{"id":"https://openalex.org/W1977845566","doi":"https://doi.org/10.1108/09685221011095245","title":"Human\u2010related problems of information security in East African cross\u2010cultural environments","display_name":"Human\u2010related problems of information security in East African cross\u2010cultural environments","publication_year":2010,"publication_date":"2010-11-23","ids":{"openalex":"https://openalex.org/W1977845566","doi":"https://doi.org/10.1108/09685221011095245","mag":"1977845566"},"language":"en","primary_location":{"id":"doi:10.1108/09685221011095245","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685221011095245","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080170293","display_name":"Tetsuya Asai","orcid":"https://orcid.org/0000-0003-1158-9810"},"institutions":[{"id":"https://openalex.org/I85922643","display_name":"Nagaoka University of Technology","ror":"https://ror.org/00ys1hz88","country_code":"JP","type":"education","lineage":["https://openalex.org/I85922643"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"T. Asai","raw_affiliation_strings":["Management and Information Systems Science, Nagaoka University of Technology, Niigata, Japan","(Management and Information Systems Science, Nagaoka University of Technology, Niigata, Japan)"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Management and Information Systems Science, Nagaoka University of Technology, Niigata, Japan","institution_ids":["https://openalex.org/I85922643"]},{"raw_affiliation_string":"(Management and Information Systems Science, Nagaoka University of Technology, Niigata, Japan)","institution_ids":["https://openalex.org/I85922643"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043010789","display_name":"Aline Uwera Hakizabera","orcid":null},"institutions":[{"id":"https://openalex.org/I85922643","display_name":"Nagaoka University of Technology","ror":"https://ror.org/00ys1hz88","country_code":"JP","type":"education","lineage":["https://openalex.org/I85922643"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"A.U. Hakizabera","raw_affiliation_strings":["Information Science and Control Engineering, Nagaoka University of Technology, Niigata, Japan","(Information Science and Control Engineering, Nagaoka University of Technology, Niigata, Japan)"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Science and Control Engineering, Nagaoka University of Technology, Niigata, Japan","institution_ids":["https://openalex.org/I85922643"]},{"raw_affiliation_string":"(Information Science and Control Engineering, Nagaoka University of Technology, Niigata, Japan)","institution_ids":["https://openalex.org/I85922643"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080170293"],"corresponding_institution_ids":["https://openalex.org/I85922643"],"apc_list":null,"apc_paid":null,"fwci":2.1406,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90744441,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"18","issue":"5","first_page":"328","last_page":"338"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9215999841690063,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hofstedes-cultural-dimensions-theory","display_name":"Hofstede's cultural dimensions theory","score":0.7693983316421509},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.6150989532470703},{"id":"https://openalex.org/keywords/commission","display_name":"Commission","score":0.5532879829406738},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5130811929702759},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4497506320476532},{"id":"https://openalex.org/keywords/uncertainty-avoidance","display_name":"Uncertainty avoidance","score":0.4387551248073578},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4353746771812439},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.42506536841392517},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.4085887670516968},{"id":"https://openalex.org/keywords/individualism","display_name":"Individualism","score":0.4053705930709839},{"id":"https://openalex.org/keywords/collectivism","display_name":"Collectivism","score":0.328332781791687},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.32621484994888306},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.2912290692329407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23025193810462952},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.21408313512802124},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.2078022062778473},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.20108237862586975},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.18421968817710876},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.10737162828445435},{"id":"https://openalex.org/keywords/creativity","display_name":"Creativity","score":0.10387200117111206}],"concepts":[{"id":"https://openalex.org/C67356462","wikidata":"https://www.wikidata.org/wiki/Q5807210","display_name":"Hofstede's cultural dimensions theory","level":2,"score":0.7693983316421509},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.6150989532470703},{"id":"https://openalex.org/C2776034101","wikidata":"https://www.wikidata.org/wiki/Q1509347","display_name":"Commission","level":2,"score":0.5532879829406738},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5130811929702759},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4497506320476532},{"id":"https://openalex.org/C119469879","wikidata":"https://www.wikidata.org/wiki/Q15514847","display_name":"Uncertainty avoidance","level":4,"score":0.4387551248073578},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4353746771812439},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.42506536841392517},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.4085887670516968},{"id":"https://openalex.org/C17022365","wikidata":"https://www.wikidata.org/wiki/Q171995","display_name":"Individualism","level":2,"score":0.4053705930709839},{"id":"https://openalex.org/C96420161","wikidata":"https://www.wikidata.org/wiki/Q237789","display_name":"Collectivism","level":3,"score":0.328332781791687},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.32621484994888306},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.2912290692329407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23025193810462952},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.21408313512802124},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.2078022062778473},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.20108237862586975},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.18421968817710876},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.10737162828445435},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.10387200117111206},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685221011095245","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685221011095245","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W648314671","https://openalex.org/W1501458601","https://openalex.org/W2019886114","https://openalex.org/W2058738741","https://openalex.org/W2091619402","https://openalex.org/W2114969359","https://openalex.org/W2140918013","https://openalex.org/W2164539034","https://openalex.org/W6676218757"],"related_works":["https://openalex.org/W2024203935","https://openalex.org/W2082838815","https://openalex.org/W1533929108","https://openalex.org/W3146306656","https://openalex.org/W3035022437","https://openalex.org/W3120629023","https://openalex.org/W1517123431","https://openalex.org/W2137987394","https://openalex.org/W3003790531","https://openalex.org/W2022550710"],"abstract_inverted_index":{"Purpose":[0],"The":[1,146,209],"purpose":[2],"of":[3,11,31,45,48,62,79,81,95,140,148,177,189,200,223],"this":[4,69],"paper":[5,70,104,210],"is":[6,202],"to":[7,35,91,123,136,158,181,193,204,235],"find":[8],"what":[9,111],"kinds":[10],"problems,":[12],"while":[13],"implementing":[14],"information":[15,213],"security":[16,214],"policy,":[17],"may":[18,108],"take":[19,109],"place":[20],"in":[21,24,39,143,228,241],"foreign":[22,87,242],"companies":[23,88,133,167,172,184],"the":[25,49,66,77,93,96,100,103,125,144,160,174,186,224,229,250],"East":[26],"African":[27],"Community":[28],"(EAC)":[29],"because":[30],"cultural":[32,63],"differences,":[33],"and":[34,52,65,114,131,165],"suggest":[36],"supplemental":[37],"countermeasures":[38,122,201,248],"international":[40],"frameworks":[41],"such":[42],"as":[43],"Committee":[44],"Sponsoring":[46],"Organizations":[47],"Treadway":[50],"Commission":[51],"ISO/IEC27001.":[53],"Design/methodology/approach":[54],"Setting":[55],"potential":[56,72,139,176,188,237],"problems":[57,73,107,142,179,191,217,238,253],"based":[58],"on":[59,99],"Hofstede's":[60],"scores":[61],"dimensions":[64],"authors'":[67],"experience,":[68],"predicts":[71],"first":[74],"by":[75],"using":[76],"theory":[78],"level":[80],"potential.":[82],"Local":[83],"employees":[84],"working":[85],"for":[86,221],"were":[89],"polled":[90],"evaluate":[92],"severity":[94],"problems.":[97,126,170],"Based":[98],"survey":[101],"results,":[102],"finds":[105,121],"which":[106],"place,":[110],"triggers":[112],"them":[113],"how":[115],"severe":[116],"they":[117],"are.":[118],"Finally,":[119],"it":[120],"prevent":[124],"Findings":[127],"Overall,":[128],"British,":[129,163],"US":[130,164],"Japanese":[132,171],"are":[134],"found":[135,157],"have":[137,159,168,173,185],"higher":[138],"facing":[141,178,190],"EAC.":[145],"problem":[147],"\u201cusing":[149],"a":[150,198,232],"previous":[151],"company's":[152],"confidential":[153],"information\u201d":[154],"has":[155,211,245],"been":[156],"highest":[161,175,187],"severity.":[162],"Belgian":[166],"individualism\u2010originated":[169],"due":[180,192],"masculinity.":[182],"Chinese":[183],"long\u2010term":[194],"orientation.":[195],"In":[196],"addition,":[197],"list":[199],"proposed":[203],"protect":[205],"business":[206],"information.":[207],"Originality/value":[208],"identified":[212],"management":[215],"(ISM)\u2010related":[216],"with":[218],"their":[219],"severities":[220],"each":[222],"selected":[225],"investing":[226],"countries":[227],"EAC,":[230],"applying":[231],"new":[233],"method":[234],"predict":[236],"concerning":[239],"ISM":[240],"companies.":[243],"It":[244],"recommended":[246],"practical":[247],"against":[249],"six":[251],"serious":[252],"identified.":[254]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
