Hanus, B., & Wu, Y. (2016). Impact of users’ security
awareness on desktop security behavior: A protection
motivation theory perspective. Information Systems
Management, 33(1), 2-16.
Henseler, J., Hubona, G., & Ray, P. A. (2016). Using PLS
path modeling in new technology research: Updated
guidelines. Industrial Management & Data Systems,
116(1), 2-20.
HIPAA Journal (2022). Summary of 2020-2021 HIPAA
fines and settlements. https://www.hipaajournal.com/
2020-hipaa-violation-cases-and-penalties/
Ifinedo, P. (2012). Understanding information systems
security policy compliance: An integration of the theory
of planned behavior and the protection motivation
theory. Computers & Security, 31(1), 83-95.
Jansen, J., & van Schaik, P. (2018). Persuading end users to
act cautiously online: A fear appeals study on phishing.
Information and Computer Security, 26(3), 264-276.
Kahneman, D. (2011), Thinking, fast and slow. Farrar,
Straus, and Giroux.
Kline, R. B. (2011). Principles and practice of structural
equation modelling. Guilford Press.
Koch, D. D. (2017). Is the HIPAA security rule enough to
protect electronic personal health information (PHI) in the
cyber age? Journal of Health Care Finance, 43(3), 1-32.
Levy, Y., & Gafni, R. (2021). Introducing the concept of
cybersecurity footprint. Information and Computer
Security, 29(5), 724-736.
Mahalingham, T., McEvoy, P. M., & Clarke, P. J. F. (2023).
Assessing the validity of self-report social media use:
Evidence of No relationship with objective smartphone
use. Computers in Human Behavior, 140, 107567.
https://doi.org/10.1016/j.chb.2022.107567
Mandiant. (2013). APT1: Exposing one of China's cyber
espionage units. https://www.fireeye.com/content/dam/
fireeye-www/services/pdfs/mandiant-apt1-report.pdf
Moqbel, M. A., & Bartelt, V. L. (2015). Consumer
acceptance of personal cloud: Integrating trust and risk
with the technology acceptance model. AIS
Transactions of Replication Research, 1, 1-11.
Office of the National Coordinator for Health Information
Technology. (n.d.). Federal Health IT Strategic Plan:
2015-2020. https://www.healthit.gov/sites/default/
files/9-5-federalhealthitstratplanfinal_0.pdf
Pachur, T., Hertwig, R., & Steinmann, F. (2012). How do
people judge risks: Availability heuristic, affect heuristic,
or both? Journal of Experimental Psychology: Applied,
18(3), 314-330.
Pattinson, M., Butavicius, M., Lillie, M., Ciccarello, B.,
Parsons, K., Calic, D., & McCormac, A. (2019).
Matching training to individual learning styles
improves information security awareness. Information
and Computer Security, 28(1), 1-14.
Pollock, T., Levy, Y., Li, W., & Kumar, A. (2021). Subject
matter experts’ feedback on experimental procedures to
measure user’s judgment errors in social engineering
attacks. Journal of Cybersecurity Education, Research
and Practice, 2, Article 4.
Posey, C., Roberts, T., & Lowry, P. B. (2015). The impact
of organizational commitment on insiders’ motivation
to protect organizational information assets. Journal of
Management Information Systems, 32(4), 179–214.
Rhee, H., Ryu, Y. U., & Kim, C. (2012). Unrealistic
optimism on information security management.
Computers & Security, 31(2), 221-232.
Rogers, R. W. (1975). A protection motivation theory of
fear appeals and attitude change. Journal of
Psychology, 91(1), 93-114.
Rogers, R. W., & Prentice-Dunn, S. (1997). Protection
motivation theory. Gochman, D. S. (Ed.), Handbook of
Health Behavior Research I: Personal and Social
Determinants, Plenum Press, pp. 113-132.
Sadok, M., Alter, S., & Bednar, P. (2020). It is not my job:
exploring the disconnect between corporate security
policies and actual security practices in SMEs.
Information and Computer Security, 28(3), 467-483.
Safa, N. S., & Von Solms, R. (2016). An information
security knowledge-sharing model in organizations.
Computers in Human Behavior, 57(C), 442-451.
Safa, N. S., Von Solms, R., & Furnell, S. (2016),
“Information security policy compliance model in
organizations”, Computers & Security, 56, 70-82.
Sarabadani, J., Crossler, R. E., & D'Arcy, J. (2022). Trading
well-being for ISP compliance: An investigation of the
positive and negative effects of SETA programs.
Proceedings of the 2022 Workshop on Information
Security and Privacy (WISP). https://aisel.aisnet.org/
wisp2022/8
Schroeder, J. (2017). Advanced persistent training: take your
security awareness program to the next level. Springer.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014).
Employees’ adherence to information security policy:
An exploratory field study. Information &
Management, 51(2), 217-224.
Tsohou, A., Karyda, M., & Kokolakis, S. (2015). Analyzing
the role of cognitive and cultural biases in the
internalization of information security policies:
Recommendations for information security awareness
programs. Computers & Security, 52, 128-141.
U.S. Department of Health and Human Services Office for
Civil Rights. (2023). Breach portal: Notice to the
secretary of HHS breach of unsecured protected health
information.
Verizon (2022). The 2022 Data breach investigations report.
https://www.verizon.com/business/resources/reports/dbir
Wash, R., Rader, E., & Fennell, C. (2017). Can people self-
report security accurately? Agreement between self-
report and behavioral measures. Proceedings of the 2017
CHI Conference on Human Factors in Computing
Systems, Association for Computing Machinery (ACM),
2228-2232. https://doi.org/10.1145/3025453.3025911
W3Techs. (2023). Usage of operating systems for websites.
https://w3techs.com/technologies/overview/operating_s
ystem/all.