{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T18:28:14Z","timestamp":1724783294549},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T00:00:00Z","timestamp":1647388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T00:00:00Z","timestamp":1647388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s10799-022-00362-y","type":"journal-article","created":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T18:05:30Z","timestamp":1647453930000},"page":"177-193","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information"],"prefix":"10.1007","volume":"24","author":[{"given":"Eun Hee","family":"Park","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5656-4436","authenticated-orcid":false,"given":"Jongwoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Lynn","family":"Wiles","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,16]]},"reference":[{"issue":"2","key":"362_CR1","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","volume":"49","author":"G Bansal","year":"2010","unstructured":"Bansal G, Zahedi F, Gefen D (2010) The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis Support Syst 49(2):138\u2013150","journal-title":"Decis Support Syst"},{"key":"362_CR2","unstructured":"Department_of_Health_and_Human_Services. Health Information Privacy Law and Policy. HealthIT.gov (2017)"},{"key":"362_CR3","volume-title":"2009 CSI computer crime and security survey executive summary","author":"S Peters","year":"2009","unstructured":"Peters S (2009) 2009 CSI computer crime and security survey executive summary. Computer Security Institute, New York"},{"key":"362_CR4","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.cose.2016.10.011","volume":"65","author":"E Park","year":"2017","unstructured":"Park E, Kim J, Park Y (2017) The role of information security learning and individual factors in disclosing patients\u2019 health information. Comput Secur 65:64\u201376","journal-title":"Comput Secur"},{"issue":"12","key":"362_CR5","first-page":"41","volume":"6","author":"AA Cannon","year":"2016","unstructured":"Cannon AA, Caldwell H (2016) HIPAA violations among nursing students: Teachable moment or terminal mistake\u2014a case study. J Nurs Educ Pract 6(12):41\u201348","journal-title":"J Nurs Educ Pract"},{"issue":"4","key":"362_CR6","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1097\/01.NNE.0000281090.65958.12","volume":"32","author":"PE Thompson","year":"2007","unstructured":"Thompson PE, Bell PL (2007) Potential student abuse of technology in the clinical setting. Nurse Educ 32(4):145\u2013146","journal-title":"Nurse Educ"},{"issue":"11","key":"362_CR7","doi-asserted-by":"publisher","first-page":"489","DOI":"10.3928\/01484834-20051101-03","volume":"44","author":"P Wimberley","year":"2005","unstructured":"Wimberley P, Isaacson J, Walden D, Wiggins N, Miller R, Stacy A (2005) HIPAA and nursing education: how to teach in a paranoid health care environment. J Nurs Educ 44(11):489\u2013492","journal-title":"J Nurs Educ"},{"issue":"2","key":"362_CR8","doi-asserted-by":"publisher","first-page":"126","DOI":"10.5480\/1536-5026-32.2.126","volume":"32","author":"DJ Skiba","year":"2011","unstructured":"Skiba DJ (2011) Nursing Education 2.0: the need for social media policies for schools of nursing. Nurs Educ Perspect 32(2):126\u2013127","journal-title":"Nurs Educ Perspect"},{"issue":"3","key":"362_CR9","doi-asserted-by":"publisher","first-page":"206","DOI":"10.4258\/hir.2016.22.3.206","volume":"22","author":"Y Song","year":"2016","unstructured":"Song Y, Lee M, Jun Y, Lee Y, Cho J, Kwon M, Lim H (2016) Revision of the measurement tool for patients\u2019 health information protection awareness. Healthc Inform Res 22(3):206\u2013216","journal-title":"Healthc Inform Res"},{"issue":"3","key":"362_CR10","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1097\/JPA.0000000000000215","volume":"29","author":"BC Calhoun","year":"2018","unstructured":"Calhoun BC, Kiel JM, Morgan AA (2018) Health insurance portability and accountability act violations by physician assistant students: applying laws to clinical vignettes. J Physician Assist Educ 29(3):154\u2013157","journal-title":"J Physician Assist Educ"},{"issue":"1","key":"362_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.5480\/14-1358","volume":"37","author":"SJ Westrick","year":"2016","unstructured":"Westrick SJ (2016) Nursing students\u2019 use of electronic and social media: law, ethics, and e-professionalism. Nurs Educ Perspect 37(1):16\u201322","journal-title":"Nurs Educ Perspect"},{"issue":"5","key":"362_CR12","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1177\/0969733009106651","volume":"16","author":"F Erdil","year":"2009","unstructured":"Erdil F, Korkmaz F (2009) Ethical problems observed by student nurses. Nurs Ethics 16(5):589\u2013598","journal-title":"Nurs Ethics"},{"key":"362_CR13","doi-asserted-by":"crossref","unstructured":"Epstein B, Turner M (2015) The nursing code of ethics: Its value, its history. Online J Issues Nurs","DOI":"10.3912\/OJIN.Vol20No02Man04"},{"issue":"4","key":"362_CR14","first-page":"268","volume":"24","author":"J Winland-Brown","year":"2015","unstructured":"Winland-Brown J, Lachman VD, Swanson EOC (2015) The new \u2018code of ethics for nurses with interpretive statements\u2019(2015): practical clinical application, Part I. Medsurg Nurs 24(4):268\u2013271","journal-title":"Medsurg Nurs"},{"issue":"5","key":"362_CR15","first-page":"363","volume":"24","author":"VD Lachman","year":"2015","unstructured":"Lachman VD, Swanson E, Winland-Brown J (2015) The new \u2018Code of Ethics for Nurses With Interpretive Statements\u2019 (2015): practical clinical application, part II. Medsurg Nurs 24(5):363\u2013368","journal-title":"Medsurg Nurs"},{"key":"362_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/(SICI)1099-1379(200002)21:1<3::AID-JOB47>3.0.CO;2-6","volume":"21","author":"L Van Dyne","year":"2000","unstructured":"Van Dyne L, Vandewalle D, Kostova T, Latham ME, Cummings L (2000) Collectivism, propensity to trust and self-esteem as predictors of organizational citizenship in a non-work setting. J Organ Behav 21:3\u201323","journal-title":"J Organ Behav"},{"issue":"4","key":"362_CR17","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1016\/j.compedu.2010.07.003","volume":"55","author":"C McCoy","year":"2010","unstructured":"McCoy C (2010) Perceived self-efficacy and technology proficiency in undergraduate college students. Comput Educ 55(4):1614\u20131617","journal-title":"Comput Educ"},{"issue":"2","key":"362_CR18","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","volume":"49","author":"G Bansal","year":"2010","unstructured":"Bansal G, Gefen D (2010) The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis Support Syst 49(2):138\u2013150","journal-title":"Decis Support Syst"},{"issue":"3","key":"362_CR19","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1287\/isre.1100.0335","volume":"22","author":"CL Anderson","year":"2011","unstructured":"Anderson CL, Agarwal R (2011) The digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health information. Inf Syst Res 22(3):469\u2013490","journal-title":"Inf Syst Res"},{"issue":"1","key":"362_CR20","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.chb.2011.08.012","volume":"28","author":"S-AA Jin","year":"2012","unstructured":"Jin S-AA (2012) \u201cTo disclose or not to disclose, that is the question\u201d: a structural equation modeling approach to communication privacy management in e-health. Comput Hum Behav 28(1):69\u201377","journal-title":"Comput Hum Behav"},{"key":"362_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.05.003","volume":"87","author":"E Park","year":"2019","unstructured":"Park E, Kim J, Wiles LL, Park Y (2019) Factors affecting intention to disclose patients\u2019 health information. Comput Secur 87:1\u201313","journal-title":"Comput Secur"},{"key":"362_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2020.101819","volume":"95","author":"P Esmaeilzadeh","year":"2020","unstructured":"Esmaeilzadeh P (2020) The impact of the privacy policy of health information exchange (HIE) on patients\u2019 information disclosure intention. Comput Secur 95:1\u201311","journal-title":"Comput Secur"},{"issue":"4","key":"362_CR23","doi-asserted-by":"publisher","first-page":"441","DOI":"10.2307\/249551","volume":"22","author":"DW Straub","year":"1998","unstructured":"Straub DW, Welke RJ (1998) Coping with systems risk: security planning models for management decision making. MIS Q 22(4):441\u2013469","journal-title":"MIS Q"},{"issue":"2","key":"362_CR24","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath T, Rao HR (2009) Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur J Inf Syst 18(2):106\u2013125","journal-title":"Eur J Inf Syst"},{"issue":"2","key":"362_CR25","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath T, Rao HR (2009) Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis Support Syst 47(2):154\u2013165","journal-title":"Decis Support Syst"},{"issue":"3","key":"362_CR26","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1287\/isre.1.3.255","volume":"1","author":"DW Straub","year":"1990","unstructured":"Straub DW (1990) Effective IS security: an empirical study. Inf Syst Res 1(3):255\u2013276","journal-title":"Inf Syst Res"},{"issue":"1","key":"362_CR27","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D'Arcy","year":"2009","unstructured":"D\u2019Arcy J, Hovav A, Galletta D (2009) User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf Syst Res 20(1):79\u201398","journal-title":"Inf Syst Res"},{"issue":"6","key":"362_CR28","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1057\/ejis.2011.23","volume":"20","author":"J D'Arcy","year":"2011","unstructured":"D\u2019Arcy J, Herath T (2011) A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. Eur J Inf Syst 20(6):643\u2013658","journal-title":"Eur J Inf Syst"},{"issue":"8","key":"362_CR29","first-page":"518","volume":"12","author":"M Karjalainen","year":"2011","unstructured":"Karjalainen M, Siponen M (2011) Toward a new meta-theory for designing information systems (IS) security training approaches. J Assoc Inf Syst 12(8):518\u2013555","journal-title":"J Assoc Inf Syst"},{"issue":"3","key":"362_CR30","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q 34(3):523\u2013548","journal-title":"MIS Q"},{"key":"362_CR31","volume-title":"Principles of information security","author":"M Whitman","year":"2011","unstructured":"Whitman M, Mattord H (2011) Principles of information security. Cengage Learning, Boston"},{"key":"362_CR32","doi-asserted-by":"crossref","unstructured":"Adawiyah R, Hidayanto AN, Hapsari IC, Ibrahim RMS (2019) Identification of how health information security awareness (HISA) influence in Patient\u2019Health information protection awareness (PHIPA). In: Proceedings in the 2019 5th international conference on computing engineering and design (ICCED). IEEE, pp 1\u20136","DOI":"10.1109\/ICCED46541.2019.9161123"},{"issue":"1","key":"362_CR33","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.compedu.2008.06.011","volume":"52","author":"RS Shaw","year":"2009","unstructured":"Shaw RS, Chen CC, Harris AL, Huang H-J (2009) The impact of information richness on information security awareness training effectiveness. Comput Educ 52(1):92\u2013100","journal-title":"Comput Educ"},{"key":"362_CR34","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2008) Analysis of perceived burden of compliance: the role of fairness, awareness, and facilitating conditions. In: Association of information systems SIGSEC workshop on information security & privacy (WISP 2008), Paris, France"},{"key":"362_CR35","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cose.2016.01.004","volume":"59","author":"WR Flores","year":"2016","unstructured":"Flores WR, Ekstedt M (2016) Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput Secur 59:26\u201344","journal-title":"Comput Secur"},{"key":"362_CR36","unstructured":"Haeussinger F, Kranz J (2013) Information security awareness: its antecedents and mediating effects on security compliant behavior. In: Proceedings in the thirty fourth international conference on information systems (ICIS) Milan, pp 1\u201316"},{"issue":"3","key":"362_CR37","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1023\/B:BUSI.0000039417.15488.17","volume":"53","author":"WJ Ritchie","year":"2004","unstructured":"Ritchie WJ, Anthony WP, Rubens AJ (2004) Individual executive characteristics: explaining the divergence between perceptual and financial measures in nonprofit organizations. J Bus Ethics 53(3):267\u2013281","journal-title":"J Bus Ethics"},{"key":"362_CR38","volume-title":"Culture's consequences","author":"G Hofstede","year":"1980","unstructured":"Hofstede G (1980) Culture\u2019s consequences. Sage, Beverly Hills"},{"issue":"2","key":"362_CR39","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/256525","volume":"36","author":"PC Earley","year":"1993","unstructured":"Earley PC (1993) East meets West meets Mideast: further explorations of collectivistic and individualistic work groups. Acad Manag J 36(2):319\u2013348","journal-title":"Acad Manag J"},{"issue":"3","key":"362_CR40","doi-asserted-by":"publisher","first-page":"423","DOI":"10.2307\/2393792","volume":"40","author":"JA Chatman","year":"1995","unstructured":"Chatman JA, Barsade SG (1995) Personality, organizational culture, and cooperation: evidence from a business simulation. Adm Sci Q 40(3):423\u2013443","journal-title":"Adm Sci Q"},{"issue":"4","key":"362_CR41","doi-asserted-by":"publisher","first-page":"827","DOI":"10.2307\/256391","volume":"34","author":"TH Cox","year":"1991","unstructured":"Cox TH, Lobel SA, McLeod PL (1991) Effects of ethnic group cultural differences on cooperative and competitive behavior on a group task. Acad Manag J 34(4):827\u2013847","journal-title":"Acad Manag J"},{"issue":"2","key":"362_CR42","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1002\/job.4030160204","volume":"16","author":"RH Moorman","year":"1995","unstructured":"Moorman RH, Blakely GL (1995) Individualism-collectivism as an individual difference predictor of organizational citizenship behavior. J Organ Behav 16(2):127\u2013142","journal-title":"J Organ Behav"},{"key":"362_CR43","doi-asserted-by":"crossref","unstructured":"Guan Y, Deng H, Zhou X (2020) Understanding the impact of the COVID-19 pandemic on career development: insights from cultural psychology. 119","DOI":"10.1016\/j.jvb.2020.103438"},{"key":"362_CR44","doi-asserted-by":"crossref","unstructured":"Irwin K (2009) Prosocial behavior across cultures: the effects of institutional versus generalized trust. In: Altruism and prosocial behavior in groups. Emerald Group Publishing Limited, pp 165\u2013198","DOI":"10.1108\/S0882-6145(2009)0000026010"},{"key":"362_CR45","first-page":"1","volume-title":"Attention and awareness in foreign language learning","author":"R Schmidt","year":"1995","unstructured":"Schmidt R (1995) Consciousness and foreign language learning: a tutorial on the role of attention and awareness in learning. In: Schmidt R (ed) Attention and awareness in foreign language learning. University of Hawaii, second language teaching & curriculum center, Honolulu, Hawaii, pp 1\u201363"},{"issue":"4","key":"362_CR46","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1037\/a0014622","volume":"96","author":"AK Lalwani","year":"2009","unstructured":"Lalwani AK, Shrum L, Chiu C-Y (2009) Motivated response styles: the role of cultural values, regulatory focus, and self-consciousness in socially desirable responding. J Pers Soc Psychol 96(4):870\u2013882","journal-title":"J Pers Soc Psychol"},{"issue":"4","key":"362_CR47","doi-asserted-by":"publisher","first-page":"823","DOI":"10.2307\/258050","volume":"10","author":"JB Dozier","year":"1985","unstructured":"Dozier JB, Miceli MP (1985) Potential predictors of whistle-blowing: a prosocial behavior perspective. Acad Manag Rev 10(4):823\u2013836","journal-title":"Acad Manag Rev"},{"issue":"2","key":"362_CR48","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/07421222.2001.11045677","volume":"18","author":"HJ Smith","year":"2001","unstructured":"Smith HJ, Keil M, Depledg G (2001) Keeping mum as the project goes under: toward an explanatory model. J Manag Inf Syst 18(2):189\u2013227","journal-title":"J Manag Inf Syst"},{"issue":"1","key":"362_CR49","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TEM.2008.2009794","volume":"56","author":"C Park","year":"2009","unstructured":"Park C, Keil M, Kim JW (2009) The effect of IT failure impact and personal morality on IT project reporting behavior. IEEE Trans Eng Manag 56(1):45\u201360","journal-title":"IEEE Trans Eng Manag"},{"issue":"1","key":"362_CR50","doi-asserted-by":"publisher","first-page":"107","DOI":"10.2307\/30040692","volume":"28","author":"MI Gundlach","year":"2003","unstructured":"Gundlach MI, Douglas SC, Martinko MJ (2003) The decision to blow the whistle: a social information processing framework. Acad Manag Rev 28(1):107\u2013123","journal-title":"Acad Manag Rev"},{"issue":"4","key":"362_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/irmj.1989100101","volume":"2","author":"MD Wybo","year":"1989","unstructured":"Wybo MD, Straub DW (1989) Protecting organizational information resources. Inf Resour Manag J 2(4):1\u201316","journal-title":"Inf Resour Manag J"},{"issue":"2","key":"362_CR52","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1111\/isj.12129","volume":"28","author":"R Willison","year":"2018","unstructured":"Willison R, Warkentin M, Johnston AC (2018) Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf Syst J 28(2):266\u2013293","journal-title":"Inf Syst J"},{"issue":"5","key":"362_CR53","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1111\/isj.12271","volume":"30","author":"A Yazdanmehr","year":"2020","unstructured":"Yazdanmehr A, Wang J, Yang Z (2020) Peers matter: the moderating role of social influence on information security policy compliance. Inf Syst J 30(5):791\u2013844","journal-title":"Inf Syst J"},{"issue":"3","key":"362_CR54","first-page":"23","volume":"25","author":"R Eley","year":"2008","unstructured":"Eley R, Fallon T, Soar J, Buikstra E, Hegney D (2008) Nurses\u2019 confidence and experience in using information technology. Aust J Adv Nurs 25(3):23\u201335","journal-title":"Aust J Adv Nurs"},{"key":"362_CR55","volume-title":"A human capital crisis in cybersecurity: technical proficiency matters","author":"K Evans","year":"2010","unstructured":"Evans K, Reeder F (2010) A human capital crisis in cybersecurity: technical proficiency matters. Center for Strategic & International Studies, Washington"},{"issue":"5","key":"362_CR56","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff PM, MacKenzie SB, Lee J, Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. J Appl Psychol 88(5):879\u2013903","journal-title":"J Appl Psychol"},{"issue":"2","key":"362_CR57","doi-asserted-by":"publisher","first-page":"iii","DOI":"10.2307\/25148727","volume":"30","author":"GA Marcoulides","year":"2006","unstructured":"Marcoulides GA, Saunders C (2006) PLS: a silver bullet? MIS Q 30(2):iii\u2013ix","journal-title":"MIS Q"},{"key":"362_CR58","doi-asserted-by":"crossref","unstructured":"Ringle C, Wende S, Will A (2005) SmartPLS 2.0. SmartPLS, Hamburg, Germany","DOI":"10.1007\/978-0-230-21288-6_8"},{"issue":"2","key":"362_CR59","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1509\/jmkr.38.2.269.18845","volume":"38","author":"A Diamantopoulos","year":"2001","unstructured":"Diamantopoulos A, Winklhofer HM (2001) Index construction with formative indicators: an alternative to scale development. J Mark Res 38(2):269\u2013277","journal-title":"J Mark Res"},{"issue":"1","key":"362_CR60","doi-asserted-by":"publisher","first-page":"iii","DOI":"10.2307\/41410402","volume":"36","author":"C Ringle","year":"2012","unstructured":"Ringle C, Sarstedt M, Straub D (2012) A critical look at the use of PLS-SEM in MIS quarterly. MIS Q 36(1):iii\u2013xiv","journal-title":"MIS Q"},{"issue":"2","key":"362_CR61","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/TPC.2014.2312452","volume":"57","author":"PB Lowry","year":"2014","unstructured":"Lowry PB, Gaskin J (2014) Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it. IEEE Trans Prof Commun 57(2):123\u2013146","journal-title":"IEEE Trans Prof Commun"},{"issue":"1","key":"362_CR62","first-page":"1","volume":"4","author":"D Gefen","year":"2000","unstructured":"Gefen D, Straub DW, Boudreau MC (2000) Structural equation modeling and regression: guidelines for research practice. Commun Assoc Inf Syst 4(1):1\u201376","journal-title":"Commun Assoc Inf Syst"},{"issue":"3","key":"362_CR63","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1108\/IMDS-04-2016-0130","volume":"117","author":"J Hair","year":"2017","unstructured":"Hair J, Hollingsworth CL, Randolph AB, Chong AYL (2017) An updated and expanded assessment of PLS-SEM in information systems research. Ind Manag Data Syst 117(3):442\u2013458","journal-title":"Ind Manag Data Syst"},{"key":"362_CR64","doi-asserted-by":"crossref","unstructured":"Streukens S, Wetzels M, Daryanto A, De Ruyter K (2010) Analyzing factorial data using PLS: application in an online complaining context. In: Vinzi VE, Chin WW, Henseler J, Wang H (eds) Handbook of partial least squares. Springer, Berlin, pp 567\u2013587","DOI":"10.1007\/978-3-540-32827-8_25"},{"issue":"3","key":"362_CR65","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TPC.2014.2344331","volume":"57","author":"J Kim","year":"2014","unstructured":"Kim J, Mohan K, Ramesh B (2014) Functional and nonfunctional quality in cloud-based collaborative writing: an empirical investigation. IEEE Trans Prof Commun 57(3):182\u2013203","journal-title":"IEEE Trans Prof Commun"},{"issue":"2","key":"362_CR66","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1287\/isre.14.2.146.16016","volume":"14","author":"MY Yi","year":"2003","unstructured":"Yi MY, Davis FD (2003) Developing and validating an observational learning model of computer software training and skill acquisition. Inf Syst Res 14(2):146\u2013169","journal-title":"Inf Syst Res"},{"key":"362_CR67","unstructured":"Chin WW (1998) The partial least squares approach to structural equation modeling. In: Marcoulides GA (ed) Modern methods for business research. Lawrence Erlbaum Associates, Mahwah, pp 295\u2013336"},{"issue":"4","key":"362_CR68","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1080\/00223980009598225","volume":"134","author":"TJ Kline","year":"2000","unstructured":"Kline TJ, Sulsky LM, Rever-Moriyama SD (2000) Common method variance and specification errors: a practical approach to detection. J Psychol 134(4):401\u2013421","journal-title":"J Psychol"},{"issue":"2\u20133","key":"362_CR69","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/217278.217285","volume":"26","author":"WW Chin","year":"1995","unstructured":"Chin WW, Gopal A (1995) Adoption intention in GSS: relative importance of beliefs. ACM SigMIS Database 26(2\u20133):42\u201364","journal-title":"ACM SigMIS Database"},{"issue":"2","key":"362_CR70","first-page":"41","volume":"2","author":"A Singh","year":"2015","unstructured":"Singh A, Malhotra M (2015) Security concerns at various levels of cloud computing paradigm: a review. Int J Comput Netw Appl 2(2):41\u201345","journal-title":"Int J Comput Netw Appl"},{"issue":"6","key":"362_CR71","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1037\/0022-3514.51.6.1173","volume":"51","author":"RM Baron","year":"1986","unstructured":"Baron RM, Kenny DA (1986) The moderator\u2013mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. J Pers Soc Psychol 51(6):1173\u20131182","journal-title":"J Pers Soc Psychol"},{"key":"362_CR72","doi-asserted-by":"crossref","unstructured":"Barlow JB, Warkentin M, Ormond D, Dennis AR (2013) Don't make excuses! discouraging neutralization to reduce IT policy violation. Comput Secur 39:145\u2013159.","DOI":"10.1016\/j.cose.2013.05.006"},{"issue":"6","key":"362_CR73","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1111\/j.1540-5915.2012.00383.x","volume":"43","author":"J D'Arcy","year":"2012","unstructured":"D\u2019Arcy J, Devaraj S (2012) Employee misuse of information technology resources: testing a contemporary deterrence model. Decis Sci 43(6):1091\u20131124","journal-title":"Decis Sci"},{"issue":"6","key":"362_CR74","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.im.2003.08.008","volume":"41","author":"SM Lee","year":"2004","unstructured":"Lee SM, Lee S-G, Yoo S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Inf Manag 41(6):707\u2013718","journal-title":"Inf Manag"},{"issue":"4","key":"362_CR75","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1016\/j.dss.2009.12.005","volume":"48","author":"H Li","year":"2010","unstructured":"Li H, Zhang J, Sarathy R (2010) Understanding compliance with internet use policy from the perspective of rational choice theory. Decis Support Syst 48(4):635\u2013645","journal-title":"Decis Support Syst"},{"issue":"1","key":"362_CR76","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","volume":"51","author":"P Ifinedo","year":"2014","unstructured":"Ifinedo P (2014) Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition. Inf Manag 51(1):69\u201379","journal-title":"Inf Manag"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-022-00362-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10799-022-00362-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-022-00362-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T22:35:19Z","timestamp":1700346919000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10799-022-00362-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,16]]},"references-count":76,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["362"],"URL":"https:\/\/doi.org\/10.1007\/s10799-022-00362-y","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,16]]},"assertion":[{"value":"20 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All procedures performed in this study involving human participants were in accordance with the ethical standards of the institutional research committee and with the 1964 Helsinki Declaration and its later amendments or comparable ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants involved in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}