Figures & data
Table 1. Percentages of answers to questions on data protection (n = 95).
Table 2. Factor loadings for social network items (n = 92).
Table 3. Factor loadings for e-mail items (n = 95).
Table 4. Factor loadings for cloud storage items (n = 91).
Table 5. Mean comparison of unprimed and primed participants for social networks, email and cloud storage. We also present the means and standard deviations found by Adhikari and Panda (Citation2018).
Table 6. Percentages of answers per category to the three data-fabrication strategies.
Table 7. Correlations between fabrication strategies and perceived severity, perceived vulnerability and self-efficacy for each of the three domains (social networks, email and cloud storage).
Table 8. Percentages of answers to the data protection questions.
Figure 1. Correlations between perceived vulnerability, self-efficacy, perceived severity and the use of protection strategies.
![Figure 1. Correlations between perceived vulnerability, self-efficacy, perceived severity and the use of protection strategies.](/cms/asset/640d348f-e8dd-49ba-a9bc-fb3126445d9c/cted_a_2106963_f0001_b.gif)