{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T11:18:54Z","timestamp":1720523934194},"reference-count":54,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2017S1A5A8018751"],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1016\/j.chb.2018.12.035","type":"journal-article","created":{"date-parts":[[2019,1,5]],"date-time":"2019-01-05T01:04:03Z","timestamp":1546650243000},"page":"357-369","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":25,"special_numbering":"C","title":["The effect of message framing on security behavior in online services: Focusing on the shift of time orientation via psychological ownership"],"prefix":"10.1016","volume":"93","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8636-1530","authenticated-orcid":false,"given":"Bong-Goon","family":"Seo","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7278-5228","authenticated-orcid":false,"given":"Do-Hyung","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.chb.2018.12.035_bib1","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1037\/0033-2909.84.5.888","article-title":"Attitude-behavior relations: A theoretical analysis and review of empirical research","volume":"84","author":"Ajzen","year":"1977","journal-title":"Psychological Bulletin"},{"issue":"3","key":"10.1016\/j.chb.2018.12.035_bib2","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions","volume":"34","author":"Anderson","year":"2010","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib3","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1002\/job.583","article-title":"Psychological ownership: Theoretical extensions, measurement and relation to work outcomes","volume":"30","author":"Avey","year":"2009","journal-title":"Journal of Organizational Behavior"},{"issue":"4","key":"10.1016\/j.chb.2018.12.035_bib4","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1037\/1089-2680.5.4.323","article-title":"Bad is stronger than good","volume":"5","author":"Baumeister","year":"2001","journal-title":"Review of General Psychology"},{"issue":"11\u201312","key":"10.1016\/j.chb.2018.12.035_bib5","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1080\/0267257X.2014.939217","article-title":"Digital consumption and the extended self","volume":"30","author":"Belk","year":"2014","journal-title":"Journal of Marketing Management"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib6","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1177\/002224379503200206","article-title":"When to accentuate the negative: The effects of perceived efficacy and message framing on intentions to perform a health-related behavior","volume":"32","author":"Block","year":"1995","journal-title":"Journal of Marketing Research"},{"issue":"4","key":"10.1016\/j.chb.2018.12.035_bib7","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","article-title":"What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors in users","volume":"39","author":"Boss","year":"2015","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib8","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","article-title":"Social network sites: Definition, history, and scholarship","volume":"13","author":"Boyd","year":"2007","journal-title":"Journal of Computer\u2010mediated Communication"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib9","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1080\/08919402.1900.10532994","article-title":"The collecting instinct","volume":"7","author":"Burk","year":"1900","journal-title":"Pedagogical Seminary"},{"key":"10.1016\/j.chb.2018.12.035_bib10","series-title":"The meaning of things: Domestic symbols and the self","author":"Csikszentmihalyi","year":"1981"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib11","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1177\/109019810002700108","article-title":"Positive versus negative framing of a hypothetical infant immunization: The influence of involvement","volume":"27","author":"Donovan","year":"2000","journal-title":"Health Education & Behavior"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib12","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","article-title":"A meta-analysis of research on protection motivation theory","volume":"30","author":"Floyd","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib13","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/0148-2963(93)00038-3","article-title":"Message framing and buying behavior: A field experiment","volume":"32","author":"Ganzach","year":"1995","journal-title":"Journal of Business Research"},{"issue":"8","key":"10.1016\/j.chb.2018.12.035_bib14","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1097\/00001888-200008000-00018","article-title":"Framing procedural risks to patients: Is 99% safe the same as a risk of 1 in 100?","volume":"75","author":"Gurm","year":"2000","journal-title":"Academic Medicine"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib15","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1111\/j.1365-2575.2012.00420.x","article-title":"Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service","volume":"24","author":"Herath","year":"2014","journal-title":"Information Systems Journal"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib16","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation and deterrence: A framework for security policy compliance in organisations","volume":"18","author":"Herath","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib17","first-page":"140","article-title":"Exploring uncharted waters: Use of psychological ownership theory in marketing","volume":"23","author":"Hulland","year":"2015","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"4","key":"10.1016\/j.chb.2018.12.035_bib18","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1037\/0022-3514.75.4.887","article-title":"Negative information weighs more heavily on the brain: The negativity bias in evaluative categorizations","volume":"75","author":"Ito","year":"1998","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1080\/00913367.1991.10673213","article-title":"Negative advertising: The malicious strain of comparative advertising","volume":"20","author":"James","year":"1991","journal-title":"Journal of Advertising"},{"issue":"3","key":"10.1016\/j.chb.2018.12.035_bib20","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: An empirical study","volume":"34","author":"Johnston","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib21","doi-asserted-by":"crossref","first-page":"113","DOI":"10.25300\/MISQ\/2015\/39.1.06","article-title":"An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric","volume":"39","author":"Johnston","year":"2015","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib22","first-page":"139","article-title":"Development of systematic process for estimating commercialization duration and cost of R&D performance","volume":"23","author":"Jun","year":"2017","journal-title":"Journal of Intelligence and Information Systems"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib23","first-page":"121","article-title":"Individual psychological ownership: Concepts, evidence, and implications for research in marketing","volume":"23","author":"Jussila","year":"2015","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib24","doi-asserted-by":"crossref","first-page":"263","DOI":"10.2307\/1914185","article-title":"Prospect theory: An analysis of decision under risk","volume":"47","author":"Kahneman","year":"1979","journal-title":"Econometrica: Journal of the Econometric Society"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib25","first-page":"185","article-title":"Psychological ownership motivation and use of social media","volume":"23","author":"Karahanna","year":"2015","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"3","key":"10.1016\/j.chb.2018.12.035_bib26","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1325555.1325569","article-title":"Promoting personal responsibility for internet safety","volume":"51","author":"LaRose","year":"2008","journal-title":"Communications of the ACM"},{"issue":"3","key":"10.1016\/j.chb.2018.12.035_bib27","doi-asserted-by":"crossref","first-page":"269","DOI":"10.2753\/MIS0742-1222280308","article-title":"Usability design and psychological ownership of a virtual world","volume":"28","author":"Lee","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"8","key":"10.1016\/j.chb.2018.12.035_bib28","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1145\/1076211.1076243","article-title":"Investigating factors affecting the adoption of anti-spyware systems","volume":"48","author":"Lee","year":"2005","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.chb.2018.12.035_bib29","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.chb.2014.12.002","article-title":"How do virtual community members develop psychological ownership and what are the effects of psychological ownership in virtual communities?","volume":"45","author":"Lee","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"10.1016\/j.chb.2018.12.035_bib30","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1086\/209174","article-title":"How consumers are affected by the framing of attribute information before and after consuming the product","volume":"15","author":"Levin","year":"1988","journal-title":"Journal of Consumer Research"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib31","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1006\/obhd.1998.2804","article-title":"All frames are not created equal: A typology and critical analysis of framing effects","volume":"76","author":"Levin","year":"1998","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"3","key":"10.1016\/j.chb.2018.12.035_bib33","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1037\/0022-3514.52.3.500","article-title":"The effect of message framing on breast self-examination attitudes, intentions, and behavior","volume":"52","author":"Meyerowitz","year":"1987","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib101","first-page":"39","article-title":"Virtuality as a psychological distance: The strategy for advertisement message appeal depending on virtuality,","volume":"24","author":"Park","year":"2017","journal-title":"Journal of Information Technology Applications & Management"},{"issue":"3","key":"10.1016\/j.chb.2018.12.035_bib102","first-page":"163","article-title":"Virtuality as a psychological distance and temporal distance: Focusing on the effect of product information type on product attitude","volume":"18","author":"Park","year":"2017","journal-title":"Knowledge Management Research"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib34","first-page":"47","article-title":"Project performance creation mechanism through online collaboration system: Focusing on individual, relational, and system characteristics","volume":"25","author":"Park","year":"2018","journal-title":"Journal of Information Technology Applications & Management"},{"key":"10.1016\/j.chb.2018.12.035_bib35","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.jenvp.2017.07.003","article-title":"Preferences for car sharing services: Effects of instrumental attributes and psychological ownership","volume":"53","author":"Paundra","year":"2017","journal-title":"Journal of Environmental Psychology"},{"issue":"3","key":"10.1016\/j.chb.2018.12.035_bib36","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1086\/598614","article-title":"The effect of mere touch on perceived ownership","volume":"36","author":"Peck","year":"2009","journal-title":"Journal of Consumer Research"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib37","doi-asserted-by":"crossref","first-page":"298","DOI":"10.2307\/259124","article-title":"Toward a theory of psychological ownership in organizations","volume":"26","author":"Pierce","year":"2001","journal-title":"Academy of Management Review"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib38","doi-asserted-by":"crossref","first-page":"121","DOI":"10.2307\/258609","article-title":"Employee ownership: A conceptual model of process and effects","volume":"16","author":"Pierce","year":"1991","journal-title":"Academy of Management Review"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib39","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.ijinfomgt.2017.09.006","article-title":"Engaging in knowledge exchange: The instrumental psychological ownership in open innovation communities","volume":"38","author":"Pirkkalainen","year":"2018","journal-title":"International Journal of Information Management"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib40","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","author":"Rogers","year":"1975","journal-title":"Journal of Psychology"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib41","doi-asserted-by":"crossref","first-page":"143","DOI":"10.13088\/jiis.2017.23.1.143","article-title":"Development on early warning system about technology leakage of small and medium enterprises","volume":"23","author":"Seo","year":"2017","journal-title":"Journal of Intelligence and Information Systems"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib42","first-page":"1","article-title":"The effect of message framing depending on psychological ownership: Focusing on information security behavior in online service","volume":"19","author":"Seo","year":"2018","journal-title":"Knowledge Management Research"},{"key":"10.1016\/j.chb.2018.12.035_bib43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jbusres.2016.10.002","article-title":"Psychological ownership and music streaming consumption","volume":"71","author":"Sinclair","year":"2017","journal-title":"Journal of Business Research"},{"key":"10.1016\/j.chb.2018.12.035_bib44","series-title":"Nudge: Improving decisions about health, wealth, and happiness","author":"Thaler","year":"1999"},{"issue":"4","key":"10.1016\/j.chb.2018.12.035_bib45","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1002\/job.249","article-title":"Psychological ownership and feelings of possession: Three field studies predicting employee attitudes and organizational citizenship behavior","volume":"25","author":"Van Dyne","year":"2004","journal-title":"Journal of Organizational Behavior"},{"issue":"13","key":"10.1016\/j.chb.2018.12.035_bib46","doi-asserted-by":"crossref","first-page":"277","DOI":"10.17705\/1CAIS.04113","article-title":"To fear or not to fear? A critical review and analysis of fear appeals in the information security context","volume":"41","author":"Wall","year":"2017","journal-title":"Communications of the Association for Information Systems"},{"issue":"1\u20132","key":"10.1016\/j.chb.2018.12.035_bib47","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1080\/0267257X.2015.1089308","article-title":"The relationship between ownership and possession: Observations from the context of digital virtual goods","volume":"32","author":"Watkins","year":"2016","journal-title":"Journal of Marketing Management"},{"issue":"4","key":"10.1016\/j.chb.2018.12.035_bib48","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1080\/03637759209376276","article-title":"Putting the fear back into fear appeals: The extended parallel process model","volume":"59","author":"Witte","year":"1992","journal-title":"Communications Monographs"},{"issue":"6","key":"10.1016\/j.chb.2018.12.035_bib49","doi-asserted-by":"crossref","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","article-title":"Security lapses and the omission of information security measures: A threat control model and empirical test","volume":"24","author":"Workman","year":"2008","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10.1016\/j.chb.2018.12.035_bib50","first-page":"25","article-title":"Smart store in smart city: The development of smart trade area analysis system based on consumer sentiments","volume":"24","author":"Yoo","year":"2018","journal-title":"Journal of Intelligence and Information Systems"},{"issue":"30","key":"10.1016\/j.chb.2018.12.035_bib51","first-page":"89","article-title":"The role of open innovation for SME's R&D success","volume":"24","author":"Yoo","year":"2018","journal-title":"Journal of Intelligence and Information Systems"},{"issue":"2","key":"10.1016\/j.chb.2018.12.035_bib52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00913367.1999.10673580","article-title":"Moderating effects of need for cognition on responses to positively versus negatively framed advertising messages","volume":"28","author":"Zhang","year":"1999","journal-title":"Journal of Advertising"},{"issue":"4","key":"10.1016\/j.chb.2018.12.035_bib53","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1016\/j.tele.2016.02.007","article-title":"The effects of psychological ownership and TAM on social media loyalty: An integrated model","volume":"33","author":"Zhao","year":"2016","journal-title":"Telematics and Informatics"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563218306216?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563218306216?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T11:39:48Z","timestamp":1656761988000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563218306216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":54,"alternative-id":["S0747563218306216"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2018.12.035","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The effect of message framing on security behavior in online services: Focusing on the shift of time orientation via psychological ownership","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2018.12.035","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}