid , W. Sami , and M. M. Sidek , \" Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion,\" in Journal of Physics: Conference Series , 2017 , vol. 890 , no. 1: IOP Publishing, p. 012163. [Online]. Available: https:\/\/iopscience.iop.org\/article\/10.1088\/1742-6596\/890\/1\/012163\/pdf. [Online]. Available: https:\/\/iopscience.iop.org\/article\/10.1088\/1742-6596\/890\/1\/012163\/pdf M. R. A. Hamid, W. Sami, and M. M. Sidek, \"Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion,\" in Journal of Physics: Conference Series, 2017, vol. 890, no. 1: IOP Publishing, p. 012163. [Online]. Available: https:\/\/iopscience.iop.org\/article\/10.1088\/1742-6596\/890\/1\/012163\/pdf. [Online]. Available: https:\/\/iopscience.iop.org\/article\/10.1088\/1742-6596\/890\/1\/012163\/pdf"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"e_1_3_2_1_46_1","volume-title":"A cyber domain-specific risk attitudes scale to address security issues in the digital space","author":"Kharlamov A.","year":"2018","unstructured":"A. Kharlamov , A. Jaiswal , G. Parry , and G. Pogrebna , \" A cyber domain-specific risk attitudes scale to address security issues in the digital space ,\" 2018 . [Online]. Available: https:\/\/www.researchgate.net\/publication\/325332842. A. Kharlamov, A. Jaiswal, G. Parry, and G. Pogrebna, \"A cyber domain-specific risk attitudes scale to address security issues in the digital space,\" 2018. [Online]. Available: https:\/\/www.researchgate.net\/publication\/325332842."},{"key":"e_1_3_2_1_47_1","volume-title":"Rhetorical appeals and legitimacy perceptions: How to induce information security policy compliance,\" in Proceedings of the 14th Pre-ICIS Workshop on Information Security and Privacy","author":"Torres C. I.","year":"2019","unstructured":"C. I. Torres and R. E. Crossler , \" Rhetorical appeals and legitimacy perceptions: How to induce information security policy compliance,\" in Proceedings of the 14th Pre-ICIS Workshop on Information Security and Privacy , 2019 , vol. 1 . [Online]. Available: https:\/\/www.albany.edu\/wisp\/includes\/WISP2019_proceedings\/WISP2019_paper_16.pdf. [Online]. Available: https:\/\/www.albany.edu\/wisp\/includes\/WISP2019_proceedings\/WISP2019_paper_16.pdf C. I. Torres and R. E. Crossler, \"Rhetorical appeals and legitimacy perceptions: How to induce information security policy compliance,\" in Proceedings of the 14th Pre-ICIS Workshop on Information Security and Privacy, 2019, vol. 1. [Online]. Available: https:\/\/www.albany.edu\/wisp\/includes\/WISP2019_proceedings\/WISP2019_paper_16.pdf. [Online]. Available: https:\/\/www.albany.edu\/wisp\/includes\/WISP2019_proceedings\/WISP2019_paper_16.pdf"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20043"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1002\/ijop.12042"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1215\/03616878-2007-018"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"}],"event":{"name":"ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining","acronym":"ICISDM 2020","location":"Hawaii HI USA"},"container-title":["Proceedings of the 2020 the 4th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404685","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404663.3404685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404685"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":51,"alternative-id":["10.1145\/3404663.3404685","10.1145\/3404663"],"URL":"https:\/\/doi.org\/10.1145\/3404663.3404685","relation":{},"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}