6
2.
8
Fig. 1 Visualisation of the relationship between the various security definitions (Von Solms &, van Niekerk, 2013)
10 - - - - - -
11 -
- -
12
Fig. 2 Mechanism of action for situated motivational affordance (Deterding, 2011)
19
3. Research Method
20 - - - - - - -
33 α
α α α α