{"id":"https://openalex.org/W4210494853","doi":"https://doi.org/10.1093/cybsec/tyab026","title":"The impact of a cause\u2013effect elaboration procedure on information security risk perceptions: a construal fit perspective","display_name":"The impact of a cause\u2013effect elaboration procedure on information security risk perceptions: a construal fit perspective","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4210494853","doi":"https://doi.org/10.1093/cybsec/tyab026"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyab026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyab026","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyab026/42320944/tyab026.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyab026/42320944/tyab026.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050265955","display_name":"Zhang Hao Goh","orcid":"https://orcid.org/0000-0001-8944-027X"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Zhang Hao Goh","raw_affiliation_strings":["Wee Kim Wee School of Communication and Information, Nanyang Technological University , 31 Nanyang Link, 637718 , Singapore"],"raw_orcid":"https://orcid.org/0000-0001-8944-027X","affiliations":[{"raw_affiliation_string":"Wee Kim Wee School of Communication and Information, Nanyang Technological University , 31 Nanyang Link, 637718 , Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Minzheng Hou","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Minzheng Hou","raw_affiliation_strings":["Department of Psychology, Faculty of Arts and Social Sciences, National University of Singapore , 9 Arts Link, Block AS4, Level 2, 117570 , Singapore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Psychology, Faculty of Arts and Social Sciences, National University of Singapore , 9 Arts Link, Block AS4, Level 2, 117570 , Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033407258","display_name":"Hichang Cho","orcid":"https://orcid.org/0000-0003-1715-4797"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hichang Cho","raw_affiliation_strings":["Department of Communications and New Media, Faculty of Arts & Social Sciences, National University of Singapore , Blk AS6, #03-41, 11 Computing Drive, 117416 , Singapore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Communications and New Media, Faculty of Arts & Social Sciences, National University of Singapore , Blk AS6, #03-41, 11 Computing Drive, 117416 , Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050265955"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":1.0621,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75391499,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11542","display_name":"Behavioral Health and Interventions","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11542","display_name":"Behavioral Health and Interventions","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/construal-level-theory","display_name":"Construal level theory","score":0.887693464756012},{"id":"https://openalex.org/keywords/risk-perception","display_name":"Risk perception","score":0.7741070985794067},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6531133055686951},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.6299780607223511},{"id":"https://openalex.org/keywords/elaboration-likelihood-model","display_name":"Elaboration likelihood model","score":0.6259283423423767},{"id":"https://openalex.org/keywords/elaboration","display_name":"Elaboration","score":0.619920551776886},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.5497282147407532},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5238100290298462},{"id":"https://openalex.org/keywords/concreteness","display_name":"Concreteness","score":0.5035712122917175},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.4986543655395508},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.4494490325450897},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4188942313194275},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33750033378601074},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3049398362636566},{"id":"https://openalex.org/keywords/cognitive-psychology","display_name":"Cognitive psychology","score":0.25248682498931885},{"id":"https://openalex.org/keywords/persuasion","display_name":"Persuasion","score":0.07650169730186462},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07458913326263428}],"concepts":[{"id":"https://openalex.org/C26326936","wikidata":"https://www.wikidata.org/wiki/Q1128306","display_name":"Construal level theory","level":2,"score":0.887693464756012},{"id":"https://openalex.org/C163355716","wikidata":"https://www.wikidata.org/wiki/Q2154783","display_name":"Risk perception","level":3,"score":0.7741070985794067},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6531133055686951},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.6299780607223511},{"id":"https://openalex.org/C2780402292","wikidata":"https://www.wikidata.org/wiki/Q282853","display_name":"Elaboration likelihood model","level":3,"score":0.6259283423423767},{"id":"https://openalex.org/C2779192218","wikidata":"https://www.wikidata.org/wiki/Q16944486","display_name":"Elaboration","level":2,"score":0.619920551776886},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5497282147407532},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5238100290298462},{"id":"https://openalex.org/C2778436841","wikidata":"https://www.wikidata.org/wiki/Q5159081","display_name":"Concreteness","level":2,"score":0.5035712122917175},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.4986543655395508},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.4494490325450897},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4188942313194275},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33750033378601074},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3049398362636566},{"id":"https://openalex.org/C180747234","wikidata":"https://www.wikidata.org/wiki/Q23373","display_name":"Cognitive psychology","level":1,"score":0.25248682498931885},{"id":"https://openalex.org/C2781310500","wikidata":"https://www.wikidata.org/wiki/Q1231428","display_name":"Persuasion","level":2,"score":0.07650169730186462},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07458913326263428},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/cybsec/tyab026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyab026","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyab026/42320944/tyab026.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/165419","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/165419","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyab026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyab026","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyab026/42320944/tyab026.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4210494853.pdf","grobid_xml":"https://content.openalex.org/works/W4210494853.grobid-xml"},"referenced_works_count":87,"referenced_works":["https://openalex.org/W21989538","https://openalex.org/W82616934","https://openalex.org/W102110531","https://openalex.org/W129912261","https://openalex.org/W195810334","https://openalex.org/W1849190772","https://openalex.org/W1854967201","https://openalex.org/W1858694176","https://openalex.org/W1860721958","https://openalex.org/W1863383349","https://openalex.org/W1966741850","https://openalex.org/W1992342542","https://openalex.org/W2004551868","https://openalex.org/W2008662685","https://openalex.org/W2013456722","https://openalex.org/W2025043113","https://openalex.org/W2032829364","https://openalex.org/W2044407078","https://openalex.org/W2049367096","https://openalex.org/W2051355184","https://openalex.org/W2072500831","https://openalex.org/W2081430061","https://openalex.org/W2088252829","https://openalex.org/W2089457241","https://openalex.org/W2093348285","https://openalex.org/W2094266241","https://openalex.org/W2094779106","https://openalex.org/W2099697766","https://openalex.org/W2102578078","https://openalex.org/W2102770351","https://openalex.org/W2106508561","https://openalex.org/W2112702781","https://openalex.org/W2112726096","https://openalex.org/W2114846242","https://openalex.org/W2129528797","https://openalex.org/W2139072733","https://openalex.org/W2148235194","https://openalex.org/W2148928627","https://openalex.org/W2164558494","https://openalex.org/W2168620475","https://openalex.org/W2173375361","https://openalex.org/W2294540033","https://openalex.org/W2325108046","https://openalex.org/W2325578273","https://openalex.org/W2330965887","https://openalex.org/W2498532455","https://openalex.org/W2502255615","https://openalex.org/W2503241677","https://openalex.org/W2505189678","https://openalex.org/W2551851611","https://openalex.org/W2761473796","https://openalex.org/W2767657516","https://openalex.org/W2770385326","https://openalex.org/W2784766349","https://openalex.org/W2901110991","https://openalex.org/W2904468173","https://openalex.org/W2954272346","https://openalex.org/W2958931065","https://openalex.org/W2964515046","https://openalex.org/W2971595569","https://openalex.org/W2974296516","https://openalex.org/W3012074587","https://openalex.org/W3093878055","https://openalex.org/W3098277899","https://openalex.org/W3108852498","https://openalex.org/W3123960828","https://openalex.org/W3124854448","https://openalex.org/W3130025725","https://openalex.org/W3152677853","https://openalex.org/W3161180066","https://openalex.org/W3210307241","https://openalex.org/W4230957748","https://openalex.org/W4236397295","https://openalex.org/W4243231938","https://openalex.org/W4300870773","https://openalex.org/W6603303379","https://openalex.org/W6629150209","https://openalex.org/W6639270240","https://openalex.org/W6651411056","https://openalex.org/W6667458701","https://openalex.org/W6685293866","https://openalex.org/W6696743402","https://openalex.org/W6719857210","https://openalex.org/W6764750872","https://openalex.org/W6781966656","https://openalex.org/W6786457550","https://openalex.org/W6804207349"],"related_works":["https://openalex.org/W2755050513","https://openalex.org/W2306436325","https://openalex.org/W3092464292","https://openalex.org/W2003351475","https://openalex.org/W2025682800","https://openalex.org/W4256067576","https://openalex.org/W2890453194","https://openalex.org/W2147512008","https://openalex.org/W4254196423","https://openalex.org/W4210494853"],"abstract_inverted_index":{"Abstract":[0],"Cybersecurity":[1],"breaches":[2],"are":[3],"on":[4,38,164],"the":[5,10,39,57,86,153],"rise.":[6],"Extant":[7],"literature":[8],"in":[9,104],"development":[11],"of":[12,26,41,62,66,88,155,159],"strategies":[13],"to":[14,44,118,132,139],"enhance":[15],"IT":[16,120,156],"users\u2019":[17,23,47,100,157],"online":[18,46,52,123],"protective":[19,107],"behaviours":[20],"has":[21],"neglected":[22],"cognitive":[24],"processing":[25],"cybersecurity":[27,48,67,97,134,160],"risk":[28,49,101,135,144],"information.":[29],"This":[30],"study":[31],"demonstrates":[32],"a":[33,82,114],"cause\u2013effect":[34],"elaboration":[35,61,87],"procedure":[36],"based":[37],"concept":[40],"construal":[42,58,83,111,158],"fit":[43,59,84,112],"influence":[45],"perceptions.":[50],"Using":[51],"experiments":[53],"(N":[54],"=":[55],"534),":[56],"between":[60,85],"causes":[63],"vs":[64,74],"effects":[65],"risks":[68,98],"and":[69,92,137,162],"perceived":[70],"temporal":[71],"distance":[72],"(distant":[73],"near)":[75],"was":[76],"manipulated.":[77],"The":[78],"results":[79],"revealed":[80],"that":[81,141],"\u2018effects\u2019":[89],"(vs":[90,95,168],"\u2018causes\u2019)":[91],"temporally":[93],"\u2018near\u2019":[94],"\u2018distant\u2019)":[96],"enhanced":[99],"perceptions,":[102],"which":[103],"turn":[105],"predicted":[106],"behavioural":[108],"intentions.":[109],"Ensuring":[110],"is":[113],"novel,":[115],"cognition-based":[116],"approach":[117],"safeguard":[119],"users":[121],"against":[122],"threats.":[124],"Our":[125],"findings":[126],"enrich":[127],"existing":[128],"staged":[129],"theories":[130],"used":[131],"investigate":[133],"perceptions":[136],"suggest":[138],"practitioners":[140],"heightened":[142],"cyber":[143],"perception":[145],"can":[146],"effectively":[147],"be":[148],"induced":[149],"by":[150],"simultaneously":[151],"enhancing":[152],"concreteness":[154],"incidents":[161],"emphasizing":[163],"its":[165],"negative":[166],"consequences":[167],"causes).":[169]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
