{"id":"https://openalex.org/W4401628112","doi":"https://doi.org/10.1093/cybsec/tyae012","title":"The health belief model and phishing: determinants of preventative security behaviors","display_name":"The health belief model and phishing: determinants of preventative security behaviors","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4401628112","doi":"https://doi.org/10.1093/cybsec/tyae012"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyae012","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae012","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyae012","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040615704","display_name":"Jie Du","orcid":"https://orcid.org/0000-0003-3383-2754"},"institutions":[{"id":"https://openalex.org/I8606887","display_name":"Grand Valley State University","ror":"https://ror.org/001m1hv61","country_code":"US","type":"education","lineage":["https://openalex.org/I8606887"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jie Du","raw_affiliation_strings":["School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401,","School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401, United States"],"affiliations":[{"raw_affiliation_string":"School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401,","institution_ids":["https://openalex.org/I8606887"]},{"raw_affiliation_string":"School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401, United States","institution_ids":["https://openalex.org/I8606887"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041804593","display_name":"Andrew J. Kalafut","orcid":null},"institutions":[{"id":"https://openalex.org/I8606887","display_name":"Grand Valley State University","ror":"https://ror.org/001m1hv61","country_code":"US","type":"education","lineage":["https://openalex.org/I8606887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew Kalafut","raw_affiliation_strings":["School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401,","School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401, United States"],"affiliations":[{"raw_affiliation_string":"School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401,","institution_ids":["https://openalex.org/I8606887"]},{"raw_affiliation_string":"School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401, United States","institution_ids":["https://openalex.org/I8606887"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007267580","display_name":"Gregory Schymik","orcid":"https://orcid.org/0000-0003-3163-421X"},"institutions":[{"id":"https://openalex.org/I8606887","display_name":"Grand Valley State University","ror":"https://ror.org/001m1hv61","country_code":"US","type":"education","lineage":["https://openalex.org/I8606887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gregory Schymik","raw_affiliation_strings":["School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401,","School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401, United States"],"affiliations":[{"raw_affiliation_string":"School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401,","institution_ids":["https://openalex.org/I8606887"]},{"raw_affiliation_string":"School of Computing, College of Computing, Grand Valley State University , 1 Campus Drive , Allendale, MI 49401, United States","institution_ids":["https://openalex.org/I8606887"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040615704"],"corresponding_institution_ids":["https://openalex.org/I8606887"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":4.5303,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.94470861,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"10","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7242570519447327},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5940752625465393},{"id":"https://openalex.org/keywords/health-belief-model","display_name":"Health belief model","score":0.593684732913971},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.5789392590522766},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.5694863200187683},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5557672381401062},{"id":"https://openalex.org/keywords/self-efficacy","display_name":"Self-efficacy","score":0.5209616422653198},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.44398272037506104},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4392368495464325},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.4355137050151825},{"id":"https://openalex.org/keywords/public-health","display_name":"Public health","score":0.35824650526046753},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.32270774245262146},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.2682850956916809},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2671148180961609},{"id":"https://openalex.org/keywords/health-education","display_name":"Health education","score":0.26243388652801514},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20977064967155457},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.16812649369239807},{"id":"https://openalex.org/keywords/nursing","display_name":"Nursing","score":0.1481323540210724},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1254066824913025}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7242570519447327},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5940752625465393},{"id":"https://openalex.org/C1602351","wikidata":"https://www.wikidata.org/wiki/Q381370","display_name":"Health belief model","level":4,"score":0.593684732913971},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5789392590522766},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.5694863200187683},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5557672381401062},{"id":"https://openalex.org/C110131835","wikidata":"https://www.wikidata.org/wiki/Q1153659","display_name":"Self-efficacy","level":2,"score":0.5209616422653198},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.44398272037506104},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4392368495464325},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.4355137050151825},{"id":"https://openalex.org/C138816342","wikidata":"https://www.wikidata.org/wiki/Q189603","display_name":"Public health","level":2,"score":0.35824650526046753},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.32270774245262146},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.2682850956916809},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2671148180961609},{"id":"https://openalex.org/C113807197","wikidata":"https://www.wikidata.org/wiki/Q60894","display_name":"Health education","level":3,"score":0.26243388652801514},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20977064967155457},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.16812649369239807},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.1481323540210724},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1254066824913025},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyae012","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae012","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyae012","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae012","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1489771250","https://openalex.org/W1794403333","https://openalex.org/W1964088509","https://openalex.org/W1977353849","https://openalex.org/W1982763056","https://openalex.org/W1984565682","https://openalex.org/W2023101623","https://openalex.org/W2050160040","https://openalex.org/W2076698718","https://openalex.org/W2081430061","https://openalex.org/W2091261347","https://openalex.org/W2100379340","https://openalex.org/W2130271219","https://openalex.org/W2156785301","https://openalex.org/W2158216255","https://openalex.org/W2161460651","https://openalex.org/W2167848862","https://openalex.org/W2183880159","https://openalex.org/W2188853087","https://openalex.org/W2585251339","https://openalex.org/W2736213052","https://openalex.org/W2745971308","https://openalex.org/W2770273620","https://openalex.org/W2893544796","https://openalex.org/W2896585390","https://openalex.org/W2899001757","https://openalex.org/W2951427780","https://openalex.org/W3037487555","https://openalex.org/W3130382807","https://openalex.org/W3156860082","https://openalex.org/W3174930054","https://openalex.org/W3180193406","https://openalex.org/W3206261414","https://openalex.org/W4229603404","https://openalex.org/W4252813635","https://openalex.org/W4294307841","https://openalex.org/W6644439013","https://openalex.org/W6683044340","https://openalex.org/W6683539973","https://openalex.org/W6686202878","https://openalex.org/W6687227294","https://openalex.org/W6738915442","https://openalex.org/W6756059518","https://openalex.org/W6766935085","https://openalex.org/W6780017066","https://openalex.org/W6781902278","https://openalex.org/W6790977417","https://openalex.org/W6800699741","https://openalex.org/W7077353036"],"related_works":["https://openalex.org/W3197652951","https://openalex.org/W185442532","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W2966027630","https://openalex.org/W3199374449","https://openalex.org/W2107554062","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2968709340"],"abstract_inverted_index":{"Abstract":[0],"Email":[1],"is":[2,12,117],"frequently":[3],"the":[4,29,49,112,149,152],"attack":[5],"vector":[6],"of":[7,33,99,106,111,124,151],"choice":[8],"for":[9,16],"hackers":[10],"and":[11,36,57,80,89,114,139],"a":[13],"large":[14],"concern":[15],"campus":[17],"IT":[18],"organizations.":[19],"This":[20],"paper":[21],"attempts":[22],"to":[23,67,71,84,95,141,160],"gain":[24],"insight":[25],"into":[26],"what":[27],"drives":[28],"email":[30,62,101],"security":[31,63,74,102,146],"behaviors":[32],"students,":[34,137],"faculty,":[35,138],"staff":[37,140],"at":[38],"one":[39],"midwestern":[40],"public,":[41],"master\u2019s":[42],"granting":[43],"university.":[44],"The":[45,122],"survey":[46],"relies":[47],"on":[48,109,131],"health":[50],"belief":[51],"model":[52],"as":[53],"its":[54],"theoretical":[55],"basis":[56],"measures":[58],"eight":[59],"constructs":[60],"including":[61],"behavior,":[64],"perceived":[65,76,78,81],"barriers":[66],"practice,":[68,85],"self-efficacy,":[69,86],"cues":[70],"action,":[72],"prior":[73,90],"experience,":[75],"vulnerability,":[77,87],"benefits,":[79,88],"severity.":[82],"Barriers":[83],"experience":[91],"variables":[92],"were":[93],"found":[94],"be":[96,158],"significant":[97],"determinants":[98],"self-reported":[100],"behaviors.":[103],"Additional":[104],"discussion":[105],"results":[107],"based":[108],"subgroups":[110],"respondents":[113],"interaction":[115],"models":[116],"included":[118],"in":[119],"this":[120,125,143],"paper.":[121],"findings":[123,156],"study":[126],"may":[127,157],"help":[128],"shed":[129],"light":[130],"how":[132],"universities":[133],"can":[134],"better":[135],"prepare":[136],"handle":[142],"critical":[144],"information":[145],"concern.":[147],"Given":[148],"makeup":[150],"subject":[153],"population,":[154],"some":[155],"applicable":[159],"businesses":[161],"beyond":[162],"academic":[163],"institutions.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
