{"id":"https://openalex.org/W3216947132","doi":"https://doi.org/10.1108/ics-07-2020-148","title":"Editorial","display_name":"Editorial","publication_year":2020,"publication_date":"2020-07-15","ids":{"openalex":"https://openalex.org/W3216947132","doi":"https://doi.org/10.1108/ics-07-2020-148","mag":"3216947132"},"language":"en","primary_location":{"id":"doi:10.1108/ics-07-2020-148","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-07-2020-148","pdf_url":"https://www.emerald.com/insight/content/doi/10.1108/ICS-07-2020-148/full/pdf?title=editorial","source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"editorial","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.emerald.com/insight/content/doi/10.1108/ICS-07-2020-148/full/pdf?title=editorial","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017310251","display_name":"Moufida Sadok","orcid":"https://orcid.org/0000-0003-2981-6516"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Moufida Sadok","raw_affiliation_strings":["Institute of Criminal Justice Studies, University of Portsmouth, Portsmouth, UK"],"affiliations":[{"raw_affiliation_string":"Institute of Criminal Justice Studies, University of Portsmouth, Portsmouth, UK","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086765619","display_name":"Peter Bedn\u00e1r","orcid":"https://orcid.org/0000-0002-3631-2626"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Peter Bednar","raw_affiliation_strings":["University of Portsmouth, Portsmouth, UK"],"affiliations":[{"raw_affiliation_string":"University of Portsmouth, Portsmouth, UK","institution_ids":["https://openalex.org/I63072094"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017310251"],"corresponding_institution_ids":["https://openalex.org/I63072094"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44066921,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"3","first_page":"397","last_page":"398"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.554099977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.554099977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.0406000018119812,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.03420000150799751,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3628550171852112}],"concepts":[{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3628550171852112}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-07-2020-148","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-07-2020-148","pdf_url":"https://www.emerald.com/insight/content/doi/10.1108/ICS-07-2020-148/full/pdf?title=editorial","source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1108/ics-07-2020-148","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-07-2020-148","pdf_url":"https://www.emerald.com/insight/content/doi/10.1108/ICS-07-2020-148/full/pdf?title=editorial","source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3216947132.pdf","grobid_xml":"https://content.openalex.org/works/W3216947132.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2955725829","https://openalex.org/W2949263084","https://openalex.org/W2743539335","https://openalex.org/W594353338","https://openalex.org/W2922049016","https://openalex.org/W4390697879","https://openalex.org/W2724734218","https://openalex.org/W4382466601","https://openalex.org/W2955504986"],"abstract_inverted_index":{"Socio-technical":[0],"issues":[1,355],"and":[2,19,47,57,70,72,108,115,154,160,188,204,259,285,302,315,333,337,346,358,408,462],"challenges":[3],"in":[4,25,32,89,119,127,132,172,200,209,223,230,242,311,340,371,378,404,414,426,467,483],"cyber":[5],"security":[6,17,30,113,134,291,319,331,344],"It":[7],"has":[8,63],"been":[9],"widely":[10],"recognised":[11],"that":[12,75,95,271,362,398],"the":[13,52,58,64,106,120,123,155,158,184,212,224,231,243,247,250,281,296,300,335,338,350,363,374,382,393,395,415,427,468,472],"development":[14],"of":[15,35,54,61,110,122,142,162,179,183,190,198,202,206,214,304,313,327,342,349,384,488],"information":[16,29,133,290,318],"policies":[18,114,292,320,365,375,386],"regulations":[20],"plays":[21],"a":[22,78,96,140,143,177,196,219,325,436],"key":[23],"role":[24],"ensuring":[26],"an":[27],"effective":[28,278],"management":[31,135],"theory.In":[33],"support":[34,235],"practice,":[36],"however,":[37],"there":[38,44,455],"is":[39,101],"no":[40,480],"real":[41],"consensus,":[42],"as":[43,129,446],"are":[45,366,376,401,432,456],"multiple":[46],"competing":[48],"approaches":[49,262,328],"when":[50],"assessing":[51],"implications":[53],"their":[55,272,405],"implementation":[56,225],"contextual":[59],"factors.All":[60],"this":[62,76,84,90],"potential":[65],"to":[66,103,112,175,234,254,263,298,354,369,387,392,409,420,445,452,471],"influence":[67],"compliance":[68,111,279,424,430,449,465],"behaviours":[69],"practices":[71],"we":[73],"believe":[74],"highlights":[77],"continued":[79],"need":[80],"for":[81,441],"research":[82,166,273,360,431],"into":[83],"crucial":[85],"field.The":[86],"discussions":[87],"presented":[88],"special":[91,489],"section":[92,137,490],"all":[93],"highlight":[94],"socio-technical":[97,125],"perspective":[98,117],"on":[99,157],"cyber-security":[100,128],"necessary":[102],"both":[104,210],"illuminate":[105],"causes":[107],"facilitators":[109],"regulations.This":[116],"follows":[118],"footstep":[121],"long-standing":[124],"tradition":[126],"previously":[130],"discussed":[131],"literature.This":[136],"starts":[138],"with":[139,217,265,356],"presentation":[141],"comparative":[144],"analysis":[145,307,396],"by":[146],"Da":[147],"Veiga":[148],"et":[149],"al.,":[150],"between":[151,317,460],"South":[152,244],"Africa":[153],"UK":[156,232],"protection":[159,258,267],"use":[161],"online":[163,473],"personal":[164,207],"information.The":[165],"involved":[167,476],"ten":[168],"insurance":[169,229,251],"organisation":[170],"websites":[171],"each":[173],"country":[174],"evaluate":[176],"number":[178,197],"data":[180,257,266],"privacy":[181],"requirements":[182],"Data":[185],"Protection":[186,189],"Act":[187],"Personal":[191],"Information":[192],"Act.The":[193],"results":[194],"display":[195],"deficiencies,":[199],"terms":[201,312],"handling":[203],"processing":[205],"information,":[208],"samples.However,":[211],"enforcement":[213],"regulation":[215],"combined":[216],"achieving":[218],"certain":[220],"maturity":[221],"level":[222],"process":[226],"within":[227,249,295],"industry":[228,252],"appears":[233],"more":[236,277],"compliant":[237],"practices.The":[238],"authors":[239],"explain":[240],"that,":[241],"African":[245],"context,":[246],"organisations":[248],"seem":[253],"not":[255],"prioritise":[256],"have":[260],"different":[261],"comply":[264],"legislation.Therefore,":[268],"they":[269],"suggest":[270],"could":[274],"potentially":[275],"inform":[276],"plans.In":[280],"second":[282],"paper,":[283,417],"Weidman":[284],"Grossklags":[286],"analyse":[287],"90":[288],"distinct":[289],"from":[293],"universities":[294],"USA":[297],"examine":[299],"language":[301,314,406],"construction":[303],"these":[305,385],"policies.The":[306],"shows":[308,361],"significant":[309,458,481],"disparities,":[310],"content,":[316],"across":[321],"organisations.This":[322],"finding":[323],"reflects":[324],"variety":[326],"towards":[329],"designing":[330],"policy":[332,399,423,429,442,448,464],"questions":[334],"applicability":[336],"relevance":[339],"practice":[341],"available":[343],"standards":[345],"frameworks.The":[347],"exploration":[348],"reading":[351],"complexity":[352],"points":[353],"clarity":[357],"consistency.The":[359],"sampled":[364],"generally":[367],"difficult":[368],"read,":[370],"particular,":[372],"if":[373],"short":[377],"length,":[379],"thereby":[380],"compromising":[381],"accessibility":[383],"wider":[388],"audience.When":[389],"it":[390],"comes":[391],"tone,":[394],"finds":[397],"documents":[400],"highly":[402],"formal":[403],"structure":[407],"some":[410],"extent":[411,422],"intentionally":[412],"ambiguous.Then,":[413],"third":[416],"Kurowski":[418],"explores":[419],"what":[421],"measurements":[425],"current":[428],"biased.The":[433],"author":[434],"developed":[435],"pre-tested":[437],"scenario-based":[438],"measurement":[439],"instrument":[440],"compliance,":[443],"referred":[444],"selfreporting":[447],"(SRPC)":[450],"scale,":[451],"assess":[453],"whether":[454],"any":[457],"differences":[459],"SRPC":[461],"existing":[463],"scales":[466],"literature.The":[469],"responses":[470],"survey,":[474],"which":[475],"54":[477],"participants,":[478],"show":[479],"biases":[482],"This":[484],"paper":[485],"forms":[486],"part":[487],"\"Cyber-Security:":[491]},"counts_by_year":[],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2021-12-06T00:00:00"}
