{"id":"https://openalex.org/W2898400520","doi":"https://doi.org/10.1108/k-05-2018-0226","title":"Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior","display_name":"Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior","publication_year":2018,"publication_date":"2018-10-24","ids":{"openalex":"https://openalex.org/W2898400520","doi":"https://doi.org/10.1108/k-05-2018-0226","mag":"2898400520"},"language":"en","primary_location":{"id":"doi:10.1108/k-05-2018-0226","is_oa":false,"landing_page_url":"https://doi.org/10.1108/k-05-2018-0226","pdf_url":null,"source":{"id":"https://openalex.org/S168682784","display_name":"Kybernetes","issn_l":"0368-492X","issn":["0368-492X","1758-7883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kybernetes","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024829774","display_name":"Ali Vafaei\u2010Zadeh","orcid":"https://orcid.org/0000-0003-1451-8866"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Ali Vafaei-Zadeh","raw_affiliation_strings":["Graduate School of Business, Universiti Sains Malaysia, Minden, Malaysia"],"affiliations":[{"raw_affiliation_string":"Graduate School of Business, Universiti Sains Malaysia, Minden, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ramayah Thurasamy","orcid":null},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ramayah Thurasamy","raw_affiliation_strings":["School of Management, Universiti Sains Malaysia, Minden, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Management, Universiti Sains Malaysia, Minden, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090271455","display_name":"Haniruzila Hanifah","orcid":"https://orcid.org/0000-0002-6185-0071"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Haniruzila Hanifah","raw_affiliation_strings":["Graduate School of Business, Universiti Sains Malaysia, Minden, Malaysia"],"affiliations":[{"raw_affiliation_string":"Graduate School of Business, Universiti Sains Malaysia, Minden, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024829774"],"corresponding_institution_ids":["https://openalex.org/I139322472"],"apc_list":null,"apc_paid":null,"fwci":1.2335,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.86304953,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"48","issue":"8","first_page":"1565","last_page":"1585"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.816655158996582},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.6506406664848328},{"id":"https://openalex.org/keywords/nonprobability-sampling","display_name":"Nonprobability sampling","score":0.5931009650230408},{"id":"https://openalex.org/keywords/theory-of-planned-behavior","display_name":"Theory of planned behavior","score":0.5481496453285217},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5062686204910278},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4906264841556549},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.431434690952301},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.4222114682197571},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.4207441806793213},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4054397642612457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38821569085121155},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.38431355357170105},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.3399149477481842},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12827304005622864}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.816655158996582},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.6506406664848328},{"id":"https://openalex.org/C100363876","wikidata":"https://www.wikidata.org/wiki/Q690661","display_name":"Nonprobability sampling","level":3,"score":0.5931009650230408},{"id":"https://openalex.org/C89785696","wikidata":"https://www.wikidata.org/wiki/Q2290753","display_name":"Theory of planned behavior","level":3,"score":0.5481496453285217},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5062686204910278},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4906264841556549},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.431434690952301},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.4222114682197571},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.4207441806793213},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4054397642612457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38821569085121155},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.38431355357170105},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.3399149477481842},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12827304005622864},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/k-05-2018-0226","is_oa":false,"landing_page_url":"https://doi.org/10.1108/k-05-2018-0226","pdf_url":null,"source":{"id":"https://openalex.org/S168682784","display_name":"Kybernetes","issn_l":"0368-492X","issn":["0368-492X","1758-7883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kybernetes","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":77,"referenced_works":["https://openalex.org/W12535498","https://openalex.org/W103880451","https://openalex.org/W657411145","https://openalex.org/W1489771250","https://openalex.org/W1490774257","https://openalex.org/W1491644571","https://openalex.org/W1517229207","https://openalex.org/W1564506851","https://openalex.org/W1570388338","https://openalex.org/W1602619638","https://openalex.org/W1607912078","https://openalex.org/W1755084311","https://openalex.org/W1965354703","https://openalex.org/W1969123563","https://openalex.org/W1970809283","https://openalex.org/W1975066611","https://openalex.org/W1976124706","https://openalex.org/W1982459405","https://openalex.org/W1986961110","https://openalex.org/W1987198869","https://openalex.org/W1987258130","https://openalex.org/W1988045348","https://openalex.org/W1992549547","https://openalex.org/W2001791196","https://openalex.org/W2001810891","https://openalex.org/W2010274637","https://openalex.org/W2016755785","https://openalex.org/W2017679397","https://openalex.org/W2017836055","https://openalex.org/W2022473311","https://openalex.org/W2029312248","https://openalex.org/W2030067122","https://openalex.org/W2036389121","https://openalex.org/W2046752514","https://openalex.org/W2048891655","https://openalex.org/W2052753903","https://openalex.org/W2065369775","https://openalex.org/W2066424242","https://openalex.org/W2069542824","https://openalex.org/W2070418545","https://openalex.org/W2078076646","https://openalex.org/W2079236679","https://openalex.org/W2080858097","https://openalex.org/W2082092096","https://openalex.org/W2099222119","https://openalex.org/W2099697766","https://openalex.org/W2099702286","https://openalex.org/W2106073596","https://openalex.org/W2106096361","https://openalex.org/W2106342240","https://openalex.org/W2110505891","https://openalex.org/W2114717587","https://openalex.org/W2129100925","https://openalex.org/W2138644293","https://openalex.org/W2139195079","https://openalex.org/W2150238850","https://openalex.org/W2152095411","https://openalex.org/W2152226178","https://openalex.org/W2157910941","https://openalex.org/W2168379157","https://openalex.org/W2168569455","https://openalex.org/W2236373062","https://openalex.org/W2256804265","https://openalex.org/W2276979642","https://openalex.org/W2312678775","https://openalex.org/W2424144552","https://openalex.org/W2467209159","https://openalex.org/W2497603870","https://openalex.org/W2517350434","https://openalex.org/W2557778508","https://openalex.org/W2575418267","https://openalex.org/W2619791207","https://openalex.org/W2777710597","https://openalex.org/W2912812321","https://openalex.org/W4235678817","https://openalex.org/W4238559129","https://openalex.org/W4299306993"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2968709340","https://openalex.org/W2544387082","https://openalex.org/W2099222119","https://openalex.org/W2888935944"],"abstract_inverted_index":{"Purpose":[0],"This":[1,142,238],"paper":[2],"aims":[3,23],"to":[4,24,39,72,85,132,164,185,188,196,207,235,241,274],"investigate":[5,25],"the":[6,26,74,88,156,186,194,220,227,232,243,255,261,276],"impact":[7],"of":[8,28,54,87,94,146,222,247,257,263],"perceived":[9,33,135,267],"price":[10,103,136,153,157,268],"level":[11,104,137,269],"and":[12,32,98,121,126,174,192,209,215,225,270],"information":[13,112,244,271],"security":[14,113,211,217,223,245,272],"awareness":[15,114,273],"on":[16,37,109,119,162],"computer":[17,169],"users\u2019":[18],"attitude.":[19],"Moreover,":[20],"this":[21,66,180],"study":[22,239],"effect":[27,108,118,161],"attitude,":[29],"subjective":[30,124],"norms":[31,125],"behavioral":[34],"control":[35],"(PBC)":[36],"intention":[38,163],"use":[40,197],"anti-malware":[41,148,201,248],"software.":[42],"Design/methodology/approach":[43],"Data":[44],"were":[45,128],"collected":[46],"using":[47,77,147,200,254],"a":[48,78,106,116],"structured":[49],"questionnaire":[50],"from":[51],"225":[52],"students":[53,195],"five":[55],"public":[56],"universities":[57,187],"in":[58,65],"Malaysia.":[59],"Purposive":[60],"sampling":[61],"technique":[62],"was":[63,70],"used":[64,71],"study.":[67],"AMOS":[68],"24":[69],"test":[73],"research":[75,181],"framework":[76],"two-step":[79],"approach.":[80],"Findings":[81,82],"give":[83],"support":[84],"some":[86],"hypotheses":[89],"developed":[90],"with":[91,260],"R2":[92],"values":[93],"0.521":[95],"for":[96,100],"attitude":[97,110,120],"0.740":[99],"intention.":[101,122,141],"Perceived":[102],"had":[105,115],"negative":[107],"while":[111],"positive":[117],"Attitude,":[123],"PBC":[127],"all":[129],"positively":[130],"related":[131,234],"intention,":[133],"but":[134],"did":[138],"not":[139],"affect":[140],"suggests":[143],"that":[144],"benefits":[145],"are":[149,171],"more":[150],"than":[151],"its":[152],"value.":[154],"Therefore,":[155,179],"has":[158],"no":[159],"direct":[160],"use.":[165],"Research":[166],"limitations/implications":[167],"University":[168],"networks":[170,191],"as":[172,176],"open":[173],"inviting":[175],"their":[177,190],"campuses.":[178],"can":[182],"be":[183],"helpful":[184],"safeguard":[189,226],"encourage":[193],"anti-malware.":[198],"However,":[199],"software":[202],"will":[203],"enable":[204],"an":[205],"individual":[206,251],"identify":[208],"prioritize":[210],"risks,":[212],"quickly":[213],"detect":[214],"mitigate":[216],"breaches,":[218],"improve":[219],"understanding":[221],"gaps":[224],"sensitive":[228],"data":[229],"by":[230,250,253],"minimizing":[231],"risks":[233],"malware.":[236],"Originality/value":[237],"ventured":[240],"model":[242],"behavior":[246,259,277],"usage":[249],"users":[252],"theory":[256],"planned":[258],"addition":[262],"two":[264],"new":[265],"variables,":[266],"explain":[275],"better.":[278]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
