[
Aldasoro, I., Frost, J., Gambacorta, L., & Whyte, D. (2021, January). Covid-19 and cyber risk in the financial sector. BIS Bulletin, 37, 1–9.
]Search in Google Scholar
[
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees’ cybersecurity behaviors. Computers in Human Behavior, 69, 437–443.10.1016/j.chb.2016.12.040
]Search in Google Scholar
[
Association of Certified Fraud Examiners. (2020, December). Fraud in the wake of COVID-19: Benchmarking report.
]Search in Google Scholar
[
Bada, M., Sasse, A. M., & Nurse, J.R.C. (2015). Cyber security awareness campaigns: Why do they fail to change behaviour?. (Paper presented at the 1st International Conference on Cyber Security for Sustainable Society). Sustainable Society Network, 118–131.
]Search in Google Scholar
[
Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, R. W. (2009). If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. European Journal of Information Systems, 18(2), 151–164.10.1057/ejis.2009.8
]Search in Google Scholar
[
Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36–45.10.1016/j.jisa.2018.08.002
]Search in Google Scholar
[
Chandarman, R., & Van Niekerk, B. (2017). Students’ cybersecurity awareness at a private tertiary educational institution. The African Journal of Information and Communication, 20, 133–155.10.23962/10539/23572
]Search in Google Scholar
[
Chłoń-Domińczak, A., & Kotowska, I. E. (Eds.). (2015). Uwarunkowania decyzji edukacyjnych. Warszawa: Instytut Badań Edukacyjnych.
]Search in Google Scholar
[
Da Veiga, A. (2018). An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture. Information & Computer Security, 26(5), 584–612.10.1108/ICS-08-2017-0056
]Search in Google Scholar
[
Dvorak, T., & Hanley, H. (2010). Financial literacy and the design of retirement plans. The Journal of Socio-Economics, 39(6), 645–652.10.1016/j.socec.2010.06.013
]Search in Google Scholar
[
ESRB. (2018). Press release: The general board of the European Systemic Risk Board held its 32nd regular meeting on 6 Dec 2018.
]Search in Google Scholar
[
Frijns, B., Gilbert, A., & Tourani-Rad, A. (2014). Learning by doing: The role of financial experience in financial literacy. Journal of Public Policy, 34(1), 123–154.10.1017/S0143814X13000275
]Search in Google Scholar
[
Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2020). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 1–11.10.1080/08874417.2020.1845583
]Search in Google Scholar
[
Grazioli, S., & Wang, A. (2001). Looking without seeing: Understanding unsophisticated consumers’ success and failure to detect Internet deception. (ICIS 2001 Proceedings, 193–203).
]Search in Google Scholar
[
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125.10.1057/ejis.2009.6
]Search in Google Scholar
[
Hosany, S., & Martin, D. (2012). Self-image congruence in consumer behavior. Journal of Business Research, 65(5), 685–691.10.1016/j.jbusres.2011.03.015
]Search in Google Scholar
[
Hughes-Larteya, K., Li, M., Botchey, F. E., & Qin, Z. (2021). Human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon, 7(3), 1–13.10.1016/j.heliyon.2021.e06522
]Search in Google Scholar
[
Hussain, A., Mohamed, A., & Razali, S. (2020). A review on cybersecurity: Challenges & emerging threats. (NISS2020: Proceedings of the 3rd International Conference on Networking, Information Systems & Security No. 28, 1–7).
]Search in Google Scholar
[
Junger, M., Montoya, & L., Overink, F.-J. (2017). Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior, 66, 75–87.10.1016/j.chb.2016.09.012
]Search in Google Scholar
[
Kennison, S. M., & Chan-Tin, E. (2020). Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Frontiers in Psychology, 11, 1–9.10.3389/fpsyg.2020.546546
]Search in Google Scholar
[
Kostyuk, N., & Wayne, C. (2021). The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public. Journal of Global Security Studies, 6(2), 1–25.10.1093/jogss/ogz077
]Search in Google Scholar
[
Kosub, T. (2015). Components and challenges of integrated cyber risk management. Zeitschrift für die gesamte Versicherungswissenschaft, 104, 615–634.10.1007/s12297-015-0316-8
]Search in Google Scholar
[
Krol, K., Moroz, M., & Sasse, M. A. (2012). Don’t work. Can’t work? Why it’s time to rethink security warnings. (Paper presented at the 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 1–8).
]Search in Google Scholar
[
Li, H., Xie, K. L., & Zhang, Z. (2020). The effects of consumer experience and disconfirmation on the timing of online review: Field evidence from the restaurant business. International Journal of Hospitality Management, 84, 1–11.10.1016/j.ijhm.2019.102344
]Search in Google Scholar
[
Lis, P., & Mendel, J. (2019). Cyberattacks on critical infrastructure: An economic perspective. Economics and Business Review, 5(2), 24–47.10.18559/ebr.2019.2.2
]Search in Google Scholar
[
Lusardi, A., & Tufano, P. (2015). Debt literacy, financial experiences, and overindebtedness. Journal of Pension Economics and Finance, 14(4), 332–368.10.1017/S1474747215000232
]Search in Google Scholar
[
Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32–44.10.1016/j.chb.2018.01.028
]Search in Google Scholar
[
Mashiane, T., & Kritzinger, E. (2018). Cybersecurity behaviour: A conceptual taxonomy. In: O. Blazy, C. Y. Yeun (Eds.), Information security. Theory and practice. (12th IFIP WG 11.2 International Conference, WISTP, 147–156).
]Search in Google Scholar
[
Mashiane, T., & Kritzinger, E. (2021). Identifying behavioral constructs in relation to user cybersecurity behavior. Eurasian Journal of Social Sciences, 9(2), 98–122.10.15604/ejss.2021.09.02.004
]Search in Google Scholar
[
McKinsey. (2020). Digital challengers in the next normal in Central and Eastern Europe on a path to digitally-led growth. McKinsey Digital.
]Search in Google Scholar
[
Milošević, N., Dobrota, M., & Barjaktarović Rakočević, S. (2018). Digital economy in Europe: Evaluation of countries’ performances. Proceedings of Rijeka Faculty of Economics: Journal of Economics and Business, 36(2), 861–880.
]Search in Google Scholar
[
Mruk, C. J. (2006). Self-esteem research, theory, and practice: Toward a positive psychology of self-esteem. New York: Springer Publishing Company.
]Search in Google Scholar
[
Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321.10.1080/0960085X.2020.1771222
]Search in Google Scholar
[
Olmstead, K., & Smith, A. (2017, March 22). What the public knows about cybersecurity. Pew Research Center.
]Search in Google Scholar
[
Parsons, K. M., Young, E., Butavicius, M. A., McCormac, A., Pattinson, M., & Jerram, C. (2015). The influence of organizational information security culture on information security decision making. Journal of Cognitive Engineering and Decision Making, 9(2), 117–129.10.1177/1555343415575152
]Search in Google Scholar
[
Reegård, K., Blackett, C., & Katta, V. (2019). The concept of cybersecurity culture. (Paper presented on the 29th European Safety and Reliability Conference).10.3850/978-981-11-2724-3_0761-cd
]Search in Google Scholar
[
Shillair, R., Cotton, S. R., Tsai, H.-Y. S., Alhabash, S., LaRose, R., & Rifon, N. J. (2005). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199–207.10.1016/j.chb.2015.01.046
]Search in Google Scholar
[
Tedder, K. (2020). The escalation of digital fraud: Global impact of the coronavirus. Report by Javelin Strategy & Research and SAS.
]Search in Google Scholar
[
Van Rooij, M., Lusardi, A., & Alessie, R. (2011a). Financial literacy and stock market participation. Journal of Financial Economics, 101(2), 449–-472.10.1016/j.jfineco.2011.03.006
]Search in Google Scholar
[
Van Rooij, M., Lusardi, A., & Alessie, R. (2011b). Financial literacy and retirement planning in the Netherlands. Journal of Economic Psychology, 32(4), 593–608.10.1016/j.joep.2011.02.004
]Search in Google Scholar
[
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3), 190–198.10.1016/j.im.2012.04.002
]Search in Google Scholar
[
Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R’s”. Heliyon, 5(12), 1–8.10.1016/j.heliyon.2019.e02855
]Search in Google Scholar
[
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97–102.10.1016/j.cose.2013.04.004
]Search in Google Scholar
[
Watanapongvanich, S., Binnagan, P., Putthinun, P., Khan, M. S. R., & Kadoya, Y. (2021). Financial literacy and gambling behavior: Evidence from Japan. Journal of Gambling Studies, 37(3), 445–465.10.1007/s10899-020-09936-3
]Search in Google Scholar
[
Wogalter, M. S., Laughery, Sr. K. R., & Mayhorn, C. B. (2012). Warnings and hazard communications. In: G. Salvendy (Ed.), Handbook of human factors and ergonomics (4 ed., pp. 868–894). Hoboken, NJ: John Wiley & Sons.
]Search in Google Scholar
[
Yasin, A., Liu, L., Li, T., Wang, J., & Zowghi, D. (2018). Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Information and Software Technology, 95, 179–200.10.1016/j.infsof.2017.12.002
]Search in Google Scholar
[
Yildirim, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability. International Journal of Information Security, 18, 741–759.10.1007/s10207-019-00429-y
]Search in Google Scholar
[
Związek Banków Polskich (ZBP). (2021). Postawy Polaków wobec cyberbezpieczeństwa. Badanie Warszawskiego Instytutu Bankowości zrealizowane w ramach projektu Bezpieczeństwo w Cyberprzestrzeni. Retrieved from https://zbp.pl/getmedia/65f267e4-3316-4198-9cce-411d8f03de32/Postawy_Polakow_wobec_Cyberbezpieczenstwa_v-3
]Search in Google Scholar
[
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 1–16.
]Search in Google Scholar