{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T16:52:06Z","timestamp":1675875126091},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s10799-012-0147-4","type":"journal-article","created":{"date-parts":[[2013,6,7]],"date-time":"2013-06-07T08:51:31Z","timestamp":1370595091000},"page":"69-89","source":"Crossref","is-referenced-by-count":6,"title":["Determining the antecedents of digital security practices in the general public dimension"],"prefix":"10.1007","volume":"14","author":[{"given":"Tabitha","family":"James","sequence":"first","affiliation":[]},{"given":"Quinton","family":"Nottingham","sequence":"additional","affiliation":[]},{"given":"Byung Cho","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,8]]},"reference":[{"issue":"3","key":"147_CR1","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","volume":"103","author":"JC Anderson","year":"1988","unstructured":"Anderson JC, Gerbing DW (1988) Structural equation modeling in practice: a review and recommended two step approach. Psychol Bull 103(3):411\u2013423","journal-title":"Psychol Bull"},{"key":"147_CR2","doi-asserted-by":"crossref","unstructured":"Anderson R (2001) Why information security is hard\u2014an economic perspective. In: Proceedings of the 17th Annual Computer Security Applied Conference. IEEE Computer Society, Los Alamitos, CA, pp 358\u2013365","DOI":"10.1109\/ACSAC.2001.991552"},{"issue":"2","key":"147_CR3","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/293411.293461","volume":"42","author":"P Benassi","year":"1999","unstructured":"Benassi P (1999) TRUSTe: an online privacy seal program. Commun ACM 42(2):56","journal-title":"Commun ACM"},{"key":"147_CR4","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1057\/ejis.1996.15","volume":"5","author":"M Bensaou","year":"1996","unstructured":"Bensaou M, Venkataman N (1996) Inter-organizational relationships and information technology: a conceptual synthesis and a research framework. Eur J Inform Syst 5:84\u201391","journal-title":"Eur J Inform Syst"},{"key":"147_CR5","first-page":"445","volume-title":"Testing structural equation models","author":"MW Browne","year":"1993","unstructured":"Browne MW, Cudeck R (1993) Alternative ways of assessing model fit. In: Bollen KA, Long JS (eds) Testing structural equation models. Sage, Newbury Park, pp 445\u2013455"},{"key":"147_CR6","volume-title":"Structural equation modeling with AMOS: basic concepts, applications and programming","author":"BM Byrne","year":"2001","unstructured":"Byrne BM (2001) Structural equation modeling with AMOS: basic concepts, applications and programming. Lawrence Erlbaum Associates, Mahwah"},{"key":"147_CR7","unstructured":"CERT (2007) Over-confidence is pervasive amongst security professionals. Retrieved July 3, from the Software Engineering Institute at Carnegie Mellon Web site: http:\/\/www.sei.cmu.edu\/about\/press\/releases\/2007ecrime.html"},{"key":"147_CR8","unstructured":"CERT (2008) Vulnerability remediation statistics. Retrieved July 3, from the Software Engineering Institute at Carnegie Mellon Web site: http:\/\/www.cert.org\/stats\/vulnerability_remediation.html"},{"key":"147_CR9","unstructured":"CR (2007) Net threats: why going online remains risky. Retrieved July 3, from the Consumer Reports Web site: http:\/\/www.consumerreports.org\/cro\/electronics-computers\/computers\/internet-and-other-services\/net-threats-9-07\/overview\/0709_net_ov.htm"},{"key":"147_CR10","doi-asserted-by":"crossref","unstructured":"D\u2019Arcy J, Hovav A, Galletta D (2008) User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inform Syst Res (Forthcoming)","DOI":"10.1287\/isre.1070.0160"},{"key":"147_CR11","doi-asserted-by":"crossref","unstructured":"Davis F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart, 319\u2013340","DOI":"10.2307\/249008"},{"key":"147_CR12","unstructured":"Department of Commerce (2011) Exploring the digital nation\u2014computer and internet use at home. Retrieved July 31st, 2012 from the Department of Commerce website: http:\/\/www.esa.doc.gov\/Reports\/exploring-digital-nation-computer-and-internet-use-home"},{"key":"147_CR13","volume-title":"Principles of information systems security: text and cases","author":"G Dhillon","year":"2007","unstructured":"Dhillon G (2007) Principles of information systems security: text and cases. Wiley, New York"},{"issue":"4","key":"147_CR14","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1108\/09685229910292664","volume":"7","author":"G Dhillon","year":"1999","unstructured":"Dhillon G (1999) Managing and controlling computer misuse. Inform Manag Comput Secur 7(4):171\u2013175","journal-title":"Inform Manag Comput Secur"},{"issue":"1","key":"147_CR15","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev T, Hart P (2006) An extended privacy calculus model for E-commerce transactions. Inform Syst Res 17(1):61\u201380","journal-title":"Inform Syst Res"},{"key":"147_CR16","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell C, Larker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18:39\u201350","journal-title":"J Mark Res"},{"key":"147_CR17","unstructured":"FTC (2007) FTC releases survey of identity theft in the U.S. study shows 8.3 million victims in 2005. Retrieved July 3, 2008, from the Federal Trade Commission Web site: http:\/\/www.ftc.gov\/opa\/2007\/11\/idtheft.shtm"},{"key":"147_CR18","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.paid.2006.10.001","volume":"42","author":"L Hayduk","year":"2007","unstructured":"Hayduk L, Cummings GG, Boadu K, Pazderka-Robinson H, Boulianne S (2007) Testing! Testing! One, two, three\u2014testing the theory in structural equation models! Pers Individ Dif 42:841\u2013850","journal-title":"Pers Individ Dif"},{"issue":"6","key":"147_CR19","first-page":"14","volume":"9","author":"S Hansche","year":"2001","unstructured":"Hansche S (2001) Designing a security awareness program: part 1. Inform Syst Secur 9(6):14\u201322","journal-title":"Inform Syst Secur"},{"issue":"3","key":"147_CR20","first-page":"213","volume":"20","author":"L Hosmer","year":"1995","unstructured":"Hosmer L (1995) Trust: the connection link between organizational theory and philosophical ethics. Acad Manag Rev 20(3):213\u2013237","journal-title":"Acad Manag Rev"},{"key":"147_CR21","unstructured":"Howard J, Longstaff T (1998) A common language for computer security incidents. Sandia National Laboratory report: SAND98-8667. Sandia National Lab. Retrieved November 29th, 2010 from: http:\/\/www.osti.gov\/ bridge\/purl.cover.jsp?purl\u00a0=\/751004-JhkwDA\/webviewable\/"},{"issue":"1","key":"147_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10705519909540118","volume":"6","author":"L Hu","year":"1999","unstructured":"Hu L, Bentler PM (1999) Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct Equ Model 6(1):1\u201355","journal-title":"Struct Equ Model"},{"key":"147_CR23","unstructured":"Hughes D (2008) 12,000 Laptops Lost Weekly At U.S. Airports. Aviation Week, Retrieved July 3, 2008, from Aviation Week Web site: http:\/\/www.aviationweek.com\/aw\/generic\/story_channel.jsp?channel=comm&id=news\/LAP07038.xml&headline=12,000%20Laptops%20Lost%20Weekly%20At%20U.S.%20Airports"},{"issue":"3","key":"147_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/joeuc.2006070101","volume":"18","author":"TL James","year":"2006","unstructured":"James TL, Pirim T, Boswell K, Reithel B, Barkhi R (2006) Determining the intention to use of biometric devices: an application and extension of the technology acceptance model. J Organ End User Comput 18(3):1\u201324","journal-title":"J Organ End User Comput"},{"key":"147_CR25","unstructured":"Javelin Strategy & Research (2010) 2010 Identity Fraud Survey Report: Consumer Version. Retrieved July 31, 2012, from Javelin Strategy Web site: http:\/\/ http:\/\/www.javelinstrategy.com\/uploads\/files\/1004.R_2010IdentityFraudSurveyConsumer.pdf"},{"key":"147_CR26","volume-title":"LISREL 8: User\u2019s reference guide","author":"KG Joreskog","year":"1996","unstructured":"Joreskog KG, Sorbom D (1996) LISREL 8: User\u2019s reference guide. Scientific Software International, Chicago"},{"issue":"4","key":"147_CR27","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/S0272-6963(99)00002-9","volume":"17","author":"XA Koufteros","year":"1999","unstructured":"Koufteros XA (1999) Testing a model of pull production: a paradigm for manufacturing research using structural equation modeling. J Oper Manag 17(4):467\u2013488","journal-title":"J Oper Manag"},{"issue":"4","key":"147_CR28","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1111\/j.1937-5956.2010.01189.x","volume":"20","author":"BC Kim","year":"2011","unstructured":"Kim BC, Chen P, Mukhopadhyay T (2011) The effect of liability and patch release on software security: the monopoly case. Prod Oper Manag 20(4):603\u2013617","journal-title":"Prod Oper Manag"},{"key":"147_CR29","volume-title":"Principles and practice guidelines of structural equation modeling","author":"R Kline","year":"1998","unstructured":"Kline R (1998) Principles and practice guidelines of structural equation modeling. Guilford Press, New York"},{"key":"147_CR30","unstructured":"Krusl I (1998) Software vulnerability analysis, Ph.D. thesis. Department of Computer Sciences, Purdue University. Retrieved, November 29th from: https:\/\/www.cerias.purdue.edu\/techreports-ssl\/public\/98-09.pdf"},{"issue":"3","key":"147_CR31","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"R Laufer","year":"1977","unstructured":"Laufer R, Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional developmental theory. J Soc Issues 33(3):22\u201342","journal-title":"J Soc Issues"},{"issue":"6","key":"147_CR32","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1016\/j.im.2003.08.008","volume":"41","author":"SM Lee","year":"2004","unstructured":"Lee SM, Lee SG, Yoo S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Inform Manag 41(6):707\u2013718","journal-title":"Inform Manag"},{"key":"147_CR33","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1037\/1082-989X.1.2.130","volume":"1","author":"RC MacCallum","year":"1996","unstructured":"MacCallum RC, Browne MW, Sugawara HM (1996) Power analysis and determination of sample size for covariance structure modeling. Psychol Methods 1:130\u2013149","journal-title":"Psychol Methods"},{"key":"147_CR34","unstructured":"NWCCC, BJA, FBI (2007) 2007 Internet crime report. Retrieved July 3, from the Internet Crime Complaint Center Web site: http:\/\/www.ic3.gov\/media\/annualreports.aspx"},{"issue":"3","key":"147_CR35","first-page":"69","volume":"7","author":"P Pavlou","year":"2003","unstructured":"Pavlou P (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int J Electron Commer 7(3):69\u2013103","journal-title":"Int J Electron Commer"},{"key":"147_CR36","volume-title":"Current and future danger: a CSI primer of computer crime & information warfare","author":"R Power","year":"1996","unstructured":"Power R (1996) Current and future danger: a CSI primer of computer crime & information warfare, 4th edn. Computer Security Institute, Orlando","edition":"4"},{"key":"147_CR37","unstructured":"Raine L (2010) Internet, broadband, and cell phone statistics, A Pew Research Center Report, Jan. 5th, 2010. Obtained August 12th, 2010 from: http:\/\/www.pewinternet.org\/Reports\/2010\/Internet-broadband-and-cell-phone-statistics.aspx"},{"key":"147_CR38","doi-asserted-by":"crossref","first-page":"90","DOI":"10.5465\/amr.1994.9410122009","volume":"19","author":"P Ring","year":"1994","unstructured":"Ring P, Van de Ven A (1994) Developing processes of cooperative inter-organizational relationships. Acad Manag Rev 19:90\u2013118","journal-title":"Acad Manag Rev"},{"key":"147_CR39","doi-asserted-by":"crossref","DOI":"10.4324\/9781410610904","volume-title":"A beginner\u2019s guide to structural equation modeling","author":"RE Schumacker","year":"2004","unstructured":"Schumacker RE, Lomax RG (2004) A beginner\u2019s guide to structural equation modeling, 2nd edn. Lawrence Erlbaum Associates, Mahwah","edition":"2"},{"issue":"2","key":"147_CR40","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/503345.503348","volume":"31","author":"MT Siponen","year":"2001","unstructured":"Siponen MT (2001) Five dimensions of information security awareness. ACM SIGCAS Comput Soc 31(2):24\u201329","journal-title":"ACM SIGCAS Comput Soc"},{"key":"147_CR41","volume-title":"Network security essentials: applications and standards","author":"W Stallings","year":"2003","unstructured":"Stallings W (2003) Network security essentials: applications and standards, 2nd edn. Pearson Education, Inc., Upper Saddle River","edition":"2"},{"key":"147_CR42","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1207\/s15327906mbr2502_4","volume":"25","author":"JH Steiger","year":"1990","unstructured":"Steiger JH (1990) Structural model evaluation and modification: an interval estimation approach. Multivar Behav Res 25:173\u2013180","journal-title":"Multivar Behav Res"},{"key":"147_CR43","unstructured":"Stoneburner G, Goguen A, Feringa A (2002) \u201cRisk management guide for information technology systems\u201d, NIST Special Publication 800-30, Retrieved November, 29th, 2010 from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-30\/sp800-30.pdf"},{"issue":"3","key":"147_CR44","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1287\/isre.1.3.255","volume":"1","author":"DW Straub","year":"1990","unstructured":"Straub DW (1990) Effective IS security: an empirical study. Inform Syst Res 1(3):255\u2013276","journal-title":"Inform Syst Res"},{"issue":"4","key":"147_CR45","doi-asserted-by":"crossref","first-page":"441","DOI":"10.2307\/249551","volume":"22","author":"D Straub","year":"1998","unstructured":"Straub D, Welke R (1998) Coping with systems risk: security planning models for management decision making. MIS Quart 22(4):441\u2013469","journal-title":"MIS Quart"},{"key":"147_CR46","unstructured":"Symantec (2008) Symantec Internet Security Threat Report. Retrieved July 3, 2008, from the Symantec Web site: http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-whitepaper_exec_summary_internet_security_threat_report_xiii_04-2008.en-us.pdf"},{"key":"147_CR47","unstructured":"Tyre P (2010) \u201cA\u2019s for Good Behavior\u201d, The New York Times, Retrieved November 29th, 2010 from: http:\/\/www.nytimes.com\/2010\/11\/28\/weekinreview\/28tyre.html"},{"issue":"2","key":"147_CR48","first-page":"5","volume":"11","author":"N Urbach","year":"2010","unstructured":"Urbach N, Ahlemann F (2010) Structural equation modeling in information systems research using partial least squares. J Inform Technol Theory Appl 11(2):5\u201340","journal-title":"J Inform Technol Theory Appl"},{"issue":"5","key":"147_CR49","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1037\/0021-9010.81.5.575","volume":"81","author":"W Eerde Van","year":"1996","unstructured":"Van Eerde W, Thierry H (1996) Vroom\u2019s expectancy models and work-related criteria: a meta-analysis. J Appl Psychol 81(5):575\u2013586","journal-title":"J Appl Psychol"},{"key":"147_CR50","volume-title":"Work and motivation","author":"VH Vroom","year":"1964","unstructured":"Vroom VH (1964) Work and motivation. Wiley, New York"},{"issue":"1","key":"147_CR51","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.ijinfomgt.2003.12.003","volume":"24","author":"ME Whitman","year":"2004","unstructured":"Whitman ME (2004) In defense of the realm: understanding the threats to information security. Int J Inform Manage 24(1):43\u201357","journal-title":"Int J Inform Manage"},{"key":"147_CR52","volume-title":"Principles of information security","author":"ME Whitman","year":"2005","unstructured":"Whitman ME, Mattord H (2005) Principles of information security. Course Technology, Boston"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-012-0147-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-012-0147-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-012-0147-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T22:28:50Z","timestamp":1563143330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-012-0147-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["147"],"URL":"https:\/\/doi.org\/10.1007\/s10799-012-0147-4","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}