{"id":"https://openalex.org/W3092338269","doi":"https://doi.org/10.1093/cybsec/tyaa011","title":"Exploring the security narrative in the work context","display_name":"Exploring the security narrative in the work context","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3092338269","doi":"https://doi.org/10.1093/cybsec/tyaa011","mag":"3092338269"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaa011","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa011","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/6/1/tyaa011/33862682/tyaa011.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/6/1/tyaa011/33862682/tyaa011.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073346661","display_name":"Karoline Busse","orcid":"https://orcid.org/0000-0002-4484-7639"},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Karoline Busse","raw_affiliation_strings":["Institut f\u00fcr Informatik IV Endenicher Allee 19a 53115 Bonn, Germany","Usable Security and Privacy Group, Rheinische Friedrich-Wilhelms-Universitat Bonn, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Informatik IV Endenicher Allee 19a 53115 Bonn, Germany","institution_ids":[]},{"raw_affiliation_string":"Usable Security and Privacy Group, Rheinische Friedrich-Wilhelms-Universitat Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091275637","display_name":"Jennifer Seifert","orcid":"https://orcid.org/0000-0001-5851-7246"},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jennifer Seifert","raw_affiliation_strings":["Faculty of Philosophy, Leibniz Universitat Hannover, Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Philosophy, Leibniz Universitat Hannover, Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000498964","display_name":"Matthew Smith","orcid":"https://orcid.org/0000-0002-2724-1379"},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthew Smith","raw_affiliation_strings":["Institut f\u00fcr Informatik IV Endenicher Allee 19a 53115 Bonn, Germany","Usable Security and Privacy Group, Rheinische Friedrich-Wilhelms-Universitat Bonn, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Informatik IV Endenicher Allee 19a 53115 Bonn, Germany","institution_ids":[]},{"raw_affiliation_string":"Usable Security and Privacy Group, Rheinische Friedrich-Wilhelms-Universitat Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073346661"],"corresponding_institution_ids":["https://openalex.org/I135140700"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.2669,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65686743,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/critical-security-studies","display_name":"Critical security studies","score":0.7145776748657227},{"id":"https://openalex.org/keywords/narrative","display_name":"Narrative","score":0.6732210516929626},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6157478094100952},{"id":"https://openalex.org/keywords/security-studies","display_name":"Security studies","score":0.5939324498176575},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.5290968418121338},{"id":"https://openalex.org/keywords/corporate-security","display_name":"Corporate security","score":0.4977877140045166},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.46133458614349365},{"id":"https://openalex.org/keywords/job-security","display_name":"Job security","score":0.4109758138656616},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.40160462260246277},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.36989593505859375},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3399438261985779},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3276527523994446},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3073807656764984},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28740888833999634},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.259374737739563},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.22336149215698242},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.17731034755706787},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.14887064695358276},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14151179790496826},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.1332969069480896}],"concepts":[{"id":"https://openalex.org/C505623098","wikidata":"https://www.wikidata.org/wiki/Q3002932","display_name":"Critical security studies","level":5,"score":0.7145776748657227},{"id":"https://openalex.org/C199033989","wikidata":"https://www.wikidata.org/wiki/Q1318295","display_name":"Narrative","level":2,"score":0.6732210516929626},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6157478094100952},{"id":"https://openalex.org/C79165680","wikidata":"https://www.wikidata.org/wiki/Q1280151","display_name":"Security studies","level":2,"score":0.5939324498176575},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.5290968418121338},{"id":"https://openalex.org/C179681481","wikidata":"https://www.wikidata.org/wiki/Q5172490","display_name":"Corporate security","level":3,"score":0.4977877140045166},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.46133458614349365},{"id":"https://openalex.org/C2777581918","wikidata":"https://www.wikidata.org/wiki/Q302562","display_name":"Job security","level":3,"score":0.4109758138656616},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.40160462260246277},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.36989593505859375},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3399438261985779},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3276527523994446},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3073807656764984},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28740888833999634},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.259374737739563},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.22336149215698242},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.17731034755706787},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.14887064695358276},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14151179790496826},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.1332969069480896},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/cybsec/tyaa011","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa011","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/6/1/tyaa011/33862682/tyaa011.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:www.repo.uni-hannover.de:123456789/16573","is_oa":true,"landing_page_url":"https://www.repo.uni-hannover.de/handle/123456789/16573","pdf_url":null,"source":{"id":"https://openalex.org/S4306401575","display_name":"Institutional Repository of Leibniz Universit\u00e4t Hannover (Leibniz Universit\u00e4t Hannover)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114112103","host_organization_name":"Leibniz University Hannover","host_organization_lineage":["https://openalex.org/I114112103"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity 6 (2020), Nr. 1","raw_type":"status-type:publishedVersion"},{"id":"doi:10.15488/16446","is_oa":true,"landing_page_url":"https://doi.org/10.15488/16446","pdf_url":null,"source":{"id":"https://openalex.org/S7407052956","display_name":"Leibniz Universit\u00e4t Hannover","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaa011","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa011","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/6/1/tyaa011/33862682/tyaa011.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3092338269.pdf","grobid_xml":"https://content.openalex.org/works/W3092338269.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W73623688","https://openalex.org/W121380501","https://openalex.org/W379884009","https://openalex.org/W1509027017","https://openalex.org/W2142225512","https://openalex.org/W2258698957","https://openalex.org/W2289877150","https://openalex.org/W2476867926","https://openalex.org/W2490721398","https://openalex.org/W2501514473","https://openalex.org/W2797893620","https://openalex.org/W3122167728","https://openalex.org/W4244365148","https://openalex.org/W4253216972","https://openalex.org/W6692513539"],"related_works":["https://openalex.org/W1972447279","https://openalex.org/W4289768364","https://openalex.org/W172307390","https://openalex.org/W4254322001","https://openalex.org/W2002467930","https://openalex.org/W2279045796","https://openalex.org/W4233780748","https://openalex.org/W2489004824","https://openalex.org/W2528710332","https://openalex.org/W4360851774"],"abstract_inverted_index":{"Abstract":[0],"It":[1],"is":[2,108],"a":[3,21,39,66,80,149,165,197],"well-known":[4],"fact":[5],"that":[6,15,59,106,161,190],"the":[7,31,62,94,113,136,145,154,170,174,191,202],"language":[8,194],"of":[9,16,23,48,96,164,167,193,204],"IT":[10,87,115,156,184],"security":[11,36,41,88,98,101,146,171,185,206],"experts":[12,37],"differs":[13],"from":[14],"non-security-related":[17],"people,":[18],"leading":[19],"to":[20,70,92,200],"multitude":[22],"problems.":[24],"However,":[25,117],"very":[26],"little":[27],"work":[28,175],"has":[29],"examined":[30],"differences":[32],"in":[33,65,90,173],"perception":[34],"between":[35],"within":[38,84,100,144],"single":[40],"department":[42,67],"or":[43],"company.":[44],"The":[45],"sociological":[46],"theory":[47],"power":[49,73],"relations":[50,74],"and":[51,56,75,132],"organizational":[52],"uncertainties":[53,60,195],"by":[54],"Croizer":[55],"Friedberg":[57],"suggests":[58],"about":[61,112],"narratives":[63,99],"used":[64],"can":[68,177],"lead":[69],"potentially":[71],"harmful":[72],"dissatisfied":[76],"employees.":[77],"We":[78],"conducted":[79],"qualitative":[81],"interview":[82],"study":[83],"two":[85],"distinct":[86],"companies":[89],"order":[91],"research":[93],"impact":[95],"diverging":[97],"departments.":[102],"Our":[103,158],"results":[104,159],"show":[105,189],"there":[107],"indeed":[109],"an":[110,179],"uncertainty":[111,124,168],"term":[114],"security.":[116],"one":[118],"company":[119,140],"we":[120,188],"interviewed":[121],"regarded":[122],"this":[123],"as":[125],"highly":[126],"beneficial":[127],"for":[128,183],"team":[129],"creativity,":[130],"communication,":[131],"mutual":[133],"education,":[134],"while":[135],"other,":[137],"more":[138],"technical-focused":[139],"showed":[141],"few":[142],"diversions":[143],"staff,":[147],"but":[148],"possibly":[150],"uniting":[151],"conflict":[152],"with":[153],"company\u2019s":[155],"department.":[157],"suggest":[160],"conscious":[162],"shaping":[163],"zone":[166],"around":[169],"narrative":[172],"context":[176],"be":[178],"important":[180],"management":[181],"skill":[182],"practitioners.":[186],"Furthermore,":[187],"analysis":[192],"provides":[196],"powerful":[198],"approach":[199],"studying":[201],"motivation":[203],"professional":[205],"groups.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
