References
- Adams, J., and D. Nettle. 2009. “Time Perspective, Personality, and Smoking, Body Mass, and Physical Activity: An Empirical Study.” British Journal of Health Psychology 14: 83–105. doi:10.1348/135910708X299664.
- Ameen, N., A. Tarhini, M. H. Shah, and N. O. Madichie. 2020. “Employees’ Behavioural Intention to Smartphone Security: A Gender-Based, Cross-National Study.” Computers in Human Behavior 104: 106184.
- Blythe, J. M., L. Coventry, and L. Little. 2015. Unpacking Security Policy Compliance: The Motivators and Barriers of Employees’ Security Behaviors. In Eleventh Symposium on Usable Privacy and Security ({SOUPS} 2015), 103–122.
- Boniwell, I., E. N. Osin, P. A. Linley, and G. V. Ivanchenko. 2010. “A Question of Balance: Time Perspective and Well-Being in British and Russian Samples.” The Journal of Positive Psychology 5 (1): 24–40. doi:10.1080/17439760903271181.
- Brothers, A., M. Gabrian, H.-W. Wahl, and M. Diehl. 2016. “Future Time Perspective and Awareness of Age-Related Change: Examining Their Role in Predicting Psychological Well-Being.” Psychology and Aging 31 (6): 605–617. doi:10.1037/pag0000101.
- Chang, H. J. 2010. 23 Things They Don’t Tell you About Capitalism. London: Penguin.
- Claar, C. L., and J. Johnson. 2012. “Analyzing Home PC Security Adoption Behaviour.” Journal of Computer Information Systems 52 (4): 20–29. doi:10.1080/08874417.2012.11645573.
- Cohen, J. 1988. Statistical Power Analysis for the Behavioural Sciences. Hillsdale, NJ: Erlbaum.
- Crossler, R. E., F. Bélanger, and D. Ormond. 2017. “The Quest for Complete Security: An Empirical Analysis of Users’ Multi-Layered Protection from Security Threats.” Information Systems Frontiers, 1–15. doi:10.1007/s10796-017-9755-1.
- Cunningham, K. F., J. W. Zhang, and R. T. Howell. 2015. “Time Perspectives and Subjective Well-Being: A Dual-Pathway Framework.” In Time Perspective Theory, Review, Research and Application, edited by M. Stolarski, N. Fieulaine, and W. van Beek, 403–415. Switzerland: Springer International Publishing.
- Daengsi, T., P. Pornpongtechavanich, and P. Wuttidittachotti. 2021. “Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks.” Education and Information Technologies 26: 1–24.
- Daugherty, J. R., and G. L. Brase. 2010. “Taking Time to be Healthy: Predicting Health Behaviors with Delay Discounting and Time Perspective.” Personality and Individual Differences 48 (2): 202–207. doi:10.1016/j.paid.2009.10.007.
- Drake, L., E. Duncan, F. Sutherland, C. Abernethy, and C. Henry. 2008. “Time Perspective and Correlates of Wellbeing.” Time & Society 17 (1): 47–61.
- Egelman, S., M. Harbach, and E. Peer. 2016, May. Behavior ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS). In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5257–5261.
- Egelman, S., and E. Peer. 2015. “Scaling the Security Wall: Developing a Security Behaviour Intensions Scale (SeBIS).” Security Feedback & Warnings. doi:10.1145/2702123.2702249.
- Jansen, J., and P. Van Schaik. 2017. “Comparing Three Models to Explain Precautionary Online Behavioural Intentions.” Information & Computer Security 25 (2): 165–180. doi:10.1108/ICS-03-2017-0018.
- Jansen, J., and P. van Schaik. 2019. “The Design and Evaluation of a Theory-Based Intervention to Promote Security Behaviour Against Phishing.” International Journal of Human-Computer Studies 123: 40–55. doi:10.1016/j.ijhcs.2018.10.004.
- Jochemczyk, L., J. Pietrzak, R. Buczkowski, M. Stolarski, and L. Markiewicz. 2016. “You Only Live Once: Present-Hedonistic Time Perspective Predicts Risk Propensity.” Personality and Individual Differences. doi:10.1016/j.paid.2016.03.010.
- Jones, B. H., and L. R. Heinrichs. 2012. “Do Business Students Practice Smartphone Security?” Journal of Computer Information Systems 53 (2): 22–30. doi:10.1080/08874417.2012.11645611.
- Kennison, S. M., and E. Chan-Tin. 2020. Taking Risks with Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors. Frontiers in Psychology, doi:10.3389/fpsyg.2020.546546.
- Keough, K. A., P. G. Zimbardo, and J. N. Boyd. 1999. “Who’s Smoking, Drinking, and Using Drugs? Time Perspective as a Predictor of Substance use.” Basic and Applied Social Psychology 21 (2): 149–164. doi:10.1207/S15324834BA210207.
- Schneier, B. 2015. Secrets and Lies: Digital Security in a Networked World (15th-Anniversary Edition). Hoboken, NJ: John Wiley & Sons.
- Sobol-Kwapinska, M. 2009. “Forms of Present Time Orientation and Satisfaction with Life in the Context of Attitudes Toward Past and Future.” Social Behaviour and Personality 37 (4): 433–440. doi:10.2224/sbp.2009.37.4.433.
- Sobol-Kwapinska, M. 2013. “Hedonism, Fatalism and ‘Carpe Diem’: Profiles of Attitudes Towards the Present Time.” Time & Society 22 (3): 371–390. doi:10.1177/0961463X13487043.
- Sobol-Kwapinska, M., and T. Jankowski. 2016. “Positive Time: Balanced Time Perspective and Positive Orientation.” Journal of Happiness Studies 17: 1511–1528. doi:10.1007/s10902-015-9656-2.
- Sobol-Kwapinska, M., T. Jankowski, and A. Przepiorka. 2015. “What do we Gain by Adding Time Perspective to Mindfulness? Carpe Diem and Mindfulness in a Temporal Framework.” Personality and Individual Differences 93. doi:10.1016/j.paid.2015.07.046.
- Sommestad, T., H. Karlzén, and J. Hallberg. 2015. “A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour.” International Journal of Information Security and Privacy (IJISP) 9 (1): 26–46. doi:10.4018/IJISP.2015010102.
- Stolarski, M., J. Bitner, and P. G. Zimbardo. 2011. “Time Perspective, Emotional Intelligence and Discounting of Delayed Awards.” Time & Society 20: 346–363. doi:10.1177/0961463X11414296.
- Stolarski, M., G. Matthews, P. Slawomir, P. G. Zimbardo, and J. Bitner. 2014. “How we Feel is a Matter of Time: Relationships Between Time Perspectives and Mood.” Journal of Happiness Studies 15 (4): 809–827. doi:10.1007/s10902-013-9450.
- Suddendorf, T., and J. Busby. 2003. “Mental Time Travel in Animals?” Trends in Cognitive Science 7: 391–396.
- Talpade, M., R. George, S. Blair, D. Green, B. James, J. McKinney, and K. Ukwu. 2019. “Characteristics of Cybersecurity Victims at Clark Atlanta University.” Annual Review of Cybertherapy And Telemedicine 2019: 159–162.
- Tan, M., and K. Sagala Aguilar. 2012. “An Investigation of Students’ Perception of Bluetooth Security.” Information Management & Computer Security 20 (5): 364–381. doi:10.1108/09685221211286539.
- Taylor, J. 2022, March 11. Data. https://osf.io/cf47m/?view_only=cb20106dfc44488f9f6f630551d19bb2 ([dataset]).
- Van Schaik, P., J. Jansen, J. Onibokun, J. Camp, and P. Kusev. 2018. “Security and Privacy in Online Social Networking: Risk Perceptions and Precautionary Behaviour.” Computers in Human Behavior 78: 283–297. doi:10.1016/j.chb.2017.10.007.
- Van Schaik, P., D. Jeske, J. Onibokun, L. Coventry, J. Jansen, and P. Kusev. 2017. “Risk Perceptions of Cyber-Security and Precautionary Behaviour.” Computers in Human Behavior 75: 547–559. doi:10.1016/j.chb.2017.05.038.
- Vedadi, A., and M. Warkentin. 2018. “Secure Behavior Over Time: Perspectives from the Theory of Process Memory.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems 49 (SI): 39–48.
- Warkentin, M., A. C. Johnston, J. Shropshire, and W. D. Barnett. 2016. “Continuance of Protective Security Behavior: A Longitudinal Study.” Decision Support Systems 92: 25–35. doi:10.1016/j.dss.2016.09.013.
- Zimbardo, P. G., and I. Boniwell. 2004. “Balancing One's Time Perspective in Pursuit of Optimal Functioning.” Positive Psychology in Practice 3: 105–168.
- Zimbardo, P. G., and J. N. Boyd. 1999. “Putting Time in Perspective: A Valid, Reliable Individual Differences Metric.” Journal of Personality and Social Psychology 77 (6): 1271–1288. doi:10.1037/0022-3514.77.6.1271.
- Zimbardo, P. G., and J. N. Boyd. 2008. The Time Paradox: The new Psychology of Time. New York: Free Press.