References
- Tamkin E 10 years after the landmark attack on Estonia, is the world better prepared for cyber threats? Foreign Policy (FP); 2017 Apr 27. [accessed 2018 Oct 31]. https://foreignpolicy.com/2017/04/27/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber-threats/.
- Turak N The next 9/11 will be a cyberattack, security expert warns. CNBC; 2018 June 1. [accessed 2018 Nov 3]. https://www.cnbc.com/2018/06/01/the-next-911-will-be-a-cyberattack-security-expert-warns.html.
- Sussman B Revealed: details of ‘first of its kind’ disruptive power grid attack. Secure World, Seguro Group Inc; 2019 Oct 8. [accessed 2019 Dec 15]. https://www.secureworldexpo.com/industry-news/first-u.s.-power-grid-attack-details.
- Fazzini K Warnings about a massive cyberattack aren’t new- intelligence officials have raised the red flags for years. CNBC; 2018 July 24. [accessed 2018 Nov 3]. https://www.cnbc.com/2018/07/24/cyberattack-warnings-from-us-intelligence-officials-are-not-new.html.
- Kirkpatrick DD, Nixon R U.S.-U.K. Warning on cyberattacks includes private homes. New York Times; 2018 Apr 16. [accessed 2018 Nov 3]. https://www.nytimes.com/2018/04/16/world/europe/us-uk-russia-cybersecurity-threat.html.
- Lawler D, Swan J. Special report: America’s greatest threat is a hurricane-force cyberattack. Axios; 2018 Aug 4. [accessed 2018 Oct 31]. https://www.axios.com/americas-greatest-threat-hurricane-force-cyberattack-67ff9c98-1cb8-4358-9d9e-e8c26836dec3.html.
- Rhee H-S, Ryu YU, Kim C-T. Unrealistic optimism on information security management. Comput Secur. 2012;31(2):221–32. doi:https://doi.org/10.1016/j.cose.2011.12.001.
- Gandhi R, Sharma A, Mahoney W, Sousan W, Zhu Q, Laplante P. Dimensions of cyber-attacks: social, political, economic, and cultural. IEEE Technol Soc Mag. 2011;30:pp. 28–38.
- Modic D, Anderson R. It’s all over but the crying: the emotional and financial impact of internet fraud. IEEE Secur Priv. 2015;13(5):99–103. doi:https://doi.org/10.1109/MSP.2015.107.
- Bada M, Nurse JRC. Chapter 4 - The social and psychological impact of cyberattacks. Published in Benson, V. & McAlaney, J. (2019/20). In: Emerging cyber threats and cognitive vulnerabilities. Academic Press, Elsevier Publisher; 2020. p. 73–92. doi:https://doi.org/10.1016/B978-0-12-816203-3.00004-6.
- Worrall S Is the United States prepared for a massive cyberattack. National Geographic; 2015 Nov 8. [accessed 2018 Oct 31]. https://news.nationalgeographic.com/2015/11/151108-cybercrime-cyberattack-ted-koppel-computers-hacking-internet-ngbooktalk/.
- Baum A. Toxins, technology, and natural disasters. In: VandenBos GR, Bryant BK, editors. Master lectures series. Cataclysms, crises, and catastrophes: psychology in action. American Psychological Association; 1987. p. 5–49. doi:https://doi.org/10.1037/11106-001.
- Baum A, Fleming R, Davidson LM. Natural disaster and technological catastrophe. Environ Behav. 1983;15(3):333–54. doi:https://doi.org/10.1177/0013916583153004.
- Roth A, Nakashima E. Massive cyberattack hits Europe with widespread ransom demands. Washington Post; 2017 June 27. [accessed 2018 Nov 6]. https://www.washingtonpost.com/world/europe/ukraines-government-key-infrastructure-hit-in-massive-cyberattack/2017/06/27/7d22c7dc-5b40-11e7-9fc6-c7ef4bc58d13_story.html?noredirect=on&utm_term=.258c0d474ca7.
- Cimpanu C Largest cyber-attack in Georgia’s history link to hacked web hosting provider. ZDNet, Trend Micro; 2019 Oct 28. [accessed 2019 Nov 9]. https://www.zdnet.com/article/largest-cyber-attack-in-georgias-history-linked-to-hacked-web-hosting-provider/.
- McDuling J America is the prime target of international cyberattacks. Quartz; 2014 Feb 27. [accessed 2018 Nov 11]. https://qz.com/180700/america-is-the-prime-target-of-international-cyberattacks/.
- Krauss C Cyberattack shows vulnerability of gas pipeline network. New York Times; 2018 Apr 4. [accessed 2018 Nov 11]. https://www.nytimes.com/2018/04/04/business/energy-environment/pipeline-cyberattack.html.
- Blinder A, Perlroth N A cyberattack hobbles atlanta, and security experts shudder. New York Times; 2018 Mar 27. [accessed 2018 Nov 5]. https://www.nytimes.com/2018/03/27/us/cyberattack-atlanta-ransomware.html.
- Shamma T Atlanta paralyzed for more than a week by cyber attack. NPR; 2018 Mar 30, NPR (transcript). [accessed 2018 Oct 31]. https://www.npr.org/2018/03/30/598386485/atlanta-paralyzed-for-more-than-a-week-by-cyber-attack.
- Newman LH Atlanta spent $2.6M to recover from a $52,000 ransomware scare. Wired; 2018 Apr 23. [accessed 2018 Nov 5]. https://www.wired.com/story/atlanta-spent-26m-recover-from-ransomware-scare/.
- Rogers J U.S. Power grid still prime cyber target. The Street; 2011 Oct 26. [accessed 2018 Nov 5]. https://www.thestreet.com/story/11290254/1/us-power-grid-still-prime-cyber-target.html.
- Panetta LE Remarks by secretary panetta on cybersecurity to the business executives for national security, New York City; 2012 Oct 11. U.S. Department of Defense News Transcripts. [accessed 2018 Oct 31]. http://archive.defense.gov/transcripts/transcript.aspx?transcriptid=5136.
- Brickenstein R. Individual reactions, summation phenomena and collective reactions. MMW Munch Med Wochenschr. 1980;122(42):1459–62. http://libproxy.txstate.edu/login?url=https://search.proquest.com/docview/75441251?accountid=5683.
- Singer TJ. An introduction to disaster: some considerations of a psychological nature. Aviat Space Environ Med. 1982;53(3):245–50. http://libproxy.txstate.edu/login?url=https://search.proquest.com/docview/80381394?accountid=5683.
- Loong LH. Sing health cyber-attack: now what? SMB World Asia (Online). 2018. [accessed 2019 Nov 9]. http://libproxy.txstate.edu/login?url=https://search.Proquest.com/docview/2074824570?accountid=5683.
- Dodge RC, Carver C, Ferguson A. Phishing for user security awareness. Comput Secur. 2007;26(1):73. doi:https://doi.org/10.1016/j.cose.2006.10.009.
- Schultz E. Security training and awareness – fitting a square peg in a round hole. Comput Secur. 2004;23(1):1–2. doi:https://doi.org/10.1016/j.cose.2004.01.002.
- Ng B-Y, Kankanhalli A, Xu YC. Studying users’ computer security behavior: a health belief perspective. Decis Support Syst. 2009;46(4):815–25. doi:https://doi.org/10.1016/j.dss.2008.11.010.
- Albrechtsen E, Hovden J. Improving information security awareness and behavior through dialogue, participation, and collective reflection; an intervention study. Comput Secur. 2010;29(4):432. doi:https://doi.org/10.1016/j.cose.2009.12.005.
- Kruger H, Drevin L, Steyn T. A vocabulary test to assess information security awareness. Inf Manage Comput Secur. 2010;18(5):316–27. doi:https://doi.org/10.1108/09685221011095236.
- Wolf M, Haworth D, Pietron L. Measuring an information security awareness program. Rev Business Inf Syst. 2011;15(3):9. doi:https://doi.org/10.19030/rbis.v15i3.5398.
- Peltier T. Implementing an information security awareness program. EDPACS. 2005;33(1):1–18. doi:https://doi.org/10.1201/1079.07366981/45423.33.1.20050701/89329.1.
- Yoon C, Hwang JW, Kim R. Exploring factors that influence students’ behaviors in information security. J Inf Syst Edu. 2012;23:407–15.
- Ku CY, Chang YW, Yen DD. National information security policy and its implementation: a case study in Taiwan. Telecomm Policy. 2009;33(7):371. doi:https://doi.org/10.1016/j.telpol.2009.03.002.
- Rotvoid G, Landry R (2007). Status of security awareness in business organizations and colleges of business: an analysis of training and education, policies, and social engineering testing. Dissertation, University of North Dakota.
- Britt P. You’ve got mail … .and security breaches. Inf Today. 2008;25:1–1, 44.
- Claar CL, Johnson J. Analyzing home PC security adoption behavior. J Comput Inf Syst. 2012;52:20–29.
- McLaughlin K. COMPTIA: end-user training is critical to security. CRN. 2006;1194:35.
- Mensch S, Wilkie L. Information security activities of college students: an exploratory study. Acad Inf Manage Sci J. 2011;14:91–116.
- Pollitt D. Energis trains employees and customers in IT security. Hum Res Manage Digest. 2005;13:25–28.
- Puhakainen P, Siponen M. Improving employees’ compliance through information systems security training: an action research study. MIS Quart. 2010;34(4):757. doi:https://doi.org/10.2307/25750704.
- Wagley J. Breaches lead to employee training. Secur Manage. 2010;54:44.
- Mehrabian A, Russell JA. An approach to environmental psychology. Cambridge, Massachusetts: M.I.T. Press; 1974.
- Jacoby J. Stimulus-organism-response reconsidered: an evolutionary step in modeling (consumer) behavior. J Consum Psychol. 2002;12(1):51–57. doi:https://doi.org/10.1207/S15327663JCP1201_05.
- Eroglu SA, Machleit KA, Davis LM. Atmospheric qualities of online retailing: a conceptual model and implications. J Bus Res. 2001;54(2):177–84. doi:https://doi.org/10.1016/S0148-2963(99)00087-9.
- Donovan RJ, Rositer JR. Store atmosphere: an environmental psychology approach. J Retail. 1982;58:34–57.
- Jacoby LL, Brooks LR. Nonanalytic cognition: memory, perception and concept learning. In: Bower G, editor. The psychology of learning and motivation: advances in research and theory. Vol. 18. New York (NY): Academic; 1984. p. 147.
- Jacoby LL, Lindsay DS, Toth JP. Unconscious influences revealed: attention, awareness and control. Am Psychol. 1992;47(6):802–09. doi:https://doi.org/10.1037/0003-066X.47.6.802.
- Loureiro S, Ribeiro L. The effect of atmosphere on emotions and online shopping intention: age differentiation. Aust N Z Market Acad Conf. 2011.
- Zaltman G. Consumer researchers. Take a Hike! J Consum Res. 2000;26(4):423–28. doi:https://doi.org/10.1086/209573.
- Davey GCL, Wells A. Worry and its psychological disorders: theory, assessment and treatment. West Sussex (England): John Wiley & Sons Ltd; 2006.
- Desai SP, Lele V. Correlating internet, social networks and workplace - a case of generation Z students. J Commer Manage Thought. 2017;8(4):802–15. doi:https://doi.org/10.5958/0976-478X.2017.00050.7.
- Emese C. The Z Generation. Acta Technologica Dubnicae. 2016:6.
- Reeves TC, Oh E. Generational differences. Handbook Res Edu Commun Technol. 2008;3:295–303.
- Roberts JA, Yaya LHP, Manolis C. The invisible addiction: cell-phone activities and addiction among male and female college students. J Behav Addict. 2014;3(4):254–65. doi:https://doi.org/10.1556/JBA.3.2014.015.
- Palfrey J, Gasser U. Born digital: understanding the first generation of digital natives. New York (NY): Basic Books; 2008.
- Kick AL, Contacos-Sawyer J, Thomas B. How generation Z’s reliance on digital communication can affect future workplace relationships. Competition Forum. 2015;13:214–22.
- Lenhart A. Teens, social media, and privacy: reputation management, third party access, & exposure to advertising. Presentation to the State of Maryland’s Children Online Privacy Working Group at the Attorney General’s Office in Baltimore, Baltimore, MA. Pew Research Internet Project; 2013.
- Davis JL, Love TP. Generalizing from social media data: a formal theory approach. Inf Commun Soc. 2019;22(5):637–47. doi:https://doi.org/10.1080/1369118X.2018.1555610.
- Kaur P. Relationship between social networking sites usage pattern and motivations behind usage: a study of generation Z ?a digital generation? Int J Appl Ser Market Perspect. 2014;3:996–1004.
- Sponcil M, Gitimu P. Use of social media by college students: relationship to communication and self-concept. J Technol Res. 2013;4:1–13.
- Parasuraman A. Technology Readiness Index (TRI): a multiple-item scale to measure readiness to embrace new technologies. J Serv Res. 2000;2(4):307–20. doi:https://doi.org/10.1177/109467050024001.
- Chapin J, Coleman G. Optimistic bias: what you think, what you know, or whom you know? N Am J Psychol. 2009;11:121–32.
- Chapin JR, Pierce M. Optimistic bias, sexual assault, and fear. J Gen Psychol. 2012;139(1):19–28. doi:https://doi.org/10.1080/00221309.2011.635724.
- White G, Ekin T, Visinescu L. Analysis of protective behavior and security incidents for home computers. J Comput Inf Syst. 2017;57(4):353–63. Online. doi:https://doi.org/10.1080/08874417.2016.1232991.
- Startup HM, Erickson TM. The Penn State Worry Questionnaire (PSWQ). In: Davey GCL, Wells A, editors. Worry and its Psychological Disorders: theory, assessment and treatment (chapter 7). West Sussex (England): John Wiley & Sons Ltd. 2006. p. 101–120.
- Meyer TJ, Miller ML, Metzger RL, Borkovec TD. Development and validation of the Penn State Worry Questionnaire. Behav Res Ther. 1990;28(6):487–95. doi:https://doi.org/10.1016/0005-7967(90)90135-6.
- Molina S, Borkovec TD. The Penn State Worry Questionnaire: psychometric properties and associated characteristics. In: Davey GCL, Tallis F, editors. Worrying: perspectives on theory, assessment, and treatment. Chichester (UK): John Wiley & Sons, Ltd; 1994. p. 265–83.
- St¨ober J. Worry, problem elaboration and suppression of imagery: the role of concreteness. Behav Res Ther. 1998;36(7–8):751–56. doi:https://doi.org/10.1016/S0005-7967(98)00027-8.
- Fresco DM, Heimberg RG, Mennin DS, Turk CL. Confirmatory factor analysis of the Penn State Worry Questionnaire. Behav Res Ther. 2002 March;40(3):313–23. doi:https://doi.org/10.1016/S0005-7967(00)00113-3.
- Brown TA. Confirmatory factor analysis of the Penn State Worry Questionnaire: multiple factors or method effects? Behav Res Ther. 2003 Dec;41(12):1411–26. doi:https://doi.org/10.1016/S0005-7967(03)00059-7.
- Winter JCF, Dodou D. Five-point likert items: t test versus Mann-Whitney-Wilcoxon. Pract Assess Res Eval. 2012;15(11):1–16. 1531–7714.
- Rasmussen JL. Analysis of libert-scale data: a reinterpretation of gregoire and driver. Psychol Bull. 1989;105(1):167–70. doi:https://doi.org/10.1037/0033-2909.105.1.167.
- Nunnally JC, Bernstein IH. Psychometric theory. New York (NY): McGraw Hill; 1994.
- Anastasi A. Psychological testing. New York (NY): Macmillan; 1988.
- Nevo B. Face validity revisited. J Educ Meas. 1985;22(4):287–93. doi:https://doi.org/10.1111/j.1745-3984.1985.tb01065.x.