{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:32:39Z","timestamp":1732041159947},"reference-count":95,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"vor","delay-in-days":84,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R033293\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1016\/j.chb.2022.107207","type":"journal-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T04:30:02Z","timestamp":1642998602000},"page":"107207","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":37,"special_numbering":"C","title":["Blockchain adoption: A study of cognitive factors underpinning decision making"],"prefix":"10.1016","volume":"131","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6296-2585","authenticated-orcid":false,"given":"Davit","family":"Marikyan","sequence":"first","affiliation":[]},{"given":"Savvas","family":"Papagiannidis","sequence":"additional","affiliation":[]},{"given":"Omer F.","family":"Rana","sequence":"additional","affiliation":[]},{"given":"Rajiv","family":"Ranjan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2022.107207_bib1","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1287\/isre.9.2.204","article-title":"A conceptual and operational definition of personal innovativeness in the domain of information technology","volume":"9","author":"Agarwal","year":"1998","journal-title":"Information Systems Research"},{"key":"10.1016\/j.chb.2022.107207_bib2","series-title":"2017 IEEE technology & engineering management conference (TEMSCON)","first-page":"137","article-title":"Blockchain technology innovations","author":"Ahram","year":"2017"},{"key":"10.1016\/j.chb.2022.107207_bib3","doi-asserted-by":"crossref","first-page":"101320","DOI":"10.1016\/j.techsoc.2020.101320","article-title":"Accepting financial transactions using blockchain technology and cryptocurrency: A customer perspective approach","volume":"62","author":"Albayati","year":"2020","journal-title":"Technology in Society"},{"key":"10.1016\/j.chb.2022.107207_bib4","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.ijhcs.2019.02.004","article-title":"User perception of Bitcoin usability and security across novice users","volume":"126","author":"Alshamsi","year":"2019","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.chb.2022.107207_bib5","series-title":"New kids on the block: An analysis of modern blockchains","author":"Anderson","year":"2016"},{"key":"10.1016\/j.chb.2022.107207_bib6","series-title":"2020 international conference on computer science and its application in agriculture (ICOSICA)","first-page":"1","article-title":"Preliminary user studies on consumer perception towards blockchain-based livestock traceability platform in Indonesia: An implication to design","author":"Asfarian","year":"2020"},{"key":"10.1016\/j.chb.2022.107207_bib7","doi-asserted-by":"crossref","first-page":"40","DOI":"10.5815\/ijisa.2018.06.05","article-title":"Blockchain with internet of things: Benefits, challenges, and future directions","volume":"10","author":"Atlam","year":"2018","journal-title":"International Journal of Intelligent Systems and Applications"},{"key":"10.1016\/j.chb.2022.107207_bib8","series-title":"Technical aspects of blockchain and IoT. Advances in computers","author":"Atlam","year":"2019"},{"key":"10.1016\/j.chb.2022.107207_bib9","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MIC.2020.3014484","article-title":"COM-PACE: Compliance-Aware Cloud application engineering using blockchain","volume":"24","author":"Aujla","year":"2020","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/j.chb.2022.107207_bib10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2307\/25148715","article-title":"The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization","author":"Awad","year":"2006","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.chb.2022.107207_bib11","doi-asserted-by":"crossref","first-page":"23601","DOI":"10.1109\/ACCESS.2020.2968741","article-title":"Smart city IoT platform respecting GDPR privacy and security aspects","volume":"8","author":"Badii","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.chb.2022.107207_bib12","doi-asserted-by":"crossref","first-page":"102063","DOI":"10.1016\/j.ijinfomgt.2019.102063","article-title":"Mobile application security: Role of perceived privacy as the predictor of security perceptions","volume":"52","author":"Balapour","year":"2020","journal-title":"International Journal of Information Management"},{"key":"10.1016\/j.chb.2022.107207_bib13","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/BF01173354","article-title":"Tests of the generality of self-efficacy theory","volume":"4","author":"Bandura","year":"1980","journal-title":"Cognitive Therapy and Research"},{"key":"10.1016\/j.chb.2022.107207_bib14","series-title":"International conference on blockchain and trustworthy systems","first-page":"322","article-title":"Enhancing user privacy in IoT: Integration of GDPR and blockchain","author":"Barati","year":"2019"},{"key":"10.1016\/j.chb.2022.107207_bib15","series-title":"Proceedings of the 52nd Hawaii international conference on system Sciences","doi-asserted-by":"crossref","DOI":"10.24251\/HICSS.2019.822","article-title":"Exploring blockchain value creation: The case of the car ecosystem","author":"Bauer","year":"2019"},{"key":"10.1016\/j.chb.2022.107207_bib16","series-title":"Blockchain\u2013the gateway to trust-free cryptographic transactions","author":"Beck","year":"2016"},{"key":"10.1016\/j.chb.2022.107207_bib17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/job.1960","article-title":"Cronbach's alpha reliability: Interval estimation, hypothesis testing, and sample size planning","volume":"36","author":"Bonett","year":"2015","journal-title":"Journal of Organizational Behavior"},{"key":"10.1016\/j.chb.2022.107207_bib18","doi-asserted-by":"crossref","first-page":"120463","DOI":"10.1016\/j.techfore.2020.120463","article-title":"Surfing blockchain wave, or drowning? Shaping the future of distributed ledgers and decentralized technologies","volume":"165","author":"Centobelli","year":"2021","journal-title":"Technological Forecasting and Social Change"},{"key":"10.1016\/j.chb.2022.107207_bib19","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1002\/jtr.2336","article-title":"Will concerns for ski tourism promote pro\u2010environmental behaviour? An implication of protection motivation theory","volume":"22","author":"Chen","year":"2020","journal-title":"International Journal of Tourism Research"},{"key":"10.1016\/j.chb.2022.107207_bib20","series-title":"2009 42nd Hawaii international conference on system Sciences","first-page":"1","article-title":"Application of protection motivation theory to adoption of protective technologies","author":"Chenoweth","year":"2009"},{"key":"10.1016\/j.chb.2022.107207_bib21","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1093\/ijlit\/eax003","article-title":"Beyond bitcoin: An early overview on smart contracts","volume":"25","author":"Cuccuru","year":"2017","journal-title":"International Journal of Law and Info Technology"},{"key":"10.1016\/j.chb.2022.107207_bib22","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation","volume":"10","author":"Culnan","year":"1999","journal-title":"Organization Science"},{"key":"10.1016\/j.chb.2022.107207_bib23","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach","volume":"20","author":"D'Arcy","year":"2009","journal-title":"Information Systems Research"},{"key":"10.1016\/j.chb.2022.107207_bib24","doi-asserted-by":"crossref","first-page":"101284","DOI":"10.1016\/j.techsoc.2020.101284","article-title":"Blockchain as a confidence machine: The problem of trust & challenges of governance","volume":"62","author":"De Filippi","year":"2020","journal-title":"Technology in Society"},{"key":"10.1016\/j.chb.2022.107207_bib25","article-title":"Blockchain: Properties and misconceptions","author":"De Leon","year":"2017","journal-title":"Asia Pacific Journal of Innovation and Entrepreneurship"},{"key":"10.1016\/j.chb.2022.107207_bib26","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Information Systems Research"},{"key":"10.1016\/j.chb.2022.107207_bib27","first-page":"1","article-title":"Blockchain technology for enhancing swift-trust, collaboration and resilience within a humanitarian supply chain setting","author":"Dubey","year":"2020","journal-title":"International Journal of Production Research"},{"key":"10.1016\/j.chb.2022.107207_bib28","doi-asserted-by":"crossref","DOI":"10.1108\/IntR-03-2016-0070","article-title":"Anxiety about electronic data hacking: Predictors and relations with digital privacy protection behavior","author":"Elhai","year":"2017","journal-title":"Internet Research"},{"key":"10.1016\/j.chb.2022.107207_bib29","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/S1071-5819(03)00111-3","article-title":"Predicting e-services adoption: A perceived risk facets perspective","volume":"59","author":"Featherman","year":"2003","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.chb.2022.107207_bib30","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","article-title":"A meta\u2010analysis of research on protection motivation theory","volume":"30","author":"Floyd","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"key":"10.1016\/j.chb.2022.107207_bib31","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S0148-2963(98)00057-5","article-title":"A short, reliable measure of subjective knowledge","volume":"46","author":"Flynn","year":"1999","journal-title":"Journal of Business Research"},{"key":"10.1016\/j.chb.2022.107207_bib32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1086\/209380","article-title":"The persuasion knowledge model: How people cope with persuasion attempts","volume":"21","author":"Friestad","year":"1994","journal-title":"Journal of Consumer Research"},{"key":"10.1016\/j.chb.2022.107207_bib33","doi-asserted-by":"crossref","first-page":"4156","DOI":"10.1109\/TII.2019.2948094","article-title":"Differential privacy-based blockchain for industrial internet-of-things","volume":"16","author":"Gai","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.chb.2022.107207_bib34","doi-asserted-by":"crossref","first-page":"183","DOI":"10.5465\/amr.1992.4279530","article-title":"Self-efficacy: A theoretical analysis of its determinants and malleability","volume":"17","author":"Gist","year":"1992","journal-title":"Academy of Management Review"},{"key":"10.1016\/j.chb.2022.107207_bib35","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1080\/10580530.2015.1117842","article-title":"Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective","volume":"33","author":"Hanus","year":"2016","journal-title":"Information Systems Management"},{"key":"10.1016\/j.chb.2022.107207_bib36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00273171.2014.962683","article-title":"An index and test of linear moderated mediation","volume":"50","author":"Hayes","year":"2015","journal-title":"Multivariate Behavioral Research"},{"key":"10.1016\/j.chb.2022.107207_bib37","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation and deterrence: A framework for security policy compliance in organisations","volume":"18","author":"Herath","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"10.1016\/j.chb.2022.107207_bib38","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.ijinfomgt.2019.02.005","article-title":"Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda","volume":"49","author":"Hughes","year":"2019","journal-title":"International Journal of Information Management"},{"key":"10.1016\/j.chb.2022.107207_bib39","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory","volume":"31","author":"Ifinedo","year":"2012","journal-title":"Computers & Security"},{"key":"10.1016\/j.chb.2022.107207_bib40","doi-asserted-by":"crossref","first-page":"106573","DOI":"10.1016\/j.chb.2020.106573","article-title":"Resume= resume? The effects of blockchain, social media, and classical resumes on resume fraud and applicant reactions to resumes","volume":"114","author":"Ingold","year":"2021","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2022.107207_bib41","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.chb.2018.05.010","article-title":"Testing a model of precautionary online behaviour: The case of online banking","volume":"87","author":"Jansen","year":"2018","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2022.107207_bib42","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.ijinfomgt.2019.08.012","article-title":"A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors","volume":"50","author":"Janssen","year":"2020","journal-title":"International Journal of Information Management"},{"key":"10.1016\/j.chb.2022.107207_bib43","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: An empirical study","author":"Johnston","year":"2010","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.chb.2022.107207_bib44","doi-asserted-by":"crossref","first-page":"120465","DOI":"10.1016\/j.techfore.2020.120465","article-title":"A machine learning based approach for predicting blockchain adoption in supply Chain","volume":"163","author":"Kamble","year":"2021","journal-title":"Technological Forecasting and Social Change"},{"key":"10.1016\/j.chb.2022.107207_bib45","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1080\/01972243.2020.1795958","article-title":"Cryptocurrencies and the emergence of blockocracy","volume":"36","author":"Kavanagh","year":"2020","journal-title":"The Information Society"},{"key":"10.1016\/j.chb.2022.107207_bib46","series-title":"Annual international cryptology conference","first-page":"357","article-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol","author":"Kiayias","year":"2017"},{"key":"10.1016\/j.chb.2022.107207_bib47","doi-asserted-by":"crossref","first-page":"120641","DOI":"10.1016\/j.techfore.2021.120641","article-title":"Blockchain technology and trust relationships in trade finance","volume":"166","author":"Kowalski","year":"2021","journal-title":"Technological Forecasting and Social Change"},{"key":"10.1016\/j.chb.2022.107207_bib48","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","article-title":"Blockchain's roles in strengthening cybersecurity and protecting privacy","volume":"41","author":"Kshetri","year":"2017","journal-title":"Telecommunications Policy"},{"key":"10.1016\/j.chb.2022.107207_bib49","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.jvb.2005.11.005","article-title":"The effect of training in verbal self-guidance on the self-efficacy and performance of Native North Americans in the selection interview","volume":"68","author":"Latham","year":"2006","journal-title":"Journal of Vocational Behavior"},{"key":"10.1016\/j.chb.2022.107207_bib50","series-title":"Stress, appraisal, and coping","author":"Lazarus","year":"1984"},{"key":"10.1016\/j.chb.2022.107207_bib51","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.dss.2010.07.009","article-title":"Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective","volume":"50","author":"Lee","year":"2011","journal-title":"Decision Support Systems"},{"key":"10.1016\/j.chb.2022.107207_bib52","doi-asserted-by":"crossref","first-page":"657","DOI":"10.2307\/30036552","article-title":"Sources of influence on beliefs about information technology use: An empirical study of knowledge workers","author":"Lewis","year":"2003","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.chb.2022.107207_bib53","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","article-title":"Avoidance of information technology threats: A theoretical perspective","author":"Liang","year":"2009","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.chb.2022.107207_bib54","doi-asserted-by":"crossref","first-page":"394","DOI":"10.17705\/1jais.00232","article-title":"Understanding security behaviors in personal computer usage: A threat avoidance perspective","volume":"11","author":"Liang","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"key":"10.1016\/j.chb.2022.107207_bib55","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1080\/09537325.2015.1047757","article-title":"User behaviour in QR mobile payment system: The QR payment acceptance model","volume":"27","author":"Li\u00e9bana-Cabanillas","year":"2015","journal-title":"Technology Analysis & Strategic Management"},{"key":"10.1016\/j.chb.2022.107207_bib56","series-title":"Share of individuals who have heard about blockchain in Italy 2019","author":"Liu","year":"2021"},{"key":"10.1016\/j.chb.2022.107207_bib57","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MS.2017.4121227","article-title":"Adaptable blockchain-based systems: A case study for product traceability","volume":"34","author":"Lu","year":"2017","journal-title":"IEEE Software"},{"key":"10.1016\/j.chb.2022.107207_bib58","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/S0148-2963(03)00111-5","article-title":"Predictors of self-efficacy for cognitive ability employment testing","volume":"58","author":"Maertz","year":"2005","journal-title":"Journal of Business Research"},{"key":"10.1016\/j.chb.2022.107207_bib59","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.chb.2017.09.024","article-title":"The influence of prior knowledge structures on website attitudes and behavioral intentions","volume":"78","author":"Manika","year":"2018","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2022.107207_bib60","series-title":"Conference on e-Business, e-Services and e-Society","first-page":"555","article-title":"Blockchain in a business model: Exploring benefits and risks","author":"Marikyan","year":"2021"},{"key":"10.1016\/j.chb.2022.107207_bib61","series-title":"Toward security capitulation theory","author":"Mcleod","year":"2020"},{"key":"10.1016\/j.chb.2022.107207_bib62","first-page":"102526","article-title":"Information security policy non-compliance: Can capitulation theory explain user behaviors?","author":"Mcleod","year":"2021","journal-title":"Computers & Security"},{"key":"10.1016\/j.chb.2022.107207_bib63","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1080\/07421222.2017.1394083","article-title":"User motivations in protecting information security: Protection motivation theory versus self-determination theory","volume":"34","author":"Menard","year":"2017","journal-title":"Journal of Management Information Systems"},{"key":"10.1016\/j.chb.2022.107207_bib64","doi-asserted-by":"crossref","first-page":"106854","DOI":"10.1016\/j.chb.2021.106854","article-title":"Blockchain technologies to address smart city and society challenges","volume":"122","author":"Mora","year":"2021","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2022.107207_bib65","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.bushor.2019.01.009","article-title":"How blockchain technologies impact your business model","volume":"62","author":"Morkunas","year":"2019","journal-title":"Business Horizons"},{"key":"10.1016\/j.chb.2022.107207_bib66","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.im.2005.08.006","article-title":"Understanding information technology acceptance by individual professionals: Toward an integrative view","volume":"43","author":"Mun","year":"2006","journal-title":"Information & Management"},{"key":"10.1016\/j.chb.2022.107207_bib67","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1046\/j.1365-2575.2000.00079.x","article-title":"A knowledge\u2010focused perspective on the diffusion and adoption of complex information technologies: The BPR example","volume":"10","author":"Newell","year":"2000","journal-title":"Information Systems Journal"},{"key":"10.1016\/j.chb.2022.107207_bib68","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s12599-017-0499-8","article-title":"Trading real-world assets on blockchain","volume":"59","author":"Notheisen","year":"2017","journal-title":"Business & Information Systems Engineering"},{"key":"10.1016\/j.chb.2022.107207_bib69","article-title":"Blockchain for next generation services in banking and finance: Cost, benefit, risk and opportunity analysis","author":"Osmani","year":"2020","journal-title":"Journal of Enterprise Information Management"},{"key":"10.1016\/j.chb.2022.107207_bib70","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.jcps.2013.05.002","article-title":"Compensatory knowledge signaling in consumer word-of-mouth","volume":"23","author":"Packard","year":"2013","journal-title":"Journal of Consumer Psychology"},{"key":"10.1016\/j.chb.2022.107207_bib71","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1086\/209383","article-title":"Consumer knowledge assessment","volume":"21","author":"Park","year":"1994","journal-title":"Journal of Consumer Research"},{"key":"10.1016\/j.chb.2022.107207_bib72","doi-asserted-by":"crossref","first-page":"106830","DOI":"10.1016\/j.chb.2021.106830","article-title":"Making public concerns tangible: An empirical study of German and UK citizens' perception of data protection and data security","volume":"122","author":"Pleger","year":"2021","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2022.107207_bib73","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s10257-015-0284-5","article-title":"Determinants of the intention to use NFC technology as a payment system: An acceptance model approach","volume":"14","author":"Ramos-De-Luna","year":"2016","journal-title":"Information Systems and E-Business Management"},{"key":"10.1016\/j.chb.2022.107207_bib74","first-page":"153","article-title":"Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation","author":"Rogers","year":"1983","journal-title":"Social psychophysiology: A sourcebook"},{"key":"10.1016\/j.chb.2022.107207_bib75","series-title":"Diffusion of innovations","author":"Rogers","year":"2010"},{"key":"10.1016\/j.chb.2022.107207_bib76","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1037\/0022-3514.34.1.54","article-title":"Fear appeals and attitude change: Effects of a threat's noxiousness, probability of occurrence, and the efficacy of coping responses","volume":"34","author":"Rogers","year":"1976","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.chb.2022.107207_bib77","series-title":"Protection motivation theory","author":"Rogers","year":"1997"},{"key":"10.1016\/j.chb.2022.107207_bib78","doi-asserted-by":"crossref","first-page":"101427","DOI":"10.1016\/j.techsoc.2020.101427","article-title":"Expert oriented approach for analyzing the blockchain adoption barriers in humanitarian supply chain","author":"Sahebi","year":"2020","journal-title":"Technology in Society"},{"key":"10.1016\/j.chb.2022.107207_bib79","doi-asserted-by":"crossref","first-page":"102388","DOI":"10.1016\/j.ijinfomgt.2021.102388","article-title":"The effects of individual-level espoused national cultural values on the willingness to use Bitcoin-like blockchain currencies","volume":"60","author":"Salcedo","year":"2021","journal-title":"International Journal of Information Management"},{"key":"10.1016\/j.chb.2022.107207_bib80","series-title":"2017 4th international conference on advanced computing and communication systems (ICACCS)","first-page":"1","article-title":"Survey of consensus protocols on blockchain applications","author":"Sankar","year":"2017"},{"key":"10.1016\/j.chb.2022.107207_bib81","doi-asserted-by":"crossref","first-page":"101278","DOI":"10.1016\/j.tele.2019.101278","article-title":"Blockchain: The emerging technology of digital trust","volume":"45","author":"Shin","year":"2019","journal-title":"Telematics and Informatics"},{"key":"10.1016\/j.chb.2022.107207_bib82","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/01973533.2016.1277529","article-title":"Extracting the variance inflation factor and other multicollinearity diagnostics from typical regression results","volume":"39","author":"Thompson","year":"2017","journal-title":"Basic and Applied Social Psychology"},{"key":"10.1016\/j.chb.2022.107207_bib83","doi-asserted-by":"crossref","first-page":"101953","DOI":"10.1016\/j.ijinfomgt.2019.05.009","article-title":"Analysing the impact of blockchain-technology for operations and supply chain management: An explanatory model drawn from multiple case studies","volume":"52","author":"T\u00f6nnissen","year":"2020","journal-title":"International Journal of Information Management"},{"key":"10.1016\/j.chb.2022.107207_bib84","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.cose.2018.08.007","article-title":"The impact of security awarness on information technology professionals' behavior","volume":"79","author":"Torten","year":"2018","journal-title":"Computers & Security"},{"key":"10.1016\/j.chb.2022.107207_bib85","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: A protection motivation theory perspective","volume":"59","author":"Tsai","year":"2016","journal-title":"Computers & Security"},{"key":"10.1016\/j.chb.2022.107207_bib86","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","article-title":"Motivating IS security compliance: Insights from habit and protection motivation theory","volume":"49","author":"Vance","year":"2012","journal-title":"Information & Management"},{"key":"10.1016\/j.chb.2022.107207_bib87","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology","author":"Venkatesh","year":"2012","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.chb.2022.107207_bib88","doi-asserted-by":"crossref","first-page":"3652","DOI":"10.1109\/TII.2019.2894573","article-title":"A blockchain-based solution for enhancing security and privacy in smart factory","volume":"15","author":"Wan","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.chb.2022.107207_bib89","doi-asserted-by":"crossref","first-page":"102090","DOI":"10.1016\/j.ijinfomgt.2020.102090","article-title":"Using the security triad to assess blockchain technology in public sector applications","volume":"52","author":"Warkentin","year":"2020","journal-title":"International Journal of Information Management"},{"key":"10.1016\/j.chb.2022.107207_bib90","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.enpol.2016.12.047","article-title":"Benefits and risks of smart home technologies","volume":"103","author":"Wilson","year":"2017","journal-title":"Energy Policy"},{"key":"10.1016\/j.chb.2022.107207_bib91","series-title":"ICIS 2005 proceedings","first-page":"31","article-title":"A protection motivation theory approach to home wireless security","author":"Woon","year":"2005"},{"key":"10.1016\/j.chb.2022.107207_bib92","doi-asserted-by":"crossref","first-page":"75845","DOI":"10.1109\/ACCESS.2019.2917562","article-title":"A survey on blockchain-based internet service architecture: Requirements, challenges, trends, and future","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.chb.2022.107207_bib93","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2017.10.004","article-title":"Digital enablement of blockchain: Evidence from HNA group","volume":"39","author":"Ying","year":"2018","journal-title":"International Journal of Information Management"},{"key":"10.1016\/j.chb.2022.107207_bib94","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0163477","article-title":"Where is current research on blockchain technology?\u2014a systematic review","volume":"11","author":"Yli-Huumo","year":"2016","journal-title":"PLoS One"},{"key":"10.1016\/j.chb.2022.107207_bib95","series-title":"2017 IEEE international congress on big data (BigData congress)","first-page":"557","article-title":"An overview of blockchain technology: Architecture, consensus, and future trends","author":"Zheng","year":"2017"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563222000292?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563222000292?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T23:10:24Z","timestamp":1661382624000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563222000292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":95,"alternative-id":["S0747563222000292"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2022.107207","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2022,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Blockchain adoption: A study of cognitive factors underpinning decision making","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2022.107207","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"107207"}}