{"id":"https://openalex.org/W2763213239","doi":"https://doi.org/10.1108/ics-02-2016-0015","title":"Escalation of commitment and information security: theories and implications","display_name":"Escalation of commitment and information security: theories and implications","publication_year":2017,"publication_date":"2017-10-03","ids":{"openalex":"https://openalex.org/W2763213239","doi":"https://doi.org/10.1108/ics-02-2016-0015","mag":"2763213239"},"language":"en","primary_location":{"id":"doi:10.1108/ics-02-2016-0015","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2016-0015","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065708300","display_name":"Dmitriy Chulkov","orcid":"https://orcid.org/0000-0003-0083-7815"},"institutions":[{"id":"https://openalex.org/I4210136381","display_name":"Indiana University Kokomo","ror":"https://ror.org/04161kh40","country_code":"US","type":"education","lineage":["https://openalex.org/I4210136381","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dmitriy V. Chulkov","raw_affiliation_strings":["School of Business, Indiana University, Kokomo, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"School of Business, Indiana University, Kokomo, Indiana, USA","institution_ids":["https://openalex.org/I4210136381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5065708300"],"corresponding_institution_ids":["https://openalex.org/I4210136381"],"apc_list":null,"apc_paid":null,"fwci":1.4509,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.87258613,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"25","issue":"5","first_page":"580","last_page":"592"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/escalation-of-commitment","display_name":"Escalation of commitment","score":0.8951467275619507},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5489516854286194},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.541964054107666},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.505219042301178},{"id":"https://openalex.org/keywords/organizational-commitment","display_name":"Organizational commitment","score":0.4894944429397583},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.43565884232521057},{"id":"https://openalex.org/keywords/de-escalation","display_name":"De-escalation","score":0.4288513660430908},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4003294110298157},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.34753042459487915},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.24989476799964905},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.21152400970458984},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.16877317428588867},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10308420658111572}],"concepts":[{"id":"https://openalex.org/C158981924","wikidata":"https://www.wikidata.org/wiki/Q3799353","display_name":"Escalation of commitment","level":2,"score":0.8951467275619507},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5489516854286194},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.541964054107666},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.505219042301178},{"id":"https://openalex.org/C83030740","wikidata":"https://www.wikidata.org/wiki/Q267236","display_name":"Organizational commitment","level":2,"score":0.4894944429397583},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.43565884232521057},{"id":"https://openalex.org/C2776056953","wikidata":"https://www.wikidata.org/wiki/Q1182511","display_name":"De-escalation","level":2,"score":0.4288513660430908},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4003294110298157},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.34753042459487915},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.24989476799964905},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.21152400970458984},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.16877317428588867},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10308420658111572},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-02-2016-0015","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2016-0015","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W80414419","https://openalex.org/W142213678","https://openalex.org/W305397564","https://openalex.org/W576153743","https://openalex.org/W1503302998","https://openalex.org/W1536398137","https://openalex.org/W1551551926","https://openalex.org/W1552413492","https://openalex.org/W1568975818","https://openalex.org/W1602619638","https://openalex.org/W1603962791","https://openalex.org/W1863670505","https://openalex.org/W1966114254","https://openalex.org/W1967820237","https://openalex.org/W1974063287","https://openalex.org/W1983710994","https://openalex.org/W2004301830","https://openalex.org/W2006397401","https://openalex.org/W2008556210","https://openalex.org/W2011830901","https://openalex.org/W2018796541","https://openalex.org/W2028269651","https://openalex.org/W2032846495","https://openalex.org/W2036178246","https://openalex.org/W2042888638","https://openalex.org/W2048584594","https://openalex.org/W2056075452","https://openalex.org/W2060408199","https://openalex.org/W2069015912","https://openalex.org/W2080940090","https://openalex.org/W2081657462","https://openalex.org/W2094413695","https://openalex.org/W2099840395","https://openalex.org/W2102478330","https://openalex.org/W2121301668","https://openalex.org/W2126812792","https://openalex.org/W2130173750","https://openalex.org/W2133469585","https://openalex.org/W2137508913","https://openalex.org/W2138958508","https://openalex.org/W2150175719","https://openalex.org/W2153744606","https://openalex.org/W2156438052","https://openalex.org/W2162477530","https://openalex.org/W2163315205","https://openalex.org/W2167310094","https://openalex.org/W2185275527","https://openalex.org/W2276368824","https://openalex.org/W2331879924","https://openalex.org/W2337703333","https://openalex.org/W2955541030","https://openalex.org/W3011865677"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W3121366071","https://openalex.org/W3045545058","https://openalex.org/W3169631683","https://openalex.org/W1983710994","https://openalex.org/W2057980697","https://openalex.org/W2610367962","https://openalex.org/W2753481872","https://openalex.org/W4247718995","https://openalex.org/W2763213239"],"abstract_inverted_index":{"Purpose":[0],"This":[1,164],"study":[2,165],"aims":[3],"to":[4,14,43,80,87,180],"explore":[5],"the":[6,9,44,67,82,93,167,171],"challenges":[7],"that":[8,109],"escalation":[10,22,36,72,98,124,149,174,190],"of":[11,21,37,46,51,55,58,113,120,123,138,148,150,173,175,191],"commitment":[12,38,52,151,176],"poses":[13],"information":[15,47,63,68,84,94,154,181],"security.":[16,48],"Design/methodology/approach":[17],"Two":[18],"distinct":[19],"scenarios":[20],"behavior":[23,152],"are":[24,39,110,161],"presented":[25],"based":[26],"on":[27,35,189],"literature":[28,168],"review.":[29],"Psychological,":[30],"organizational":[31,115],"and":[32,41,107,142,157,183,186],"economic":[33,117,187],"theories":[34,188],"reviewed":[40],"applied":[42],"area":[45],"Findings":[49],"Escalation":[50],"involves":[53],"continuation":[54],"a":[56,74,89,101,132],"course":[57],"action":[59],"after":[60],"receiving":[61],"negative":[62],"about":[64],"it.":[65],"In":[66,92],"security":[69,85,95,155,182],"compliance":[70],"context,":[71,97],"affects":[73],"firm":[75],"when":[76],"an":[77],"employee":[78],"decides":[79],"break":[81],"firm\u2019s":[83],"policy":[86],"complete":[88],"failing":[90],"task.":[91],"investment":[96,104],"occurs":[99],"if":[100],"manager":[102],"continues":[103],"in":[105,134,177],"policies":[106],"solutions":[108],"ineffective":[111],"because":[112],"psychological,":[114],"or":[116,136],"factors.":[118],"Both":[119],"these":[121],"types":[122],"may":[125],"be":[126],"prevented":[127],"with":[128],"de-escalation":[129],"techniques":[130],"including":[131],"change":[133],"management":[135],"rotation":[137],"duties,":[139],"monitoring,":[140],"auditing":[141],"governance":[143],"mechanisms.":[144],"Practical":[145],"implications":[146],"Implications":[147],"for":[153,158],"decision-makers":[156],"future":[159],"research":[160],"discussed.":[162],"Originality/value":[163],"complements":[166],"by":[169],"establishing":[170],"context":[172],"decisions":[178],"related":[179],"reviewing":[184],"managerial":[185],"commitment.":[192]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
