{"id":"https://openalex.org/W2060771466","doi":"https://doi.org/10.1080/01449290802556021","title":"The amplification effects of procedural justice on a threat control model of information systems security behaviours","display_name":"The amplification effects of procedural justice on a threat control model of information systems security behaviours","publication_year":2009,"publication_date":"2009-01-29","ids":{"openalex":"https://openalex.org/W2060771466","doi":"https://doi.org/10.1080/01449290802556021","mag":"2060771466"},"language":"en","primary_location":{"id":"doi:10.1080/01449290802556021","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01449290802556021","pdf_url":null,"source":{"id":"https://openalex.org/S123849098","display_name":"Behaviour and Information Technology","issn_l":"0144-929X","issn":["0144-929X","1362-3001"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Behaviour &amp; Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103270691","display_name":"Michael Workman","orcid":"https://orcid.org/0000-0003-3151-3143"},"institutions":[{"id":"https://openalex.org/I869194970","display_name":"College of Business and Technology","ror":"https://ror.org/00tr1bg48","country_code":"US","type":"education","lineage":["https://openalex.org/I869194970"]},{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael Workman","raw_affiliation_strings":["Florida Institute of Technology, College of Business","Florida Institute of Technology, College of Business , Melbourne, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida Institute of Technology, College of Business","institution_ids":["https://openalex.org/I869194970"]},{"raw_affiliation_string":"Florida Institute of Technology, College of Business , Melbourne, FL, USA","institution_ids":["https://openalex.org/I106959904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049306051","display_name":"William H. Bommer","orcid":"https://orcid.org/0000-0001-9800-623X"},"institutions":[{"id":"https://openalex.org/I127339247","display_name":"California State University System","ror":"https://ror.org/020qm1538","country_code":"US","type":"education","lineage":["https://openalex.org/I127339247"]},{"id":"https://openalex.org/I67328108","display_name":"California State University, Fresno","ror":"https://ror.org/03enmdz06","country_code":"US","type":"education","lineage":["https://openalex.org/I67328108"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William H. Bommer","raw_affiliation_strings":["Craig School of Business, California State University","Craig School of Business, California State University,Fresno, CA, USA"],"affiliations":[{"raw_affiliation_string":"Craig School of Business, California State University","institution_ids":["https://openalex.org/I127339247"]},{"raw_affiliation_string":"Craig School of Business, California State University,Fresno, CA, USA","institution_ids":["https://openalex.org/I67328108"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084116084","display_name":"Detmar W. Straub","orcid":"https://orcid.org/0000-0001-7030-1034"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Detmar Straub","raw_affiliation_strings":["J. Mack Robinson College of Business, Georgia State University","J. Mack Robinson College of Business, Georgia State University, Atlanta, GA, USA,"],"affiliations":[{"raw_affiliation_string":"J. Mack Robinson College of Business, Georgia State University","institution_ids":["https://openalex.org/I181565077"]},{"raw_affiliation_string":"J. Mack Robinson College of Business, Georgia State University, Atlanta, GA, USA,","institution_ids":["https://openalex.org/I181565077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103270691"],"corresponding_institution_ids":["https://openalex.org/I106959904","https://openalex.org/I869194970"],"apc_list":null,"apc_paid":null,"fwci":0.7403,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.82433197,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"28","issue":"6","first_page":"563","last_page":"575"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.6591416597366333},{"id":"https://openalex.org/keywords/extant-taxon","display_name":"Extant taxon","score":0.6455878615379333},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6346848011016846},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.6224026083946228},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.597008228302002},{"id":"https://openalex.org/keywords/information-systems-security","display_name":"Information systems security","score":0.5499699115753174},{"id":"https://openalex.org/keywords/economic-justice","display_name":"Economic Justice","score":0.5129179954528809},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.48636606335639954},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.44700080156326294},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.43629390001296997},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4300031363964081},{"id":"https://openalex.org/keywords/standard-of-good-practice","display_name":"Standard of Good Practice","score":0.41988489031791687},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.39906609058380127},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3796135187149048},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.31727877259254456},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2689271569252014},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.24749282002449036},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.23919573426246643},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2259804606437683},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.17397376894950867},{"id":"https://openalex.org/keywords/management-information-systems","display_name":"Management information systems","score":0.16958963871002197},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1425035297870636},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.10227414965629578},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.08361315727233887}],"concepts":[{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.6591416597366333},{"id":"https://openalex.org/C178300618","wikidata":"https://www.wikidata.org/wiki/Q1898509","display_name":"Extant taxon","level":2,"score":0.6455878615379333},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6346848011016846},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.6224026083946228},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.597008228302002},{"id":"https://openalex.org/C2988319471","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information systems security","level":4,"score":0.5499699115753174},{"id":"https://openalex.org/C139621336","wikidata":"https://www.wikidata.org/wiki/Q3190382","display_name":"Economic Justice","level":2,"score":0.5129179954528809},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.48636606335639954},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.44700080156326294},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.43629390001296997},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4300031363964081},{"id":"https://openalex.org/C47309137","wikidata":"https://www.wikidata.org/wiki/Q7598357","display_name":"Standard of Good Practice","level":5,"score":0.41988489031791687},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.39906609058380127},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3796135187149048},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.31727877259254456},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2689271569252014},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.24749282002449036},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.23919573426246643},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2259804606437683},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.17397376894950867},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.16958963871002197},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1425035297870636},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.10227414965629578},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.08361315727233887},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/01449290802556021","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01449290802556021","pdf_url":null,"source":{"id":"https://openalex.org/S123849098","display_name":"Behaviour and Information Technology","issn_l":"0144-929X","issn":["0144-929X","1362-3001"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Behaviour &amp; Information Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":89,"referenced_works":["https://openalex.org/W58358093","https://openalex.org/W63821403","https://openalex.org/W1484864026","https://openalex.org/W1516089888","https://openalex.org/W1538043169","https://openalex.org/W1552061030","https://openalex.org/W1566168400","https://openalex.org/W1582830784","https://openalex.org/W1586873571","https://openalex.org/W1964521886","https://openalex.org/W1965235584","https://openalex.org/W1972859821","https://openalex.org/W1976300921","https://openalex.org/W1984186949","https://openalex.org/W1988826963","https://openalex.org/W1990566616","https://openalex.org/W1997302797","https://openalex.org/W2000959487","https://openalex.org/W2007409322","https://openalex.org/W2022122406","https://openalex.org/W2022133889","https://openalex.org/W2025043113","https://openalex.org/W2028573370","https://openalex.org/W2036512235","https://openalex.org/W2042005649","https://openalex.org/W2042198631","https://openalex.org/W2045839236","https://openalex.org/W2047917391","https://openalex.org/W2049501037","https://openalex.org/W2052354782","https://openalex.org/W2055847123","https://openalex.org/W2055985396","https://openalex.org/W2056847254","https://openalex.org/W2057412844","https://openalex.org/W2061960606","https://openalex.org/W2062121040","https://openalex.org/W2065461065","https://openalex.org/W2065540129","https://openalex.org/W2069017375","https://openalex.org/W2074511573","https://openalex.org/W2075779809","https://openalex.org/W2079768274","https://openalex.org/W2081363108","https://openalex.org/W2081430061","https://openalex.org/W2088135512","https://openalex.org/W2090978119","https://openalex.org/W2091261347","https://openalex.org/W2091866932","https://openalex.org/W2092729026","https://openalex.org/W2096311059","https://openalex.org/W2096611814","https://openalex.org/W2097427281","https://openalex.org/W2099167936","https://openalex.org/W2100826189","https://openalex.org/W2102155487","https://openalex.org/W2106689294","https://openalex.org/W2109762168","https://openalex.org/W2112914455","https://openalex.org/W2119587968","https://openalex.org/W2126512988","https://openalex.org/W2126816540","https://openalex.org/W2130140239","https://openalex.org/W2139421175","https://openalex.org/W2142175015","https://openalex.org/W2145520874","https://openalex.org/W2153834579","https://openalex.org/W2156565637","https://openalex.org/W2167026971","https://openalex.org/W2170554716","https://openalex.org/W2171728588","https://openalex.org/W2179683524","https://openalex.org/W2291356582","https://openalex.org/W2398576731","https://openalex.org/W2622838936","https://openalex.org/W2797247465","https://openalex.org/W3044291841","https://openalex.org/W3122503705","https://openalex.org/W3124243881","https://openalex.org/W3125721404","https://openalex.org/W3205979693","https://openalex.org/W4230425646","https://openalex.org/W4239945053","https://openalex.org/W4242428868","https://openalex.org/W4254019417","https://openalex.org/W4255290799","https://openalex.org/W4285719527","https://openalex.org/W4292808503","https://openalex.org/W4292811746","https://openalex.org/W4388252364"],"related_works":["https://openalex.org/W40842196","https://openalex.org/W2126017555","https://openalex.org/W1567258312","https://openalex.org/W2248314326","https://openalex.org/W4308535653","https://openalex.org/W815057058","https://openalex.org/W2497647994","https://openalex.org/W1988974780","https://openalex.org/W2474818065","https://openalex.org/W1208953748"],"abstract_inverted_index":{"Abstract":[0],"Organisations":[1],"are":[2],"increasingly":[3],"impacted":[4],"by":[5],"employee":[6],"failures":[7],"to":[8,35,113,129],"implement":[9,36],"readily":[10],"available":[11],"systems":[12],"security":[13,18,37,65,119,161,173],"countermeasures":[14],"that":[15,141],"result":[16],"in":[17,107,145],"lapses.":[19],"An":[20],"area":[21],"where":[22],"this":[23],"is":[24,27],"most":[25],"intriguing":[26],"among":[28],"those":[29],"organisational":[30,99,136,155],"members":[31],"who":[32],"know":[33],"how":[34,115],"measures":[38],"but":[39,49],"do":[40,42],"not":[41],"so.":[43],"Important":[44],"suggestions":[45],"have":[46,67,79],"been":[47,68],"made,":[48],"despite":[50],"them,":[51],"the":[52,61,90,123,131,146],"problem":[53],"continues,":[54],"and":[55,83,86,127,135,169],"even":[56],"grows":[57],"worse.":[58],"Most":[59],"of":[60,81,118,125,154],"research":[62,92,168],"into":[63,122],"these":[64],"behaviours":[66,120],"either":[69,96],"purely":[70],"self-report":[71],"perceptions":[72,117,153],"(many":[73],"with":[74,151],"low":[75],"response":[76],"rates)":[77],"or":[78,98],"consisted":[80],"theory":[82],"model":[84,149],"building":[85],"testing.":[87],"In":[88],"addition,":[89],"extant":[91],"has":[93],"concentrated":[94],"on":[95,158],"individual":[97,134,142],"factors.":[100,137],"With":[101],"our":[102],"research,":[103],"we":[104,164],"were":[105],"interested":[106],"addressing":[108],"two":[109],"literature":[110],"gaps:":[111],"(1)":[112],"determine":[114],"well":[116],"translated":[121],"world":[124],"practice,":[126],"(2)":[128],"understand":[130],"relationships":[132],"between":[133],"Our":[138],"study":[139],"found":[140],"factors":[143],"outlined":[144],"threat":[147],"control":[148,176],"amplified":[150],"high":[152],"procedural":[156],"justice":[157],"taking":[159],"specified":[160],"countermeasures.":[162],"Consequently,":[163],"make":[165],"recommendations":[166],"for":[167],"practice.":[170],"Keywords:":[171],"information":[172],"behavioursprocedural":[174],"justicethreat":[175],"modelsecurity":[177],"lapses":[178]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-01-22T23:29:09.771500","created_date":"2025-10-10T00:00:00"}
