{"id":"https://openalex.org/W3094617583","doi":"https://doi.org/10.1007/s10676-020-09560-0","title":"Scoping the ethical principles of cybersecurity fear appeals","display_name":"Scoping the ethical principles of cybersecurity fear appeals","publication_year":2020,"publication_date":"2020-10-20","ids":{"openalex":"https://openalex.org/W3094617583","doi":"https://doi.org/10.1007/s10676-020-09560-0","mag":"3094617583"},"language":"en","primary_location":{"id":"doi:10.1007/s10676-020-09560-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10676-020-09560-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10676-020-09560-0.pdf","source":{"id":"https://openalex.org/S13096939","display_name":"Ethics and Information Technology","issn_l":"1388-1957","issn":["1388-1957","1572-8439"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ethics and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10676-020-09560-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102725128","display_name":"Marc Dupuis","orcid":"https://orcid.org/0000-0002-5303-2511"},"institutions":[{"id":"https://openalex.org/I4210138624","display_name":"University of Washington Bothell","ror":"https://ror.org/02ygzhr13","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701","https://openalex.org/I4210138624"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Marc Dupuis","raw_affiliation_strings":["Computing and Software Systems, University of Washington, Box 358534, Bothell, WA, 98011, USA"],"raw_orcid":"https://orcid.org/0000-0002-5303-2511","affiliations":[{"raw_affiliation_string":"Computing and Software Systems, University of Washington, Box 358534, Bothell, WA, 98011, USA","institution_ids":["https://openalex.org/I4210138624"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035796880","display_name":"Karen Renaud","orcid":"https://orcid.org/0000-0002-7187-6531"},"institutions":[{"id":"https://openalex.org/I877506347","display_name":"Abertay University","ror":"https://ror.org/04mwwnx67","country_code":"GB","type":"education","lineage":["https://openalex.org/I877506347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Karen Renaud","raw_affiliation_strings":["School of Design and Informatics, Abertay University, Bell Street, Dundee, Scotland, DD1 1HG, UK"],"raw_orcid":"https://orcid.org/0000-0002-7187-6531","affiliations":[{"raw_affiliation_string":"School of Design and Informatics, Abertay University, Bell Street, Dundee, Scotland, DD1 1HG, UK","institution_ids":["https://openalex.org/I877506347"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102725128"],"corresponding_institution_ids":["https://openalex.org/I4210138624"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":2.5052,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.91800295,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"23","issue":"3","first_page":"265","last_page":"284"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fear-appeal","display_name":"Fear appeal","score":0.8145965337753296},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7993205785751343},{"id":"https://openalex.org/keywords/appeal","display_name":"Appeal","score":0.782696008682251},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6114873290061951},{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.4553970396518707},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39540570974349976},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.35472553968429565},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.34652405977249146},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3268488347530365},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.30640706419944763},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.17375075817108154},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.17050838470458984}],"concepts":[{"id":"https://openalex.org/C67677051","wikidata":"https://www.wikidata.org/wiki/Q5439364","display_name":"Fear appeal","level":2,"score":0.8145965337753296},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7993205785751343},{"id":"https://openalex.org/C2778449503","wikidata":"https://www.wikidata.org/wiki/Q329777","display_name":"Appeal","level":2,"score":0.782696008682251},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6114873290061951},{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.4553970396518707},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39540570974349976},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.35472553968429565},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.34652405977249146},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3268488347530365},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.30640706419944763},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.17375075817108154},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.17050838470458984},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10676-020-09560-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10676-020-09560-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10676-020-09560-0.pdf","source":{"id":"https://openalex.org/S13096939","display_name":"Ethics and Information Technology","issn_l":"1388-1957","issn":["1388-1957","1572-8439"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ethics and Information Technology","raw_type":"journal-article"},{"id":"pmh:oai:rke.abertay.ac.uk:openaire_cris_publications/b4d627bc-a507-453e-97a1-591113a308e9","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/b4d627bc-a507-453e-97a1-591113a308e9","pdf_url":null,"source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Dupuis , M &amp; Renaud , K 2021 , ' Scoping the ethical principles of cybersecurity fear appeals ' , Ethics and Information Technology , vol. 23 , no. 3 , pp. 265-284 . https://doi.org/10.1007/s10676-020-09560-0","raw_type":"article"},{"id":"pmh:oai:strathprints.strath.ac.uk:75130","is_oa":true,"landing_page_url":"https://strathprints.strath.ac.uk/view/author/1324853.html>","pdf_url":"https://strathprints.strath.ac.uk/75130/1/Dupuis_Renaud_EIT_2020_Scoping_the_ethical_principles_of_cybersecurity_fear_appeals.pdf","source":{"id":"https://openalex.org/S4306402226","display_name":"Strathprints: The University of Strathclyde institutional repository (University of Strathclyde)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I181647926","host_organization_name":"University of Strathclyde","host_organization_lineage":["https://openalex.org/I181647926"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.1007/s10676-020-09560-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10676-020-09560-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10676-020-09560-0.pdf","source":{"id":"https://openalex.org/S13096939","display_name":"Ethics and Information Technology","issn_l":"1388-1957","issn":["1388-1957","1572-8439"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ethics and Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320311725","display_name":"Abertay University","ror":"https://ror.org/04mwwnx67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3094617583.pdf","grobid_xml":"https://content.openalex.org/works/W3094617583.grobid-xml"},"referenced_works_count":118,"referenced_works":["https://openalex.org/W106440455","https://openalex.org/W129912261","https://openalex.org/W324885528","https://openalex.org/W327401144","https://openalex.org/W1488535100","https://openalex.org/W1494581773","https://openalex.org/W1494893239","https://openalex.org/W1500111248","https://openalex.org/W1542137476","https://openalex.org/W1591619664","https://openalex.org/W1721321607","https://openalex.org/W1915390068","https://openalex.org/W1955340616","https://openalex.org/W1964255764","https://openalex.org/W1965608807","https://openalex.org/W1966296640","https://openalex.org/W1967534107","https://openalex.org/W1968866220","https://openalex.org/W1974015259","https://openalex.org/W1981293131","https://openalex.org/W1985747251","https://openalex.org/W1989070614","https://openalex.org/W1989364164","https://openalex.org/W1989621554","https://openalex.org/W1994614584","https://openalex.org/W1995796971","https://openalex.org/W2004222284","https://openalex.org/W2005012434","https://openalex.org/W2007268728","https://openalex.org/W2010902645","https://openalex.org/W2016531202","https://openalex.org/W2017785078","https://openalex.org/W2018145967","https://openalex.org/W2018967263","https://openalex.org/W2025829466","https://openalex.org/W2028125787","https://openalex.org/W2028386368","https://openalex.org/W2029182511","https://openalex.org/W2041832525","https://openalex.org/W2042349803","https://openalex.org/W2052194544","https://openalex.org/W2054287826","https://openalex.org/W2058356342","https://openalex.org/W2059334003","https://openalex.org/W2062861758","https://openalex.org/W2067019646","https://openalex.org/W2067796062","https://openalex.org/W2071929309","https://openalex.org/W2075693168","https://openalex.org/W2081430061","https://openalex.org/W2081436185","https://openalex.org/W2091261347","https://openalex.org/W2098723594","https://openalex.org/W2099647042","https://openalex.org/W2103099631","https://openalex.org/W2106096361","https://openalex.org/W2107828364","https://openalex.org/W2113443071","https://openalex.org/W2113792477","https://openalex.org/W2121730733","https://openalex.org/W2124377026","https://openalex.org/W2129100925","https://openalex.org/W2133469487","https://openalex.org/W2134049139","https://openalex.org/W2151446052","https://openalex.org/W2152023319","https://openalex.org/W2155115453","https://openalex.org/W2158471524","https://openalex.org/W2159759652","https://openalex.org/W2161264813","https://openalex.org/W2165628963","https://openalex.org/W2166272993","https://openalex.org/W2166700718","https://openalex.org/W2171515724","https://openalex.org/W2198614093","https://openalex.org/W2204032447","https://openalex.org/W2238586764","https://openalex.org/W2264727379","https://openalex.org/W2278491562","https://openalex.org/W2284795751","https://openalex.org/W2315925864","https://openalex.org/W2324454559","https://openalex.org/W2331339397","https://openalex.org/W2385286840","https://openalex.org/W2407226211","https://openalex.org/W2476065884","https://openalex.org/W2501705385","https://openalex.org/W2505189678","https://openalex.org/W2517956914","https://openalex.org/W2596170870","https://openalex.org/W2610414453","https://openalex.org/W2740284219","https://openalex.org/W2773208068","https://openalex.org/W2788386415","https://openalex.org/W2794085046","https://openalex.org/W2883296141","https://openalex.org/W2891790212","https://openalex.org/W2898579639","https://openalex.org/W2899001757","https://openalex.org/W2906928358","https://openalex.org/W2910598250","https://openalex.org/W2911471464","https://openalex.org/W2924508986","https://openalex.org/W2998982058","https://openalex.org/W3044291841","https://openalex.org/W3124970347","https://openalex.org/W3138665546","https://openalex.org/W4210418299","https://openalex.org/W4214907476","https://openalex.org/W4232242847","https://openalex.org/W4243848308","https://openalex.org/W4248590333","https://openalex.org/W4292808503","https://openalex.org/W6641003204","https://openalex.org/W6806256995","https://openalex.org/W6829586167","https://openalex.org/W7000943348","https://openalex.org/W7019640536"],"related_works":["https://openalex.org/W3032998312","https://openalex.org/W4384486036","https://openalex.org/W135177976","https://openalex.org/W1503094549","https://openalex.org/W2337920774","https://openalex.org/W4318823662","https://openalex.org/W2886410948","https://openalex.org/W137176824","https://openalex.org/W2201197950","https://openalex.org/W1983206842"],"abstract_inverted_index":{"Abstract":[0],"Fear":[1],"appeals":[2,61,133,183],"are":[3,10,24,203],"used":[4,115],"in":[5],"many":[6,18],"domains.":[7],"Cybersecurity":[8],"researchers":[9,94],"also":[11],"starting":[12],"to":[13,28,33,74,83,118,145,193,205],"experiment":[14],"with":[15],"fear":[16,32,48,60,92,106,132,148,182,208],"appeals,":[17],"reporting":[19],"positive":[20],"outcomes.":[21],"Yet":[22],"there":[23],"ethical":[25,65,79,143,161,191],"concerns":[26,80],"related":[27],"the":[29,44,70,78,125,160,178,187,195],"use":[30],"of":[31,46,110,130,156,171,180,189,197,201],"motivate":[34],"action.":[35],"In":[36],"this":[37,41],"paper,":[38],"we":[39,140],"explore":[40],"aspect":[42],"from":[43,62,177],"perspectives":[45],"cybersecurity":[47,105,131,147,157,181,207],"appeal":[49,93,107,149,209],"deployers":[50,89],"and":[51,95,102,128,184,211],"recipients":[52],".":[53],"We":[54,67,86,114,151],"commenced":[55],"our":[56],"investigation":[57],"by":[58],"considering":[59],"three":[63],"foundational":[64],"perspectives.":[66],"then":[68,103,152],"consulted":[69,88],"two":[71],"stakeholder":[72],"groups":[73],"gain":[75],"insights":[76],"into":[77],"they":[81],"consider":[82],"be":[84],"pertinent.":[85],"first":[87,167],":":[90],"(a)":[91],"(b)":[96],"Chief":[97],"Information":[98],"Security":[99],"Officers":[100],"(CISOs),":[101],"potential":[104,126,172],"recipients:":[108],"members":[109],"a":[111,154,169],"crowdsourcing":[112],"platform.":[113],"their":[116],"responses":[117],"develop":[119],"an":[120],"effects-reasoning":[121],"matrix":[122],",":[123,168,186],"identifying":[124],"benefits":[127],"detriments":[129,173],"for":[134],"all":[135],"stakeholders.":[136],"Using":[137],"these":[138,202],"insights,":[139],"derived":[141],"six":[142,190],"principles":[144,192],"guide":[146],"deployment.":[150,212],"evaluated":[153],"snapshot":[155],"studies":[158],"using":[159],"principle":[162],"lens.":[163],"Our":[164],"contribution":[165],"is,":[166],"list":[170],"that":[174],"could":[175],"result":[176],"deployment":[179,196],"second":[185],"set":[188],"inform":[194,206],"such":[198],"appeals.":[199],"Both":[200],"intended":[204],"design":[210]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
