{"id":"https://openalex.org/W4416018504","doi":"https://doi.org/10.1093/cybsec/tyaf034","title":"University students' security behavior against email phishing attacks: insights from the health belief model","display_name":"University students' security behavior against email phishing attacks: insights from the health belief model","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416018504","doi":"https://doi.org/10.1093/cybsec/tyaf034"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf034","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf034","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyaf034","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094217129","display_name":"Anderson Kevin Gwenhure","orcid":"https://orcid.org/0009-0005-7427-9635"},"institutions":[{"id":"https://openalex.org/I4210114028","display_name":"Atma Jaya University Yogyakarta","ror":"https://ror.org/01gmyr425","country_code":"ID","type":"education","lineage":["https://openalex.org/I4210114028"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Anderson Kevin Gwenhure","raw_affiliation_strings":["Universitas Atma Jaya Yogyakarta Department of Informatics Engineering, , Yogyakarta 55281 ,"],"raw_orcid":"https://orcid.org/0009-0005-7427-9635","affiliations":[{"raw_affiliation_string":"Universitas Atma Jaya Yogyakarta Department of Informatics Engineering, , Yogyakarta 55281 ,","institution_ids":["https://openalex.org/I4210114028"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5094217129"],"corresponding_institution_ids":["https://openalex.org/I4210114028"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":2.9051,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.93644448,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.6604999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.6604999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.18870000541210175,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.03970000147819519,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9283000230789185},{"id":"https://openalex.org/keywords/confirmatory-factor-analysis","display_name":"Confirmatory factor analysis","score":0.4668999910354614},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4584999978542328},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.4343999922275543},{"id":"https://openalex.org/keywords/health-belief-model","display_name":"Health belief model","score":0.42800000309944153},{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.4059999883174896},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.37130001187324524},{"id":"https://openalex.org/keywords/fear-appeal","display_name":"Fear appeal","score":0.3400999903678894},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.3294999897480011}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9283000230789185},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6588000059127808},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5764999985694885},{"id":"https://openalex.org/C40722632","wikidata":"https://www.wikidata.org/wiki/Q5160137","display_name":"Confirmatory factor analysis","level":3,"score":0.4668999910354614},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4584999978542328},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.4343999922275543},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.4341000020503998},{"id":"https://openalex.org/C1602351","wikidata":"https://www.wikidata.org/wiki/Q381370","display_name":"Health belief model","level":4,"score":0.42800000309944153},{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.4059999883174896},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.37130001187324524},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.367900013923645},{"id":"https://openalex.org/C67677051","wikidata":"https://www.wikidata.org/wiki/Q5439364","display_name":"Fear appeal","level":2,"score":0.3400999903678894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.334199994802475},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3111000061035156},{"id":"https://openalex.org/C166735990","wikidata":"https://www.wikidata.org/wiki/Q1750812","display_name":"Human factors and ergonomics","level":3,"score":0.29589998722076416},{"id":"https://openalex.org/C163355716","wikidata":"https://www.wikidata.org/wiki/Q2154783","display_name":"Risk perception","level":3,"score":0.29269999265670776},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C123269153","wikidata":"https://www.wikidata.org/wiki/Q1897038","display_name":"Theory of reasoned action","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C117035363","wikidata":"https://www.wikidata.org/wiki/Q3769299","display_name":"Human behavior","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2815999984741211},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.2782000005245209},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.2531999945640564},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.2515000104904175},{"id":"https://openalex.org/C526869908","wikidata":"https://www.wikidata.org/wiki/Q3298118","display_name":"Suicide prevention","level":3,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyaf034","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf034","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf034","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf034","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":93,"referenced_works":["https://openalex.org/W94113514","https://openalex.org/W144368622","https://openalex.org/W1531381717","https://openalex.org/W1660197351","https://openalex.org/W1847607158","https://openalex.org/W1927233378","https://openalex.org/W1964088509","https://openalex.org/W1964884664","https://openalex.org/W1970168623","https://openalex.org/W1980352827","https://openalex.org/W1988826963","https://openalex.org/W1997753214","https://openalex.org/W2031058241","https://openalex.org/W2049300055","https://openalex.org/W2058144115","https://openalex.org/W2063958832","https://openalex.org/W2066604358","https://openalex.org/W2071666535","https://openalex.org/W2075902832","https://openalex.org/W2079802557","https://openalex.org/W2082494913","https://openalex.org/W2083408108","https://openalex.org/W2095362277","https://openalex.org/W2099007243","https://openalex.org/W2102635611","https://openalex.org/W2104709233","https://openalex.org/W2106096361","https://openalex.org/W2107894836","https://openalex.org/W2122463941","https://openalex.org/W2123521920","https://openalex.org/W2132253094","https://openalex.org/W2142150409","https://openalex.org/W2145046219","https://openalex.org/W2155893348","https://openalex.org/W2157058256","https://openalex.org/W2164558494","https://openalex.org/W2481769138","https://openalex.org/W2497179706","https://openalex.org/W2518952773","https://openalex.org/W2597473562","https://openalex.org/W2623703952","https://openalex.org/W2759186900","https://openalex.org/W2768990831","https://openalex.org/W2771825534","https://openalex.org/W2893544796","https://openalex.org/W2901563683","https://openalex.org/W2904907452","https://openalex.org/W2909055311","https://openalex.org/W2945437145","https://openalex.org/W2959709018","https://openalex.org/W2966985053","https://openalex.org/W2969360171","https://openalex.org/W2975407965","https://openalex.org/W3003283133","https://openalex.org/W3007657319","https://openalex.org/W3022739979","https://openalex.org/W3030593508","https://openalex.org/W3084205444","https://openalex.org/W3085861814","https://openalex.org/W3110557506","https://openalex.org/W3111733481","https://openalex.org/W3124883010","https://openalex.org/W3126431024","https://openalex.org/W3133843004","https://openalex.org/W3133990685","https://openalex.org/W3166620705","https://openalex.org/W3192855505","https://openalex.org/W3204452949","https://openalex.org/W3205433150","https://openalex.org/W4205632826","https://openalex.org/W4252460146","https://openalex.org/W4280508109","https://openalex.org/W4282920965","https://openalex.org/W4292248591","https://openalex.org/W4311134468","https://openalex.org/W4311201806","https://openalex.org/W4311537499","https://openalex.org/W4319431101","https://openalex.org/W4320039079","https://openalex.org/W4320916962","https://openalex.org/W4321242706","https://openalex.org/W4366550444","https://openalex.org/W4379877105","https://openalex.org/W4382322657","https://openalex.org/W4387640073","https://openalex.org/W4388535678","https://openalex.org/W4390263708","https://openalex.org/W4391365412","https://openalex.org/W4391577458","https://openalex.org/W4392964524","https://openalex.org/W4393065045","https://openalex.org/W4396851448","https://openalex.org/W4401628112"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Despite":[1,243],"advancements":[2],"in":[3,63,75,81,99,176,187],"technical":[4],"defenses,":[5],"phishing":[6,103,158,194],"attacks":[7,159,195],"persist":[8],"due":[9,212],"to":[10,29,57,91,101,146,169,171,179,185,193,199,213,270,280,286,311,325],"end-user":[11],"vulnerabilities":[12,254],"and":[13,41,59,125,144,173,196,224,259,278,289,300,316],"behaviors,":[14],"including":[15],"shadow":[16],"security":[17,45,97,153,166,188,201,209,226,263,287,307],"behaviors":[18,98],"like":[19],"bypassing":[20],"established":[21],"protocols.":[22],"Traditional":[23],"cybersecurity":[24,55,64,83,253,329],"awareness":[25,308],"programs":[26,309],"often":[27],"fail":[28],"change":[30],"behavior":[31,62],"effectively":[32],"because":[33],"they":[34],"adopt":[35],"generic":[36],"approaches,":[37],"overlooking":[38],"the":[39,50,68,163,214,220,296,303,313,319,326],"psychological":[40,258,276],"behavioral":[42,54,260],"factors":[43,93,261],"influencing":[44,94,262],"practices.":[46],"To":[47],"address":[48],"this,":[49],"emerging":[51],"field":[52],"of":[53,152,165,217,233,305,318,328],"aims":[56],"understand":[58,282],"influence":[60],"human":[61],"contexts.":[65],"In":[66,265],"particular,":[67],"Health":[69],"Belief":[70],"Model":[71],"(HBM),":[72],"traditionally":[73],"applied":[74,87],"health":[76],"contexts,":[77],"has":[78],"shown":[79],"promise":[80],"predicting":[82],"behaviors.":[84,189,242],"This":[85],"study":[86,247],"an":[88],"adapted":[89],"HBM":[90],"examine":[92],"university":[95,111],"students'":[96],"response":[100],"email":[102],"attacks.":[104],"Self-reported":[105],"data":[106,133],"were":[107,130,148,182],"collected":[108],"from":[109],"569":[110],"students":[112],"at":[113],"Universitas":[114],"Atma":[115],"Jaya":[116],"Yogyakarta,":[117],"Indonesia,":[118],"using":[119],"convenience":[120],"sampling.":[121],"Confirmatory":[122],"factor":[123],"analysis":[124],"covariance-based":[126],"structural":[127],"equation":[128],"modeling":[129],"employed":[131],"for":[132,272],"analysis.":[134],"The":[135],"results":[136],"revealed":[137],"that":[138,274],"perceived":[139,141,157,191,197,234],"severity,":[140],"importance,":[142],"self-efficacy,":[143],"cues":[145,170],"action":[147],"statistically":[149],"significant":[150,206],"predictors":[151],"behavior.":[154,210,264],"Students":[155],"who":[156],"as":[160,231],"severe,":[161],"recognized":[162],"importance":[164],"measures,":[167],"responded":[168],"action,":[172],"felt":[174],"confident":[175],"their":[177],"ability":[178],"protect":[180],"themselves":[181],"more":[183,291],"likely":[184],"engage":[186],"However,":[190,211],"susceptibility":[192],"barriers":[198],"adopting":[200],"measures":[202],"did":[203],"not":[204],"show":[205],"relationships":[207],"with":[208],"inherent":[215],"limitations":[216],"self-reported":[218],"data,":[219],"terms":[221],"\u201csecurity":[222],"behavior\u201d":[223,227],"\u201cstudent":[225],"should":[228],"be":[229],"understood":[230],"reflective":[232],"or":[235],"intended":[236],"actions,":[237],"rather":[238],"than":[239],"actual":[240],"observed":[241],"these":[244],"limitations,":[245],"this":[246],"provides":[248],"valuable":[249],"insights":[250],"into":[251],"human-related":[252],"by":[255],"identifying":[256],"key":[257],"doing":[266],"so,":[267],"it":[268],"responds":[269],"calls":[271],"studies":[273],"apply":[275],"frameworks":[277],"models":[279],"better":[281],"how":[283],"individuals":[284],"respond":[285],"threats":[288],"develop":[290],"effective":[292],"protection":[293],"strategies.":[294],"Thus,":[295],"findings":[297],"remain":[298],"relevant":[299],"will":[301],"support":[302],"creation":[304],"tailored":[306],"designed":[310],"meet":[312],"specific":[314],"needs":[315],"characteristics":[317],"studied":[320],"demographics,":[321],"ultimately":[322],"contributing":[323],"meaningfully":[324],"enhancement":[327],"resilience.":[330]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-11-06T00:00:00"}
