{"id":"https://openalex.org/W1442963952","doi":"https://doi.org/10.1007/978-3-319-20376-8_14","title":"The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring","display_name":"The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W1442963952","doi":"https://doi.org/10.1007/978-3-319-20376-8_14","mag":"1442963952"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-20376-8_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20376-8_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018488407","display_name":"Stefan Bauer","orcid":"https://orcid.org/0000-0003-1712-060X"},"institutions":[{"id":"https://openalex.org/I102248843","display_name":"Vienna University of Economics and Business","ror":"https://ror.org/03yn8s215","country_code":"AT","type":"education","lineage":["https://openalex.org/I102248843"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Stefan Bauer","raw_affiliation_strings":["Vienna University of Economics and Business, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Vienna University of Economics and Business, Vienna, Austria","institution_ids":["https://openalex.org/I102248843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021103725","display_name":"Edward Bernroider","orcid":"https://orcid.org/0000-0003-4787-8358"},"institutions":[{"id":"https://openalex.org/I102248843","display_name":"Vienna University of Economics and Business","ror":"https://ror.org/03yn8s215","country_code":"AT","type":"education","lineage":["https://openalex.org/I102248843"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Edward W.N. Bernroider","raw_affiliation_strings":["Vienna University of Economics and Business, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Vienna University of Economics and Business, Vienna, Austria","institution_ids":["https://openalex.org/I102248843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5018488407"],"corresponding_institution_ids":["https://openalex.org/I102248843"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.9975,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.94099419,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"154","last_page":"164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6481328010559082},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.635952889919281},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.610737144947052},{"id":"https://openalex.org/keywords/coping","display_name":"Coping (psychology)","score":0.5498735904693604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.540596067905426},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.5328894853591919},{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.5135457515716553},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.4782392382621765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4661506414413452},{"id":"https://openalex.org/keywords/german","display_name":"German","score":0.439014196395874},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3044058680534363},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.21712526679039001}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6481328010559082},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.635952889919281},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.610737144947052},{"id":"https://openalex.org/C73282008","wikidata":"https://www.wikidata.org/wiki/Q1759895","display_name":"Coping (psychology)","level":2,"score":0.5498735904693604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.540596067905426},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.5328894853591919},{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.5135457515716553},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.4782392382621765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4661506414413452},{"id":"https://openalex.org/C154775046","wikidata":"https://www.wikidata.org/wiki/Q188","display_name":"German","level":2,"score":0.439014196395874},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3044058680534363},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.21712526679039001},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-20376-8_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20376-8_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:research.wu.ac.at:openaire_cris_publications/2ec340bd-383b-48fb-8660-5fca063feb09","is_oa":false,"landing_page_url":"https://research.wu.ac.at/de/publications/2ec340bd-383b-48fb-8660-5fca063feb09","pdf_url":null,"source":{"id":"https://openalex.org/S7407055123","display_name":"WU Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bauer, S & Bernroider, E 2015, The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring. in Tryfonas, Theo, Askoxylakis, Ioannis (ed.), Human Aspects of Information Security, Privacy, and Trust. Springer Lecture Notes in Computer Science (LNCS), Los Angeles, pp. 154 - 164. https://doi.org/10.1007/978-3-319-20376-8_14","raw_type":"info:eu-repo/semantics/bookPart"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W141842149","https://openalex.org/W779871633","https://openalex.org/W1545460766","https://openalex.org/W1903013269","https://openalex.org/W1966997002","https://openalex.org/W1970809283","https://openalex.org/W1971440513","https://openalex.org/W1974589815","https://openalex.org/W1976876708","https://openalex.org/W1981054068","https://openalex.org/W1987381312","https://openalex.org/W1988050849","https://openalex.org/W1988071189","https://openalex.org/W1989210507","https://openalex.org/W1993957541","https://openalex.org/W2010902645","https://openalex.org/W2012073895","https://openalex.org/W2025829466","https://openalex.org/W2026442199","https://openalex.org/W2033213440","https://openalex.org/W2051297451","https://openalex.org/W2056847254","https://openalex.org/W2063141940","https://openalex.org/W2077514183","https://openalex.org/W2081430061","https://openalex.org/W2081657462","https://openalex.org/W2086676398","https://openalex.org/W2091261347","https://openalex.org/W2099647042","https://openalex.org/W2130892515","https://openalex.org/W2148514199","https://openalex.org/W2156438052","https://openalex.org/W2170554716","https://openalex.org/W2170899042","https://openalex.org/W2521695965","https://openalex.org/W4292811746"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2544387082","https://openalex.org/W2968709340","https://openalex.org/W2099222119","https://openalex.org/W2888935944"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-10T00:00:00"}
