<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMI</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Med Inform</journal-id>
      <journal-title>JMIR Medical Informatics</journal-title>
      <issn pub-type="epub">2291-9694</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v8i7e15880</article-id>
      <article-id pub-id-type="pmid">32706677</article-id>
      <article-id pub-id-type="doi">10.2196/15880</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Good News and Bad News About Incentives to Violate the Health Insurance Portability and Accountability Act (HIPAA): Scenario-Based Questionnaire Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Paradice</surname>
            <given-names>David</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Chiarini Tremblay</surname>
            <given-names>Monica</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Gaia</surname>
            <given-names>Joana</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4243-3835</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>Xunyi</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8037-0962</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Yoo</surname>
            <given-names>Chul Woo</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2822-9344</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Sanders</surname>
            <given-names>G Lawrence</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>State University of New York at Buffalo</institution>
            <addr-line>325G Jacobs</addr-line>
            <addr-line>Buffalo, NY, New York</addr-line>
            <country>United States</country>
            <phone>1 7166452373</phone>
            <email>mgtsand@buffalo.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-1501-8663</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>State University of New York at Buffalo</institution>
        <addr-line>Buffalo, NY</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Hankamer School of Business</institution>
        <institution>Baylor University</institution>
        <addr-line>Waco, TX</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Florida Atlantic University</institution>
        <addr-line>Boca Raton, FL</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: G Lawrence Sanders <email>mgtsand@buffalo.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>7</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>7</month>
        <year>2020</year>
      </pub-date>
      <volume>8</volume>
      <issue>7</issue>
      <elocation-id>e15880</elocation-id>
      <history>
        <date date-type="received">
          <day>16</day>
          <month>8</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>18</day>
          <month>9</month>
          <year>2019</year>
        </date>
        <date date-type="rev-recd">
          <day>13</day>
          <month>11</month>
          <year>2019</year>
        </date>
        <date date-type="accepted">
          <day>14</day>
          <month>5</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Joana Gaia, Xunyi Wang, Chul Woo Yoo, G Lawrence Sanders. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 20.07.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Medical Informatics, is properly cited. The complete bibliographic information, a link to the original publication on http://medinform.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://medinform.jmir.org/2020/7/e15880" xlink:type="simple"/>
      <related-article related-article-type="correction-forward" xlink:title="This is a corrected version. See correction statement in:" xlink:href="https://medinform.jmir.org/2020/9/e24243/" vol="8" page="e24243"> </related-article>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The health care industry has more insider breaches than any other industry. Soon-to-be graduates are the trusted insiders of tomorrow, and their knowledge can be used to compromise organizational security systems.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The objective of this paper was to identify the role that monetary incentives play in violating the Health Insurance Portability and Accountability Act’s (HIPAA) regulations and privacy laws by the next generation of employees. The research model was developed using the economics of crime literature and rational choice theory. The primary research question was whether higher perceptions of being apprehended for violating HIPAA regulations were related to higher requirements for monetary incentives.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Five scenarios were developed to determine if monetary incentives could be used to influence subjects to illegally obtain health care information and to release that information to individuals and media outlets. The subjects were also asked about the probability of getting caught for violating HIPAA laws. Correlation analysis was used to determine whether higher perceptions of being apprehended for violating HIPAA regulations were related to higher requirements for monetary incentives.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Many of the subjects believed there was a high probability of being caught. Nevertheless, many of them could be incentivized to violate HIPAA laws. In the nursing scenario, 45.9% (240/523) of the participants indicated that there is a price, ranging from US $1000 to over US $10 million, that is acceptable for violating HIPAA laws. In the doctors’ scenario, 35.4% (185/523) of the participants indicated that there is a price, ranging from US $1000 to over US $10 million, for violating HIPAA laws. In the insurance agent scenario, 45.1% (236/523) of the participants indicated that there is a price, ranging from US $1000 to over US $10 million, for violating HIPAA laws. When a personal context is involved, the percentages substantially increase. In the scenario where an experimental treatment for the subject’s mother is needed, which is not covered by insurance, 78.4% (410/523) of the participants would accept US $100,000 from a media outlet for the medical records of a politician. In the scenario where US $50,000 is needed to obtain medical records about a famous reality star to help a friend in need of emergency medical transportation, 64.6% (338/523) of the participants would accept the money.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>A key finding of this study is that individuals perceiving a high probability of being caught are less likely to release private information. However, when the personal context involves a friend or family member, such as a mother, they will probably succumb to the incentive, regardless of the probability of being caught. The key to reducing noncompliance will be to implement organizational procedures and constantly monitor and develop educational and training programs to encourage HIPAA compliance.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>cyber security</kwd>
        <kwd>data security</kwd>
        <kwd>Health Insurance Portability and Accountability Act</kwd>
        <kwd>motivation</kwd>
        <kwd>economics of crime</kwd>
        <kwd>rational choice theory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced legislation for protecting the privacy of personal health information. Although the health care industry in the United States is one of the most regulated industries, compliance with the regulations is variable. In 2017, more than 14.6 million people were affected by data breaches [<xref ref-type="bibr" rid="ref1">1</xref>]. Cybersecurity reports illustrate that health care data breaches will continue to increase [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref4">4</xref>]. Some of these breaches are simply external malicious attacks, but they are often the result of rent-seeking and illegal behaviors of insiders [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref7">7</xref>]. Verizon’s 2018 Data Breach Investigations Report paints a bleak picture of the health care industry in which errors and misuse of data are widespread [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. Health care is the only vertical industry that has more insiders behind breaches: 58% when compared with external actors at 42%. This is probably the reason why the majority of the US population does not trust organizations that share health care information [<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref12">12</xref>].</p>
        <p>The objective of this study was to identify the role that monetary incentives play in the next generation of employees when it comes to violating HIPAA regulations and privacy laws. These individuals are of particular interest because many will also become trusted insiders, with the knowledge and insight to significantly compromise organizational security systems. The research model was developed using the economics of crime and rational choice theory frameworks to identify situations where employees might engage in illegal breach behavior. Scenarios were developed for 5 situations to determine whether monetary incentives could be used to influence subjects to obtain health care information and to release that information. Approximately 35.4% (185/523) to 45.9% (240/523) of the survey participants indicated that there is a price, ranging from US $1000 to over US $10 million, that is acceptable for violating HIPAA laws. In addition, subjects were also asked about their perceived probability of getting caught for violating HIPAA laws. More than 50.1% (262/523) of the participants indicated that the probability of getting caught was more than 74.9% (392/523). Nevertheless, many of them could still be incentivized to violate HIPAA laws. The correlations between the probability of being apprehended and the level of the monetary incentive required for violating HIPAA ranged from 0.14 to 0.43.</p>
      </sec>
      <sec>
        <title>Related Work</title>
        <sec>
          <title>Foundation Research on the Economics of Crime</title>
          <p>Gary Becker’s seminal paper on the market for criminal activity posits that potential criminals examine returns on criminal activity as a function of the probability of getting caught or apprehended and the severity of the punishment [<xref ref-type="bibr" rid="ref13">13</xref>]. He argued that criminals commit crimes when they perceive the expected benefits from crime would exceed the expected cost of crime. Becker received a Nobel Prize for his research on the economics of crime. Becker’s [<xref ref-type="bibr" rid="ref14">14</xref>] economics of crime model has received more than 1000 citations a year, although it was published in 1968.</p>
          <p>General deterrence theory in the information systems area is used to explore the effects of countermeasures and security policies on protecting information and improving security [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. Early papers by Gopal and Sanders [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>] examined the role of preventive and deterrent controls on software piracy. Herath and Rao [<xref ref-type="bibr" rid="ref19">19</xref>] found that the perception of certainty of detections is related to intentions to comply with security policies, but that severity of penalty did not have a deterrent effect. However, deterrence theory research results have been inconsistent and contradictory, and more attention is needed on the theoretical and methodological foundations [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
          <p>General deterrence theory is based on Gary Becker’s theory that criminal behavior is deterred when the expected loss (penalty of violating the law) is greater than the expected gain. Many studies involving deterrence theory have focused primarily on the effect of penalties [<xref ref-type="bibr" rid="ref21">21</xref>]. A framework known as routine activity theory states that a crime can arise from changes in the structured situation or environmental setting, and 4 elements—value, inertia, visibility, and access—would affect the suitability of a target of crime [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref22">22</xref>]. The following paragraphs provide details on the conceptual foundations of the Becker model.</p>
          <p>Engaging in criminal activity involves a choice with consequences and opportunities, where individuals perceive them differently. They can be deterred if there is a likelihood of punishment, and the punishment is severe [<xref ref-type="bibr" rid="ref23">23</xref>]. The market model for crime assumes that offenders, victims, and law enforcement engage in optimizing behavior related to their preferences and that offenders have expectations about returns, the propensity for being caught, and the resulting punishment [<xref ref-type="bibr" rid="ref23">23</xref>]. This model assumes that potential participants in illegal activities are rational economic actors. Empirical research in the area typically uses an event study that examines whether changes in laws, punishment (incarceration and fines), increases in law enforcement, drug usage, and the economy lead to increases or decreases in criminal activity [<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref26">26</xref>].</p>
          <p>Wrongdoers use a calculus of rational choice to determine whether to engage in criminal activity [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref27">27</xref>]. An individual will commit a crime if the inequality in <xref rid="figure1" ref-type="fig">Figure 1</xref> holds [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>The Becker crime utility model.</p>
            </caption>
            <graphic xlink:href="medinform_v8i7e15880_fig1.PNG" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>The <italic>u<sub>positive</sub></italic> term is the expected utility obtained by the potential perpetrator if he or she commits the crime. This utility can mean both monetary and nonmonetary gains. The <italic>u<sub>negative</sub></italic> term is the expected utility resulting from being apprehended and the ensuing punishment. The <italic>p</italic> term is the probability of being apprehended or getting caught. This is a perception of the risk of offending [<xref ref-type="bibr" rid="ref27">27</xref>]. The <italic>u<sub>legal</sub></italic> term is the utility derived when he or she does not commit the crime. If the net expected gains from the left side of the inequality are greater than the utility of engaging in legal work on the right side, then the individual will commit the crime.</p>
          <p>We illustrate a simplified model of the calculations using 2 equations that form the basis of the model. The criminal will weigh the costs and benefits in the following way:</p>
          <disp-quote>
            <p>Benefits=Probability of success × (Gains from crime + Other benefits)</p>
          </disp-quote>
          <disp-quote>
            <p>Costs=Probability of getting caught × (Punishment for getting caught + Other costs)</p>
          </disp-quote>
          <p>Assume that the expected profits to the potential perpetrator for engaging in illegal activity is US $10,000 and that the probability of success or not getting caught is 90%. The other benefits may be that the potential perpetrator finds excitement from participating and even camaraderie. The utility of these other benefits can be translated into US $2000. Therefore, the total potential benefit is US $10,800 (0.90 × [US $10,000 + US $2000]).</p>
          <p>On the costs side, let us assume that the perpetrator perceives that fines of US $16,000 are typically levied as punishment for this type of crime. The other costs might be a loss of job for a few months and social isolation that can be translated into US $6000. The probability of getting caught is 0.10. The total potential cost for engaging in this activity if caught is US $2200 (0.10 × [US $16,000 + US $6,000]).</p>
          <p>As the benefits (US $10,800) exceed the costs (US $2200), the individual might engage in criminal activity if this amount of money is perceived as sufficient. As the results of this study show, sometimes there are never enough benefits for people to engage in illegal activities. The other costs are sometimes perceived as being too large, and this translates to a high level of disutility. The other costs could include the loss of a job, prison time, and social desirability effect from a large social network.</p>
          <p>There are ongoing discussions and controversy about utility theory and the use of rational decision making among traditional and behavioral economists. Behavioral economists do not abandon the notion that humans can be rational, but they think that there are situations where decision making is less than rational and that more robust models are needed to understand the vagaries of human behavior [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref33">33</xref>]. Our research draws on a combination of traditional economics and behavioral economics to understand the role of incentives in modeling choice behavior related to criminal activity. Empirical evidence supports the role of incentives in terms of labor market experiences and perceptions of the probability of being apprehended and incarcerated [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
          <p>The economics of crime model posits that deterrence will work to counter monetary gains if the penalties are large and if there is a certain level of risk of being caught. There is some empirical evidence that the criminal justice system’s ability to deter crime is weaker than thought [<xref ref-type="bibr" rid="ref26">26</xref>]. However, vibrant labor markets and high manufacturing wages appear to be very effective in deterring crime. In a recent review on the economics of crime, Stephen Levitt of Freakonomics fame [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>] predicts that there will be fewer research studies on the economics of crime because of declining criminal activity:</p>
          <disp-quote>
            <p>In some sense, however, public policies to reduce crime (many of them informed by economic thinking) have proven too successful from the perspective of the academic interested in studying crime. With the crime rate at less than half the level it was two decades ago in the United States and lower almost everywhere else in the world as well, the demand for crime research has no doubt also been diminished[<xref ref-type="bibr" rid="ref37">37</xref>]</p>
          </disp-quote>
          <p>Although it may be true that certain crimes are decreasing, criminal activity involving cybercrime, information security breaches, and privacy intrusions have resulted in substantial dollar losses. HIPAA noncompliance has become a very serious problem. As noted earlier, in 2017, more than 14.6 million people were affected by data breaches, and in the health care industry, errors and misuse of data are widespread [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
          <p>We agree, in part, with Levitt’s assertion that academic research has made some gains; however, we believe that the research is at an early stage when it comes to cybercriminal activity, particularly in health care practice. There is evidence that the number of security incidents has decreased, but the dollar amount of financial losses per incident has increased [<xref ref-type="bibr" rid="ref37">37</xref>]. Underreporting of cybercrime is an elephant-in-the-room problem. Companies are sometimes reticent to report cybercrime because they are embarrassed, and they fear that they will lose customers.</p>
        </sec>
        <sec>
          <title>Insider Attacks</title>
          <p>Insiders can be current and former employees, contractors, and business partners that have access to an organization’s network, system, or data. Insiders can engage in malicious or unintentional activities that negatively affect the confidentiality, integrity, and availability of an organization’s information system [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>].</p>
          <p>A recent large-scale, country-wide study found that cyberattacks by outsiders are strategic and often motivated by economic incentives [<xref ref-type="bibr" rid="ref40">40</xref>]. These attacks can adversely affect business operations and compromise sensitive customer information. However, it appears that trusted insider threats, traced to existing employees, are also related to economic incentives.</p>
          <p>The focus of this research is on insider attacks because they account for a substantial portion of privacy violations, including funds embezzlement; pilfering of trade secrets; theft of customer information and competitive information; and a variety of illegal, fraudulent activities [<xref ref-type="bibr" rid="ref41">41</xref>], and they can also result in significant losses [<xref ref-type="bibr" rid="ref42">42</xref>]. Malicious insiders can cause more damage to the organization than traditional hackers [<xref ref-type="bibr" rid="ref43">43</xref>]. The average cost of an insider attack is US $8 million per year [<xref ref-type="bibr" rid="ref44">44</xref>], but the fallout from a breach can lead to long-term loss of customers, lawsuits, and damaged reputations.</p>
          <p>In some instances, insider security breaches occur because of negligence. For example, some people do not know that they are not supposed to maintain social security numbers in a temporary file or email a medical diagnosis to another doctor without obtaining permission. Insiders pose a considerable threat to organizations as they can bypass several security measures using their knowledge and access to the systems [<xref ref-type="bibr" rid="ref45">45</xref>]. The motives behind malicious attacks are diverse, including seeking revenge and retribution, thrills, anarchy, and curiosity. Financial motives, however, are the undercurrent of most attacks and include reasons such as student loan debt, financial pressures caused by health care needs or mounting personal debt (eg, credit cards and gambling), or loss of financial stability (job loss or demotion). Threats from trusted insiders are difficult to detect, are embarrassing, damage the reputation of the organization, are often destructive, and cause serious operational disruptions [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Hypotheses Development</title>
        <p>The primary objective of this study was to identify the role that monetary incentives play in violating HIPAA regulations and privacy laws in the next generation of employees. The conceptual model is presented in <xref rid="figure2" ref-type="fig">Figure 2</xref>. The research hypotheses draws on the economics of crime and rational choice theory frameworks to identify situations where employees might engage in illegal breach behavior.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>The conceptual model. HIPAA: Health Insurance Portability and Accountability Act.</p>
          </caption>
          <graphic xlink:href="medinform_v8i7e15880_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>Our first research hypothesis examines the role of the level of monetary inducements and the perceived probability of being apprehended in violating HIPAA laws.</p>
        <disp-quote>
          <p>Hypothesis 1: Higher perceptions of being apprehended for violating Health Insurance Portability and Accountability Act regulations are related to higher requirements for monetary incentives.</p>
        </disp-quote>
        <p>Our second research hypothesis focuses on the role of the situational or personal context in violating HIPAA laws. Under the specific context in which a family member or friend needs critical medical assistance that is not covered by insurance, we believe that the relationship will not be as strong as the relationship in Hypothesis 1. Sometimes, there are compelling personal reasons for committing offenses [<xref ref-type="bibr" rid="ref41">41</xref>]. They can include medical bills, credit card debt, addictions, and the desire to help a family or friend in need. Scenario 4 involves the need to pay for an experimental operation for the subject’s mother. Scenario 5 involves the need to pay for an ambulance airlift for a close friend.</p>
        <disp-quote>
          <p>Hypothesis 2: Higher Perceptions of Being Apprehended for Violating Health Insurance Portability and Accountability Act Regulations are Related to Higher Requirements for Monetary Incentives When the Personal Context Involves a Family Member or Friend, and the Strength of the Relationship is Not as Strong as in Hypothesis 1.</p>
        </disp-quote>
        <p>The last objective of this study was to determine if the perceived risk or probability of getting caught could be modified by using fear appeals as a deterrent [<xref ref-type="bibr" rid="ref20">20</xref>]. Approximately 50% of the subjects were targeted to receive information related to real people receiving fines and jail time for violating HIPAA laws (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). This information is a <italic>fear treatment</italic>, and it is used as a deterrent in this study [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>].</p>
        <disp-quote>
          <p>Hypothesis 3: The group receiving the fear appeal treatment will have higher perceptions of the probability of being caught violating HIPAA regulations than the group who did not receive the fear appeals treatment.</p>
        </disp-quote>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Participants</title>
        <p>The local institutional review board approved the protocol for the pilot study and the main study. A questionnaire was developed to examine the relationships among an individual’s propensity to reveal private health care information when offered a monetary incentive and the subject’s perception of getting caught violating HIPAA laws. The pilot study involved medical residents and individuals in an executive MBA program, some of who work in the health care industry as executives. After collecting data for the pilot study, significant time was spent in refining the instrument and scenarios to avoid the complexity involved in estimating probabilities and trade-offs found in many research studies involving scenarios and simulated games used to evaluate choice behavior. The data were collected in May 2018.</p>
        <p>An important consideration in designing the survey was obtaining information from the subjects on the probability of getting caught if they violated health care regulations. As noted earlier, the questionnaire items were anchored using numerical probabilities and verbal labels because this approach has proven to be a very effective method for eliciting probabilities [<xref ref-type="bibr" rid="ref49">49</xref>], and it counters some of the measurement problems encountered in measuring perceived arrest rates involved in studies of rational choice theory [<xref ref-type="bibr" rid="ref50">50</xref>].</p>
        <p>The questionnaire was refined and distributed to 574 students in an undergraduate information technology course. This was a voluntary survey, and credits were given for completing the questionnaire. We chose an undergraduate sample because they were more computer proficient, they will be entering the workforce in the immediate future, they are not as aware of HIPAA compliance regulations, and they are less concerned with social desirability issues. These students have majored in business IT, and they have largely been trained for business evaluation and business decision making, but not much on health care, especially the regulations or laws in health care. This is a closed survey that was only open to this particular sample, and we used a password to ensure this.</p>
        <p>In social science research, social desirability bias is a type of response bias that is the tendency of survey respondents to answer questions in a manner that will be viewed favorably by others. It can take the form of overreporting <italic>good behavior</italic> or underreporting <italic>bad</italic> or undesirable behavior [<xref ref-type="bibr" rid="ref51">51</xref>]. Social desirability bias occurs when subjects are less prone to answer questions truthfully, which could diminish their social prestige [<xref ref-type="bibr" rid="ref52">52</xref>]. We assert that the medical interns and the executive MBA participants in the pilot test were deeply concerned with social desirability issues as well as the potential loss of high incomes. That is why we did not revisit that population in the main study. Individuals with high status tend to overreport <italic>good behavior</italic> and underreport <italic>bad behavior</italic>. Social desirability bias is a problem in studies involving abilities, personality, and illegal activities. Subjects with high incomes and status tend to deny illegal acts. In the pilot study, only 6% (6/96) of the participants (3 of the medical residents and 3 of the executive MBAs) succumbed to incentives to violate HIPAA laws. The amount of money required by these individuals ranged from US $50,000 to US $1 billion.</p>
        <p>Students in the main study group were given 3 extra points in their final exam for participating in the anonymous survey regardless of completion. We removed subjects with more than 10% (1/10) missing values and subjects who took less than 3 min to complete the survey. The final data set consisted of 523 subjects out of the initial 574 survey participants.</p>
        <p>The study subjects consisted of 60% males and 40% females, and their average age was 21 years. The study population consisted of 45% whites, 4% blacks, 4% Hispanics, 45% Asians, and 3% others.</p>
      </sec>
      <sec>
        <title>Overview of the Scenarios</title>
        <p>Scenarios were adapted from an earlier HIPAA compliance study [<xref ref-type="bibr" rid="ref53">53</xref>] and redeveloped for 5 situations to determine if monetary incentives could influence subjects to obtain health care information and to release that information to individuals and media outlets (<xref ref-type="boxed-text" rid="box1">Textbox 1</xref>). <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> also illustrates an example of the survey question that elicited a response on how much money a subject would accept to reveal information and their perception of the probability of being apprehended for the nursing scenario. The first 3 scenarios do not incorporate a personal or family situation involved in deciding to accept a monetary incentive. We refer to these scenarios as having no personal context. In addition, we use different income levels in the scenarios, resulting in a differential influence of monetary incentives on insiders’ deviant behavior decisions. The salaries in the first 3 scenarios were US $30,000, US $200,000, and US $60,000. We included these salary levels to examine income sensitivities.</p>
        <p>Scenarios 4 and 5, however, involve personal or situational contexts. There are situational and transitory influences that lead to committing offenses [<xref ref-type="bibr" rid="ref41">41</xref>], and they can include financial problems, medical bills, and addictions. Scenario 4 involves the need to pay for an experimental operation for the subject’s mother. Scenario 5 involves the need to pay for an ambulance airlift for a close friend. The 2 scenarios incorporate the concept of the value of life and the notion of <italic>identified lives</italic> as distinct from <italic>statistical lives</italic> [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref54">54</xref>]. The economics literature on the value of life distinguishes between identified and statistical lives. Statistical lives have no face or a personal context. Examples include the number of cancer cases that have occurred, the number of lives lost in traffic accidents, and lives lost in natural disasters, whereas identified lives have faces, names, family, and a historical legacy. Identified lives have a personal context.</p>
        <boxed-text id="box1" position="float">
          <title>Overview of the scenarios.</title>
         <p>
        <bold>Scenario 1: Nurse’s aide, no personal context</bold>
      </p>
      <p>Suppose you are a nurse’s aide at a hospital and you earn US $30,000 per year. A friend asks you to get them some information on a patient you have been caring for. What amount of money would you receive to make this acceptable?</p>
      <p>
        <bold>Scenario 2: Doctor, no personal context</bold>
      </p>
      <p>Suppose you are a doctor at a hospital and you earn US $200,000 per year. A very close friend asks you to access patient information to help them in an upcoming legal battle. What amount of money would you receive to make this acceptable?</p>
      <p>
        <bold>Scenario 3: Insurance local celebrity, no personal context</bold>
      </p>
      <p>Suppose you work for an insurance company and make US $60,000 per year. A relative asks you to get insurance data on a famous local celebrity from the organization you work for. What amount of money would you receive to make this acceptable?</p>
      <p>
        <bold>Scenario 4: Your mother needs an experimental treatment, personal context</bold>
      </p>
      <p>Your mother has just been diagnosed with a rare condition that causes kidney failure and is fatal if untreated. This condition can be treated, but the treatment is still considered experimental and is therefore not covered by health insurance, nor is it eligible for any type of financial assistance. The treatment is available both nationally and internationally and costs US $100,000. A media outlet approaches you to get information about a famous politician and offers to pay you US $100,000 for that information. This money can save your mother’s life. Would you accept the payment from the media outlet and give the money to your mother?</p>
      <p>
        <bold>Scenario 5: Best friend needs air medical transportation, personal context</bold>
      </p>
      <p>Your best friend has been in an all-terrain vehicle accident in a rural area of Kansas. He or she has life-threatening injuries and needs air medical transportation to receive lifesaving medical care. The medical air evacuation is not covered by insurance and costs US $50,000. Your best friend will not survive ground transportation or local medical care. A media outlet offers you US $50,000 to obtain the health care records of a famous reality television star. This money can save your best friend’s life. Would you accept the payment from the news outlet to give the money to your best friend?</p>
      <p>
        <bold>Each scenario also included the following question:</bold>
      </p>
      <p>What do you think is the likelihood of getting caught if you accept the money?</p>
      <p>Extremely unlikely (0%)</p>
      <p>Moderately unlikely (7%)</p>
      <p>Slightly unlikely (25%)</p>
      <p>Neither likely nor unlikely (50%)</p>
      <p>Slightly likely (75%)</p>
      <p>Moderately likely (93%)</p>
      <p>Extremely likely (100%)</p>
        </boxed-text>
      </sec>
      <sec>
        <title>Deterrent Treatment</title>
        <p>As noted earlier, we also included a deterrent treatment in the study for half of the participants in the study [<xref ref-type="bibr" rid="ref19">19</xref>]. The treatment consisted of short vignettes that described instances where individuals received fines and were sentenced for violating HIPAA regulations (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). Half of the subjects received the treatment.</p>
      </sec>
      <sec>
        <title>Research Design</title>
        <p>In this section, we provide an overview of the study design. First, 574 students in an undergraduate information technology course voluntarily participated in this survey. Credits were given for completing the questionnaire. Second, half of the participants were given the deterrent treatment, which consisted of short vignettes that described the possible punishments for violating HIPPA regulations. Third, all participants, including both the treated and nontreated ones, completed the survey, where the 5 scenarios were presented. The average completion time was 8.5 min. Therefore, given the clear logic of the survey and the time needed to complete the survey, we believe that survey fatigue is not a serious concern in our study.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Main Findings</title>
        <p>We used correlation analysis to explore the relationship between the net monetary incentive to commit a crime and the perceived probability of being apprehended in Hypothesis 1. Hypothesis 1 was supported. It shows that higher perceptions of being apprehended for violating HIPAA regulations are related to higher requirements for monetary incentives. The correlations between the probability of getting caught and the amount of money that the subjects would accept to provide the information were 0.44 (<italic>P</italic>&#60;.001) for the nursing scenario, 0.25 (<italic>P</italic>&#60;.001) for the doctor scenario, and 0.43 (<italic>P</italic>&#60;.001) for the insurance scenario. Differences in income can explain the differences in the correlations for the nurse/insurance scenarios as compared with the doctor scenario. The nurse aide’s salary was US $30,000; the doctor’s salary was US $200,000; and the insurance agent’ s salary was US $60,000. Referring back to the Becker crime utility model in <xref rid="figure1" ref-type="fig">Figure 1</xref>, the monetary incentives to commit a crime on the left side would have to be substantially greater than the utility of legal work on the right side. We had posited that the students would not be aware of HIPPA laws; however, approximately 51% agreed or strongly agreed that they were aware of HIPPA regulations. This variable, however, did not have a statistically significant effect on the results when included in the analysis.</p>
        <p>These results provide strong support for Hypothesis 1, showing that higher perceptions of being caught for violating HIPAA regulations are related to higher requirements for monetary incentives. Individuals in the study that perceive higher levels of risk of being caught, in essence, will require more money to participate in an illegal act.</p>
        <p>To improve the readability of the instrument crosstabs, we collapsed the amount of money from 11 to 5 categories and the probability of getting caught from 7 to 3 categories. Many of the subjects felt that the probability of getting caught for violating a HIPAA law was very high, greater than 93%. In the nursing scenario, 30% (157/523) of the participants thought the probability of getting caught was greater than 93%, and in the doctor scenario, 50% (261/523) of the participants thought the probability of getting caught was greater than 93%. In the insurance scenario, 39% (204/523) of the participants thought the probability of getting caught was greater than 93%. In the mother scenario, it was 37% (194/523), and in the best friend scenario, it was 38% (199/523). Although many of the individuals in the study believed there was a high probability of being caught, a good number of them could be incentivized to violate HIPAA laws. <xref ref-type="table" rid="table1">Tables 1</xref>-<xref ref-type="table" rid="table5">5</xref> show the results. <xref rid="figure3" ref-type="fig">Figure 3</xref> reflects the general trend of the relationship regarding the amount of money it would take to violate a HIPAA regulation based on the probability of getting caught.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Nursing scenario results.</p>
          </caption>
          <graphic xlink:href="medinform_v8i7e15880_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Nurse, no personal context (scenario 1).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="160"/>
            <col width="0"/>
            <col width="170"/>
            <col width="0"/>
            <col width="150"/>
            <col width="0"/>
            <col width="170"/>
            <col width="0"/>
            <col width="170"/>
            <col width="0"/>
            <col width="150"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Scenario 1</td>
                <td colspan="10">Perceived probability of getting caught (R=0.438; <italic>P</italic>&#60;.001; 95% CI 0.36-0.52)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">≥25%</td>
                <td colspan="2">50%</td>
                <td colspan="2">75%</td>
                <td colspan="2">≤93%</td>
                <td colspan="2">Total, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="12">
                  <bold>Amount of money willing to receive (US $), n</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">&#60;10,000</td>
                <td colspan="2">25</td>
                <td colspan="2">13</td>
                <td colspan="2">4</td>
                <td colspan="2">1</td>
                <td>43 (8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">10,000-99,999</td>
                <td colspan="2">25</td>
                <td colspan="2">16</td>
                <td colspan="2">10</td>
                <td colspan="2">2</td>
                <td>53 (10)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">100,000-999,999</td>
                <td colspan="2">34</td>
                <td colspan="2">8</td>
                <td colspan="2">12</td>
                <td colspan="2">8</td>
                <td>62 (12)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="2">&#62;1,000,000</td>
                <td colspan="2">41</td>
                <td colspan="2">16</td>
                <td colspan="2">16</td>
                <td colspan="2">12</td>
                <td>85 (16)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">No amount of money, n</td>
                <td colspan="2">43</td>
                <td colspan="2">37</td>
                <td colspan="2">64</td>
                <td colspan="2">136</td>
                <td colspan="2">280 (54)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">Total, n (%)</td>
                <td colspan="2">168 (32)</td>
                <td colspan="2">90 (17)</td>
                <td colspan="2">106 (20)</td>
                <td colspan="2">159 (30)</td>
                <td colspan="2">523 (100)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Doctor, no personal context (scenario 2).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="160"/>
            <col width="170"/>
            <col width="150"/>
            <col width="170"/>
            <col width="170"/>
            <col width="150"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Scenario 2</td>
                <td colspan="5">Perceived probability of getting caught (R=0.282; <italic>P</italic>&#60;.001; 95% CI 0.20-0.36)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <break/>
                </td>
                <td>≥25%</td>
                <td>50%</td>
                <td>75%</td>
                <td>≤93%</td>
                <td>Total, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="7">
                  <bold>Amount of money willing to receive (US $), n</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>&#60;10,000</td>
                <td>7</td>
                <td>3</td>
                <td>5</td>
                <td>2</td>
                <td>17 (3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>10,000-99,999</td>
                <td>9</td>
                <td>11</td>
                <td>6</td>
                <td>9</td>
                <td>35 (7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>100,000-999,999</td>
                <td>14</td>
                <td>9</td>
                <td>12</td>
                <td>8</td>
                <td>43 (8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>&#62;1,000,000</td>
                <td>33</td>
                <td>12</td>
                <td>16</td>
                <td>29</td>
                <td>90 (17)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">No amount of money, n</td>
                <td>48</td>
                <td>23</td>
                <td>52</td>
                <td>215</td>
                <td>338 (65)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">Total, n (%)</td>
                <td>111 (21)</td>
                <td>58 (11)</td>
                <td>91 (17)</td>
                <td>263 (50)</td>
                <td>523 (100)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Insurance company, no personal context (scenario 3).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="160"/>
            <col width="0"/>
            <col width="170"/>
            <col width="0"/>
            <col width="150"/>
            <col width="0"/>
            <col width="170"/>
            <col width="0"/>
            <col width="170"/>
            <col width="0"/>
            <col width="150"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Scenario 3</td>
                <td colspan="9">Perceived probability of getting caught (R=0.282; <italic>P</italic>&#60;.001; 95% CI 0.20-0.36)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <break/>
                </td>
                <td colspan="2">≥25%</td>
                <td colspan="2">50%</td>
                <td colspan="2">75%</td>
                <td colspan="2">≤93%</td>
                <td>Total, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="12">
                  <bold>Amount of money willing to receive (US $), n</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>&#60;10,000</td>
                <td colspan="2">7</td>
                <td colspan="2">3</td>
                <td colspan="2">5</td>
                <td colspan="2">2</td>
                <td colspan="2">17 (3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>10,000-99,999</td>
                <td colspan="2">9</td>
                <td colspan="2">11</td>
                <td colspan="2">6</td>
                <td colspan="2">9</td>
                <td colspan="2">35 (7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>100,000-999,999</td>
                <td colspan="2">14</td>
                <td colspan="2">9</td>
                <td colspan="2">12</td>
                <td colspan="2">8</td>
                <td colspan="2">43 (8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>&#62;1,000,000</td>
                <td colspan="2">33</td>
                <td colspan="2">12</td>
                <td colspan="2">16</td>
                <td colspan="2">29</td>
                <td colspan="2">90 (17)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">No amount of money, n</td>
                <td colspan="2">48</td>
                <td colspan="2">23</td>
                <td colspan="2">52</td>
                <td colspan="2">215</td>
                <td>338 (65)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">Total, n (%)</td>
                <td colspan="2">111 (21)</td>
                <td colspan="2">58 (11)</td>
                <td colspan="2">91 (17)</td>
                <td colspan="2">263 (50)</td>
                <td>523 (100)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Personal context: your mother needs an experimental treatment (scenario 4).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="160"/>
            <col width="170"/>
            <col width="150"/>
            <col width="170"/>
            <col width="170"/>
            <col width="150"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Scenario 4</td>
                <td colspan="5">Perceived probability of getting caught (R=0.25; <italic>P</italic>&#60;.001; 95% CI 0.17-0.33)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <break/>
                </td>
                <td>≥25%</td>
                <td>50%</td>
                <td>75%</td>
                <td>≤93%</td>
                <td>Total, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="7">
                  <bold>Willing to receive US $100,000, n</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No</td>
                <td>8</td>
                <td>15</td>
                <td>22</td>
                <td>67</td>
                <td>112 (21)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yes</td>
                <td>82</td>
                <td>90</td>
                <td>114</td>
                <td>124</td>
                <td>410 (79)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">Total, n (%)</td>
                <td>90 (17)</td>
                <td>105 (20)</td>
                <td>136 (26)</td>
                <td>191 (37)</td>
                <td>522 (100)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Personal context: best friend needs air medical transportation (scenario 5).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="160"/>
            <col width="170"/>
            <col width="150"/>
            <col width="170"/>
            <col width="170"/>
            <col width="150"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Scenario 5</td>
                <td colspan="5">Perceived probability of getting caught (R=0.14; <italic>P</italic>&#60;.001; 95% CI 0.05-0.23)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <break/>
                </td>
                <td>≥25%</td>
                <td>50%</td>
                <td>75%</td>
                <td>≤93%</td>
                <td>Total, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="7">
                  <bold>Willing to receive US $50,000, n</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No</td>
                <td>24</td>
                <td>36</td>
                <td>34</td>
                <td>88</td>
                <td>182 (35)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yes</td>
                <td>67</td>
                <td>75</td>
                <td>87</td>
                <td>109</td>
                <td>338 (65)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">Total, n (%)</td>
                <td>91 (18)</td>
                <td>111 (21)</td>
                <td>121 (23)</td>
                <td>197 (38)</td>
                <td>520 (100)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>The magnitude of the number of individuals who would receive monetary incentives was not expected. We did postulate that there would be some individuals who could be incentivized to violate HIPAA laws, but we thought it would be a small number. In the pilot study, the subjects were medical interns and students enrolled in an executive MBA program. Only 6% (6/96) of the participants (3 medical residents and 3 executive MBAs) succumbed to incentives and violated the HIPAA laws. The amount of money required by these individuals ranged from US $50,000 to US $1 billion. We realize that individuals with high-income potential (medical interns and executive MBAs) would be less prone to violating health care laws, but we did not expect such a dramatic difference.</p>
        <p>In the main study, 47.0% (246/523) of the participants received the money in the nursing scenario, 35.0% (183/523) of the participants in the doctor scenario, and 44.9% (235/523) of the participants in the insurance scenario. Again, differences in income might explain the difference, in part. The nurse aide’s salary was US $30,000, the doctor’s salary was US $200,000, and the insurance agent was US $60,000. Referring back to the Becker crime utility model in <xref rid="figure1" ref-type="fig">Figure 1</xref>, the monetary incentives to commit a crime on the left side would have to be substantially greater than the utility of legal work on the right side.</p>
        <p>Hypothesis 2 is supported. Recall that it postulates that higher perceptions of being apprehended for violating HIPAA regulations are related to higher requirements for monetary incentives when the personal context involves a family member or friend. However, the strength of this relationship is not as strong as that of the relationship in Hypothesis 1.</p>
        <p>Point-biserial correlations are used when there is a dichotomous variable involved. The subjects could answer either a yes or no whether they would accept money to violate a HIPAA regulation. The point-biserial correlation between the probability of getting caught and whether the subjects would accept US $100,000 from a media outlet to pay for an experimental treatment was 0.25 (<italic>P</italic>&#60;.001). The point-biserial correlation between the probability of getting caught and whether the subjects would accept US $50,000 from a media outlet to pay for medical evacuation was 0.14 (<italic>P</italic>=.001).</p>
        <p>These correlations are not as strong as those in the first 3 scenarios. The correlations between the probability of getting caught and the amount of money that the subjects would accept to provide the information were 0.44 for the nursing scenario, 0.25 for the doctor scenario, and 0.43 for the insurance scenario.</p>
        <p>However, there is more to the story than just the correlations. Looking at the first 3 scenarios, in which there was no personal context, we observed that 47% (246/523) of participants in the nursing scenario indicated that they would be willing to take some level of money to provide patient data, 35% (183/523) of participants in the doctor scenario indicated they would be willing to take some level of money to provide patient data, and 45% (235/523) of participants in the insurance scenario indicated they would be willing to take some level of money to provide insurance data about a celebrity. This is in stark contrast to the 2 personal context scenarios where 79% (413/523) of participants would receive money to save their mothers and 65% (340/523) of participants would receive money to save their best friends.</p>
        <p>It is not surprising that 79% of the participants would accept money to save their mother and 65% would accept money to save their best friend. There is a strong <italic>personal motive</italic> to save the lives of individuals who are friends and family, even if there is a strong chance of getting caught. These results are related to how people perceive the difference between <italic>identified lives</italic> and <italic>statistical lives</italic> [<xref ref-type="bibr" rid="ref30">30</xref>]. Statistical lives involve aggregate numbers, such as 29,000 people die from liver cancer each year. As can be expected, the concepts of statistical life and identified life are very controversial [<xref ref-type="bibr" rid="ref55">55</xref>]. In the United States, the value of a statistical life has been identified by government agencies to be in the US $7 million range [<xref ref-type="bibr" rid="ref30">30</xref>]. When a situation involves familiar faces and close relationships with the individual, the use of the statistical value of a life is problematic. It is very difficult to place a value on the life of a family member or close friend. Indeed, the value of a close relative may be infinite. These results support Hypothesis 2 well, which suggests that higher perceptions of being caught violating HIPAA regulations are not related to higher requirements for monetary incentives when the personal context involves a family member or friend.</p>
        <p>Prospect theory supports the results for the personal context. Loss of a friend or family member would have a very large impact on an individual’s life. The endowment effect also comes into play [<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref57">57</xref>]. People value things that they possess, and family and friends are important possessions that are difficult to replace. The endowment construct is related to psychological ownership, and it supports the notion that people overvalue things they perceive they own [<xref ref-type="bibr" rid="ref58">58</xref>]. Psychological ownership occurs when an individual feels that an object is <italic>theirs</italic> or <italic>mine</italic> [<xref ref-type="bibr" rid="ref59">59</xref>]<italic>.</italic> Psychological ownership usually involves some person-object relations. However, it can also be felt toward ideas, words, artistic creations, tablets, phones, people, and virtual avatars [<xref ref-type="bibr" rid="ref60">60</xref>].</p>
        <p>As noted earlier, the situational context matters. In the nursing example, there were 194 individuals in the study that would not receive any amount of money nor would they turn over patient information to someone. However, those same 194 individuals would take the US $100,000 to pay for an experimental procedure for their mother. The natural question is whether they would take the money because they thought that there would not be a high probability of being caught. However, 124 of the subjects indicated a high probability of getting caught (greater than 93%) but would still help their mother.</p>
      </sec>
      <sec>
        <title>Individuals That Are Absolutely Deterred from Violating Health Insurance Portability and Accountability Act Laws</title>
        <p>We also counted the number of people who would not violate HIPAA laws at all. There were 14.1% (74/523) of the people in the study that would not receive any money to violate HIPAA regulations for all 5 scenarios. They are what is referred to as absolutely deterred from engaging in criminal behavior. <italic>Absolute deterrence</italic> occurs when individuals refrain from criminal acts because he or she perceives that any level of risk for receiving punishment and the resulting punishment is not acceptable [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref61">61</xref>]. In essence, the severity, certainty, and swiftness of the punishment are not acceptable to absolutely deterred individuals. It was also interesting to note that 14 people would not help their mother but would help their friend. This result is in contrast to the 85 subjects who would help their mother but would not help their friend.</p>
      </sec>
      <sec>
        <title>There Is No Treatment Effect</title>
        <p>Hypothesis 3 was not supported. Recall that it postulates that the group receiving the fear treatment will have higher perceptions of being caught violating HIPAA regulations than the group who did not receive the fear treatment.</p>
        <p>Information related to real people receiving fines and jail time for violating HIPAA laws was received by 50% of the subjects (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). This information is a fear treatment and is used as a deterrent [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. As noted earlier, the results of studies involving treatment effects for deterrence have been inconsistent and contradictory [<xref ref-type="bibr" rid="ref20">20</xref>]. Fear appeals use threats in the form of graphics and narrative warnings to modify behavior. The graphics and text illustrated in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> had little effect on the probability of getting caught. The means between the group receiving the fear appeal treatment and the group who did not receive the treatment were not statistically significant for any of the scenarios. Earlier research on software piracy and MP3 piracy found a modest, yet statistically significant, effect when the subjects were informed about punishment for software and MP3 piracy [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref62">62</xref>]. Sometimes, fear appeals do not work [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref63">63</xref>]. Possible explanations could be that (1) the degree to which an individual perceives information assets as personally relevant is highly subjective, thus potentially marginalizing the impact of the fear appeal, and (2) the conventional fear appeal rhetorical framework is inadequate in providing threat warnings when it is used in the information security context [<xref ref-type="bibr" rid="ref63">63</xref>]. We included what would be considered as harsh sanctions as a treatment, and there was still no effect.</p>
        <p>There is a notion of readiness to commit crimes. Although a large number of participants in the study were attracted to the monetary gains and the need to protect family members and friends, there is a tipping point. In reaching a state of readiness to violate a law, individuals will need to evaluate whether an offense will be a solution to their needs. In other words:</p>
        <disp-quote>
          <p>It can therefore be predicted that if the expected utility of illegal actions exceeds that of the legal alternatives, an individual will be more likely to decide to engage in a specific crime at a later date (i.e., they will have reached a state of “readiness”)[<xref ref-type="bibr" rid="ref41">41</xref>].</p>
        </disp-quote>
        <p>Information security research needs a major and fundamental shift toward a reconceptualization of deterrence to account for rational forces and restrictive deterrence [<xref ref-type="bibr" rid="ref41">41</xref>]. One interesting area for research is how potential opportunities to engage in internal computer abuse are shaped by technical skills and the jobs of the insiders. It is also worth considering whether these same employees with the passage of time have been able to contemplate faults in the systems. People in jobs for a long time understand the deficiencies in all aspects of a system, including security flaws. Job movement is one way to deal with this issue, but in the interest of specialization and productivity, moving people around is rarely embraced as a mechanism to increase security.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>This study aimed to examine the role that monetary incentives play in violating HIPAA regulations and privacy laws in the next generation of employees. Scenarios were developed for 5 situations to determine whether monetary incentives could influence subjects to obtain health care information and to release that information. Approximately 35% to 46% of the 523 survey participants indicated that there is a price, ranging from US $1000 to over US $10 million, that is acceptable for violating HIPAA laws. In addition, subjects were also asked about their perceived probability of getting caught for violating HIPAA laws. More than 50% of the participants indicated that the probability of getting caught was more than 75%. Nevertheless, many of them could still be incentivized to violate HIPAA laws. The correlations between the probability of being apprehended and the level of the monetary incentive required for violating HIPAA ranged from 0.14 to 0.43.</p>
        <p>In the pilot study consisting of 64 medical residents and 32 executive MBA candidates, just 6% (6/96) of the participants would succumb to monetary incentives and violate HIPAA laws. The amount of money required to incentivize medical residents and executives would also be large, ranging from US $50,000 to US $1 billion.</p>
        <p>Between 25% and 30% of the subjects in the main study could be incentivized to violate HIPAA laws if they were offered over US $100,000. This is a substantial amount of money, and it is unlikely that such a sum would be offered to trusted insiders to violate privacy laws. The bad news is that although the number of HIPAA privacy breaches detected is declining, the dollar values of losses are escalating.</p>
        <p>In general, individuals who perceive that there is a high probability of being caught are less likely to release private information. The implication is that technology and improvements in organizational processes could increase the perception of the probability of getting caught. The bad news is that approximately 15% of the subjects in the study would receive money, even if there is a 93% or greater chance of being caught.</p>
        <p>Moreover, computer knowledge is not necessary because of the availability of <italic>crime as a service</italic>. Third-party providers can be used in cyberattacks [<xref ref-type="bibr" rid="ref64">64</xref>]. Anyone can hack and attack and become an amateur hacker using simple automated programming tools and distributed denial-of-service–for-hire attacks and by obtaining billions of compromised passwords from the dark web [<xref ref-type="bibr" rid="ref65">65</xref>]. Trusted insiders could provide the needed entrée for third-party providers of cyberattacks.</p>
        <p>Our last finding is that there is a small chance of being caught, and there is an even smaller chance of being convicted. One security expert estimates that for every individual who gets caught, 10,000 people go free and that for every 1 individual who is successfully prosecuted, 100 get off scot-free or just receive a warning [<xref ref-type="bibr" rid="ref66">66</xref>].</p>
        <p>Between April 2003 and July 2018, there were 186,453 health information privacy complaints submitted to the US Department of Health and Human Services [<xref ref-type="bibr" rid="ref67">67</xref>]. Of these complaints, 37,670 were investigated, resulting in 26,152 (69%) corrective actions. The Office of Civil Rights has imposed civil penalties of US $78,829,182 for just 55 cases. During that same period, the Department of Justice received 688 cases from the Office of Civil Rights for further criminal investigation. It is very difficult to obtain details about the disposition of criminal HIPAA violations. We conducted a search at the Department of Justice [<xref ref-type="bibr" rid="ref68">68</xref>] using <italic>HIPAA</italic> as a keyword on their website where the Department of Justice has obtained fines and jail time. As illustrated in <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>, there were only 11 cases with fines and jail time.</p>
        <p>Most of the subjects in our study thought that there was a high probability of being caught for violating HIPAA laws. For example, in the nursing scenario, 30% (157/523) of the participants indicated that there was a 93% or higher chance of getting caught. Clearly, this is not the case. People, even experts, consistently misestimate statistical probabilities, even when there is new contrary evidence.</p>
      </sec>
      <sec>
        <title>There Is Often a Price</title>
        <p>Our results suggest that many people have a price. It may be a significant amount of money, or it may be a situation where a family member or friend needs critical medical assistance. Monitoring credit reports is a very invasive and controversial practice, but some companies are turning to credit monitoring as a way to counter breaches prompted by financial gain, although several states have taken steps to ban or limit employer access to credit reports.</p>
        <p>The results suggest that the subjects in this sample responded rationally to the mother and the best friend scenarios. They just discounted the negative consequences of getting caught, and they attached a very high value to the lives of their mother and best friend. They also acted rationally in the first 3 scenarios. Some people indicate that there was a low probability of getting caught, but many of those people would still not participate in illegal activities. This result may be related to the Black Swan phenomenon [<xref ref-type="bibr" rid="ref69">69</xref>]. There may be a low probability of getting caught, but the impact of getting caught could have serious long-term consequences and might be perceived, as such, by some individuals. Fines, possible prison time, loss of a job, and difficulty securing a job in the future can result in high monetary costs and social isolation.</p>
        <p>Although there are mechanisms for reporting violations, this is still a complex problem. Organizations need to use educational campaigns as well as monitoring and enforcement strategies that strike the proper balance of protecting health care information and protecting the privacy of individuals against inadvertent violation of HIPAA laws.</p>
        <p>Our results illustrate the importance of providing both preventive and deterrent information to increase HIPAA compliance [<xref ref-type="bibr" rid="ref70">70</xref>]. The key will be to implement organizational procedures and constantly monitor and develop educational and training programs that will provide the appropriate frequency and intensity of deterrent information so that employees will not ignore but will embrace HIPAA compliance.</p>
      </sec>
      <sec>
        <title>The Challenge Ahead</title>
        <p>The protection of personal information is a significant challenge because this information is ubiquitous, and that information has a monetary value. Businesses use this information to target customer segments. Nonprofits use this information to increase the effectiveness of fundraising campaigns. The dark side of the abundance of personal information is that this information can be compromised and retrieved by insiders and external hackers. Insider threats can come from outside infiltrators who become insiders by phishing and social networking attacks. However, they can also come from insider threats, resulting from homegrown malicious employees who intentionally want to compromise a system for profit and for a variety of reasons, including hacktivism and thrill motives. In many instances, breaches occur because of negligence, for example, some people do not know that they are not supposed to maintain social security numbers in a temporary file or email a medical diagnosis to another doctor without obtaining permission.</p>
        <p>Our results suggest that there is a high probability that compromises can occur when employees are presented with monetary incentives, given the right context. These results have serious implications because many security breaches are from insiders [<xref ref-type="bibr" rid="ref42">42</xref>]. Given that the greatest challenge to organizations is insider threats, the results of this study are provocative.</p>
        <p>There are some steps that organizations can take to reduce the chance of security breaches. They can use both preventive and deterrent controls to reduce the probability of minor and major events [<xref ref-type="bibr" rid="ref71">71</xref>]. Preventive controls impede criminal behavior by forcing the perpetrator to deplete resources [<xref ref-type="bibr" rid="ref17">17</xref>]. Organizations must have preventive controls in place. These preventive controls include sophisticated monitoring systems technologies and constant attention to authentication protocols to prevent unauthorized access to buildings, software, and databases. Organizations usually focus on preventives because preventives can be implemented, and they are under the control of the organization. This is in contrast to deterrent strategies that focus on the apprehension and punishment of perpetrators as well as on education, legal campaigns, and fear appeals. Developing security education, training, and awareness is always a challenge. The key is to focus continually on health information security awareness [<xref ref-type="bibr" rid="ref70">70</xref>]. It is not enough to have employees complete a web-based or even an in-person security training class. Employees need to be immersed in security training, receive feedback, and interact socially with other employees on security issues if the training is to be successful [<xref ref-type="bibr" rid="ref72">72</xref>]. Some organizations are taking very aggressive steps to counter insider threats from malicious employees, negligent users, and infiltrators. They install software that tracks user logins, monitors file and database usage locally and in the cloud, records web activity, and regularly monitors email activity. These systems, in addition to recording activity, can also be used to send out alerts involving unusual behavior by insiders.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Treatment.</p>
        <media xlink:href="medinform_v8i7e15880_app1.docx" xlink:title="DOCX File , 212 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Example of a web-based questionnaire for the nurse aide scenario.</p>
        <media xlink:href="medinform_v8i7e15880_app2.docx" xlink:title="DOCX File , 116 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Criminal penalties levied by the Department of Justice.</p>
        <media xlink:href="medinform_v8i7e15880_app3.docx" xlink:title="DOCX File , 15 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This study is based upon the work supported by the National Science Foundation under Grant No 1754085.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <source>HIPAA Journal</source>
          <year>2017</year>
          <access-date>2020-05-29</access-date>
          <comment>Largest Healthcare Data Breaches of 2017<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hipaajournal.com/largest-healthcare-data-breaches-2017/">https://www.hipaajournal.com/largest-healthcare-data-breaches-2017/</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Uwizeyemungu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Poba-Nzaou</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Cantinotti</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>European hospitals' transition toward fully electronic-based systems: do information technology security and privacy practices follow?</article-title>
          <source>JMIR Med Inform</source>
          <year>2019</year>
          <month>03</month>
          <day>25</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>e11211</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://medinform.jmir.org/2019/1/e11211/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11211</pub-id>
          <pub-id pub-id-type="medline">30907732</pub-id>
          <pub-id pub-id-type="pii">v7i1e11211</pub-id>
          <pub-id pub-id-type="pmcid">PMC6452275</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thilakanathan</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Calvo</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Nepal</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Glozier</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Facilitating secure sharing of personal health data in the cloud</article-title>
          <source>JMIR Med Inform</source>
          <year>2016</year>
          <month>05</month>
          <day>27</day>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>e15</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://medinform.jmir.org/2016/2/e15/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/medinform.4756</pub-id>
          <pub-id pub-id-type="medline">27234691</pub-id>
          <pub-id pub-id-type="pii">v4i2e15</pub-id>
          <pub-id pub-id-type="pmcid">PMC4902857</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bender</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Cyr</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Arbuckle</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ferris</surname>
              <given-names>LE</given-names>
            </name>
          </person-group>
          <article-title>Ethics and privacy implications of using the internet and social media to recruit participants for health research: a privacy-by-design framework for online recruitment</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>04</month>
          <day>6</day>
          <volume>19</volume>
          <issue>4</issue>
          <fpage>e104</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2017/4/e104/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.7029</pub-id>
          <pub-id pub-id-type="medline">28385682</pub-id>
          <pub-id pub-id-type="pii">v19i4e104</pub-id>
          <pub-id pub-id-type="pmcid">PMC5399223</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Farahmand</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Spafford</surname>
              <given-names>EH</given-names>
            </name>
          </person-group>
          <article-title>Understanding insiders: an analysis of risk-taking behavior</article-title>
          <source>Inf Syst Front</source>
          <year>2010</year>
          <month>08</month>
          <day>24</day>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>5</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1007/s10796-010-9265-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schultz</surname>
              <given-names>EE</given-names>
            </name>
          </person-group>
          <article-title>A framework for understanding and predicting insider attacks</article-title>
          <source>Comput Sec</source>
          <year>2002</year>
          <month>10</month>
          <volume>21</volume>
          <issue>6</issue>
          <fpage>526</fpage>
          <lpage>31</lpage>
          <pub-id pub-id-type="doi">10.1016/s0167-4048(02)01009-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stavrou</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Kandias</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Karoulas</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Gritzalis</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <source>Business Process Modeling for Insider Threat Monitoring and Handling</source>
          <year>2014</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer International Publishing</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <source>Verizon Enterprise Solutions</source>
          <year>2018</year>
          <access-date>2020-05-29</access-date>
          <comment>Insights and Resources &#124; Data Breach Investigations Report<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf">https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pal</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Zhong</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Khethavath</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Designing an algorithm to preserve privacy for medical record linkage with error-prone data</article-title>
          <source>JMIR Med Inform</source>
          <year>2014</year>
          <month>01</month>
          <day>20</day>
          <volume>2</volume>
          <issue>1</issue>
          <fpage>e2</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://medinform.jmir.org/2014/1/e2/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/medinform.3090</pub-id>
          <pub-id pub-id-type="medline">25600786</pub-id>
          <pub-id pub-id-type="pii">v2i1e2</pub-id>
          <pub-id pub-id-type="pmcid">PMC4288117</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Platt</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobson</surname>
              <given-names>PD</given-names>
            </name>
            <name name-style="western">
              <surname>Kardia</surname>
              <given-names>SL</given-names>
            </name>
          </person-group>
          <article-title>Public trust in health information sharing: a measure of system trust</article-title>
          <source>Health Serv Res</source>
          <year>2018</year>
          <month>04</month>
          <volume>53</volume>
          <issue>2</issue>
          <fpage>824</fpage>
          <lpage>45</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28097657"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/1475-6773.12654</pub-id>
          <pub-id pub-id-type="medline">28097657</pub-id>
          <pub-id pub-id-type="pmcid">PMC5867170</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Müthing</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Brüngel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Friedrich</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Server-focused security assessment of mobile health apps for popular mobile platforms</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>01</month>
          <day>23</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>e9818</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/1/e9818/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.9818</pub-id>
          <pub-id pub-id-type="medline">30672738</pub-id>
          <pub-id pub-id-type="pii">v21i1e9818</pub-id>
          <pub-id pub-id-type="pmcid">PMC6364205</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Prochaska</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Bird</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chadaga</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Arora</surname>
              <given-names>VM</given-names>
            </name>
          </person-group>
          <article-title>Resident use of text messaging for patient care: ease of use or breach of privacy?</article-title>
          <source>JMIR Med Inform</source>
          <year>2015</year>
          <month>11</month>
          <day>26</day>
          <volume>3</volume>
          <issue>4</issue>
          <fpage>e37</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://medinform.jmir.org/2015/4/e37/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/medinform.4797</pub-id>
          <pub-id pub-id-type="medline">26611620</pub-id>
          <pub-id pub-id-type="pii">v3i4e37</pub-id>
          <pub-id pub-id-type="pmcid">PMC6858010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Becker</surname>
              <given-names>GS</given-names>
            </name>
          </person-group>
          <article-title>Crime and punishment: an economic approach</article-title>
          <source>J Polit Econ</source>
          <year>1968</year>
          <month>03</month>
          <volume>76</volume>
          <issue>2</issue>
          <fpage>169</fpage>
          <lpage>217</lpage>
          <pub-id pub-id-type="doi">10.1086/259394</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Becker</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <source>Crime and punishment: an economic approach</source>
          <year>1968</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>a</fpage>
          <lpage>68</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>D'Arcy</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hovav</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Galletta</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach</article-title>
          <source>Inf Syst Res</source>
          <year>2009</year>
          <month>03</month>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>79</fpage>
          <lpage>98</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1070.0160</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rao</surname>
              <given-names>HR</given-names>
            </name>
          </person-group>
          <article-title>Insider threats in a financial institution: analysis of attack-proneness of information systems applications</article-title>
          <source>MIS Q</source>
          <year>2015</year>
          <month>01</month>
          <day>1</day>
          <volume>39</volume>
          <issue>1</issue>
          <fpage>91</fpage>
          <lpage>112</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2015/39.1.05</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gopal</surname>
              <given-names>RD</given-names>
            </name>
            <name name-style="western">
              <surname>Sanders</surname>
              <given-names>GL</given-names>
            </name>
          </person-group>
          <article-title>International software piracy: analysis of key issues and impacts</article-title>
          <source>Inform Syst Res</source>
          <year>1998</year>
          <month>12</month>
          <volume>9</volume>
          <issue>4</issue>
          <fpage>380</fpage>
          <lpage>97</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.9.4.380</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gopal</surname>
              <given-names>RD</given-names>
            </name>
            <name name-style="western">
              <surname>Sanders</surname>
              <given-names>GL</given-names>
            </name>
          </person-group>
          <article-title>Preventive and deterrent controls for software piracy</article-title>
          <source>J Manage Inform Syst</source>
          <year>2015</year>
          <month>12</month>
          <day>8</day>
          <volume>13</volume>
          <issue>4</issue>
          <fpage>29</fpage>
          <lpage>47</lpage>
          <pub-id pub-id-type="doi">10.1080/07421222.1997.11518141</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Herath</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Rao</surname>
              <given-names>HR</given-names>
            </name>
          </person-group>
          <article-title>Protection motivation and deterrence: a framework for security policy compliance in organisations</article-title>
          <source>Eur J Inform Syst</source>
          <year>2017</year>
          <month>12</month>
          <day>19</day>
          <volume>18</volume>
          <issue>2</issue>
          <fpage>106</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1057/ejis.2009.6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>D'Arcy</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Herath</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings</article-title>
          <source>Eur J Inform Syst</source>
          <year>2017</year>
          <month>12</month>
          <day>19</day>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>643</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1057/ejis.2011.23</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Willison</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Warkentin</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Beyond deterrence: an expanded view of employee computer abuse</article-title>
          <source>MIS Q</source>
          <year>2013</year>
          <month>01</month>
          <day>1</day>
          <volume>37</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>20</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2013/37.1.01</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>LE</given-names>
            </name>
            <name name-style="western">
              <surname>Felson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Social change and crime rate trends: a routine activity approach</article-title>
          <source>Am Sociol Rev</source>
          <year>1979</year>
          <month>08</month>
          <volume>44</volume>
          <issue>4</issue>
          <fpage>588</fpage>
          <lpage>608</lpage>
          <pub-id pub-id-type="doi">10.2307/2094589</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Myers</surname>
              <given-names>SL</given-names>
            </name>
          </person-group>
          <article-title>Estimating the economic model of crime: employment versus punishment effects</article-title>
          <source>Q J Econ</source>
          <year>1983</year>
          <month>02</month>
          <volume>98</volume>
          <issue>1</issue>
          <fpage>157</fpage>
          <pub-id pub-id-type="doi">10.2307/1885572</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Levitt</surname>
              <given-names>SD</given-names>
            </name>
          </person-group>
          <article-title>Understanding why crime fell in the 1990s: four factors that explain the decline and six that do not</article-title>
          <source>J Econ Perspect</source>
          <year>2004</year>
          <month>02</month>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>163</fpage>
          <lpage>90</lpage>
          <pub-id pub-id-type="doi">10.1257/089533004773563485</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ehrlich</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Capital punishment and deterrence: some further thoughts and additional evidence</article-title>
          <source>J Polit Econ</source>
          <year>1977</year>
          <month>08</month>
          <volume>85</volume>
          <issue>4</issue>
          <fpage>741</fpage>
          <lpage>88</lpage>
          <pub-id pub-id-type="doi">10.1086/260598</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cornwell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Trumbull</surname>
              <given-names>WN</given-names>
            </name>
          </person-group>
          <article-title>Estimating the economic model of crime with panel data</article-title>
          <source>Rev Econ Stat</source>
          <year>1994</year>
          <month>05</month>
          <volume>76</volume>
          <issue>2</issue>
          <fpage>360</fpage>
          <pub-id pub-id-type="doi">10.2307/2109893</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Loughran</surname>
              <given-names>TA</given-names>
            </name>
            <name name-style="western">
              <surname>Paternoster</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chalfin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Can rational choice be considered a general theory of crime? Evidence from individual-level panel data</article-title>
          <source>Criminology</source>
          <year>2016</year>
          <month>01</month>
          <day>8</day>
          <volume>54</volume>
          <issue>1</issue>
          <fpage>86</fpage>
          <lpage>112</lpage>
          <pub-id pub-id-type="doi">10.1111/1745-9125.12097</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Draca</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Machin</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Crime and economic incentives</article-title>
          <source>Annu Rev Econ</source>
          <year>2015</year>
          <month>08</month>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>389</fpage>
          <lpage>408</lpage>
          <pub-id pub-id-type="doi">10.1146/annurev-economics-080614-115808</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jolls</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sunstein</surname>
              <given-names>CR</given-names>
            </name>
            <name name-style="western">
              <surname>Thaler</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A behavioral approach to law and economics</article-title>
          <source>Stanford Law Rev</source>
          <year>1998</year>
          <month>05</month>
          <volume>50</volume>
          <issue>5</issue>
          <fpage>1471</fpage>
          <lpage>550</lpage>
          <pub-id pub-id-type="doi">10.2307/1229304</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thaler</surname>
              <given-names>RH</given-names>
            </name>
          </person-group>
          <source>Misbehaving: The Making of Behavioral Economics</source>
          <year>2017</year>
          <month>03</month>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>WW Norton &#38; Company</publisher-name>
          <fpage>77</fpage>
          <lpage>81</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thaler</surname>
              <given-names>RH</given-names>
            </name>
          </person-group>
          <article-title>Mental accounting and consumer choice</article-title>
          <source>Mark Sci</source>
          <year>2008</year>
          <month>01</month>
          <volume>27</volume>
          <issue>1</issue>
          <fpage>15</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1287/mksc.1070.0330</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kahneman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Tversky</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Prospect theory: an analysis of decision under risk</article-title>
          <source>Econometrica</source>
          <year>1979</year>
          <month>03</month>
          <volume>47</volume>
          <issue>2</issue>
          <fpage>263</fpage>
          <pub-id pub-id-type="doi">10.2307/1914185</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tversky</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kahneman</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Advances in prospect theory: cumulative representation of uncertainty</article-title>
          <source>J Risk Uncertainty</source>
          <year>1992</year>
          <month>10</month>
          <volume>5</volume>
          <issue>4</issue>
          <fpage>297</fpage>
          <lpage>323</lpage>
          <pub-id pub-id-type="doi">10.1007/bf00122574</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Freeman</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The Economics of Crime</article-title>
          <source>Handbook of Labor Economics</source>
          <year>1999</year>
          <publisher-loc>Amsterdam</publisher-loc>
          <publisher-name>Elsevier</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Snijders</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Bosker</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <source>Freakonomics: A Rogue Economist Explores the Hidden Side of Everything. First Edition</source>
          <year>2005</year>
          <publisher-loc>New York, USA</publisher-loc>
          <publisher-name>William Morrow</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Levitt</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dubner</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>SuperFreakonomics: Global Cooling, Patriotic Prostitutes, and Why Suicide Bombers Should Buy Life Insurance. First Edition</source>
          <year>2009</year>
          <publisher-loc>New York, USA</publisher-loc>
          <publisher-name>William Morrow</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <source>PricewaterhouseCoopers</source>
          <year>2018</year>
          <access-date>2019-09-07</access-date>
          <comment>The Global State of Information Security Survey 2018<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pwc.com/us/en/services/consulting/cybersecurity/library/information-security-survey.html#insight1">https://www.pwc.com/us/en/services/consulting/cybersecurity/library/information-security-survey.html#insight1</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Theis</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Trzeciak</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Costa</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Moore</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Common Sense Guide to Mitigating Insider Threats, Sixth Edition. Technical Report CMU/SEI-2018-TR-</source>
          <year>2019</year>
          <access-date>2020-06-09</access-date>
          <publisher-loc>Pittsburgh, Pennsylvania</publisher-loc>
          <publisher-name>Software Engineering Institute, Carnegie Mellon University</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://resources.sei.cmu.edu/asset_files/TechnicalReport/2019_005_001_540647.pdf">https://resources.sei.cmu.edu/asset_files/TechnicalReport/2019_005_001_540647.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rodrigues</surname>
              <given-names>JJ</given-names>
            </name>
            <name name-style="western">
              <surname>de la Torre</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>López-Coronado</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Analysis of the security and privacy requirements of cloud-based electronic health records systems</article-title>
          <source>J Med Internet Res</source>
          <year>2013</year>
          <month>08</month>
          <day>21</day>
          <volume>15</volume>
          <issue>8</issue>
          <fpage>e186</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2013/8/e186/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2494</pub-id>
          <pub-id pub-id-type="medline">23965254</pub-id>
          <pub-id pub-id-type="pii">v15i8e186</pub-id>
          <pub-id pub-id-type="pmcid">PMC3757992</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hui</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SH</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks</article-title>
          <source>MIS Q</source>
          <year>2017</year>
          <month>02</month>
          <day>1</day>
          <volume>41</volume>
          <issue>2</issue>
          <fpage>497</fpage>
          <lpage>523</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2017/41.2.08</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Willison</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Lowry</surname>
              <given-names>PB</given-names>
            </name>
            <name name-style="western">
              <surname>Paternoster</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A tale of two deterrents: considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research</article-title>
          <source>J Assoc Inform Syst</source>
          <year>2018</year>
          <volume>19</volume>
          <issue>12</issue>
          <fpage>1187</fpage>
          <lpage>216</lpage>
          <pub-id pub-id-type="doi">10.17705/1jais.00524</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Crossler</surname>
              <given-names>RE</given-names>
            </name>
            <name name-style="western">
              <surname>Johnston</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Lowry</surname>
              <given-names>PB</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Warkentin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Baskerville</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Future directions for behavioral information security research</article-title>
          <source>Comput Secur</source>
          <year>2013</year>
          <month>02</month>
          <volume>32</volume>
          <fpage>90</fpage>
          <lpage>101</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2012.09.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pramanik</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sankaranarayanan</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Upadhyaya</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Security policies to mitigate insider threat in the document control domain</article-title>
          <source>20th Annual Computer Security Applications Conference: IEEE</source>
          <year>2004</year>
          <conf-name>20th Annual Computer Security Applications Conference</conf-name>
          <conf-date>December 6-10, 2004</conf-date>
          <conf-loc>Tuscon, Arizona</conf-loc>
          <fpage>-</fpage>
          <pub-id pub-id-type="doi">10.1109/csac.2004.35</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chickowoski</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <source>Dark Reading</source>
          <year>2018</year>
          <access-date>2020-05-29</access-date>
          <comment>The 6 Worst Insider Attacks of 2018 – So Far<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.darkreading.com/the-6-worst-insider-attacks-of-2018---so-far/d/d-id/1332183">https://www.darkreading.com/the-6-worst-insider-attacks-of-2018---so-far/d/d-id/1332183</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <source>Software Engineering Institute - Carnegie Mellon University</source>
          <year>2019</year>
          <access-date>2020-05-29</access-date>
          <comment>Insider Threat<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://insights.sei.cmu.edu/insider-threat/">https://insights.sei.cmu.edu/insider-threat/</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roy Sarkar</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Assessing insider threats to information security using technical, behavioural and organisational measures</article-title>
          <source>Inf Secur Tech Rep</source>
          <year>2010</year>
          <month>08</month>
          <volume>15</volume>
          <issue>3</issue>
          <fpage>112</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1016/j.istr.2010.11.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ruiter</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Kessels</surname>
              <given-names>LT</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>GY</given-names>
            </name>
            <name name-style="western">
              <surname>Kok</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Sixty years of fear appeal research: current state of the evidence</article-title>
          <source>Int J Psychol</source>
          <year>2014</year>
          <month>04</month>
          <volume>49</volume>
          <issue>2</issue>
          <fpage>63</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1002/ijop.12042</pub-id>
          <pub-id pub-id-type="medline">24811876</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>GY</given-names>
            </name>
            <name name-style="western">
              <surname>Ruiter</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Kok</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Threatening communication: a qualitative study of fear appeal effectiveness beliefs among intervention developers, policymakers, politicians, scientists, and advertising professionals</article-title>
          <source>Int J Psychol</source>
          <year>2014</year>
          <month>04</month>
          <volume>49</volume>
          <issue>2</issue>
          <fpage>71</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24811877"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/ijop.12000</pub-id>
          <pub-id pub-id-type="medline">24811877</pub-id>
          <pub-id pub-id-type="pmcid">PMC4278564</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McGlone</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Reed</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>Anchoring in the interpretation of probability expressions</article-title>
          <source>J Pragmatics</source>
          <year>1998</year>
          <month>12</month>
          <volume>30</volume>
          <issue>6</issue>
          <fpage>723</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1016/s0378-2166(98)00011-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pogarsky</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Roche</surname>
              <given-names>SP</given-names>
            </name>
            <name name-style="western">
              <surname>Pickett</surname>
              <given-names>JT</given-names>
            </name>
          </person-group>
          <article-title>Heuristics and biases, rational choice, and sanction perceptions</article-title>
          <source>Criminology</source>
          <year>2017</year>
          <month>02</month>
          <day>2</day>
          <volume>55</volume>
          <issue>1</issue>
          <fpage>85</fpage>
          <lpage>111</lpage>
          <pub-id pub-id-type="doi">10.1111/1745-9125.12129</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dodou</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>de Winter</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Social desirability is the same in offline, online, and paper surveys: a meta-analysis</article-title>
          <source>Comput Hum Behav</source>
          <year>2014</year>
          <month>07</month>
          <volume>36</volume>
          <fpage>487</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2014.04.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Akbulut</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Dönmez</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Dursun</surname>
              <given-names>OO</given-names>
            </name>
          </person-group>
          <article-title>Cyberloafing and social desirability bias among students and employees</article-title>
          <source>Comput Hum Behav</source>
          <year>2017</year>
          <month>07</month>
          <volume>72</volume>
          <fpage>87</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.02.043</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Basile</collab>
            <name name-style="western">
              <surname>Jennifer</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <source>Disseration. University at Buffalo</source>
          <year>2014</year>
          <access-date>2020-06-09</access-date>
          <comment>An empirical Investigation on Increasing HIPAA Compliance<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ubir.buffalo.edu/xmlui/handle/10477/51211">https://ubir.buffalo.edu/xmlui/handle/10477/51211</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hammitt</surname>
              <given-names>JK</given-names>
            </name>
            <name name-style="western">
              <surname>Treich</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Statistical vs identified lives in benefit-cost analysis</article-title>
          <source>J Risk Uncertainty</source>
          <year>2007</year>
          <month>06</month>
          <day>21</day>
          <volume>35</volume>
          <issue>1</issue>
          <fpage>45</fpage>
          <lpage>66</lpage>
          <pub-id pub-id-type="doi">10.1007/s11166-007-9015-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Russell</surname>
              <given-names>LB</given-names>
            </name>
          </person-group>
          <article-title>Do we really value identified lives more highly than statistical lives?</article-title>
          <source>Med Decis Making</source>
          <year>2013</year>
          <month>12</month>
          <day>30</day>
          <volume>34</volume>
          <issue>5</issue>
          <fpage>556</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1177/0272989x13512183</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thaler</surname>
              <given-names>RH</given-names>
            </name>
          </person-group>
          <article-title>Asymmetric games and the endowment effect</article-title>
          <source>Behav Brain Sci</source>
          <year>2010</year>
          <month>02</month>
          <day>4</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>117</fpage>
          <pub-id pub-id-type="doi">10.1017/s0140525x00026492</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kahneman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Knetsch</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Thaler</surname>
              <given-names>RH</given-names>
            </name>
          </person-group>
          <article-title>Anomalies: the endowment effect, loss aversion, and status quo bias</article-title>
          <source>J Econ Perspect</source>
          <year>1991</year>
          <month>02</month>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>193</fpage>
          <lpage>206</lpage>
          <pub-id pub-id-type="doi">10.1257/jep.5.1.193</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brasel</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Gips</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Tablets, touchscreens, and touchpads: how varying touch interfaces trigger psychological ownership and endowment</article-title>
          <source>J Consum Psychol</source>
          <year>2014</year>
          <month>04</month>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>226</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jcps.2013.10.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pierce</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Kostova</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Dirks</surname>
              <given-names>KT</given-names>
            </name>
          </person-group>
          <article-title>The state of psychological ownership: integrating and extending a century of research</article-title>
          <source>Rev Gen Psychol</source>
          <year>2003</year>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>84</fpage>
          <lpage>107</lpage>
          <pub-id pub-id-type="doi">10.1037//1089-2680.7.1.84</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moon</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hossain</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Sanders</surname>
              <given-names>GL</given-names>
            </name>
            <name name-style="western">
              <surname>Garrity</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Jo</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Player commitment to massively multiplayer online role-playing games (MMORPGs): an integrated model</article-title>
          <source>Int J Electron Comm</source>
          <year>2014</year>
          <month>12</month>
          <day>8</day>
          <volume>17</volume>
          <issue>4</issue>
          <fpage>7</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.2753/jec1086-4415170401</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paternoster</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Absolute and restrictive deterrence in a panel of youth: explaining the onset, persistence/desistance, and frequency of delinquent offending</article-title>
          <source>Soc Probl</source>
          <year>1989</year>
          <month>06</month>
          <volume>36</volume>
          <issue>3</issue>
          <fpage>289</fpage>
          <lpage>309</lpage>
          <pub-id pub-id-type="doi">10.1525/sp.1989.36.3.03a00060</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yoo</surname>
              <given-names>CW</given-names>
            </name>
            <name name-style="western">
              <surname>Sanders</surname>
              <given-names>GL</given-names>
            </name>
            <name name-style="western">
              <surname>Rhee</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Choe</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>The effect of deterrence policy in software piracy: cross-cultural analysis between Korea and Vietnam</article-title>
          <source>Inf Dev</source>
          <year>2012</year>
          <month>11</month>
          <day>20</day>
          <volume>30</volume>
          <issue>4</issue>
          <fpage>342</fpage>
          <lpage>57</lpage>
          <pub-id pub-id-type="doi">10.1177/0266666912465974</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johnston</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Warkentin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Siponen</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric</article-title>
          <source>MIS Q</source>
          <year>2015</year>
          <month>01</month>
          <day>1</day>
          <volume>39</volume>
          <issue>1</issue>
          <fpage>113</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2015/39.1.06</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reid</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Ryder</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Financial crime in the twenty-first century: the rise of the virtual collar criminal</article-title>
          <source>White Collar Crime and Risk: Financial Crime, Corruption and the Financial Crisis</source>
          <year>2018</year>
          <publisher-loc>London</publisher-loc>
          <publisher-name>Palgrave Macmillan UK</publisher-name>
          <fpage>231</fpage>
          <lpage>51</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mathews</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <source>Forbes</source>
          <year>2017</year>
          <access-date>2018-09-17</access-date>
          <comment>File With 1.4 Billion Hacked And Leaked Passwords Found On The Dark Web<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.forbes.com/sites/leemathews/2017/12/11/billion-hacked-passwords-dark-web/#5991d6f21f2f">https://www.forbes.com/sites/leemathews/2017/12/11/billion-hacked-passwords-dark-web/#5991d6f21f2f</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grimes</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <source>CSO</source>
          <year>2016</year>
          <access-date>2019-01-02</access-date>
          <comment>Why It's So Hard to Prosecute Cyber Criminals<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.csoonline.com/article/3147398/data-protection/why-its-so-hard-to-prosecute-cyber-criminals.html">https://www.csoonline.com/article/3147398/data-protection/why-its-so-hard-to-prosecute-cyber-criminals.html</ext-link>
                                                </comment>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="web">
          <source>The US Department of Health and Human Services (HHS)</source>
          <year>2019</year>
          <access-date>2020-05-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hhs.gov/">https://www.hhs.gov/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="web">
          <source>US Department of Justice</source>
          <year>2019</year>
          <access-date>2020-05-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.justice.gov/">https://www.justice.gov/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Taleb</surname>
              <given-names>NN</given-names>
            </name>
          </person-group>
          <source>The Black Swan: The Impact of the Highly Improbable</source>
          <year>2008</year>
          <publisher-loc>UK</publisher-loc>
          <publisher-name>Penguin UK</publisher-name>
          <fpage>4</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>EH</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wiles</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>YS</given-names>
            </name>
          </person-group>
          <article-title>Factors affecting intention to disclose patients’ health information</article-title>
          <source>Comput Secur</source>
          <year>2019</year>
          <month>11</month>
          <volume>87</volume>
          <fpage>101340</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2018.05.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Webb</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmad</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Maynard</surname>
              <given-names>SB</given-names>
            </name>
            <name name-style="western">
              <surname>Shanks</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A situation awareness model for information security risk management</article-title>
          <source>Computers Secur</source>
          <year>2014</year>
          <month>07</month>
          <volume>44</volume>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2014.04.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yoo</surname>
              <given-names>CW</given-names>
            </name>
            <name name-style="western">
              <surname>Sanders</surname>
              <given-names>GL</given-names>
            </name>
            <name name-style="western">
              <surname>Cerveny</surname>
              <given-names>RP</given-names>
            </name>
          </person-group>
          <article-title>Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance</article-title>
          <source>Decis Support Syst</source>
          <year>2018</year>
          <month>04</month>
          <volume>108</volume>
          <fpage>107</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dss.2018.02.009</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
