M. Abrams and J. Weiss, Malicious control system cyber security attack case studyMaroochy Water Services, The MITRE Corporation, 2008.

S. N. Smith, The Impact of Monetary Value Gains and Losses on Cybersecurity Behavior, 2017.

M. Anwar, Gender difference and employees'cybersecurity behaviors. Computers in Human Behavior, vol.69, pp.437-443, 2017.

A. E. Scheflen, How behavior means, 1973.

H. Liang and Y. Xue, Understanding security behaviors in personal computer usage: A threat avoidance perspective, vol.11, pp.394-413, 2010.

H. A. Kruger, An assessment of the role of cultural factors in information security awareness, Information Security South Africa (ISSA), 2011.

T. Bjrnhaug, Internet of Things-Cybersecurity at Home, 2017.

R. Bitton, Taxonomy of mobile users'security awareness, Computers & Security, vol.73, pp.266-293, 2018.

J. M. Stanton, Analysis of end user security behaviors. Computers & security, vol.24, pp.124-133, 2005.

A. Acquisti, L. Brandimarte, and G. Loewenstein, Privacy and human behavior in the age of information, Science, vol.347, issue.6221, pp.509-514, 2015.

E. Kritzinger and S. H. Solms, Cyber security for home users: A new way of protection through awareness enforcement. Computers Security, vol.29, pp.840-847, 2010.

N. S. Safa, R. V. Solms, and S. Furnell, Information security policy compliance model in organizations, Computers Security, vol.56, pp.70-82, 2016.

J. Blythe, Cyber security in the workplace: Understanding and promoting behaviour change, Proceedings of CHItaly 2013 Doctoral Consortium, vol.1065, pp.92-101, 2013.

B. Bulgurcu, H. Cavusoglu, and I. Benbasat, Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness, MIS quarterly, vol.34, issue.3, pp.523-548, 2010.

R. J. Deibert and R. Rohozinski, Risking security: Policies and paradoxes of cyberspace security, International Political Sociology, vol.4, issue.1, pp.15-32, 2010.

H. G. Djajadikerta, S. M. Roni, and T. Trireksani, Dysfunctional information system behaviors are not all created the same: Challenges to the generalizability of security-based research, Information Management, vol.52, issue.8, pp.1012-1024, 2015.

K. H. Guo, Security-related behavior in using information systems in the workplace: A review and synthesis. Computers Security, vol.32, pp.242-251, 2013.

A. M. Chu, P. Y. Chau, and M. K. So, Developing a Typological Theory Using a Quantitative Approach: A Case of Information Security Deviant Behavior, CAIS, vol.37, p.25, 2015.

C. L. Anderson and R. Agarwal, Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions, MIS quarterly, vol.34, issue.3, pp.613-643, 2010.

K. Edwards, Examining the security awareness, information privacy, and the security behaviors of home computer users, 2015.

S. Talib, N. L. Clarke, and S. M. Furnell, An analysis of information security awareness within home and work environments. in Availability, Reliability, and Security, ARES'10 International Conference on, 2010.

Y. Li and M. T. Siponen, A Call For Research On Home Users'Information Security Behaviour. in PACIS, 2011.

K. Sharma, Impact of framing and priming on users'behavior in cybersecurity, 2017.

M. Bada and A. Sasse, Cyber Security Awareness Campaigns: Why do they fail to change behaviour?, 2014.

N. S. Safa, R. V. Solms, and L. Futcher, Human aspects of information security in organisations, Computer Fraud Security, issue.2, pp.15-18, 2016.

N. S. Safa, Information security conscious care behaviour formation in organizations, Computers Security, vol.53, pp.65-78, 2015.

P. Ifinedo, Effects of Organizational Citizenship Behavior and Social Cognitive Factors on Employees'Non-Malicious Counterproductive Computer Security Behaviors: An Empirical Analysis, CONF-IRM, 2015.

N. Nthala and I. Flechais, If Its Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It: A Study into Home Data Security Decisions, International Conference on Human Aspects of Information Security, Privacy, and Trust, 2017.

V. Tech, When users resist: how to change management and user resistance to password security, 2011.

C. Rughini and R. Rughini, Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union. computers security, vol.43, pp.111-125, 2014.