{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:33:38Z","timestamp":1760236418621,"version":"build-2065373602"},"reference-count":99,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["883588"],"award-info":[{"award-number":["883588"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Human failure is a primary contributor to successful cyber attacks. For any cybersecurity initiative, it is therefore vital to motivate individuals to implement secure behavior. Research using protection motivation theory (PMT) has given insights into what motivates people to safeguard themselves in cyberspace. Recent PMT results have highlighted the central role of the coping appraisal in the cybersecurity context. In cybersecurity, we cope with threats using countermeasures. Research has shown that countermeasure awareness is a significant antecedent to all coping appraisal elements. Yet, although awareness plays a key role within the PMT framework, it is generally challenging to influence. A factor that is easy to influence is countermeasure readability. Earlier work has shown the impact of readability on understanding and that readability metrics make measuring and improving readability simple. Therefore, our research aims to clarify the relationship between countermeasure readability and security intentions. We propose an extended theoretical framework and investigate its implications using a survey. In line with related studies, results indicate that people are more likely to have favorable security intentions if they are aware of countermeasures and are confident in their ability to implement them. Crucially, the data show that countermeasure readability influences security intentions. Our results imply that cybersecurity professionals can utilize readability metrics to assess and improve the readability of countermeasure texts, providing an actionable avenue towards influencing security intentions.<\/jats:p>","DOI":"10.3390\/jcp1040034","type":"journal-article","created":{"date-parts":[[2021,11,21]],"date-time":"2021-11-21T20:58:21Z","timestamp":1637528301000},"page":"675-703","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["The Effect of Countermeasure Readability on Security Intentions"],"prefix":"10.3390","volume":"1","author":[{"given":"Tim","family":"Smit","sequence":"first","affiliation":[{"name":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4195-0585","authenticated-orcid":false,"given":"Max","family":"van Haastrecht","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands"},{"name":"Leiden Institute of Advanced Computer Science (LIACS), Leiden University, Niels Bohrweg 1, 2333 CA Leiden, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9237-221X","authenticated-orcid":false,"given":"Marco","family":"Spruit","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands"},{"name":"Leiden Institute of Advanced Computer Science (LIACS), Leiden University, Niels Bohrweg 1, 2333 CA Leiden, The Netherlands"},{"name":"Department of Public Health and Primary Care, Leiden University Medical Center (LUMC), Albinusdreef 2, 2333 ZA Leiden, The Netherlands"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,19]]},"reference":[{"key":"ref_1","unstructured":"Kemp, S., Hootsuite, and We Are Social (2021, August 17). Digital 2021 July Global Statshot Report. Available online: https:\/\/datareportal.com\/reports\/digital-2021-july-global-statshot."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/09540962.2020.1764206","article-title":"New development: COVID-19 as an accelerator of digital transformation in public service delivery","volume":"41","author":"Agostino","year":"2020","journal-title":"Public Money Manag."},{"key":"ref_3","unstructured":"ENISA (2021, May 24). Top Ten Cyber Hygiene Tips for SMEs during COVID-19 Pandemic. Available online: https:\/\/www.enisa.europa.eu\/news\/enisa-news\/top-ten-cyber-hygiene-tips-for-smes-during-covid-19-pandemic."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"8","DOI":"10.38044\/2686-9136-2020-1-2-8-16","article-title":"Digital Transformation vs COVID-19: The Case of Japan","volume":"1","author":"Lida","year":"2020","journal-title":"Digit. Law J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1080\/10580530.2020.1814461","article-title":"COVID-19 Pandemic: Shifting Digital Transformation to a High-Speed Gear","volume":"37","year":"2020","journal-title":"Inf. Syst. Manag."},{"key":"ref_6","unstructured":"Smith, Z., Lostri, E., and Lewis, J. (2020). The Hidden Costs of Cybercrime, McAfee Inc.. Technical Report."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1007\/s10796-019-09959-1","article-title":"Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments","volume":"21","author":"Heidt","year":"2019","journal-title":"Inf. Syst. Front."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Van Haastrecht, M., Yigit Ozkan, B., Brinkhuis, M., and Spruit, M. (2021). Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics. Appl. Sci., 11.","DOI":"10.3390\/app11156909"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Holt, T., and Bossler, A. (2015). Cybercrime in Progress, Routledge. [1st ed.].","DOI":"10.4324\/9781315775944"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1080\/10580530.2015.1117842","article-title":"Impact of Users\u2019 Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective","volume":"33","author":"Hanus","year":"2015","journal-title":"Inf. Syst. Manag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory","volume":"31","author":"Ifinedo","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.chb.2018.11.002","article-title":"Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general","volume":"92","author":"Martens","year":"2019","journal-title":"Comput. Hum. Behav."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Alkhurayyif, Y., and Weir, G.R.S. (2017, January 6\u20138). Readability as a basis for information security policy assessment. Proceedings of the 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, UK.","DOI":"10.1109\/EST.2017.8090409"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Alkhurayyif, Y., and Weir, G.R.S. (2018, January 16\u201317). Using Sequential Exploratory Mixed Methods Design to Explore Readability of ISPs. Proceedings of the 2018 International Conference on Computing, Electronics Communications Engineering (iCCECE), Southend, UK.","DOI":"10.1109\/iCCECOME.2018.8659025"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1007\/s00779-021-01560-1","article-title":"The role of self-efficacy on the adoption of information systems security innovations: A meta-analysis assessment","volume":"25","author":"Hameed","year":"2021","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_16","first-page":"102710","article-title":"Understanding cybersecurity behavioral habits: Insights from situational support","volume":"57","author":"Hong","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2021.102309","article-title":"Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation","volume":"106","author":"Vrhovec","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1037\/0022-3514.56.3.407","article-title":"Impact of conceptions of ability on self-regulatory mechanisms and complex decision making","volume":"56","author":"Wood","year":"1989","journal-title":"J. Personal. Soc. Psychol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1037\/0022-3514.60.6.941","article-title":"Self-regulatory mechanisms governing the impact of social comparison on complex decision making","volume":"60","author":"Bandura","year":"1991","journal-title":"J. Personal. Soc. Psychol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/S0090-2616(98)90006-7","article-title":"Social cognitive theory and self-efficacy: Going beyond traditional motivational and behavioral approaches","volume":"26","author":"Stajkovic","year":"1998","journal-title":"Organ. Dyn."},{"key":"ref_21","unstructured":"Bandura, A. (1986). Social Foundations of Thought and Action, Prentice Hall."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","article-title":"Self-efficacy: Toward a unifying theory of behavioral change","volume":"84","author":"Bandura","year":"1977","journal-title":"Psychol. Rev."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A Protection Motivation Theory of Fear Appeals and Attitude Change","volume":"91","author":"Rogers","year":"1975","journal-title":"J. Psychol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1002\/job.322","article-title":"Self-determination theory and work motivation","volume":"26","author":"Deci","year":"2005","journal-title":"J. Organ. Behav."},{"key":"ref_25","unstructured":"Champion, V., and Skinner, C. (2008). The Health Belief Model. Health Behavior and Health Education: Theory, Research, and Practice, Jossey-Bass. [4th ed.]."},{"key":"ref_26","unstructured":"Claar, C. (2011). The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model. [Ph.D. Thesis, Utah State University]."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: A health belief perspective","volume":"46","author":"Ng","year":"2009","journal-title":"Decis. Support Syst."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Bauer, S., and Bernroider, E.W. (2015). The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring, Springer Publishing.","DOI":"10.1007\/978-3-319-20376-8_14"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4018\/IJISP.2015010102","article-title":"A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour","volume":"9","author":"Sommestad","year":"2015","journal-title":"Int. J. Inf. Secur. Priv."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1111\/j.1559-1816.2000.tb02308.x","article-title":"Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory","volume":"30","author":"Milne","year":"2000","journal-title":"J. Appl. Soc. Psychol."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"ref_32","unstructured":"Fishbein, M., and Ajzen, I. (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research (Addison-Wesley Series in Social Psychology), Addison-Wesley."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1016\/0022-1031(86)90045-4","article-title":"Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control","volume":"22","author":"Ajzen","year":"1986","journal-title":"J. Exp. Soc. Psychol."},{"key":"ref_34","unstructured":"Richards, J., and Schmidt, R. (2015). Longman Dictionary of Language Teaching and Applied Linguistics, Taylor & Francis. [4th ed.]."},{"key":"ref_35","unstructured":"DuBay, W. (2007). Smart Language: Readers, Readability, and the Grading of Text, BookSurge Publishing."},{"key":"ref_36","first-page":"19","article-title":"The Concept of Readability","volume":"26","author":"Dale","year":"1949","journal-title":"Elem. Engl."},{"key":"ref_37","unstructured":"Klare, G.R. (1963). The Measurement of Readability, Amsterdam University Press."},{"key":"ref_38","unstructured":"Calonia, J. (2021, May 24). What Is Readability?. Available online: https:\/\/www.grammarly.com\/blog\/readability\/."},{"key":"ref_39","unstructured":"Hargis, G., Carey, M., Hernandez, A.K., Hughes, P., Longo, D., Rouiller, S., and Wilde, E. (2004). Developing Quality Technical Information: A Handbook for Writers and Editors, IBM Press. [2nd ed.]."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Dell\u2019Orletta, F., Wieling, M., Venturi, G., Cimino, A., and Montemagni, S. (2015, January 26). Assessing the Readability of Sentences: Which Corpora and Features?. Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications, Association for Computational Linguistics (ACL), Baltimore, MD, USA.","DOI":"10.3115\/v1\/W14-1820"},{"key":"ref_41","unstructured":"Campbell, G., and Weir, G. (2006). Matching readers to texts with the Strathclyde readability measure. ICT in the Analysis, Teaching and Learning of Languages, Strathprints. Preprints of the ICTATLL Workshop 2006."},{"key":"ref_42","first-page":"43","article-title":"How can security be measured?","volume":"2","author":"Chapin","year":"2005","journal-title":"Inf. Syst. Control J."},{"key":"ref_43","unstructured":"Van Oosten, P., Tanghe, D., and Hoste, V. (2010, January 19\u201321). Towards an improved methodology for automated readability prediction. Proceedings of the 7th Conference on International Language Resources and Evaluation (LREC 2010), European Language Resources Association (ELRA), Valetta, Malta."},{"key":"ref_44","unstructured":"Chenoweth, T., Minch, R., and Gattiker, T. (2009, January 5\u20138). Application of Protection Motivation Theory to Adoption of Protective Technologies. Proceedings of the 2009 42nd Hawaii International Conference on System Sciences, Waikoloa, HI, USA."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.cose.2014.11.002","article-title":"Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach","volume":"48","author":"Pittayachawan","year":"2015","journal-title":"Comput. Secur."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1108\/09685220910978112","article-title":"Consumer motivations in taking action against spyware: An empirical investigation","volume":"17","author":"Gurung","year":"2009","journal-title":"Inf. Manag. Comput. Secur."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1057\/ejis.2009.11","article-title":"Threat or coping appraisal: Determinants of SMB executives\u2019 decision to adopt anti-malware software","volume":"18","author":"Lee","year":"2009","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_48","first-page":"47","article-title":"Applying Protection Motivation Theory to Information Security Training for College Students","volume":"9","author":"Meso","year":"2013","journal-title":"J. Inf. Priv. Secur."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: A protection motivation theory perspective","volume":"59","author":"Tsai","year":"2016","journal-title":"Comput. Secur."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"2432","DOI":"10.1016\/j.jbusres.2016.01.013","article-title":"Consumer adoption versus rejection decisions in seemingly similar service innovations: The case of the Internet and mobile banking","volume":"69","author":"Laukkanen","year":"2016","journal-title":"J. Bus. Res."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1111\/j.1559-1816.2010.00615.x","article-title":"Explaining Internet Banking Behavior: Theory of Reasoned Action, Theory of Planned Behavior, or Technology Acceptance Model?","volume":"40","author":"Yousafzai","year":"2010","journal-title":"J. Appl. Soc. Psychol."},{"key":"ref_52","unstructured":"Woon, I., Tan, G., and Low, R. (2005). A Protection Motivation Theory Approach to Home Wireless Security, Association for Information Systems."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/S1441-3582(02)70157-2","article-title":"Designing Vignette Studies in Marketing","volume":"10","author":"Wason","year":"2002","journal-title":"Australas. Mark. J."},{"key":"ref_54","unstructured":"Cisco Systems (2021, February 19). What Are the Most Common Cyber Attacks?. Available online: https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/common-cyberattacks.html."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions","volume":"34","author":"Anderson","year":"2010","journal-title":"MIS Q."},{"key":"ref_56","unstructured":"Vagias, W. (2006). Likert-Type Scale Response Anchors, Clemson University. Technical Report."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.sapharm.2006.07.002","article-title":"Perceived difficulty and self-efficacy in the factor structure of perceived behavioral control to seek drug information from physicians and pharmacists","volume":"3","author":"Liu","year":"2007","journal-title":"Res. Soc. Adm. Pharm."},{"key":"ref_58","unstructured":"My Byline Media (2021, July 08). Dale-Chall Readability Calculator. Available online: https:\/\/readabilityformulas.com\/free-dale-chall-test.php."},{"key":"ref_59","unstructured":"WebFX (2021, May 24). Readable. Available online: https:\/\/www.webfx.com\/tools\/read-able\/."},{"key":"ref_60","unstructured":"Harrison, C. (2021, May 24). Tip Sheet on Question Wording. Available online: https:\/\/psr.iq.harvard.edu\/files\/psr\/files\/PSRQuestionnaireTipSheet_0.pdf."},{"key":"ref_61","unstructured":"Hair, J., Hult, T., Ringle, C., and Sarstedt, M. (2017). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), SAGE Publications. [2nd ed.]."},{"key":"ref_62","unstructured":"Ray, S., Danks, N., Valdez, A., Estrada, J., Uanhoro, J., Nakayama, J., Koyan, L., Burbach, L., Bejar, A., and Adler, S. (2021, July 08). SEMinR (2.1.0). Available online: https:\/\/cran.r-project.org\/web\/packages\/seminr\/."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1108\/17465660610667775","article-title":"The error term in formative measurement models: Interpretation and modeling implications","volume":"1","author":"Diamantopoulos","year":"2006","journal-title":"J. Model. Manag."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/s11747-011-0261-6","article-title":"An assessment of the use of partial least squares structural equation modeling in marketing research","volume":"40","author":"Hair","year":"2011","journal-title":"J. Acad. Mark. Sci."},{"key":"ref_65","first-page":"876","article-title":"Formative Vs. Reflective Measurement Model: Guidelines for Structural Equation Modeling Research","volume":"18","author":"Hanafiah","year":"2020","journal-title":"Int. J. Anal. Appl."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1037\/1082-989X.5.2.155","article-title":"On the nature and direction of relationships between constructs and measures","volume":"5","author":"Edwards","year":"2000","journal-title":"Psychol. Methods"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"623","DOI":"10.2307\/25148814","article-title":"Specifying Formative Constructs in Information Systems Research","volume":"31","author":"Petter","year":"2007","journal-title":"MIS Q."},{"key":"ref_68","unstructured":"Ramayah, T., Cheah, J., Chuah, F., Ting, H., and Memon, M. (2018). Partial Least Squares Structural Equation Modeling (PLS-SEM) Using SmartPLS 3.0: An Updated Guide and Practical Guide to Statistical Analysis, Pearson. [2nd ed.]."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1177\/1094428114526928","article-title":"Common Beliefs and Reality About PLS","volume":"17","author":"Henseler","year":"2014","journal-title":"Organ. Res. Methods"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1592401.1592405","article-title":"Conceptualizing and testing formative constructs","volume":"40","author":"Roberts","year":"2009","journal-title":"Database Adv. Inf. Syst."},{"key":"ref_71","first-page":"16","article-title":"The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time","volume":"8","author":"Marakas","year":"2007","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_72","unstructured":"Trochim, W., and Donnelly, J. (2006). The Research Methods Knowledge Base, Atomic Dog. [3rd ed.]."},{"key":"ref_73","unstructured":"Chin, W. (1998). The partial least squares approach for structural equation modeling. Modern Methods for Business Research, Lawrence Erlbaum Associates Publishers."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Keith, T. (2019). Multiple Regression and Beyond, Taylor & Francis. [3rd ed.].","DOI":"10.4324\/9781315162348"},{"key":"ref_75","unstructured":"Kenny, D. (1979). Correlation and Causality, Wiley."},{"key":"ref_76","unstructured":"Becker, J. (2021, July 08). Interpreting Path Coefficients. Available online: https:\/\/forum.smartpls.com\/viewtopic.php?t=16088."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear Appeals and Information Security Behaviors: An Empirical Study","volume":"34","author":"Johnston","year":"2010","journal-title":"MIS Q."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","article-title":"Self-efficacy in information security: Its influence on end users\u2019 information security practice behavior","volume":"28","author":"Rhee","year":"2009","journal-title":"Comput. Secur."},{"key":"ref_79","unstructured":"Cohen, J. (1988). Statistical Power Analysis for the Behavioral Sciences, Routledge. [2nd ed.]."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"774","DOI":"10.21105\/joss.00774","article-title":"Quanteda: An R package for the quantitative analysis of textual data","volume":"3","author":"Benoit","year":"2018","journal-title":"J. Open Source Softw."},{"key":"ref_81","unstructured":"DiMascio, C., Amos, R., Stevens, M., and Chakraborty, S. (2021, July 08). Py-Readability-Metrics. Available online: https:\/\/github.com\/cdimascio\/py-readability-metrics."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1146\/annurev.publhealth.23.100901.140546","article-title":"The Importance of the Normality Assumption in Large Public Health Data Sets","volume":"23","author":"Lumley","year":"2002","journal-title":"Annu. Rev. Public Health"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Hanel, P.H.P., and Vione, K.C. (2016). Do Student Samples Provide an Accurate Estimate of the General Public?. PLoS ONE, 11.","DOI":"10.1371\/journal.pone.0168354"},{"key":"ref_84","unstructured":"Frost, J. (2021, July 08). Introduction to Bootstrapping in Statistics with an Example. Available online: https:\/\/statisticsbyjim.com\/hypothesis-testing\/bootstrapping\/."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1037\/0021-9010.82.2.247","article-title":"Overall job satisfaction: How good are single-item measures?","volume":"82","author":"Wanous","year":"1997","journal-title":"J. Appl. Psychol."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"3192","DOI":"10.1108\/IJCHM-10-2017-0649","article-title":"Convergent validity assessment of formatively measured constructs in PLS-SEM","volume":"30","author":"Cheah","year":"2018","journal-title":"Int. J. Contemp. Hosp. Manag."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1177\/109467050133001","article-title":"Do We Really Need Multiple-Item Measures in Service Research?","volume":"3","author":"Drolet","year":"2001","journal-title":"J. Serv. Res."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1080\/0163853X.2017.1296264","article-title":"Predicting Text Comprehension, Processing, and Familiarity in Adult Readers: New Approaches to Readability Formulas","volume":"54","author":"Crossley","year":"2017","journal-title":"Discourse Process."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Curto, P., Mamede, N., and Baptista, J. (2015). Automatic Text Difficulty Classifier\u2014Assisting the Selection of Adequate Reading Materials for European Portuguese Teaching, SCITEPRESS\u2014Science and and Technology Publications.","DOI":"10.5220\/0005428300360044"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Nadeem, F., and Ostendorf, M. (2018, January 5). Estimating Linguistic Complexity for Science Texts. Proceedings of the Thirteenth Workshop on Innovative Use of NLP for Building Educational Applications, Association for Computational Linguistics (ACL), New Orleans, LA, USA.","DOI":"10.18653\/v1\/W18-0505"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.cose.2017.11.015","article-title":"Correlating human traits and cyber security behavior intentions","volume":"73","author":"Gratian","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Dempsey, K., Eavy, P., Goren, N., and Moore, G. (2018). Automation Support for Security Control Assessments, National Institute of Standards and Technology (NIST). Technical Report NISTIR 8011.","DOI":"10.6028\/NIST.IR.8011-3"},{"key":"ref_93","unstructured":"Mulloy, E. (2021, May 24). Zero-Day Vulnerabilities and Zero-Day Attacks. Available online: https:\/\/www.sdsolutionsllc.com\/zero-day-vulnerabilities-and-zero-day-attacks\/."},{"key":"ref_94","unstructured":"Swiss Federal Department of Finance (2021, May 24). Malware, Available online: https:\/\/www.ncsc.admin.ch\/ncsc\/en\/home\/cyberbedrohungen\/malware.html."},{"key":"ref_95","unstructured":"Swiss Federal Department of Finance (2021, May 24). Phishing, Available online: https:\/\/www.ncsc.admin.ch\/ncsc\/en\/home\/cyberbedrohungen\/phishing.html."},{"key":"ref_96","unstructured":"Cisco Systems (2021, May 24). Cisco IOS Firewall Intrusion Detection System. Available online: https:\/\/newsroom.cisco.com\/dlls\/IOSIDSDS.pdf."},{"key":"ref_97","unstructured":"Gontharet, F. (2015). Man-in-The-Middle Attacks & Countermeasures Analysis. [Master\u2019s Thesis, Abertay University]."},{"key":"ref_98","unstructured":"Finjan (2021, May 24). What Are Zero-Day Threats and How to Guard against Them?. Available online: https:\/\/blog.finjan.com\/zero-day-threats\/."},{"key":"ref_99","unstructured":"Sophos (2021, May 24). Zero-Day Threats: Guarding against the Unknown Enemy. Available online: https:\/\/www.sophos.com\/en-us\/security-news-trends\/security-trends\/zeroday-threats.aspx."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/4\/34\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:33:04Z","timestamp":1760167984000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/4\/34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,19]]},"references-count":99,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["jcp1040034"],"URL":"https:\/\/doi.org\/10.3390\/jcp1040034","relation":{},"ISSN":["2624-800X"],"issn-type":[{"type":"electronic","value":"2624-800X"}],"subject":[],"published":{"date-parts":[[2021,11,19]]}}}