Albrechtsen, E., & Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection: An intervention study. Computers & Security, 29(4), 432–445.
Audrin, C., & Audrin, B. (2022). Key factors in digital literacy in learning and education: A systematic literature review using text mining. Education and Information Technologies, 27(6), 7395–7419.
Barn, B. S., Barn, R., & Tan, J. (2014). Young people and smartphones: An empirical study on information security. In Proceedings of the 47th Hawaii International Conference on System Sciences (pp. 4504–4514). IEEE.
Bélanger, F., & Crossler, R. E. (2019). Dealing with digital traces: Understanding protective behaviors on mobile devices. The Journal of Strategic Information Systems, 28(1), 34–49.
Blythe, J. M., & Coventry, L. (2018). Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Computers in Human Behavior, 87, 87–97.
Büchi, M., Just, N., & Latzer, M. (2017). Caring is not enough: The importance of Internet skills for online privacy protection. Information, Communication & Society, 20(8), 1261–1278.
Bulgurcu, B. (2010). Antecedents and outcomes of information privacy concerns in online social networking: A theoretical perspective. Information Systems, 2(2), 153–163.
Califf, C. B., & Brooks, S. (2020). An empirical study of techno-stressors, literacy facilitation, burnout, and turnover intention as experienced by K-12 teachers. Computers & Education, 157, Article 103971.
Chen, H., & Yuan, Y. (2022). The impact of ignorance and bias on information security protection motivation: A case of e-waste handling. Internet Research, 33(6), 2244–2275.
Coklar, A. N., & Tatli, A. (2020). Evaluation of digital citizenship levels of teachers in the context of information literacy and internet and computer use self-efficacy. Asian Journal of Contemporary Education, 4(2), 80–90.
Deye, S. U. N. N. Y. (2015). Promoting digital literacy among students and educators. In National Conference of State Legislatures. https://www.ncsl.org/Portals/1/Documents/educ/digLiteracy_final.pdf
Dickson, D. (2005). The case for a ‘deficit model’ of science communication. SciDev.net, 27, 1–6.
Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal, 19(4), 391–412.
Esmaeili, M. (2014). Assessment of users' information security behavior in smartphone networks (Master’s thesis). Eastern Michigan University.
Fischer-Preßler, D., Bonaretti, D., & Fischbach, K. (2022). A protection-motivation perspective to explain intention to use and continue to use mobile warning systems. Business & Information Systems Engineering, 64(2), 167–182.
Göldağ, B. (2021). Investigation of the relationship between digital literacy levels and digital data security awareness levels of university students. E-International Journal of Educational Research, 12(3), 82–100.
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2018). Multivariate data analysis (8th ed.). Cengage.
Hanus, B., & Wu, Y. A. (2016). Impact of users’ security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management, 33(1), 2–16.
Hatlevik, O. E., Throndsen, I., Loi, M., & Gudmundsdottir, G. B. (2018). Students’ ICT self-efficacy and computer and information literacy: Determinants and relationships. Computers & Education, 118, 107–119.
Hayes, A. F. (2009). Beyond Baron and Kenny: Statistical mediation analysis in the new millennium. Communication Monographs, 76(4), 408–420.
Heidt, M., Olt, C. M., & Buxmann, P. (2019). To (psychologically) own data is to protect data: How psychological ownership determines protective behavior in a work and private context.
Hu, Q., Lu, Y., Pan, Z., Gong, Y., & Yang, Z. (2021). Can AI artifacts influence human cognition? The effects of artificial autonomy in intelligent personal assistants. International Journal of Information Management, 56, Article 102250.
Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69–79.
Jansen, J., & van Schaik, P. (2019). The design and evaluation of a theory-based intervention to promote security behaviour against phishing. International Journal of Human-Computer Studies, 123, 40–55.
Julien, H. (2018). Digital literacy in theory and practice. In M. Khosrow-Pour (Ed.), Encyclopedia of information science and technology (4th ed., pp. 2243–2252). IGI Global.
Lai, F., Li, D., & Hsieh, C. T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353–363.
Lee, D., Larose, R., & Rifon, N. (2008). Keeping our network safe: A model of online protection behaviour. Behaviour & Information Technology, 27(5), 445–454.
Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71–90.
Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1.
Ng, B. Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815–825.
Ng, W. (2012). Can we teach digital natives digital literacy? Computers & Education, 59(3), 1065–1078.
Norman, P., Boer, H., Seydel, E. R., & Mullan, B. (2015). Protection motivation theory. In Predicting and changing health behaviour: Research and practice with social cognition models (3rd ed., pp. 70–106). Open University Press.
Ortiz, J., Chih, W. H., & Tsai, F. S. (2018). Information privacy, consumer alienation, and lurking behavior in social networking sites. Computers in Human Behavior, 80, 143–157.
Park, Y. J. (2013). Digital literacy and privacy behavior online. Communication Research, 40(2), 215–236.
Pattinson, M., Butavicius, M., Parsons, K., McCormac, A., & Calic, D. (2015). Factors that influence information security behavior: An Australian web-based study. In Human aspects of information security, privacy, and trust: Third international conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings (Vol. 3, pp. 231–241). Springer International Publishing.
Pawlicka, A., Tomaszewska, R., Krause, E., Jaroszewska-Choraś, D., Pawlicki, M., & Choraś, M. (2022). Has the pandemic made us more digitally literate? Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic. Journal of Ambient Intelligence and Humanized Computing, 1–11.
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In Social psychology: A source book (pp. 153–176).
Rouhani, S., Zamenian, S., & Rotbie, S. (2018). A prototyping and evaluation of hospital dashboard through the end-user computing satisfaction model (EUCS). Journal of Information Technology Management, 10(3), 43–60.
Shepherd, S., & Kay, A. C. (2012). On the perpetuation of ignorance: System dependence, system justification, and the motivated avoidance of sociopolitical information. Journal of Personality and Social Psychology, 102(2), 264–280.
Siponen, M., Pahnila, S., & Mahmood, A. (2007). Employees’ adherence to information security policies: An empirical study. In New approaches for security, privacy and trust in complex environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa (Vol. 22, pp. 133–144). Springer US.
Sirlin, N., Epstein, Z., Arechar, A. A., & Rand, D. G. (2021). Digital literacy is associated with more discerning accuracy judgments but not sharing intentions. Proceedings of the National Academy of Sciences.
Smith, J., Hewitt, B., & Skrbiš, Z. (2015). Digital socialization: Young people’s changing value orientations towards internet use between adolescence and early adulthood. Information, Communication & Society, 18(9), 1022–1038.
Taba, M., Allen, T. B., Caldwell, P. H., Skinner, S. R., Kang, M., McCaffery, K., & Scott, K. M. (2022). Adolescents’ self-efficacy and digital health literacy: A cross-sectional mixed methods study. BMC Public Health, 22(1), 1223.
Thompson, N., McGill, T. J., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376–391.
Tinmaz, H., Lee, Y. T., Fanea-Ivanovici, M., & Baber, H. (2022). A systematic review on digital literacy. Smart Learning Environments, 9(1), Article 1.
Tsai, H. S., Jiang, M., Alhabash, S., et al. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138–150.
Vedadi, A., & Warkentin, M. (2020). Can secure behaviors be contagious? A two-stage investigation of the influence of herd behavior on security decisions. Journal of the Association for Information Systems, 21(2), 428–459.
Verkijika, S. F. (2018). Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret. Computers & Security, 77, 860–870.
Wan, Z., Wang, Y., & Haggerty, N. (2008). Why people benefit from e-learning differently: The effects of psychological processes on e-learning outcomes. Information & Management, 45(8), 513–521.
Wissinger, C. L. (2017). Privacy literacy: From theory to practice. Communications in Information Literacy, 11(2), 378–389.
Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799–2816.
Wynn, D., Williams, C., Karahanna, E., & Madupalli, R. (2013). Preventive adoption of information security behaviors. Information Systems Journal.
Xu, H., Gupta, S., Rosson, M. B., & Carroll, J. M. (2012). Measuring mobile users' concerns for information privacy. In Proceedings of the International Conference on Information Systems (ICIS), 2012, Orlando, USA.
Yoon, C., & Kim, H. (2013). Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms. Information Technology & People, 26(4), 401–419.
Yoon, C., Hwang, J. W., & Kim, R. (2012). Exploring factors that influence students’ behaviors in information security. Journal of Information Systems Education, 23(4), 407–416.