{"id":"https://openalex.org/W3217322409","doi":"https://doi.org/10.3390/jcp1040034","title":"The Effect of Countermeasure Readability on Security Intentions","display_name":"The Effect of Countermeasure Readability on Security Intentions","publication_year":2021,"publication_date":"2021-11-19","ids":{"openalex":"https://openalex.org/W3217322409","doi":"https://doi.org/10.3390/jcp1040034","mag":"3217322409"},"language":"en","primary_location":{"id":"doi:10.3390/jcp1040034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040034","pdf_url":"https://www.mdpi.com/2624-800X/1/4/34/pdf?version=1637900633","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/1/4/34/pdf?version=1637900633","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067738261","display_name":"Tim Smit","orcid":"https://orcid.org/0009-0000-4743-3522"},"institutions":[{"id":"https://openalex.org/I193662353","display_name":"Utrecht University","ror":"https://ror.org/04pp8hn57","country_code":"NL","type":"education","lineage":["https://openalex.org/I193662353"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tim Smit","raw_affiliation_strings":["Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands","institution_ids":["https://openalex.org/I193662353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011203090","display_name":"Max van Haastrecht","orcid":null},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]},{"id":"https://openalex.org/I193662353","display_name":"Utrecht University","ror":"https://ror.org/04pp8hn57","country_code":"NL","type":"education","lineage":["https://openalex.org/I193662353"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Max van Haastrecht","raw_affiliation_strings":["Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands","Leiden Institute of Advanced Computer Science (LIACS), Leiden University, Niels Bohrweg 1, 2333 CA Leiden, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-4195-0585","affiliations":[{"raw_affiliation_string":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands","institution_ids":["https://openalex.org/I193662353"]},{"raw_affiliation_string":"Leiden Institute of Advanced Computer Science (LIACS), Leiden University, Niels Bohrweg 1, 2333 CA Leiden, The Netherlands","institution_ids":["https://openalex.org/I121797337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033880574","display_name":"Marco Spruit","orcid":"https://orcid.org/0000-0002-9237-221X"},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]},{"id":"https://openalex.org/I193662353","display_name":"Utrecht University","ror":"https://ror.org/04pp8hn57","country_code":"NL","type":"education","lineage":["https://openalex.org/I193662353"]},{"id":"https://openalex.org/I2800006345","display_name":"Leiden University Medical Center","ror":"https://ror.org/05xvt9f17","country_code":"NL","type":"funder","lineage":["https://openalex.org/I2800006345"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Marco Spruit","raw_affiliation_strings":["Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands","Department of Public Health and Primary Care, Leiden University Medical Center (LUMC), Albinusdreef 2, 2333 ZA Leiden, The Netherlands","Leiden Institute of Advanced Computer Science (LIACS), Leiden University, Niels Bohrweg 1, 2333 CA Leiden, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-9237-221X","affiliations":[{"raw_affiliation_string":"Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands","institution_ids":["https://openalex.org/I193662353"]},{"raw_affiliation_string":"Department of Public Health and Primary Care, Leiden University Medical Center (LUMC), Albinusdreef 2, 2333 ZA Leiden, The Netherlands","institution_ids":["https://openalex.org/I2800006345"]},{"raw_affiliation_string":"Leiden Institute of Advanced Computer Science (LIACS), Leiden University, Niels Bohrweg 1, 2333 CA Leiden, The Netherlands","institution_ids":["https://openalex.org/I121797337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011203090"],"corresponding_institution_ids":["https://openalex.org/I121797337","https://openalex.org/I193662353"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":1.4237,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86311395,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"1","issue":"4","first_page":"675","last_page":"703"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9453999996185303,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/readability","display_name":"Readability","score":0.9543880224227905},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.8682150840759277},{"id":"https://openalex.org/keywords/coping","display_name":"Coping (psychology)","score":0.675862193107605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.603553295135498},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5030991435050964},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.47737547755241394},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.43946096301078796},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.4211907386779785},{"id":"https://openalex.org/keywords/technostress","display_name":"Technostress","score":0.41184112429618835},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.28373876214027405},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15822753310203552},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15232518315315247},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14387103915214539}],"concepts":[{"id":"https://openalex.org/C2778143727","wikidata":"https://www.wikidata.org/wiki/Q1820650","display_name":"Readability","level":2,"score":0.9543880224227905},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.8682150840759277},{"id":"https://openalex.org/C73282008","wikidata":"https://www.wikidata.org/wiki/Q1759895","display_name":"Coping (psychology)","level":2,"score":0.675862193107605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.603553295135498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5030991435050964},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.47737547755241394},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.43946096301078796},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.4211907386779785},{"id":"https://openalex.org/C2778399959","wikidata":"https://www.wikidata.org/wiki/Q586162","display_name":"Technostress","level":2,"score":0.41184112429618835},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.28373876214027405},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15822753310203552},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15232518315315247},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14387103915214539},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/jcp1040034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040034","pdf_url":"https://www.mdpi.com/2624-800X/1/4/34/pdf?version=1637900633","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:99fae69e527f4777a79a8f112d2d456d","is_oa":true,"landing_page_url":"https://doaj.org/article/99fae69e527f4777a79a8f112d2d456d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 1, Iss 4, Pp 675-703 (2021)","raw_type":"article"},{"id":"pmh:oai:scholarlypublications.universiteitleiden.nl:item_3243070","is_oa":true,"landing_page_url":"https://hdl.handle.net/1887/3243070","pdf_url":null,"source":{"id":"https://openalex.org/S4306400850","display_name":"Leiden Repository (Leiden University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121797337","host_organization_name":"Leiden University","host_organization_lineage":["https://openalex.org/I121797337"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"Article / Letter to editor"},{"id":"pmh:ul:oai:scholarlypublications.universiteitleiden.nl:item_3243070","is_oa":true,"landing_page_url":"http://hdl.handle.net/1887/3243070","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, 1(4), 675 - 704","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.3390/jcp1040034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040034","pdf_url":"https://www.mdpi.com/2624-800X/1/4/34/pdf?version=1637900633","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1083731953","display_name":null,"funder_award_id":"883588","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3217322409.pdf","grobid_xml":"https://content.openalex.org/works/W3217322409.grobid-xml"},"referenced_works_count":71,"referenced_works":["https://openalex.org/W162489372","https://openalex.org/W1442963952","https://openalex.org/W1490774257","https://openalex.org/W1660197351","https://openalex.org/W1746336329","https://openalex.org/W1774460361","https://openalex.org/W1964088509","https://openalex.org/W1970809283","https://openalex.org/W1981054068","https://openalex.org/W1996495656","https://openalex.org/W2020989719","https://openalex.org/W2024488177","https://openalex.org/W2030660416","https://openalex.org/W2074967591","https://openalex.org/W2081093195","https://openalex.org/W2081430061","https://openalex.org/W2084389751","https://openalex.org/W2091261347","https://openalex.org/W2091271623","https://openalex.org/W2099647042","https://openalex.org/W2099697766","https://openalex.org/W2100372251","https://openalex.org/W2100739170","https://openalex.org/W2107529665","https://openalex.org/W2108271931","https://openalex.org/W2119401948","https://openalex.org/W2125806375","https://openalex.org/W2129100925","https://openalex.org/W2130892515","https://openalex.org/W2132747867","https://openalex.org/W2134049139","https://openalex.org/W2153852789","https://openalex.org/W2163890779","https://openalex.org/W2163914445","https://openalex.org/W2168991419","https://openalex.org/W2170185509","https://openalex.org/W2250496306","https://openalex.org/W2254778937","https://openalex.org/W2271788777","https://openalex.org/W2291072898","https://openalex.org/W2295825763","https://openalex.org/W2503241677","https://openalex.org/W2569236205","https://openalex.org/W2601349024","https://openalex.org/W2766287034","https://openalex.org/W2770273620","https://openalex.org/W2806146112","https://openalex.org/W2894969232","https://openalex.org/W2895553377","https://openalex.org/W2896512139","https://openalex.org/W2901697661","https://openalex.org/W2921265701","https://openalex.org/W2985776815","https://openalex.org/W3024794551","https://openalex.org/W3080962083","https://openalex.org/W3083505223","https://openalex.org/W3093777151","https://openalex.org/W3121047513","https://openalex.org/W3143860025","https://openalex.org/W3158566747","https://openalex.org/W3184791374","https://openalex.org/W4230308150","https://openalex.org/W4233019818","https://openalex.org/W4236922299","https://openalex.org/W4246301396","https://openalex.org/W4292808503","https://openalex.org/W6645811747","https://openalex.org/W6684122877","https://openalex.org/W6729090211","https://openalex.org/W6784528528","https://openalex.org/W6788326095"],"related_works":["https://openalex.org/W2212346408","https://openalex.org/W1534474695","https://openalex.org/W4321485552","https://openalex.org/W4285804237","https://openalex.org/W2098788060","https://openalex.org/W2049537972","https://openalex.org/W2368745349","https://openalex.org/W2766840","https://openalex.org/W2405948830","https://openalex.org/W4205373851"],"abstract_inverted_index":{"Human":[0],"failure":[1],"is":[2,15,73,94,102,106],"a":[3,74,86,154],"primary":[4],"contributor":[5],"to":[6,18,21,38,77,97,104,133,168,185,208],"successful":[7],"cyber":[8],"attacks.":[9],"For":[10],"any":[11],"cybersecurity":[12,57,202],"initiative,":[13],"it":[14,93],"therefore":[16],"vital":[17],"motivate":[19],"individuals":[20],"implement":[22,186],"secure":[23],"behavior.":[24],"Research":[25,67],"using":[26,65,153],"protection":[27],"motivation":[28],"theory":[29],"(PMT)":[30],"has":[31,68,111],"given":[32],"insights":[33],"into":[34],"what":[35],"motivates":[36],"people":[37,164],"safeguard":[39],"themselves":[40],"in":[41,55,182],"cyberspace.":[42],"Recent":[43],"PMT":[44,91],"results":[45,161,199],"have":[46,169],"highlighted":[47],"the":[48,52,56,90,113,135,189,212],"central":[49],"role":[50,88],"of":[51,115,177,214],"coping":[53,79],"appraisal":[54,80],"context.":[58],"In":[59,156],"cybersecurity,":[60],"we":[61],"cope":[62],"with":[63,158],"threats":[64],"countermeasures.":[66],"shown":[69,112],"that":[70,101,120,163,192,201],"countermeasure":[71,107,138,193,215],"awareness":[72,84],"significant":[75],"antecedent":[76],"all":[78],"elements.":[81],"Yet,":[82],"although":[83],"plays":[85],"key":[87],"within":[89],"framework,":[92],"generally":[95],"challenging":[96],"influence.":[98],"A":[99],"factor":[100],"easy":[103],"influence":[105],"readability.":[108],"Earlier":[109],"work":[110],"impact":[114],"readability":[116,121,127,139,194,206,213],"on":[117],"understanding":[118],"and":[119,125,140,149,179,210],"metrics":[122,207],"make":[123],"measuring":[124],"improving":[126],"simple.":[128],"Therefore,":[129],"our":[130],"research":[131],"aims":[132],"clarify":[134],"relationship":[136],"between":[137],"security":[141,171,196,223],"intentions.":[142,197,224],"We":[143],"propose":[144],"an":[145,218],"extended":[146],"theoretical":[147],"framework":[148],"investigate":[150],"its":[151],"implications":[152],"survey.":[155],"line":[157],"related":[159],"studies,":[160],"indicate":[162],"are":[165,175,180],"more":[166],"likely":[167],"favorable":[170],"intentions":[172],"if":[173],"they":[174],"aware":[176],"countermeasures":[178],"confident":[181],"their":[183],"ability":[184],"them.":[187],"Crucially,":[188],"data":[190],"show":[191],"influences":[195],"Our":[198],"imply":[200],"professionals":[203],"can":[204],"utilize":[205],"assess":[209],"improve":[211],"texts,":[216],"providing":[217],"actionable":[219],"avenue":[220],"towards":[221],"influencing":[222]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2021-12-06T00:00:00"}
