{"id":"https://openalex.org/W4407006697","doi":"https://doi.org/10.1093/cybsec/tyaf001","title":"Implementing information security controls: now or later? Delay discounting of losses and gains","display_name":"Implementing information security controls: now or later? Delay discounting of losses and gains","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407006697","doi":"https://doi.org/10.1093/cybsec/tyaf001"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf001/61716948/tyaf001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf001/61716948/tyaf001.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116092264","display_name":"Marte Marjorie S\u00f8gnen","orcid":null},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Marte Marjorie S\u00f8gnen","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology , Teknologivegen 22, Gj\u00f8vik 2815 ,"],"raw_orcid":"https://orcid.org/0009-0000-1189-7835","affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology , Teknologivegen 22, Gj\u00f8vik 2815 ,","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076015656","display_name":"Ad\u00e1m Szekeres","orcid":"https://orcid.org/0000-0003-0715-5382"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Adam Szekeres","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology , Teknologivegen 22, Gj\u00f8vik 2815 ,"],"raw_orcid":"https://orcid.org/0000-0003-0715-5382","affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology , Teknologivegen 22, Gj\u00f8vik 2815 ,","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007276490","display_name":"Einar Snekkenes","orcid":"https://orcid.org/0000-0002-2277-6964"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Einar Arthur Snekkenes","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology , Teknologivegen 22, Gj\u00f8vik 2815 ,"],"raw_orcid":"https://orcid.org/0000-0002-2277-6964","affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology , Teknologivegen 22, Gj\u00f8vik 2815 ,","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5116092264"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01707143,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discounting","display_name":"Discounting","score":0.5837802290916443},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49904584884643555},{"id":"https://openalex.org/keywords/delay-discounting","display_name":"Delay discounting","score":0.41472870111465454},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3829708993434906},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3511296212673187},{"id":"https://openalex.org/keywords/actuarial-science","display_name":"Actuarial science","score":0.3318708539009094},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.32752883434295654},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.27732905745506287},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.13045775890350342}],"concepts":[{"id":"https://openalex.org/C6177178","wikidata":"https://www.wikidata.org/wiki/Q10998070","display_name":"Discounting","level":2,"score":0.5837802290916443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49904584884643555},{"id":"https://openalex.org/C2994109249","wikidata":"https://www.wikidata.org/wiki/Q186412","display_name":"Delay discounting","level":3,"score":0.41472870111465454},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3829708993434906},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3511296212673187},{"id":"https://openalex.org/C162118730","wikidata":"https://www.wikidata.org/wiki/Q1128453","display_name":"Actuarial science","level":1,"score":0.3318708539009094},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.32752883434295654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.27732905745506287},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.13045775890350342}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyaf001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf001/61716948/tyaf001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf001/61716948/tyaf001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4260268498","display_name":null,"funder_award_id":"288856","funder_id":"https://openalex.org/F4320323299","funder_display_name":"Norges Forskningsr\u00e5d"}],"funders":[{"id":"https://openalex.org/F4320323299","display_name":"Norges Forskningsr\u00e5d","ror":"https://ror.org/00epmv149"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4407006697.pdf","grobid_xml":"https://content.openalex.org/works/W4407006697.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W1517753279","https://openalex.org/W1971219113","https://openalex.org/W1975912221","https://openalex.org/W1992342542","https://openalex.org/W1994077204","https://openalex.org/W2006778537","https://openalex.org/W2006873532","https://openalex.org/W2024509488","https://openalex.org/W2029708893","https://openalex.org/W2036969276","https://openalex.org/W2042720915","https://openalex.org/W2045591401","https://openalex.org/W2073634068","https://openalex.org/W2097427281","https://openalex.org/W2104970912","https://openalex.org/W2109685530","https://openalex.org/W2115351542","https://openalex.org/W2115693658","https://openalex.org/W2126078878","https://openalex.org/W2127814643","https://openalex.org/W2135574561","https://openalex.org/W2169888706","https://openalex.org/W2184282197","https://openalex.org/W2337005109","https://openalex.org/W2338846068","https://openalex.org/W2339573327","https://openalex.org/W2509303870","https://openalex.org/W2562319537","https://openalex.org/W2800484587","https://openalex.org/W3009461695","https://openalex.org/W3010026764","https://openalex.org/W3125333312","https://openalex.org/W3137273165","https://openalex.org/W3196471253","https://openalex.org/W3214091791","https://openalex.org/W4200170479","https://openalex.org/W4234210156","https://openalex.org/W4252827145","https://openalex.org/W4390938546","https://openalex.org/W6630917173","https://openalex.org/W6686212658","https://openalex.org/W6697078037","https://openalex.org/W6766935085","https://openalex.org/W6799898726","https://openalex.org/W6860524234"],"related_works":["https://openalex.org/W2888838390","https://openalex.org/W4244961351","https://openalex.org/W3174942542","https://openalex.org/W2081069602","https://openalex.org/W2909839649","https://openalex.org/W1975673236","https://openalex.org/W2059677078","https://openalex.org/W1914588930","https://openalex.org/W2514130376","https://openalex.org/W2114514115"],"abstract_inverted_index":{"Abstract":[0],"Delay":[1],"discounting":[2,59,90,229],"is":[3,204],"a":[4,113,149],"behavioral":[5,34],"process,":[6],"which":[7,68,203],"explains":[8],"certain":[9],"peculiarities":[10],"of":[11,88,102,148,165,173,182,210,227,237],"human":[12,97],"decision-making":[13],"when":[14],"choices":[15,42,98],"and":[16,33,46,71],"their":[17],"consequences":[18],"are":[19,130],"separated":[20],"from":[21,78],"each":[22],"other":[23],"in":[24,31,74,106,185,207],"time.":[25],"The":[26,109],"concept":[27,87],"has":[28],"been":[29],"used":[30],"psychology":[32],"economics":[35],"to":[36,94,118,132,140,170],"explain":[37],"how":[38,85],"individuals":[39,53],"make":[40],"suboptimal":[41],"with":[43,123,137,198],"undesirable":[44],"individual":[45],"societal":[47],"consequences.":[48],"Existing":[49],"research":[50,152],"shows":[51],"that":[52],"can":[54,91],"be":[55,92],"characterized":[56],"by":[57,194],"several":[58],"parameters":[60,122,136,176,230],"(k)":[61],"across":[62],"contexts,":[63],"capturing":[64],"the":[65,79,86,100,141,146,160,174,189,208,220,225,235],"rate":[66],"at":[67],"future":[69],"gains":[70],"losses":[72],"decrease":[73],"value":[75],"as":[76,180,215],"seen":[77],"present.":[80],"This":[81,217],"present":[82],"paper":[83,218],"investigates":[84],"delay":[89,228],"utilized":[93],"better":[95],"understand":[96],"regarding":[99],"implementation":[101],"information":[103,142,238],"security":[104,143],"controls":[105],"organizational":[107,186],"settings.":[108,187],"study":[110],"relies":[111],"on":[112,223],"validated":[114],"psychometric":[115],"instrument":[116],"(MCQ-21)":[117],"collect":[119],"gold-standard":[120],"k":[121,135,175],"monetary":[124],"outcomes.":[125],"Furthermore,":[126],"two":[127],"novel":[128],"variants":[129],"developed":[131],"estimate":[133],"individuals\u2019":[134],"outcomes":[138],"specific":[139],"context.":[144],"Within":[145],"framework":[147],"nonexperimental":[150],"correlational":[151],"design,":[153],"an":[154,195,199],"online":[155],"survey":[156],"was":[157],"distributed":[158],"among":[159],"employees":[161],"($n":[162],"=":[163],"135$)":[164],"three":[166],"Norwegian":[167],"organizations.":[168],"Contrary":[169],"expectations,":[171],"none":[172],"provided":[177],"predictive":[178],"power":[179],"predictors":[181],"real-world":[183],"behavior":[184,211,232],"Nevertheless,":[188],"same":[190],"behaviors":[191],"were":[192],"predicted":[193],"attitude-based":[196],"measure":[197],"accuracy":[200],"(adjusted":[201],"$R^2=0.22$),":[202],"observed":[205],"generally":[206],"literature":[209],"prediction":[212,233],"using":[213],"attitudes":[214],"predictors.":[216],"contributes":[219],"first":[221],"results":[222],"assessing":[224],"effectiveness":[226],"for":[231],"within":[234],"context":[236],"security.":[239]},"counts_by_year":[],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-10-10T00:00:00"}
