Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., &
Polak, P. (2015). What do systems users have to fear?
Using fear appeals to engender threats and fear that
motivate protective security behaviors. MIS Quarterly:
Management Information Systems, 39(4), 837–864.
Brands, J., & Van Doorn, J. (2022). The measurement,
intensity and determinants of fear of cybercrime: A
systematic review. Computers in Human Behavior, 127,
107082.
Brooks, A. T., Krumlauf, M., Beck, K. H., Fryer, C. S.,
Yang, L., Ramchandani, V. A., & Wallen, G. R. (2019).
A Mixed Methods Examination of Sleep Throughout
the Alcohol Recovery Process Grounded in the Social
Cognitive Theory: The Role of Self-Efficacy and
Craving. Health Education and Behavior, 46(1), 126–
136.
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010).
Information security policy compliance: An empirical
study of rationality-based beliefs and information
security awareness. MIS Quarterly: Management
Information Systems, 34(SPEC. ISSUE 3), 523–548.
Burns, A. J., Posey, C., Roberts, T. L., & Benjamin Lowry,
P. (2017). Examining the relationship of organizational
insiders’ psychological capital with information
security threat and coping appraisals. Computers in
Human Behavior, 68, 190–209.
Burns, A. J., Roberts, T. L., Posey, C., & Lowry, P. B.
(2019). The adaptive roles of positive and negative
emotions in organizational insiders’ security-based
precaution taking. Information Systems Research, 30(4),
1228–1247.
Carmichael, S., & Piquero, A. R. (2004). Sanctions,
Perceived Anger, and Criminal Offending. Journal of
Quantitative Criminology, 20(4), 371–393.
Compeau, D. R., & Higgins, C. A. (1995). Computer self-
efficacy: Development of a measure and initial test.
MIS Quarterly: Management Information Systems,
19(2), 189–210.
Cram, W. A., Proudfoot, J. G., & D’arcy, J. (2017).
Organizational information security policies: a review
and research framework. European Journal of
Information Systems, 26, 605–641.
D’Arcy, J., Herath, T., & Shoss, M. K. (2014).
Understanding Employee Responses to Stressful
Information Security Requirements: A Coping
Perspective. Journal of Management Information
Systems, 31(2), 285–318.
DataReportal. (2023). DIGITAL AROUND THE WORLD.
https://datareportal.com/global-digital-overview
Fairchild, A. J., & McQuillin, S. D. (2010). Evaluating
mediation and moderation effects in school psychology:
A presentation of methods and review of current
practice. Journal of School Psychology,
48(1), 53–84.
Farshadkhah, S., Van Slyke, C., & Fuller, B. (2021).
Onlooker effect and affective responses in information
security violation mitigation. Computers and Security,
100, 102082.
Fredrickson, B. (2001). The Role of Positive Emotions in
Positive Psychology. The American Psychologist, 56,
218–226.
Fredrickson, B. L. (2004). The broaden-and-build theory of
positive emotions. Philosophical Transactions of the
Royal Society B: Biological Sciences, 359(1449),
1367–1377.
Fredrickson, B. L., & Branigan, C. (2005). Positive
emotions broaden the scope of attention and thought-
action repertoires. Cognition and Emotion, 19(3), 313–
332.
Fredrickson, B. L., & Joiner, T. (2002). Positive emotions
trigger upward spirals toward emotional well-being.
Psychological Science, 13(2), 172–175.
Gulenko, I. (2014). Improving passwords: influence of
emotions on security behaviour. Information
Management & Computer Security, 22(2), 167–178.
Herath, T., & Rao, H. R. (2009). Protection motivation and
deterrence: A framework for security policy
compliance in organisations. European Journal of
Information Systems, 18(2), 106–125.
I. M. Y. Woon., Tan., W., & R. T. Low. (2005). A
PROTECTION MOTIVATION THEORY APPROACH
TO HOME WIRELESS SECURITY. 5, 186–204.
Ifinedo, P. (2012). Understanding Information systems
security policy compliance. Computers and Security,
31(1), 83–95.
Izard, C. E. (2002). Translating emotion theory and
research into preventive interventions. Psychological
Bulletin, 128(5), 796–824.
Jansen, J., & van Schaik, P. (2018). Persuading end users to
act cautiously online: a fear appeals study on phishing.
Information and Computer Security, 26(3), 264–276.
Kemper, T. D., & Lazarus, R. S. (1990). Emotion and
Adaptation. Contemporary Sociology, 21(4), 522.
Khan, H. U., & AlShare, K. A. (2019). Violators versus
non-violators of information security measures in
organizations—A study of distinguishing factors.
Journal of Organizational Computing and Electronic
Commerce, 29(1), 4–23.
Kim, L. (2017). Cybersecurity awareness: Protecting data
and patients. Nursing Management, 48(4), 16–19.
LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting
personal responsibility for internet safety.
Communications of the ACM, 51(3), 71–76.
Liang, H., Xue, Y., Pinsonneault, A., & Wu, Y. (2019).
What users do besides problem-focused coping when
facing it security threats: An emotion-focused coping
perspective. MIS Quarterly: Management Information
Systems, 43(2), 373–394.
Lowry, P. B., & Moody, G. D. (2015). Proposing the
control-reactance compliance model (CRCM) to
explain opposing motivations to comply with
organisational information security policies.
Information Systems Journal, 25(5), 433–463.
Ma, X. (2022). IS professionals’ information security
behaviors in Chinese IT organizations for information
security protection. Information Processing and
Management, 59(1), 102744.
Mallinckrodt, B., & Wei, M. (2005). Attachment, social
competencies, social support, and psychological
distress. Journal of Counseling Psychology, 52(3),
358–367.