{"id":"https://openalex.org/W2265415932","doi":"https://doi.org/10.1007/978-3-319-20376-8_39","title":"An Identification of Variables Influencing the Establishment of Information Security Culture","display_name":"An Identification of Variables Influencing the Establishment of Information Security Culture","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2265415932","doi":"https://doi.org/10.1007/978-3-319-20376-8_39","mag":"2265415932"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-20376-8_39","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20376-8_39","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworkspost2013/1335","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076471652","display_name":"Emad Sherif","orcid":"https://orcid.org/0000-0002-8450-338X"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Emad Sherif","raw_affiliation_strings":["Computer Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Computer Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033160778","display_name":"Steven Furnell","orcid":"https://orcid.org/0000-0003-0984-7542"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["AU","GB","ZA"],"is_corresponding":false,"raw_author_name":"Steven Furnell","raw_affiliation_strings":["Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa","Computer Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK","Security Research Institute, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]},{"raw_affiliation_string":"Computer Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"Security Research Institute, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029670131","display_name":"Nathan Clarke","orcid":"https://orcid.org/0000-0002-3595-3800"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["AU","GB"],"is_corresponding":false,"raw_author_name":"Nathan Clarke","raw_affiliation_strings":["Computer Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK","Security Research Institute, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"Computer Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"Security Research Institute, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076471652"],"corresponding_institution_ids":["https://openalex.org/I897542642"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.9954,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.94470999,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"436","last_page":"448"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765935063362122},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6609015464782715},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5298808813095093},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3523099422454834},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.32369235157966614}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765935063362122},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6609015464782715},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5298808813095093},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3523099422454834},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.32369235157966614},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-20376-8_39","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-20376-8_39","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-2336","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/1335","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-2336","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/1335","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W130727141","https://openalex.org/W624366721","https://openalex.org/W1512740566","https://openalex.org/W1534528139","https://openalex.org/W1581022591","https://openalex.org/W1805157503","https://openalex.org/W1966997002","https://openalex.org/W1968584218","https://openalex.org/W1982936123","https://openalex.org/W1986793627","https://openalex.org/W1992549547","https://openalex.org/W1994285348","https://openalex.org/W2000431168","https://openalex.org/W2033213440","https://openalex.org/W2033378528","https://openalex.org/W2037104605","https://openalex.org/W2040517709","https://openalex.org/W2048890402","https://openalex.org/W2058640412","https://openalex.org/W2071051448","https://openalex.org/W2075326502","https://openalex.org/W2080940090","https://openalex.org/W2083700439","https://openalex.org/W2088489410","https://openalex.org/W2106240333","https://openalex.org/W2115571006","https://openalex.org/W2147782344","https://openalex.org/W2156438052","https://openalex.org/W2295647385","https://openalex.org/W2899429755"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W4210648132"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
