{"id":"https://openalex.org/W3194448568","doi":"https://doi.org/10.1108/ics-02-2021-0020","title":"Predicting information security culture among employees of telecommunication companies in an emerging market","display_name":"Predicting information security culture among employees of telecommunication companies in an emerging market","publication_year":2021,"publication_date":"2021-08-03","ids":{"openalex":"https://openalex.org/W3194448568","doi":"https://doi.org/10.1108/ics-02-2021-0020","mag":"3194448568"},"language":"en","primary_location":{"id":"doi:10.1108/ics-02-2021-0020","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2021-0020","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065064370","display_name":"Nurul Asmui Azmi Md Azmi","orcid":null},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Nurul Asmui Azmi Md Azmi","raw_affiliation_strings":["Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032226135","display_name":"Ai Ping Teoh","orcid":"https://orcid.org/0000-0002-9267-9094"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ai Ping Teoh","raw_affiliation_strings":["Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024829774","display_name":"Ali Vafaei\u2010Zadeh","orcid":"https://orcid.org/0000-0003-1451-8866"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ali Vafaei-Zadeh","raw_affiliation_strings":["Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090271455","display_name":"Haniruzila Hanifah","orcid":"https://orcid.org/0000-0002-6185-0071"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Haniruzila Hanifah","raw_affiliation_strings":["Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5065064370"],"corresponding_institution_ids":["https://openalex.org/I139322472"],"apc_list":null,"apc_paid":null,"fwci":3.4064,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.9329367,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"29","issue":"5","first_page":"866","last_page":"882"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.7221580147743225},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.6681689023971558},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.6439964175224304},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.61683189868927},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.45501577854156494},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4187723696231842},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.4048881530761719},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3361126780509949},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.308956503868103},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21366319060325623},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1104402244091034},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.09882846474647522},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.08795535564422607}],"concepts":[{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.7221580147743225},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.6681689023971558},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.6439964175224304},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.61683189868927},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.45501577854156494},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4187723696231842},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.4048881530761719},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3361126780509949},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.308956503868103},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21366319060325623},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1104402244091034},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.09882846474647522},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.08795535564422607},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-02-2021-0020","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2021-0020","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1036702971","https://openalex.org/W1494928303","https://openalex.org/W1507819171","https://openalex.org/W1508514464","https://openalex.org/W1512740566","https://openalex.org/W1890810289","https://openalex.org/W1966866208","https://openalex.org/W2010902645","https://openalex.org/W2027548841","https://openalex.org/W2035981836","https://openalex.org/W2037069781","https://openalex.org/W2038702827","https://openalex.org/W2039488416","https://openalex.org/W2058144115","https://openalex.org/W2070775597","https://openalex.org/W2071051448","https://openalex.org/W2072500831","https://openalex.org/W2076538849","https://openalex.org/W2080940090","https://openalex.org/W2088489410","https://openalex.org/W2100511523","https://openalex.org/W2105846236","https://openalex.org/W2108401663","https://openalex.org/W2109487213","https://openalex.org/W2131568786","https://openalex.org/W2155019783","https://openalex.org/W2162569891","https://openalex.org/W2268996991","https://openalex.org/W2274083676","https://openalex.org/W2291759867","https://openalex.org/W2300663785","https://openalex.org/W2315364228","https://openalex.org/W2332747402","https://openalex.org/W2568632554","https://openalex.org/W2598077924","https://openalex.org/W2623711236","https://openalex.org/W2626529610","https://openalex.org/W2737451008","https://openalex.org/W2743181616","https://openalex.org/W2792624926","https://openalex.org/W2794726510","https://openalex.org/W2805872757","https://openalex.org/W2907462893","https://openalex.org/W2947297481","https://openalex.org/W2995576379","https://openalex.org/W2999704926","https://openalex.org/W4246218578"],"related_works":["https://openalex.org/W2120971814","https://openalex.org/W2508914475","https://openalex.org/W4310892428","https://openalex.org/W4293770853","https://openalex.org/W2356973015","https://openalex.org/W2777401565","https://openalex.org/W2099222119","https://openalex.org/W1974991139","https://openalex.org/W2007996913","https://openalex.org/W4224942254"],"abstract_inverted_index":{"Purpose":[0],"The":[1,20,119,137],"purpose":[2],"of":[3,17,31,44,57,205],"this":[4,23],"study":[5,24,120,199],"is":[6,196],"to":[7,82,100,200],"examine":[8],"factors,":[9],"which":[10],"influence":[11,148],"information":[12,77,110,114,149,168,176,187,191,213,217],"security":[13,78,96,111,115,150,169,177,180,188,192,207,214,218],"culture":[14,151,219],"among":[15],"employees":[16,56],"telecommunications":[18,59,159,223],"companies.":[19,60],"motivation":[21],"for":[22],"was":[25,98,121],"the":[26,29,37,107,158,184,197,202,210,221],"rise":[27],"in":[28,123,131,152,157,220],"number":[30],"data":[32,139],"breach":[33],"incidents":[34],"caused":[35],"by":[36,64],"organizations\u2019":[38],"own":[39],"employees.":[40],"Design/methodology/approach":[41],"A":[42],"total":[43],"139":[45],"usable":[46],"responses":[47],"were":[48,62,80],"collected":[49],"via":[50],"a":[51,84,103,141,172],"Web-based":[52],"questionnaire":[53],"survey":[54],"from":[55],"Malaysian":[58,222],"Data":[61],"analysed":[63],"using":[65],"SmartPLS":[66],"3.":[67],"Findings":[68],"Security":[69,91],"education,":[70],"training":[71],"and":[72,76,86,113,167,190,216],"awareness":[73,79,112,170,189,215],"(SETA)":[74],"programmes":[75,166],"found":[81,99],"have":[83,171],"positive":[85],"significant":[87,145,173],"impact":[88,174],"on":[89,106,144,175,209],"Information":[90],"Culture.":[92],"Additionally,":[93],"self-reported":[94],"employees\u2019":[95,206],"behaviour":[97,181,208],"act":[101],"as":[102],"partial":[104],"mediator":[105],"relationship":[108,185,211],"between":[109,186,212],"culture.":[116,178,193],"Research":[117],"limitations/implications":[118],"cross-sectional":[122],"nature.":[124],"Therefore,":[125],"it":[126],"could":[127],"not":[128],"measure":[129],"changes":[130],"population":[132],"over":[133],"time.":[134],"Practical":[135],"implications":[136],"empirical":[138],"provides":[140],"new":[142],"perspective":[143],"elements":[146],"that":[147,164],"an":[153],"emerging":[154],"market.":[155],"Organizations":[156],"industry":[160],"can":[161],"now":[162],"recognize":[163],"SETA":[165],"Employees\u2019":[179],"also":[182],"mediates":[183],"Originality/value":[194],"This":[195],"first":[198],"analyse":[201],"mediating":[203],"effect":[204],"context.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
