{"id":"https://openalex.org/W1641396650","doi":"https://doi.org/10.1108/ics-04-2014-0025","title":"The sufficiency of the theory of planned behavior for explaining information security policy compliance","display_name":"The sufficiency of the theory of planned behavior for explaining information security policy compliance","publication_year":2015,"publication_date":"2015-05-22","ids":{"openalex":"https://openalex.org/W1641396650","doi":"https://doi.org/10.1108/ics-04-2014-0025","mag":"1641396650"},"language":"en","primary_location":{"id":"doi:10.1108/ics-04-2014-0025","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2014-0025","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091355367","display_name":"Teodor Sommestad","orcid":"https://orcid.org/0000-0002-2606-4139"},"institutions":[{"id":"https://openalex.org/I1291458624","display_name":"Swedish Defence Research Agency","ror":"https://ror.org/0470cgs30","country_code":"SE","type":"funder","lineage":["https://openalex.org/I1291458624"]},{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]}],"countries":["JP","SE"],"is_corresponding":true,"raw_author_name":"Teodor Sommestad","raw_affiliation_strings":["Information Security and IT Architecture; Swedish Defence Research Agency (FOI); Link\u00f6ping; Sweden","Swedish Defence Research Agency (FOI)","Information Security and IT Architecture","Sweden","Link\u00f6ping"],"affiliations":[{"raw_affiliation_string":"Information Security and IT Architecture; Swedish Defence Research Agency (FOI); Link\u00f6ping; Sweden","institution_ids":["https://openalex.org/I1291458624"]},{"raw_affiliation_string":"Swedish Defence Research Agency (FOI)","institution_ids":["https://openalex.org/I1291458624"]},{"raw_affiliation_string":"Information Security and IT Architecture","institution_ids":["https://openalex.org/I4210138172"]},{"raw_affiliation_string":"Sweden","institution_ids":[]},{"raw_affiliation_string":"Link\u00f6ping","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037009385","display_name":"Henrik Karlz\u00e9n","orcid":"https://orcid.org/0009-0009-4394-7695"},"institutions":[{"id":"https://openalex.org/I1291458624","display_name":"Swedish Defence Research Agency","ror":"https://ror.org/0470cgs30","country_code":"SE","type":"funder","lineage":["https://openalex.org/I1291458624"]},{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]}],"countries":["JP","SE"],"is_corresponding":false,"raw_author_name":"Henrik Karlz\u00e9n","raw_affiliation_strings":["Information Security and IT Architecture; Swedish Defence Research Agency (FOI); Link\u00f6ping; Sweden","Swedish Defence Research Agency (FOI)","Information Security and IT Architecture","Link\u00f6ping","Sweden"],"affiliations":[{"raw_affiliation_string":"Information Security and IT Architecture; Swedish Defence Research Agency (FOI); Link\u00f6ping; Sweden","institution_ids":["https://openalex.org/I1291458624"]},{"raw_affiliation_string":"Swedish Defence Research Agency (FOI)","institution_ids":["https://openalex.org/I1291458624"]},{"raw_affiliation_string":"Information Security and IT Architecture","institution_ids":["https://openalex.org/I4210138172"]},{"raw_affiliation_string":"Link\u00f6ping","institution_ids":[]},{"raw_affiliation_string":"Sweden","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079919068","display_name":"Jonas Hallberg","orcid":null},"institutions":[{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]},{"id":"https://openalex.org/I1291458624","display_name":"Swedish Defence Research Agency","ror":"https://ror.org/0470cgs30","country_code":"SE","type":"funder","lineage":["https://openalex.org/I1291458624"]}],"countries":["JP","SE"],"is_corresponding":false,"raw_author_name":"Jonas Hallberg","raw_affiliation_strings":["Information Security and IT Architecture; Swedish Defence Research Agency (FOI); Link\u00f6ping; Sweden","Sweden","Information Security and IT Architecture","Swedish Defence Research Agency (FOI)","Link\u00f6ping"],"affiliations":[{"raw_affiliation_string":"Information Security and IT Architecture; Swedish Defence Research Agency (FOI); Link\u00f6ping; Sweden","institution_ids":["https://openalex.org/I1291458624"]},{"raw_affiliation_string":"Sweden","institution_ids":[]},{"raw_affiliation_string":"Information Security and IT Architecture","institution_ids":["https://openalex.org/I4210138172"]},{"raw_affiliation_string":"Swedish Defence Research Agency (FOI)","institution_ids":["https://openalex.org/I1291458624"]},{"raw_affiliation_string":"Link\u00f6ping","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091355367"],"corresponding_institution_ids":["https://openalex.org/I1291458624","https://openalex.org/I4210138172"],"apc_list":null,"apc_paid":null,"fwci":27.174,"has_fulltext":false,"cited_by_count":115,"citation_normalized_percentile":{"value":0.99455324,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"23","issue":"2","first_page":"200","last_page":"217"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/regret","display_name":"Regret","score":0.8943494558334351},{"id":"https://openalex.org/keywords/theory-of-planned-behavior","display_name":"Theory of planned behavior","score":0.8461315035820007},{"id":"https://openalex.org/keywords/explanatory-power","display_name":"Explanatory power","score":0.6559180021286011},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.604755699634552},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5254111289978027},{"id":"https://openalex.org/keywords/prospect-theory","display_name":"Prospect theory","score":0.5093063116073608},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.43856796622276306},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4294723868370056},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.42153090238571167},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.34295418858528137},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.2858229875564575},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.21042370796203613},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1926681101322174},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15199854969978333},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.08981019258499146}],"concepts":[{"id":"https://openalex.org/C50817715","wikidata":"https://www.wikidata.org/wiki/Q79895177","display_name":"Regret","level":2,"score":0.8943494558334351},{"id":"https://openalex.org/C89785696","wikidata":"https://www.wikidata.org/wiki/Q2290753","display_name":"Theory of planned behavior","level":3,"score":0.8461315035820007},{"id":"https://openalex.org/C2777402642","wikidata":"https://www.wikidata.org/wiki/Q2557224","display_name":"Explanatory power","level":2,"score":0.6559180021286011},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.604755699634552},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5254111289978027},{"id":"https://openalex.org/C339426","wikidata":"https://www.wikidata.org/wiki/Q1151839","display_name":"Prospect theory","level":2,"score":0.5093063116073608},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.43856796622276306},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4294723868370056},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.42153090238571167},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.34295418858528137},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.2858229875564575},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.21042370796203613},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1926681101322174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15199854969978333},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.08981019258499146},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-04-2014-0025","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2014-0025","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W78978687","https://openalex.org/W1483478140","https://openalex.org/W1525451939","https://openalex.org/W1586873571","https://openalex.org/W1607912078","https://openalex.org/W1608836379","https://openalex.org/W1963551737","https://openalex.org/W1970809283","https://openalex.org/W2010902645","https://openalex.org/W2044519557","https://openalex.org/W2053905359","https://openalex.org/W2060010505","https://openalex.org/W2081430061","https://openalex.org/W2091261347","https://openalex.org/W2099697766","https://openalex.org/W2104806923","https://openalex.org/W2132470305","https://openalex.org/W2145482311","https://openalex.org/W2152095411","https://openalex.org/W2482738141","https://openalex.org/W2622838936","https://openalex.org/W2759725717","https://openalex.org/W2944944168","https://openalex.org/W4206711400","https://openalex.org/W4285719527","https://openalex.org/W6635313423","https://openalex.org/W6675028442"],"related_works":["https://openalex.org/W4376155396","https://openalex.org/W2971351794","https://openalex.org/W1947085858","https://openalex.org/W2101991911","https://openalex.org/W2174986909","https://openalex.org/W2527791220","https://openalex.org/W2155070487","https://openalex.org/W4311589891","https://openalex.org/W2034057221","https://openalex.org/W2102152630"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,59,95,140],"This":[2,141],"paper":[3],"aims":[4],"to":[5,50,118,161,167],"challenge":[6],"the":[7,10,33,84,100,108,122,125,132,144,159,168,171],"assumption":[8],"that":[9,19,46],"theory":[11,36,45,87],"of":[12,77,107,110,115,121,124,134,147,153],"planned":[13],"behaviour":[14],"(TPB)":[15],"includes":[16],"all":[17],"constructs":[18,31,81],"explain":[20],"information":[21,54,135,154],"security":[22,55,136,155],"policy":[23,137,156],"compliance":[24,52,157],"and":[25,80,99,158,170],"investigates":[26],"if":[27],"anticipated":[28,78,97,148],"regret":[29,79,98,149],"or":[30],"from":[32,61,83],"protection":[34,85,172],"motivation":[35,86,173],"add":[37],"explanatory":[38],"power.":[39],"The":[40,112],"TPB":[41,126,169],"is":[42,129,143],"an":[43],"established":[44],"has":[47],"been":[48],"found":[49],"predict":[51],"with":[53],"policies":[56],"well.":[57],"Design/methodology/approach":[58],"Responses":[60],"306":[62],"respondents":[63],"at":[64],"a":[65,71,151],"research":[66],"organization":[67],"were":[68],"collected":[69],"using":[70,90],"questionnaire-based":[72],"survey.":[73],"Extensions":[74],"in":[75,105,131,165],"terms":[76],"drawn":[82],"are":[88,114],"tested":[89],"hierarchical":[91],"regression":[92],"analysis.":[93],"Findings":[94],"Adding":[96],"threat":[101],"appraisal":[102],"process":[103],"results":[104],"improvements":[106,113],"predictions":[109],"intentions.":[111],"sufficient":[116],"magnitude":[117],"warrant":[119],"adjustments":[120],"model":[123],"when":[127],"it":[128],"used":[130],"area":[133],"compliance.":[138],"Originality/value":[139],"study":[142],"first":[145,160],"test":[146],"as":[150],"predictor":[152],"assess":[162],"its":[163],"influence":[164],"relation":[166],"theory.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":14},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":14},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-22T08:38:42.863108","created_date":"2025-10-10T00:00:00"}
