1. SSSP Springer Series in Social Psychology;I Ajzen,1985
2. Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613–643 (2010).
https://doi.org/10.2307/25750694
3. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 69, 437–443 (2017).
https://doi.org/10.1016/j.chb.2016.12.040
4. Baldwin, W.: Information no one else knows: the value of self-report. In: Stone, A., Bachrach, C., Jobe, J., Kurtzman, H., Cain, V. (eds.) The Science of Self-report, 1st edn, pp. 15–20. Psychology Press, Mahwah (1999)
5. Bandura, A.: Social Learning Theory. General Learning Press, New York, NY (1971)