{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T09:53:12Z","timestamp":1769248392028,"version":"3.49.0"},"reference-count":82,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T00:00:00Z","timestamp":1670457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100004419","name":"CRDF Global","doi-asserted-by":"publisher","award":["202109-68097"],"award-info":[{"award-number":["202109-68097"]}],"id":[{"id":"10.13039\/100004419","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Publications"],"abstract":"<jats:p>Performing research data governance is critical for preventing the transfer of technologies related to weapons of mass destruction (WMD). While research data governance is common in developed countries, it is still often considered less necessary by research organizations in developing countries such as Indonesia. An investigation of research data governance behavior for Indonesian scientists was conducted in this study. The theories of planned behavior (TPB) and protection motivation (PMT) were used to explain the relationships between different factors influencing scientists\u2019 behavior. The theories have been widely used in the information security domain, and the approach was adopted to build the research model of this study. The obtained data were analyzed using partial least-squares structural equation modeling (PLS-SEM) to answer the main research question: \u201cwhat factors determine the likelihood of practicing research data governance by Indonesian scientists to prevent WMD-applicable technology transfer?\u201d By learning what motivates scientists to adopt research data governance practices, organizations can design relevant strategies that are directed explicitly at stimulating positive responses. The results of this study can also be applied in other developing countries that have similar situations, such as Indonesia.<\/jats:p>","DOI":"10.3390\/publications10040050","type":"journal-article","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T02:50:51Z","timestamp":1670554251000},"page":"50","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Indonesian Scientists\u2019 Behavior Relative to Research Data Governance in Preventing WMD-Applicable Technology Transfer"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8637-2881","authenticated-orcid":false,"given":"Lindung Parningotan","family":"Manik","sequence":"first","affiliation":[{"name":"Research Center for Data and Information Sciences, National Research and Innovation Agency, Bandung 40135, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3563-0021","authenticated-orcid":false,"given":"Zaenal","family":"Akbar","sequence":"additional","affiliation":[{"name":"Research Center for Computing, National Research and Innovation Agency, Bogor 16911, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0305-9054","authenticated-orcid":false,"given":"Aris","family":"Yaman","sequence":"additional","affiliation":[{"name":"Research Center for Computing, National Research and Innovation Agency, Bogor 16911, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1387-9419","authenticated-orcid":false,"given":"Ariani","family":"Indrawati","sequence":"additional","affiliation":[{"name":"Research Center for Computing, National Research and Innovation Agency, Bogor 16911, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"101493","DOI":"10.1016\/j.giq.2020.101493","article-title":"Data governance: Organizing data for trustworthy Artificial Intelligence","volume":"37","author":"Janssen","year":"2020","journal-title":"Gov. Inf. Q."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"205395172094808","DOI":"10.1177\/2053951720948087","article-title":"Emerging models of data governance in the age of datafication","volume":"7","author":"Micheli","year":"2020","journal-title":"Big Data Soc."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1080\/01972243.2018.1542648","article-title":"Big data governance of personal health information and challenges to contextual integrity","volume":"35","author":"Winter","year":"2019","journal-title":"Inf. Soc."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.ijinfomgt.2019.07.008","article-title":"Data governance: A conceptual framework, structured review, and research agenda","volume":"49","author":"Abraham","year":"2019","journal-title":"Int. J. Inf. Manag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.bushor.2016.06.001","article-title":"Managerial work in the realm of the digital universe: The role of the data triad","volume":"59","author":"Khatri","year":"2016","journal-title":"Bus. Horizons"},{"key":"ref_6","first-page":"2177","article-title":"How Indonesia Uses Big Data \u201cIndonesian One Data\u201d for the Future of Policy Making","volume":"29","author":"Putera","year":"2020","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1515\/pdtc-2019-0015","article-title":"The Indonesian National Scientific Repository: A Case Study of Research Data Sharing","volume":"49","author":"Anggawira","year":"2020","journal-title":"Preserv. Digit. Technol. Cult."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.clsr.2016.11.003","article-title":"Opening up government data for Big Data analysis and public benefit","volume":"33","author":"Hardy","year":"2017","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1177\/1094428117718627","article-title":"The Double-Edged Sword of Big Data in Organizational and Management Research: A Review of Opportunities and Risks","volume":"21","author":"Wenzel","year":"2018","journal-title":"Organ. Res. Methods"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s11948-009-9159-9","article-title":"A Note on the Definition of \u201cDual Use\u201d","volume":"16","author":"Forge","year":"2010","journal-title":"Sci. Eng. Ethics"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1038\/ng763","article-title":"Genomics and future biological weapons: The need for preventive action by the biomedical community","volume":"29","author":"Fraser","year":"2001","journal-title":"Nat. Genet."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1002\/asi.22634","article-title":"The conundrum of sharing research data","volume":"63","author":"Borgman","year":"2012","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Richesson, R.L., and Andrews, J.E. (2019). Research Data Governance, Roles, and Infrastructure. Clinical Research Informatics, Springer International Publishing.","DOI":"10.1007\/978-3-319-98779-8"},{"key":"ref_14","first-page":"122","article-title":"An Exploratory Study of Research Data Governance in the U.S","volume":"4","author":"Kouper","year":"2020","journal-title":"Open Inf. Sci."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Borgman, C.L. (2010, January 8\u201312). Research Data: Who will share what, with whom, when, and why?. Proceedings of the Fifth China\u2014North America Library Conference, Beijing, China.","DOI":"10.2139\/ssrn.1714427"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-319-59111-7_21","article-title":"Data Governance: A Challenge for Merged and Collaborating Institutions in Developing Countries","volume":"Volume 504","author":"Choudrie","year":"2017","journal-title":"Information and Communication Technologies for Development"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-030-11235-6_20","article-title":"Identifying the Constructs and Agile Capabilities of Data Governance and Data Management: A Review of the Literature","volume":"Volume 933","author":"Krauss","year":"2019","journal-title":"Locally Relevant ICT Research"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"50330","DOI":"10.1109\/ACCESS.2019.2910838","article-title":"A Framework for Big Data Governance to Advance RHINs: A Case Study of China","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref_19","first-page":"38","article-title":"Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges","volume":"140\u2013141","year":"2019","journal-title":"Comput. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1038\/s41588-020-0651-0","article-title":"Privacy challenges and research opportunities for genomic data sharing","volume":"52","author":"Bonomi","year":"2020","journal-title":"Nat. Genet."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1186\/s40504-018-0078-x","article-title":"Disease surveillance data sharing for public health: The next ethical frontiers","volume":"14","author":"Kostkova","year":"2018","journal-title":"Life Sci. Soc. Policy"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"147420","DOI":"10.1109\/ACCESS.2019.2946185","article-title":"Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.giq.2015.05.001","article-title":"Government data does not mean data governance: Lessons learned from a public sector application audit","volume":"32","author":"Thompson","year":"2015","journal-title":"Gov. Inf. Q."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10796-019-09923-z","article-title":"Data Governance as a Collective Action Problem","volume":"22","author":"Benfeldt","year":"2020","journal-title":"Inf. Syst. Front."},{"key":"ref_25","first-page":"18","article-title":"The influence of organizational culture on information governance effectiveness","volume":"29","author":"Daneshmandnia","year":"2019","journal-title":"Rec. Manag. J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1507","DOI":"10.1080\/03075079.2018.1445986","article-title":"An international research on the influence of accreditation on academic quality","volume":"44","author":"Ulker","year":"2019","journal-title":"Stud. High. Educ."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A Protection Motivation Theory of Fear Appeals and Attitude Change1","volume":"91","author":"Rogers","year":"1975","journal-title":"J. Psychol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Liakh, O. (2021). Accountability through Sustainability Data Governance: Reconfiguring Reporting to Better Account for the Digital Acceleration. Sustainability, 13.","DOI":"10.3390\/su132413814"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSEC.2018.2875329","article-title":"Data Science Data Governance [AI Ethics]","volume":"16","author":"Kroll","year":"2018","journal-title":"IEEE Secur. Priv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Kim, H.Y., and Cho, J.S. (2017, January 25\u201330). Data Governance Framework for Big Data Implementation with a Case of Korea. Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA.","DOI":"10.1109\/BigDataCongress.2017.56"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"e001395","DOI":"10.1136\/bmjgh-2019-001395","article-title":"How to use relevant data for maximal benefit with minimal risk: Digital health data governance to protect vulnerable populations in low-income and middle-income countries","volume":"4","author":"Tiffin","year":"2019","journal-title":"BMJ Glob. Health"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Paskaleva, K., Evans, J., Martin, C., Linjordet, T., Yang, D., and Karvonen, A. (2017). Data Governance in the Sustainable Smart City. Informatics, 4.","DOI":"10.3390\/informatics4040041"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2007.51","article-title":"A Coherent Strategy for Data Security through Data Governance","volume":"5","author":"Trope","year":"2007","journal-title":"IEEE Secur. Priv."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Pinfield, S., Cox, A.M., and Smith, J. (2014). Research Data Management and Libraries: Relationships, Activities, Drivers and Influences. PLoS ONE, 9.","DOI":"10.1371\/journal.pone.0114734"},{"key":"ref_36","first-page":"65","article-title":"A theory of reasoned action: Some applications and implications","volume":"27","author":"Fishbein","year":"1979","journal-title":"Neb. Symp. Motiv."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1002\/hbe2.195","article-title":"The theory of planned behavior: Frequently asked questions","volume":"2","author":"Ajzen","year":"2020","journal-title":"Hum. Behav. Emerg. Technol."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/0146167292181001","article-title":"A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action","volume":"18","author":"Madden","year":"1992","journal-title":"Personal. Soc. Psychol. Bull."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"87","DOI":"10.4278\/0890-1171-11.2.87","article-title":"The Theory of Planned Behavior: A Review of its Applications to Health-Related Behaviors","volume":"11","author":"Godin","year":"1996","journal-title":"Am. J. Health Promot."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1080\/00222216.1992.11969889","article-title":"Application of the Theory of Planned Behavior to Leisure Choice","volume":"24","author":"Ajzen","year":"1992","journal-title":"J. Leis. Res."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1108\/10662240410542634","article-title":"The theory of planned behavior and Internet purchasing","volume":"14","author":"George","year":"2004","journal-title":"Internet Res."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1016\/j.compedu.2012.04.015","article-title":"An investigation of mobile learning readiness in higher education based on the theory of planned behavior","volume":"59","author":"Cheon","year":"2012","journal-title":"Comput. Educ."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1089\/cpb.2009.0109","article-title":"The Theory of Planned Behavior Applied to Young People\u2019s Use of Social Networking Web Sites","volume":"12","author":"Pelling","year":"2009","journal-title":"Cyberpsychol. Behav."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1111\/j.1758-0854.2009.01013.x","article-title":"An Experimental Test of the Theory of Planned Behavior","volume":"1","author":"Sniehotta","year":"2009","journal-title":"Appl. Psychol. Health Well-Being"},{"key":"ref_45","unstructured":"Rogers, R.W., and Prentice-Dunn, S. (1997). Protection motivation theory. Handbook of Health Behavior Research 1: Personal and Social Determinants, Plenum Press."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1093\/her\/1.3.153","article-title":"Protection Motivation Theory and preventive health: Beyond the Health Belief Model","volume":"1","author":"Rogers","year":"1986","journal-title":"Health Educ. Res."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1080\/15245004.2011.595539","article-title":"\u201cAct on Climate Change\u201d: An Application of Protection Motivation Theory","volume":"17","author":"Cismaru","year":"2011","journal-title":"Soc. Mark. Q."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Janmaimool, P. (2017). Application of Protection Motivation Theory to Investigate Sustainable Waste Management Behaviors. Sustainability, 9.","DOI":"10.3390\/su9071079"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1080\/10580530.2015.1117842","article-title":"Impact of Users\u2019 Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective","volume":"33","author":"Hanus","year":"2016","journal-title":"Inf. Syst. Manag."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Crossler, R.E. (2010, January 5\u20138). Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data. Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, Honolulu, HI, USA.","DOI":"10.1109\/HICSS.2010.311"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: A protection motivation theory perspective","volume":"59","author":"Tsai","year":"2016","journal-title":"Comput. Secur."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1108\/ICS-04-2014-0025","article-title":"The sufficiency of the theory of planned behavior for explaining information security policy compliance","volume":"23","author":"Sommestad","year":"2015","journal-title":"Inf. Comput. Secur."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory","volume":"31","author":"Ifinedo","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","article-title":"Motivating IS security compliance: Insights from Habit and Protection Motivation Theory","volume":"49","author":"Vance","year":"2012","journal-title":"Inf. Manag."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.chb.2015.12.037","article-title":"An information security knowledge sharing model in organizations","volume":"57","author":"Safa","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Davis, R.G. (2004). Agroterrorism: Need for Awareness. Perspectives in World Food and Agriculture 2004, Iowa State Press. Chapter 23.","DOI":"10.1002\/9780470290187.ch23"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1080\/10576100600698477","article-title":"Pyro-Terrorism\u2014The Threat of Arson-Induced Forest Fires as a Future Terrorist Weapon of Mass Destruction","volume":"29","author":"Baird","year":"2006","journal-title":"Stud. Confl. Terror."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","article-title":"Analysis of end user security behaviors","volume":"24","author":"Stanton","year":"2005","journal-title":"Comput. Secur."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","article-title":"Information security conscious care behaviour formation in organizations","volume":"53","author":"Safa","year":"2015","journal-title":"Comput. Secur."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.ijhcs.2006.08.003","article-title":"Investigation of IS professionals\u2019 intention to practise secure development of applications","volume":"65","author":"Woon","year":"2007","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"53","DOI":"10.6087\/kcse.119","article-title":"Citation performance of Indonesian scholarly journals indexed in Scopus from Scopus and Google Scholar","volume":"5","author":"Lukman","year":"2018","journal-title":"Sci. Ed."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"012041","DOI":"10.1088\/1757-899X\/732\/1\/012041","article-title":"Evaluation of university accreditation prediction system","volume":"732","author":"Musthafa","year":"2020","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"135","DOI":"10.6087\/kcse.138","article-title":"Proposal of the S-score for measuring the performance of researchers, institutions, and journals in Indonesia","volume":"5","author":"Lukman","year":"2018","journal-title":"Sci. Ed."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"He, Y., Chen, J., Antonyrajah, D., and Horrocks, I. (2021). BERTMap: A BERT-based Ontology Alignment System. arXiv.","DOI":"10.1609\/aaai.v36i5.20510"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","article-title":"Partial least squares structural equation modeling (PLS-SEM)","volume":"26","author":"Hair","year":"2014","journal-title":"Eur. Bus. Rev."},{"key":"ref_66","unstructured":"Garson, G.D. (2016). Partial Least Squares: Regression & Structural Equation Models, Statistical Associates Publishing."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"84","DOI":"10.2307\/270754","article-title":"Assessing Reliability and Stability in Panel Models","volume":"8","author":"Wheaton","year":"1977","journal-title":"Sociol. Methodol."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"1558","DOI":"10.1016\/j.dss.2006.01.002","article-title":"Adoption of internet banking: An empirical study in Hong Kong","volume":"42","author":"Cheng","year":"2006","journal-title":"Decis. Support Syst."},{"key":"ref_69","first-page":"53","article-title":"Structural equation modelling: Guidelines for determining model fit","volume":"6","author":"Hooper","year":"2008","journal-title":"Electron. J. Bus. Res. Methods"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1177\/1094428114526928","article-title":"Common Beliefs and Reality About PLS: Comments on R\u00f6nkk\u00f6 and Evermann (2013)","volume":"17","author":"Henseler","year":"2014","journal-title":"Organ. Res. Methods"},{"key":"ref_71","unstructured":"Hair, J., Black, W., and Babin, B. (2010). Multivariate Data Analysis: A Global Perspective, Pearson Education. [7th ed.]."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1111\/j.2044-8287.2011.02017.x","article-title":"The importance of coping appraisal in behavioural responses to pandemic flu","volume":"17","author":"Teasdale","year":"2012","journal-title":"Br. J. Health Psychol."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/11287462.2018.1441780","article-title":"Hidden concerns of sharing research data by low\/middle-income country scientists","volume":"29","author":"Bezuidenhout","year":"2018","journal-title":"Glob. Bioeth."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1029\/2018EA000461","article-title":"Research Data Sharing: Practices and Attitudes of Geophysicists","volume":"5","author":"Tenopir","year":"2018","journal-title":"Earth Space Sci."},{"key":"ref_75","first-page":"113","article-title":"Factors influencing the acceptance of smart homes in Jordan","volume":"11","author":"Mashal","year":"2020","journal-title":"Int. J. Electron. Mark. Retail."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Akther, T., and Nur, T. (2022). A model of factors influencing COVID-19 vaccine acceptance: A synthesis of the theory of reasoned action, conspiracy theory belief, awareness, perceived usefulness, and perceived ease of use. PLoS ONE, 17.","DOI":"10.1371\/journal.pone.0261869"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.cose.2013.09.009","article-title":"Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory","volume":"39","author":"Cheng","year":"2013","journal-title":"Comput. Secur."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1016\/j.elerap.2010.07.003","article-title":"Lower bounds on sample size in structural equation modeling","volume":"9","year":"2010","journal-title":"Electron. Commer. Res. Appl."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Ryan, T. (2013). Sample Size Determination and Power, Wiley.","DOI":"10.1002\/9781118439241"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1108\/IMR-04-2014-0148","article-title":"A critical look at the use of SEM in international business research","volume":"33","author":"Richter","year":"2016","journal-title":"Int. Mark. Rev."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Clark, R., Freedberg, M., Hazeltine, E., and Voss, M.W. (2015). Are There Age-Related Differences in the Ability to Learn Configural Responses?. PLoS ONE, 10.","DOI":"10.1371\/journal.pone.0137260"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/14792772143000003","article-title":"Intention-Behavior Relations: A Conceptual and Empirical Review","volume":"12","author":"Sheeran","year":"2005","journal-title":"Eur. Rev. Soc. Psychol."}],"container-title":["Publications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2304-6775\/10\/4\/50\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:36:46Z","timestamp":1760146606000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2304-6775\/10\/4\/50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,8]]},"references-count":82,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["publications10040050"],"URL":"https:\/\/doi.org\/10.3390\/publications10040050","relation":{},"ISSN":["2304-6775"],"issn-type":[{"value":"2304-6775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,8]]}}}