{"id":"https://openalex.org/W3151450546","doi":"https://doi.org/10.1108/ics-01-2020-0008","title":"Gender differences in predictors of technology threat avoidance","display_name":"Gender differences in predictors of technology threat avoidance","publication_year":2021,"publication_date":"2021-03-27","ids":{"openalex":"https://openalex.org/W3151450546","doi":"https://doi.org/10.1108/ics-01-2020-0008","mag":"3151450546"},"language":"en","primary_location":{"id":"doi:10.1108/ics-01-2020-0008","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-01-2020-0008","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059779964","display_name":"Andrew R. Gillam","orcid":"https://orcid.org/0000-0001-8280-0631"},"institutions":[{"id":"https://openalex.org/I2801521079","display_name":"Concordia University Texas","ror":"https://ror.org/028177t76","country_code":"US","type":"education","lineage":["https://openalex.org/I2801521079"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andrew R. Gillam","raw_affiliation_strings":["Department of Computer Science, Concordia University Texas, Austin, Texas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Concordia University Texas, Austin, Texas, USA","institution_ids":["https://openalex.org/I2801521079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032646224","display_name":"Alina M. Waite","orcid":"https://orcid.org/0000-0002-6304-8170"},"institutions":[{"id":"https://openalex.org/I86420138","display_name":"Indiana State University","ror":"https://ror.org/00f8man71","country_code":"US","type":"education","lineage":["https://openalex.org/I86420138"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alina M. Waite","raw_affiliation_strings":["Human Resource Development and Performance Technologies, Indiana State University, Terre Haute, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Human Resource Development and Performance Technologies, Indiana State University, Terre Haute, Indiana, USA","institution_ids":["https://openalex.org/I86420138"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059779964"],"corresponding_institution_ids":["https://openalex.org/I2801521079"],"apc_list":null,"apc_paid":null,"fwci":3.4042,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.93065679,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"29","issue":"3","first_page":"393","last_page":"412"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9596999883651733,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.7292786240577698},{"id":"https://openalex.org/keywords/uncertainty-avoidance","display_name":"Uncertainty avoidance","score":0.5853967666625977},{"id":"https://openalex.org/keywords/variance","display_name":"Variance (accounting)","score":0.5789029598236084},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.5204720497131348},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.5153774619102478},{"id":"https://openalex.org/keywords/moderation","display_name":"Moderation","score":0.5003504753112793},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.48247912526130676},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.4119030237197876},{"id":"https://openalex.org/keywords/creativity","display_name":"Creativity","score":0.09899365901947021},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09188205003738403}],"concepts":[{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.7292786240577698},{"id":"https://openalex.org/C119469879","wikidata":"https://www.wikidata.org/wiki/Q15514847","display_name":"Uncertainty avoidance","level":4,"score":0.5853967666625977},{"id":"https://openalex.org/C196083921","wikidata":"https://www.wikidata.org/wiki/Q7915758","display_name":"Variance (accounting)","level":2,"score":0.5789029598236084},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.5204720497131348},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.5153774619102478},{"id":"https://openalex.org/C93225998","wikidata":"https://www.wikidata.org/wiki/Q1941972","display_name":"Moderation","level":2,"score":0.5003504753112793},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.48247912526130676},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.4119030237197876},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.09899365901947021},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09188205003738403},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C17022365","wikidata":"https://www.wikidata.org/wiki/Q171995","display_name":"Individualism","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C96420161","wikidata":"https://www.wikidata.org/wiki/Q237789","display_name":"Collectivism","level":3,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-01-2020-0008","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-01-2020-0008","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W85797161","https://openalex.org/W312671515","https://openalex.org/W596895264","https://openalex.org/W855863217","https://openalex.org/W1591059668","https://openalex.org/W1608836379","https://openalex.org/W1863383349","https://openalex.org/W2018900556","https://openalex.org/W2029699977","https://openalex.org/W2037557484","https://openalex.org/W2081430061","https://openalex.org/W2101179869","https://openalex.org/W2102303925","https://openalex.org/W2110770770","https://openalex.org/W2122463941","https://openalex.org/W2134049139","https://openalex.org/W2148540129","https://openalex.org/W2157989366","https://openalex.org/W2163741736","https://openalex.org/W2270133221","https://openalex.org/W2308431633","https://openalex.org/W2316759376","https://openalex.org/W2503241677","https://openalex.org/W2557778508","https://openalex.org/W2560767322","https://openalex.org/W2563010877","https://openalex.org/W2571810488","https://openalex.org/W2593649556","https://openalex.org/W2609288800","https://openalex.org/W2613009956","https://openalex.org/W2770273620","https://openalex.org/W2783760402","https://openalex.org/W2786192200","https://openalex.org/W2788201401","https://openalex.org/W2791817255","https://openalex.org/W2800379891","https://openalex.org/W2800771502","https://openalex.org/W2802849241","https://openalex.org/W2909890789","https://openalex.org/W2924541016","https://openalex.org/W2980193891","https://openalex.org/W4292808503"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W3126095231","https://openalex.org/W2072812638","https://openalex.org/W2352855287","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W2382526412","https://openalex.org/W4200071106","https://openalex.org/W2045811717"],"abstract_inverted_index":{"Purpose":[0],"The":[1,84,132,226],"purpose":[2],"of":[3,13,36,62,66,76,89,96,135,190,201,228,241],"this":[4,229],"paper":[5],"is":[6],"to":[7,29,57,205,212,251],"examine":[8],"gender":[9,63,136,242],"differences":[10],"in":[11,27,42,91,142,156],"predictors":[12,65],"technology":[14,67,143,206,217,244],"threat":[15,68,144,157,178,207,245],"avoidance":[16,69,92,97,109,125,128,158,179,182,191,208,246],"motivation":[17,33,70,93,126,180],"and":[18,34,71,94,108,117,127,149,168,181,184,199,235,248,253],"behavior":[19,41,72,98,183],"among":[20],"working":[21],"US":[22,80],"adults.":[23],"Implications":[24],"were":[25],"considered":[26,155],"regard":[28],"cybersecurity":[30,40],"awareness":[31],"training":[32,202],"perceptions":[35],"need":[37],"for":[38,222],"protective":[39,220],"the":[43,59,122,139,197,223,238,255],"workplace.":[44],"Design/methodology/approach":[45],"A":[46],"single-shot":[47],"regression-based":[48],"study":[49,230],"used":[50,250],"ordinal":[51],"regression":[52,85],"supported":[53],"by":[54],"K-means":[55],"clustering":[56],"evaluate":[58,254],"moderating":[60,239],"effects":[61,141,240],"on":[64,73,243],"a":[74],"sample":[75,162],"n":[77],"=":[78],"206":[79],"adult":[81],"workers.":[82],"Findings":[83],"model":[86],"explained":[87],"47.5%":[88],"variance":[90],"39%":[95],"variance.":[99],"Gender":[100,119,173],"moderated":[101,121],"predictive":[102,133],"associations":[103,187,256],"between":[104,124,257],"several":[105],"independent":[106],"variables":[107,163],"motivation:":[110],"perceived":[111,113,115],"susceptibility,":[112],"effectiveness,":[114],"cost":[116],"self-efficacy.":[118],"also":[120],"association":[123],"behavior.":[129],"Research":[130],"limitations/implications":[131],"impact":[134],"extends":[137],"beyond":[138],"main":[140],"avoidance.":[145],"Data":[146],"frequency":[147,166],"distributions":[148,167],"inter-variable":[150],"relationships":[151],"should":[152],"be":[153],"routinely":[154],"studies,":[159],"especially":[160],"if":[161],"exhibit":[164],"non-normal":[165],"nonlinear":[169],"associations.":[170],"Practical":[171],"implications":[172],"was":[174],"significantly":[175],"associated":[176],"with":[177,188],"exhibited":[185],"notable":[186],"antecedents":[189],"motivation.":[192],"Related":[193],"insights":[194],"can":[195],"inform":[196],"design":[198],"delivery":[200],"content":[203],"relating":[204],"as":[209,219],"organizations":[210],"strive":[211],"more":[213],"effectively":[214],"leverage":[215],"information":[216],"end-users":[218],"assets":[221],"enterprise.":[224],"Originality/value":[225],"uniqueness":[227],"derives":[231],"from":[232],"its":[233],"focus":[234],"findings":[236],"regarding":[237],"factors":[247],"techniques":[249],"measure":[252],"them.":[258]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
