. Accenture, cost of cyber crime study, Ponemon Institute LLC & Accenture, p.54, 2017.

M. Labs, McAfee labs threat report, 2017.

, Usable security: why do we need it? How do we get it?, 2005.

M. Warkentin and R. Willison, Behavioral and policy issues in information systems security: the insider threat, European Journal of Information Systems, vol.18, issue.2, pp.101-105, 2009.

S. R. Boss, L. J. Kirsch, I. Angermeier, R. A. Shingler, and R. W. Boss, If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security, European Journal of Information Systems, vol.18, pp.151-164, 2009.

B. Bulgurcu, H. Cavusoglu, and I. Benbasat, Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol.34, issue.3, pp.523-548, 2010.

J. D'arcy, A. Hovav, and D. Galletta, User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach, Information Systems Research, vol.20, issue.1, pp.79-98, 2009.

C. Donalds, Cybersecurity policy compliance: an empirical study of Jamaican government agencies, SIG GlobDev Pre-ECIS Workshop, 2015.

T. Herath and H. R. Rao, Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, vol.18, issue.2, pp.106-125, 2009.

J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton, Analysis of end user security behaviors, Computers & Security, vol.24, issue.2, pp.124-133, 2005.

A. Bandura, Self-Efficacy: toward a unifying theory of behaviour change, Psychological Review, vol.84, issue.2, pp.191-215, 1977.

D. R. Compeau and C. A. Higgins, Computer self-efficacy: development of a measure and initial test, MIS Quarterly, vol.19, issue.2, pp.189-211, 1995.

C. Donalds and K. Osei-bryson, Exploring the impacts of individual styles on security compliance behavior: a preliminary analysis. SIG ICT in Global Development, 10th Annual Pre-ICIS Workshop, 2017.

B. Ng, A. Kankanhalli, and Y. C. Xu, Studying users' computer security behavior: a health belief perspective, Decision Support Systems, vol.46, issue.4, pp.815-825, 2009.

B. A. Nosek, M. R. Banaji, and A. G. Greenwald, Harvesting implicit group attitudes and beliefs from a demonstration web site, Group Dynamics: Theory, Research, and Practice, vol.6, issue.1, pp.101-115, 2002.

P. Ifinedo, Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol.31, issue.1, pp.83-95, 2012.

A. Vance, M. Siponen, and S. Pahnila, Motivating IS security compliance: insights from habit and protection motivation theory, Information & Management, vol.49, issue.3-4, pp.190-198, 2012.

M. Anwar, W. He, I. Ash, X. Yuan, L. Li et al., Gender difference and employees' cybersecurity behaviors, Computers in Human Behavior, vol.69, pp.437-443, 2017.

A. J. Rowe and J. D. Boulgarides, Decision styles-a perspective, Leadership & Organization Development Journal, vol.4, issue.4, pp.3-9, 1983.

J. C. Henderson and P. C. Nutt, The influence of decision style on decision making behavior, Management Science, vol.26, issue.4, pp.371-386, 1980.

H. Niu, Cyber peers' influence for adolescent consumer in decision-making styles and online purchasing behavior, Journal of Applied Psychology, vol.43, issue.6, pp.1228-1237, 2013.

, International Monetary Fund: Regional economic outlook: Sub-Saharan Africa. World Economic and Financial Surveys, p.123, 2015.

, World Economic Forum

R. D. Banker and R. Natarajan, Evaluating contextual variables affecting productivity, Operations Research, vol.56, issue.1, pp.48-58, 2008.

S. Samoilenko, Overview on data envelopment analysis. Advances in research methods for information systems research, pp.139-150, 2014.

S. Ayabakan, I. R. Bardhan, and Z. Zheng, A data envelopment analysis approach to estimate IT-enabled production capability, MIS Quarterly, vol.41, issue.1, pp.189-205, 2017.

S. Samoilenko and K. M. Osei-bryson, Using data envelopment analysis (DEA) for monitoring efficiency-based performance of productivity-driven organizations: design and implementation of a decision support system, Omega, vol.41, issue.1, pp.131-142, 2013.

R. D. Banker, A. Charnes, and W. W. Cooper, Some models for estimating technical and scale inefficiencies in data envelopment analysis, Management Science, vol.30, issue.9, pp.1078-1092, 1984.

A. K. Behera, J. Verbert, B. Lauwers, and J. R. Duflou, Tool path compensation strategies for single point incremental sheet forming using multivariate adaptive regression splines, Computer-Aided Design, vol.45, issue.3, pp.575-590, 2013.

K. M. Osei-bryson, A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research, Information Systems Frontiers, vol.17, issue.4, pp.845-856, 2015.

T. Hastie, R. Tibshirani, and J. Friedman, The elements of statistical learning: data mining, inference, and prediction, 2001.

T. Hastie and R. Tibshirani, Generalized additive model, 1990.

A. J. Rowe and R. O. Mason, Managing with style: a guide to understanding assessing, and improving decision making, 1987.