<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cyber security in the workplace: Understanding and promoting behaviour change</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>John M Blythe</string-name>
          <email>john.blythe@northumbria.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>PaCT Lab, Department of Psychology, Northumbria University</institution>
          ,
          <addr-line>Newcastle-upon-Tyne, UK NE1 8ST</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2013</year>
      </pub-date>
      <abstract>
        <p>Cyber security and the role employees play in securing information are major concerns for businesses. The aim of this research is to explore employee security behaviours and design interventions that can motivate behaviour change. Previous research has focused on exploring factors that influence information security policy compliance; however there are several limitations with this approach. Our work-to-date has explored the behaviours that constitute 'information security' and potential influencers of these behaviours. These findings will aid the design of behaviour change interventions.</p>
      </abstract>
      <kwd-group>
        <kwd>Cyber security</kwd>
        <kwd>Information security</kwd>
        <kwd>Behaviour change</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The advancement of technology in the workplace has allowed employees
ubiquitous access to information, permitting employees to work in a number of different
locations and on numerous devices enhancing individual productivity and the
efficiency of business operation. Businesses utilize a number of services to achieve this
operation including remote access and cloud-based storage to name a few and a
number of technological devices including laptops, tablets, PDAs and mobile phones.</p>
      <p>
        However, this adoption of newer technology has also increased their risk to cyber
threats as organisations and individuals are increasingly affected by misuses of
information that result from security lapses. Current cyber security practices and
approaches cannot cope with this increased dependency and as a result, the UK cyber
security strategy was developed with the intention to protect citizens, businesses and
critical infrastructures from cyber-attacks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Organisations adopt a range of technical and procedural approaches to secure
information (e.g. encryption and security awareness campaigns, respectively). However,
these efforts are not enough as security breaches continue to plague companies.
Statistics show that 93% of large organisations and 76% of small businesses experienced a
security breach in the last year [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Employees appear to be a large source of the
prob
      </p>
      <p>
        lem as estimates show approximately half of all data breaches are due to compliance
failure (indirectly or directly) to their company’s security policy [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>Although employees have been identified as one of the most significant
vulnerabilities in information security of organisations, research to date is fragmented and little
attention has been given to designing theoretically based and empirically validated
behavioural interventions.
1.1</p>
      <sec id="sec-1-1">
        <title>What influences security behaviour?</title>
        <p>Research has been dedicated to exploring the causes and determinants of secure
behaviour. The main body of research has focused on positive behaviours, which help
serve the organisational goal of information security. These are compliant behaviours
such as encrypting removable media. The other type of research has explored
negative, potentially damaging, behaviours such as employee computer misuse/abuse.</p>
        <p>
          Studies focusing on positive behaviours have primarily been through a
“policycompliance” lens, exploring the extent to which employees’ conform to organisational
rules and guidelines as laid out in their organisation’s information security policy
(ISP). There is a plethora of research in this domain investigating the factors that
relate to compliance to these policies. Numerous theories have been employed to
identify these factors such as the theory of planned behaviour (TPB) [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] and protection
motivation theory (PMT) [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] to name a few.
        </p>
        <p>Consistently researched factors have been identified using a number of different
theories and conceptualizations. These include internal influences such as
selfefficacy [e.g. 4, 5, 6], and attitude towards security [e.g. 7]; external influences such
as social pressures i.e. the extent to which an individual is influenced by what relevant
others (e.g. management) expect him/her to do [e.g. 4, 5, 6, 7] and an individuals’
threat and response evaluation. Threat perception has been studied in terms of
perceived vulnerability (an individual’s assessment of the probability of threatening
events) [e.g. 5] and perceived severity (severity of consequences to the organisation
arising from non-compliance) [e.g. 6]. Finally, an individuals’ assessment of response
(i.e. security) has been investigated in terms of response efficacy (belief that the
security action will reduce threats) [e.g. 5] and response cost (costs associated with the
security behaviour such as time and effort) [e.g. 6].</p>
        <p>Whilst the “policy-compliance” approach has identified a number of factors that
can help provide an understanding of why individuals comply with their ISP, there are
a number of limitations with this paradigm. Firstly, there is an over-reliance on
exploratory research that has largely adopted non-experimental methodologies, which
have limitations in terms of understanding cause-and-effect relationships between the
factors. Previous research [e.g. 5, 6, 7] has implemented hypothesized regression
models to understand security behaviour and factors that account for the most
variance in compliance intention. Whilst these help us understand the relationships
between several factors, they cannot tell us which factors are most efficacious in
promoting secure behaviours.</p>
        <p>Secondly, research investigating policy-compliance operationalise their outcome
variable as “intention to comply with the information security policy” [e.g. 5, 6, 7].</p>
        <p>This narrows information security to a single behaviour - compliance. However, this
is an over simplification. ISPs actually dictate a variety of security behaviours that
cannot be simplified to a single behaviour.</p>
        <p>Thirdly, there are organisational differences with regards to approaches to ISPs.
There is a lack of consensus for the content of these policies so there is diversity in
their described and expected employee security behaviours. Furthermore, companies
differ in deployment of their policies and newer forms of security documents that
complement the ISP (e.g. home working policies) makes this area more complex.
Different levels of organisational security maturity and legislative obligations (e.g.
Freedom of Information Act (2000)) also mean that there are inconsistencies in
policies across organisations.</p>
        <p>
          The theoretical implications of this “policy-compliance” approach are that the
researched behavioural determinants may not be applicable to the large amount of
security behaviours. For example, factors such as social pressures may have more of an
influence on password behaviour than preventative anti-virus behaviour. It is
therefore important to understand how factors might differ in their influence on
behaviours. Research in other domains such as [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] has emphasized the importance of
assessing the degree to which behavioural determinants influence specific behaviours
and how they may vary depending upon the behaviour and the population being
studied. However, previous research studies have not explored these differences in
employee information security behaviour.
        </p>
        <p>
          It is important to consider other influences of security behaviour including the
usability of the security systems and employees’ working environment. A security
system that considers usable design will help generate fewer insecure behaviours
compared to a poorly designed system which will lead employees to ‘workaround’ their
security guidelines simply in order to get their main job done, thus resulting in
insecure practice. It is important to consider these different influences when promoting
behaviour change. Future research also needs to understand security behaviour with
regards to Bring Your Own Device (BYOD) and home working, both of which have
limited research but provide challenging issues for workplaces to manage security [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>
          Additionally, research needs to provide more focus on the context of behaviour in
organisations. Two potentially important factors could be psychological ownership
(perception that a physical/non-physical target is “theirs”) and organisational
citizenship behaviour (discretionary behaviours that go beyond the job role). These factors
have only been studied within security in relation to non-work users [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], however
could play an important role in employee security behaviour.
1.2
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>Security behaviour change</title>
        <p>Despite efforts to understand the security behaviour of employees, there has been
little attention dedicated to improving this behaviour. Behaviour change is a large
research area, particularly within the health and sustainability domain. However, there
is a distinct lack of research within the arena of cyber security particularly in the
context of the workplace.</p>
        <p>
          In organisations, previous behaviour change methods have been implemented such
as training. A recent review [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] suggests that current approaches are based upon
practical experience and lack empirical evidence and a theoretical grounding. There
are, however, examples of empirically and theoretically based cyber security
behaviour change in non-work domains such as [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] who used the game anti-phishing Phil
and the health belief model to deliver tailored risk messages to improve financial
security behaviour. However, despite previous research investigating the influences
of ISP compliance using behaviour change models, the findings have not been utlised
in intervention design within in the workplace.
        </p>
        <p>Models from health psychology are particularly relevant to this area as health
behaviours are similarly sensitive to that of security. Within health, individuals have to
undertake a number of preventative behaviours (e.g. sanitising hands in hospitals to
prevent contamination). Similar to security, individuals have to take preventative
action to prevent a security breach (e.g. running anti-virus scans). Best practice and
guidance for successful behaviour change from other domains may therefore have
applicability to cyber security.
2</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Proposed Research</title>
      <p>There are two parts to this PhD research. The first part (stages 1-2) aims to define
information security behaviours, the potential determinants of these, and identify
behaviours for intervention. The second part (stages 3+) will consist of designing
interventions driven by the findings of the earlier exploratory studies. The research
questions proposed so far are:
1. What security behaviours are employees expected to perform? (Stage 1)
2. Are vignettes a suitable tool for cyber security research? (Stage 2a)
3. What are the behavioural determinants of security behaviours and how might they
differ across the diverse security behaviours? (Stage 2b)
4. What behaviour change approaches are most suitable for cyber security? (Stage 3)</p>
      <p>This research will entail a pragmatic research approach through use of both
qualitative and quantitative methodologies. Stage 1 and 2a are complete however stage 2b is
currently on-going.
2.1</p>
      <sec id="sec-2-1">
        <title>Stage 1.</title>
        <p>The first stage involved the development of a behavioural inventory by identifying
employees’ expected security behaviours. To achieve this, an internet search was
carried out to collate information security policies available and accessible online. 25
policies were collated from healthcare (n=7), universities (n=10) and councils (n=8).
Policies were excluded if they only consisted of an executive summary or they
referenced supplementary documents that were unavailable online or if they were not a
UK institution (due to legislative differences between countries).</p>
        <p>
          Inductive content analysis was adopted using guidelines outlined by [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The
purpose of this analysis was to establish the categorical structure of the data within ISPs.
The findings revealed eleven categories with designated behaviours for employees as
shown in Table 1.
        </p>
        <sec id="sec-2-1-1">
          <title>How access controls are allocated and managed</title>
        </sec>
        <sec id="sec-2-1-2">
          <title>Actions to prevent malicious software</title>
        </sec>
        <sec id="sec-2-1-3">
          <title>Steps for recovering and reporting security incidences</title>
          <p>Strategies to physically protect infrastructures,
information and information resources
Responsibility in protection, storage and processing of
information
Software and system acquisition, installation and
maintenance
Appropriate usage of information systems, email and
the internet
Outlines prevention and recovery from internal and
external threats
Compliance to legislation acts such as the data
protection act (1998)
2.2</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Stage 2a</title>
        <p>Security can be considered a sensitive issue for employees to discuss as behaving
insecure could be perceived as poor job performance. It is important to address why
employees behave insecurely and therefore methodologies or tools to engage
employees in this discussion are required.</p>
        <p>
          Vignettes are considered one such useful tool and have been shown to be useful
when dealing with sensitive issues [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] as they allow participants to control whether
they disclose personal information. These are fictional scenarios describing a
character and a story that allow exploration of participants’ views on the issues arising from
the scenario. In this research, a vignette described a security scenario (e.g. recycling
passwords) but did not discuss the consequences or whether the behaviour was
secure/insecure. See figure 1 for example vignette.
        </p>
        <p>A pilot study was run with 8 employees from multiple organisations to assess the
suitability of vignettes. This was undertaken by allocating participants to a vignette or
non-vignette condition. Those in the vignette condition were given short stories for
each of the categories in Table 1. Those in the non-vignette condition were given a
short description of the category. A semi-structured interview guide was used
covering the elicitation of the factors (see stage 2b). The results from stage 2a
indicated that participants in the vignette conditions were more open in their discussion of
insecure behaviours and reasons for this, compared to the non-vignette condition and
required less questioning from the researcher. Vignettes were therefore deemed a
useful tool to use to help aid and engage participants in security discussion and allow
rich and detailed data to be collected.
2.3</p>
      </sec>
      <sec id="sec-2-3">
        <title>Stage 2b</title>
        <p>This stage is exploring the influences of security behaviours, aiming to analyse the
degree to which factors may differ depending upon specific security behaviours. This
approach will help examine user perceptions and usage of security solutions, within
the workplace, allowing the identification of poor security practices which require
further exploration and targeted behaviour change.</p>
        <p>A deductive approach was adopted for this stage using factors that have previously
been investigated for compliance to ISP. The factors of interest are influences
including internal (self-efficacy &amp; attitude) and external (social pressures). Furthermore,
individuals’ threat evaluation (perceived vulnerability &amp; severity), and their response
evaluation (response efficacy &amp; cost). Semi-structured interviews will be used with
employees’ from recruited organisations, using the vignettes based on stage 1 and
questions focusing on the elicitation of the factors outlined above. Participants will
also be required to complete a questionnaire, assessing psychological ownership and
organisational citizenship behaviour. This is to categorise participants into high/low
groups to allow comparisons to be made dependent upon these measures.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Future Work</title>
      <p>
        On completion of stage 2b, the data will be analysed using framework analysis [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
as this deductive approach allows the assessment of the influences to be identified a
priori and refined through further analysis. The findings will also help identify
behaviours that will be targeted in interventions. These interventions could take many
forms such as manipulating influences of the targeted security behaviour (e.g.
increasing individual’s perceived severity) and investigating whether this leads to behaviour
change. This could, for example, involve re-designing security software so
interventions target a specific behavioural determinant, or, use individuals’ data from security
software to provide a tailored intervention to the individual. Whilst the current
behaviour change studies are yet to be designed. The following sections outline the
proposed methodology of the behavioural interventions, measurement of security behaviour
and an example intervention to illustrate behaviour change within the cyber security
domain.
3.1
      </p>
      <sec id="sec-3-1">
        <title>Stage 3</title>
        <p>Behaviour change interventions</p>
        <p>
          Currently, there is an abundance of guidance for the development, running and
evaluation of behaviour change interventions. Within the behaviour change domain,
interventions aiming to change behaviour are often poorly reported and difficult to
replicate [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. It is therefore important that when designing the interventions for this
PhD that they follow previous research and guidance to enhance replicability and
help inform future cyber security research and practice.
        </p>
        <p>
          For example, appropriate guidance includes the Medical Research Council (MRC)
framework for complex intervention development, implementation and evaluation
[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. Other useful guidance is the nine principles for developing interventions based
on models [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] which is developed by the Government Social Research and provides
practical guidance on intervention development using theoretical underpinnings.
These guidelines highlight the importance of interventions being theory-driven, piloted
and evaluated effectively. They emphasise understanding the target behaviour, its key
influencing behavioural determinants, and where possible, identifying effective
intervention techniques that have previously worked for the targeted factors. As discussed,
in terms of this PhD research, stages 1 and 2 are aiming to explore the determinants of
security behaviour and will inform potential areas for intervention. Once target
behaviours have been identified, the subsequent studies of stage 3 will aim to improve the
chosen security behaviour of interest using interventions.
        </p>
        <p>Evaluating successful behaviour change</p>
        <p>It is important that any changes resulting from an intervention are due to the
intervening factors at play and not due to extraneous variables. It is therefore necessary
that the most appropriate evaluation methods are in place to assess the effectiveness
of the intervention and provide empirical evidence of its efficiency. Random control
trials (RCTs) are considered the gold standard for evaluation and have been widely</p>
        <p>
          used within the health domain for clinical trials and also within the psychology
discipline. They provide valid and reliable evidence of the effectiveness of an intervention
and are considered the best way to evaluate a behaviour change attempt. To design
RCTs, participants are allocated to either an experimental condition (behaviour
change attempt) or a comparison (control) condition. This design endeavours to
overcome confounding variables by exposing participants in the experimental and control
condition to the same experimental factors except the behaviour change intervention.
It is assumed that differences in behaviour resulting from the research are due to the
intervention and not extraneous variables. To achieve this it is important that
participants in the intervention condition and those in the control condition are as ‘closely
matched’ as possible by recruiting participants from the same recruitment sample and
randomly allocating them to conditions. Randomisation to conditions reduces
selection bias by ensuring that the only differences between the intervention and control
condition will be due to chance and any observed differences will be due to the
intervention condition. The use of RCTs for behaviour change is advocated extensively
throughout behaviour change literature including the MRC framework and Cabinet
Office guidance for developing public policy related to changing behaviour [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. The
behaviour change studies of stage 3 will therefore adopt RCTs as they are deemed the
most appropriate methodology for assessing intervention efforts.
        </p>
        <p>Measuring security behaviour</p>
        <p>
          Behaviour is complex making it equally complex to quantify and measure it.
Previous research exploring security behaviour in employees has primarily adopted
selfreport measures to assess an individual’s security performance. Typically this has
explored the extent to which they comply to information security policies and specific
security behaviours such as email-related security behaviour [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Despite many
advantages to using self-report data, they are a type of subjective measure as they rely
on individual awareness. Therefore, they are open to many biases and are potentially
unreliable. Objective measures, on the other hand, are considered to be more robust
and accurate indicators of behaviour because they are less vulnerable to biases. In the
context of security, an objective measure could be a password log to give an
indication of frequency of password changes. Where possible, the behaviour change studies
in this PhD research will measure both subjective and objective measures of
behaviour in order to increase reliability, validity and measurement of behaviour change
effectiveness.
        </p>
        <p>Cyber Security behaviour change: An example</p>
        <p>Current security systems within in the workplace (such as anti-virus software, for
example) can be considered quite passive as they are often mandated by IT support
and require little input from employees. Furthermore employees are often unaware of
the function and utility of this software on their work computer. An active
intervention could be designed to utilise the information from anti-virus software and other
security systems to tailor risk messages to employees regarding their behaviour when
online and ultimately improve their virus prevention behaviour. The intention of the
intervention would be to increase perceived susceptibility to receiving a virus. This</p>
        <p>
          would be achieved by providing information about the consequences of visiting
insecure websites and downloading attachments. Furthermore, indicating the level of risk
associated with the employees’ behaviour would provide a “visualisation” of their
actions (e.g. an insecure website would be more noticeable if the colour red was used
in a message). Individuals are influenced by sub-conscious cues and this “priming”
through visualisation is important for behaviour change [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. It would be anticipated
that by enhancing perceived susceptibility to viruses and priming secure behaviour
would lead to behaviour change in employees.
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Contributions</title>
      <p>It is hoped that this research will help understand how to promote security
behaviour change within the workplace and in doing so, aid evaluation of current approaches
to information security. The main contribution is to develop interventions that are
theory based and provide empirical evidence of their efficiency. Furthermore, the
findings from this research will aid in the re-development of security solutions and
provide resolutions for how they can be designed to encourage secure behaviour.
5
6</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgements References</title>
      <p>I would like to thank my PhD supervisors, Lynne Coventry and Linda Little, for
their support and guidance with this research.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Cabinet</given-names>
            <surname>Office</surname>
          </string-name>
          .
          <article-title>The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world</article-title>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Price</given-names>
            <surname>Waterhouse Coopers</surname>
          </string-name>
          .
          <source>2012 Global State of Information Security Survey</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Stanton</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stam</surname>
            ,
            <given-names>K.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mastrangelo</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jolton</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Analysis of end user security behaviours</article-title>
          .
          <source>Computers &amp; Security</source>
          .
          <volume>24</volume>
          ,
          <fpage>124</fpage>
          -
          <lpage>133</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bulgurcu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cavusoglu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benbasat</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness</article-title>
          .
          <source>MIS Quarterly</source>
          .
          <volume>34</volume>
          ,
          <fpage>523</fpage>
          -
          <lpage>548</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Ifinedo</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory</article-title>
          .
          <source>Computers &amp; Security</source>
          .
          <volume>31</volume>
          ,
          <fpage>83</fpage>
          -
          <lpage>95</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Herath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rao</surname>
            ,
            <given-names>H. R.</given-names>
          </string-name>
          :
          <article-title>Protection motivation and deterrence: a framework for security policy compliance in organisations</article-title>
          .
          <source>European Journal of Information Systems</source>
          .
          <volume>18</volume>
          ,
          <issue>2</issue>
          ,
          <fpage>106</fpage>
          -
          <lpage>125</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Herath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rao</surname>
            ,
            <given-names>H. R.</given-names>
          </string-name>
          :
          <article-title>Encouraging information security behaviours in organisations: Role of penalties, pressures and perceived effectiveness</article-title>
          .
          <source>Decision Support Systems</source>
          .
          <volume>47</volume>
          ,
          <issue>2</issue>
          ,
          <fpage>154</fpage>
          -
          <lpage>165</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Fishbein</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cappella</surname>
            ,
            <given-names>J. N.</given-names>
          </string-name>
          :
          <article-title>The role of theory in developing effective health communications</article-title>
          .
          <source>Journal of Communication</source>
          .
          <volume>56</volume>
          ,
          <fpage>S1</fpage>
          -
          <lpage>S17</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Anderson</surname>
            ,
            <given-names>C. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agarwal</surname>
          </string-name>
          , R.:
          <article-title>Practicing safe computing: a multimedia empirical examination of home computer user security behavioural intentions</article-title>
          .
          <source>MIS Quarterly</source>
          .
          <volume>34</volume>
          ,
          <issue>3</issue>
          ,
          <fpage>613</fpage>
          -
          <lpage>643</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Puhakainen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Siponen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Improving employees' compliance through information systems security training: An action research study</article-title>
          .
          <source>MIS Quarterly</source>
          .
          <volume>34</volume>
          ,
          <fpage>757</fpage>
          -
          <lpage>778</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Davinson</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sillence</surname>
          </string-name>
          , E.:
          <article-title>It won't happen to me: Promoting secure behaviour among internet users</article-title>
          .
          <source>Computers in Human Behaviour</source>
          .
          <volume>26</volume>
          ,
          <fpage>1739</fpage>
          -
          <lpage>1747</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Elo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kyngäs</surname>
          </string-name>
          , H.:
          <article-title>The qualitative content analysis process</article-title>
          .
          <source>Journal of advanced nursing. 62</source>
          ,
          <issue>1</issue>
          ,
          <fpage>107</fpage>
          -
          <lpage>115</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Barter</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Renold</surname>
          </string-name>
          , E.:
          <article-title>'I wanna tell you a story': exploring the application of vignettes in qualitative research with children and young people</article-title>
          .
          <source>International Journal of Social Research Methodology. 3</source>
          ,
          <issue>4</issue>
          ,
          <fpage>307</fpage>
          -
          <lpage>323</lpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ritchie</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spencer</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Qualitative data analysis for applied policy research</article-title>
          . In: Bryman,
          <string-name>
            <given-names>A.</given-names>
            &amp;
            <surname>Burgess</surname>
          </string-name>
          , R.G. [eds.] “
          <article-title>Analyzing qualitative data”</article-title>
          .
          <source>Sage</source>
          , London. (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Abraham</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Michie</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A taxonomy of behavior change techniques used in interventions</article-title>
          .
          <source>Health psychology. 27</source>
          ,
          <issue>3</issue>
          ,
          <issue>379</issue>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Campbell</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fitzpatrick</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haines</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kinmonth</surname>
            ,
            <given-names>A. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandercock</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spiegelhalter</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyrer</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Framework for design and evaluation of complex interventions to improve health</article-title>
          .
          <source>BMJ: British Medical Journal</source>
          .
          <volume>321</volume>
          ,
          <issue>7262</issue>
          ,
          <issue>694</issue>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Darnton</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>GSR Behaviour Change Knowledge Review. Practical Guide: An overview of behaviour change models and their uses</article-title>
          .
          <source>HMT Publishing Unit</source>
          , London (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Haynes</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldacre</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torgerson</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Test, learn, adapt: developing public policy with randomised controlled trials</article-title>
          . Cabinet
          <string-name>
            <surname>Office-Behavioural Insights Team</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Ng</surname>
          </string-name>
          , B.‐Y.,
          <string-name>
            <surname>Kankanhalli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Studying users' computer security behaviour: A health belief perspective</article-title>
          .
          <source>Decision Support Systems</source>
          .
          <volume>46</volume>
          ,
          <issue>4</issue>
          ,
          <fpage>815</fpage>
          ‐
          <lpage>825</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>Cabinet</given-names>
            <surname>Office</surname>
          </string-name>
          . MINDSPACE:
          <article-title>Influencing behaviour through public policy</article-title>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>