J. Abawajy, User preference of cyber security awareness delivery methods, Behaviour& Information, vol.33, issue.3, pp.237-248, 2014.

R. Agarwal and J. Prasad, Are individual differences germane to the acceptance of new information technologies? Decision sciences, vol.30, pp.361-391, 1999.

N. A. Arachchilage and S. Love, Security awareness of computer users: A phishing threat avoidance perspective, Computers in Human Behavior, vol.38, pp.304-312, 2014.

E. Albrechtsen and J. &hovden, Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study, Computers & Security, vol.29, issue.4, pp.432-445, 2010.

J. C. Brancheau, B. D. Janz, and J. C. Wetherbe, Key Issues in Information Systems Management: 1994-95 SIM Delphi Results, MIS Quarterly, vol.20, issue.2, pp.225-242, 1996.

L. L. Carstensen, D. M. Issacowitz, and S. T. Charles, Taking time seriously: A theory ofsocioemotional selectivity, American Psychologist, vol.54, pp.165-181, 1999.

H. Cavusoglu, H. Cavusoglu, and S. &raghunathan, Economics of ITSecurity Management: Four Improvements to Current Security Practices, Communications of the Association for Information, vol.14, issue.1, p.3, 2004.

J. E. Chung, N. Park, H. Wang, J. Fulk, and M. Mclaughlin, Age differences in perceptions of online community participation among non-users: An extension of the Technology Acceptance Model, Computers in Human, vol.26, issue.6, pp.1674-1684, 2010.

A. Darwish, A. El-zarka, and F. &aloul, 2012 International Conference on Computer Systems and Industrial Informatics, towards understanding phishing victims' profile, pp.1-5, 2012.

M. Durgin, Understanding the importance of and implementing internal security measures, SANS Institute Reading Room, 2007.

S. Egelman and E. Peer, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsScaling the security wall: Developing a security behavior intentions scale, pp.2873-2882, 2015.

, The new users' guide: how to raise information security awareness (EN), 2010.

S. Furnell and N. Clarke, Power to the people? The evolving recognition of human aspects of security, vol.31, pp.983-988, 2012.

S. M. Furnell, A. Jusoh, and D. &katsabas, The challenges of understanding and using security: A survey of end-users, Computers & Security, vol.25, issue.1, pp.27-35, 2006.

T. Herath and H. R. Rao, Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, vol.18, issue.2, pp.106-125, 2009.

P. Ifinedo, Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol.31, issue.1, pp.83-95, 2012.

M. Igbaria and S. &parasuraman, A path analytic study of individual characteristics, computer anxiety and attitudes toward microcomputers, Journal, vol.15, issue.3, pp.373-388, 1989.

M. Igbaria, N. Zinatelli, P. Cragg, and A. L. &cavaye, Personal computing acceptance factors in small firms: a structural equation model, MIS quarterly, pp.279-305, 1997.

J. Lee and Y. Lee, A holistic model of computer abuses within organizations, Information management & computer, vol.10, issue.2, pp.57-63, 2002.

S. M. Lee, S. G. Lee, and S. &yoo, An integrative model of computer abuse based on social control and general deterrence theories, Information & Management, vol.41, issue.6, pp.707-718, 2004.

D. F. Lohmeyer, J. Mccrory, and S. Pogreb, Managing information security, McKinsey Quart. Special Edition, vol.2, pp.12-16, 2002.

J. G. Mohebzada, A. El-zarka, A. H. Bhojani, and A. &darwish, Phishing in a university community: Two large scale phishing experiments, 2012 International Conference on Innovations in Information Technology (IIT), pp.249-254, 2012.

K. Parsons, D. Calic, M. Pattinson, M. Butavicius, A. Mccormac et al., The human aspects of information security questionnaire (HAIS-Q): two further validation studies, Computers & Security, vol.66, pp.40-51, 2017.

K. M. Parsons, E. Young, M. A. Butavicius, A. Mccormac, M. R. Pattinson et al., The influence of organizational information security culture on information security decision making, Journal of Cognitive Engineering and Decision, vol.9, issue.2, pp.117-129, 2015.

C. E. Porter and N. &donthu, Using the technology acceptance model to explain how attitudes determine Internet usage: The role of perceived access barriers and demographics, Journal of business, vol.59, issue.9, pp.999-1007, 2006.

, Security awareness: turning your people into your first line of defence, 2010.

S. Ransbotham and S. &mitra, Choice and chance: A conceptual model of paths to information security compromise, Information Systems Research, vol.20, issue.1, pp.121-139, 2009.

E. Schultz, From the Editor-in-Chief: The human factor in security, Computers and security, vol.24, issue.6, pp.425-426, 2005.

N. S. Safa and M. A. Ismail, A customer loyalty formation model in electronic commerce, Economic Modelling35, pp.559-564, 2013.

N. S. Safa, M. Sookhak, R. Von-solms, S. Furnell, N. A. Ghani et al., Information security conscious care behaviour formation in organizations, Computers & Security, vol.53, pp.65-78, 2015.

N. S. Safa, R. Von-solms, and S. &furnell, Information security policy compliance model in organizations, Computers & Security, vol.56, pp.70-82, 2016.

S. Taylor and P. Todd, Assessing IT usage: The role of prior experience, MIS, vol.19, pp.561-570, 1995.

V. Venkatesh and M. G. Morris, Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior, MIS quarterly, pp.115-139, 2000.

V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, User acceptance of information technology: Toward a unified view, MIS quarterly, pp.425-478, 2003.

V. Solms, R. Van-niekerk, and J. , From information security to cyber security. Computers & security, vol.38, pp.97-102, 2013.

C. Vroom and R. Von-solms, Towards information security behavioural compliance, Computers & security, vol.23, issue.3, pp.191-198, 2004.

R. Werlinger, K. Hawkey, D. Botta, and K. &beznosov, Security practitioners in context: Their activities and interactions with other stakeholders within organizations, International Journal of Human-Computer Studies, vol.67, issue.7, pp.584-606, 2009.

M. Whitty, J. Doodson, S. Creese, and D. Hodges, Individual differences in cyber security behaviors: an examination of who is sharing passwords, Cyberpsychology, Behavior, and Social Networking, vol.18, issue.1, pp.3-7, 2015.

C. C. Wood and W. W. Banks, Human error: an overlooked but significant information security problem, Computers & Security, vol.12, issue.1, pp.51-60, 1993.