{"id":"https://openalex.org/W3036795564","doi":"https://doi.org/10.1108/ics-08-2019-0095","title":"The role of norms in information security policy compliance","display_name":"The role of norms in information security policy compliance","publication_year":2020,"publication_date":"2020-06-19","ids":{"openalex":"https://openalex.org/W3036795564","doi":"https://doi.org/10.1108/ics-08-2019-0095","mag":"3036795564"},"language":"en","primary_location":{"id":"doi:10.1108/ics-08-2019-0095","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-08-2019-0095","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043814913","display_name":"Isaac Wiafe","orcid":"https://orcid.org/0000-0003-1149-3309"},"institutions":[{"id":"https://openalex.org/I138690464","display_name":"University of Ghana","ror":"https://ror.org/01r22mr83","country_code":"GH","type":"education","lineage":["https://openalex.org/I138690464"]}],"countries":["GH"],"is_corresponding":true,"raw_author_name":"Isaac Wiafe","raw_affiliation_strings":["Department of Computer Science, University of Ghana, Accra, Ghana"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Ghana, Accra, Ghana","institution_ids":["https://openalex.org/I138690464"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029541425","display_name":"Felix Nti Koranteng","orcid":"https://orcid.org/0000-0001-5917-381X"},"institutions":[{"id":"https://openalex.org/I56822791","display_name":"Ghana Institute of Management and Public Administration","ror":"https://ror.org/04yexcn51","country_code":"GH","type":"education","lineage":["https://openalex.org/I56822791"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Felix Nti Koranteng","raw_affiliation_strings":["Department of Information Systems and Innovation, Ghana Institute of Management and Public Administration, Accra, Ghana"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Innovation, Ghana Institute of Management and Public Administration, Accra, Ghana","institution_ids":["https://openalex.org/I56822791"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071535426","display_name":"Abigail Wiafe","orcid":"https://orcid.org/0000-0001-6019-6074"},"institutions":[{"id":"https://openalex.org/I898088062","display_name":"Ghana Communication Technology University","ror":"https://ror.org/05hvkkr89","country_code":"GH","type":"education","lineage":["https://openalex.org/I898088062"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Abigail Wiafe","raw_affiliation_strings":["Faculty of Computing and Information Systems, Ghana Technology University College, Accra, Ghana"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Information Systems, Ghana Technology University College, Accra, Ghana","institution_ids":["https://openalex.org/I898088062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078424997","display_name":"Emmanuel Nyarko Obeng","orcid":"https://orcid.org/0000-0001-9382-468X"},"institutions":[{"id":"https://openalex.org/I138690464","display_name":"University of Ghana","ror":"https://ror.org/01r22mr83","country_code":"GH","type":"education","lineage":["https://openalex.org/I138690464"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Emmanuel Nyarko Obeng","raw_affiliation_strings":["Department of Computer Science, University of Ghana, Accra, Ghana"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Ghana, Accra, Ghana","institution_ids":["https://openalex.org/I138690464"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033750060","display_name":"Winfred Yaokumah","orcid":"https://orcid.org/0000-0001-7756-1832"},"institutions":[{"id":"https://openalex.org/I138690464","display_name":"University of Ghana","ror":"https://ror.org/01r22mr83","country_code":"GH","type":"education","lineage":["https://openalex.org/I138690464"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Winfred Yaokumah","raw_affiliation_strings":["Department of Computer Science, University of Ghana, Accra, Ghana"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Ghana, Accra, Ghana","institution_ids":["https://openalex.org/I138690464"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043814913"],"corresponding_institution_ids":["https://openalex.org/I138690464"],"apc_list":null,"apc_paid":null,"fwci":3.3395,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.93542557,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"28","issue":"5","first_page":"743","last_page":"761"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9521999955177307,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.7519718408584595},{"id":"https://openalex.org/keywords/information-systems-security","display_name":"Information systems security","score":0.7448209524154663},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.7021368741989136},{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.6436440944671631},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.6372338533401489},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5683882236480713},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.4700022339820862},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.46330907940864563},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4289301037788391},{"id":"https://openalex.org/keywords/standard-of-good-practice","display_name":"Standard of Good Practice","score":0.42439475655555725},{"id":"https://openalex.org/keywords/descriptive-statistics","display_name":"Descriptive statistics","score":0.4137399196624756},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4122835695743561},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40625500679016113},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.35520654916763306},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.307369589805603},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.23433548212051392},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.22628501057624817},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21549245715141296},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.17826083302497864},{"id":"https://openalex.org/keywords/management-information-systems","display_name":"Management information systems","score":0.15767112374305725},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.10539397597312927},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.09898272156715393},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0949816107749939},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.07539510726928711},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0683538019657135}],"concepts":[{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.7519718408584595},{"id":"https://openalex.org/C2988319471","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information systems security","level":4,"score":0.7448209524154663},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.7021368741989136},{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.6436440944671631},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.6372338533401489},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5683882236480713},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.4700022339820862},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.46330907940864563},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4289301037788391},{"id":"https://openalex.org/C47309137","wikidata":"https://www.wikidata.org/wiki/Q7598357","display_name":"Standard of Good Practice","level":5,"score":0.42439475655555725},{"id":"https://openalex.org/C39896193","wikidata":"https://www.wikidata.org/wiki/Q380344","display_name":"Descriptive statistics","level":2,"score":0.4137399196624756},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4122835695743561},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40625500679016113},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.35520654916763306},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.307369589805603},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.23433548212051392},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.22628501057624817},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21549245715141296},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.17826083302497864},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.15767112374305725},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.10539397597312927},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.09898272156715393},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0949816107749939},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.07539510726928711},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0683538019657135},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-08-2019-0095","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-08-2019-0095","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":80,"referenced_works":["https://openalex.org/W4477077","https://openalex.org/W78978687","https://openalex.org/W173593908","https://openalex.org/W657411145","https://openalex.org/W1488402966","https://openalex.org/W1516261653","https://openalex.org/W1536398137","https://openalex.org/W1545776183","https://openalex.org/W1602619638","https://openalex.org/W1607912078","https://openalex.org/W1641396650","https://openalex.org/W1879074003","https://openalex.org/W1964088509","https://openalex.org/W1968135828","https://openalex.org/W1970174926","https://openalex.org/W1970809283","https://openalex.org/W1971432357","https://openalex.org/W1987381312","https://openalex.org/W1989345773","https://openalex.org/W1992549547","https://openalex.org/W1997836764","https://openalex.org/W2005168308","https://openalex.org/W2005364767","https://openalex.org/W2008216695","https://openalex.org/W2012923515","https://openalex.org/W2023641092","https://openalex.org/W2024488177","https://openalex.org/W2032926056","https://openalex.org/W2033213440","https://openalex.org/W2048584594","https://openalex.org/W2051890203","https://openalex.org/W2052888082","https://openalex.org/W2054759866","https://openalex.org/W2055847123","https://openalex.org/W2060960513","https://openalex.org/W2071318899","https://openalex.org/W2078076646","https://openalex.org/W2088530342","https://openalex.org/W2099222119","https://openalex.org/W2099697766","https://openalex.org/W2100379340","https://openalex.org/W2112786892","https://openalex.org/W2118016181","https://openalex.org/W2119920728","https://openalex.org/W2127638919","https://openalex.org/W2130892515","https://openalex.org/W2131784034","https://openalex.org/W2132089162","https://openalex.org/W2143263668","https://openalex.org/W2156438052","https://openalex.org/W2160947415","https://openalex.org/W2161028505","https://openalex.org/W2181301463","https://openalex.org/W2198829320","https://openalex.org/W2242840730","https://openalex.org/W2256729371","https://openalex.org/W2264326308","https://openalex.org/W2400926733","https://openalex.org/W2417946255","https://openalex.org/W2503241677","https://openalex.org/W2521457698","https://openalex.org/W2567769395","https://openalex.org/W2571574484","https://openalex.org/W2575418267","https://openalex.org/W2610196913","https://openalex.org/W2704410357","https://openalex.org/W2740534380","https://openalex.org/W2769810480","https://openalex.org/W2770081621","https://openalex.org/W2778865020","https://openalex.org/W2783571795","https://openalex.org/W2801387997","https://openalex.org/W2803982931","https://openalex.org/W2895633959","https://openalex.org/W2898219382","https://openalex.org/W2941259227","https://openalex.org/W2948030712","https://openalex.org/W2999971836","https://openalex.org/W3216828173","https://openalex.org/W4243667233"],"related_works":["https://openalex.org/W40842196","https://openalex.org/W2126017555","https://openalex.org/W2049188895","https://openalex.org/W2263437148","https://openalex.org/W2380583381","https://openalex.org/W2481421941","https://openalex.org/W4308535653","https://openalex.org/W4285359482","https://openalex.org/W2474818065","https://openalex.org/W1208953748"],"abstract_inverted_index":{"Purpose":[0],"The":[1,69],"purpose":[2],"of":[3,81,96,136,139],"this":[4,129,131],"paper":[5],"is":[6,109],"to":[7,48,63,112,121],"determine":[8],"which":[9],"factors":[10],"influence":[11,22,142],"information":[12,31,75,114,126,143],"system":[13,32],"security":[14,33,76,144],"policy":[15,34],"compliance.":[16],"It":[17],"examines":[18],"how":[19],"different":[20],"norms":[21,83,92,140],"compliance":[23,77,85],"intention.":[24,86],"Design/methodology/approach":[25],"Based":[26],"on":[27,30,84],"relevant":[28],"literature":[29],"compliance,":[35],"a":[36],"research":[37],"model":[38],"was":[39,46,61],"developed":[40],"and":[41,53,90],"validated.":[42],"An":[43],"online":[44],"questionnaire":[45],"used":[47,62],"gather":[49],"data":[50],"from":[51],"respondents":[52],"partial":[54],"least":[55],"square":[56],"structural":[57],"equation":[58],"modelling":[59],"(PLS-SEM)":[60],"analyse":[64],"432":[65],"responses":[66],"received.":[67],"Findings":[68],"results":[70],"indicated":[71],"that":[72],"attitude":[73],"towards":[74],"mediates":[78],"the":[79,137],"effects":[80],"personal":[82,97],"In":[87],"addition,":[88],"descriptive":[89],"subjective":[91],"are":[93],"significant":[94,106],"predictors":[95],"norms.":[98],"Originality/value":[99],"Though":[100],"advancement":[101],"in":[102,124,141],"technology":[103],"has":[104],"reached":[105],"heights,":[107],"it":[108],"still":[110],"inadequate":[111],"guaranteed":[113],"systems\u2019":[115],"security.":[116,127],"Researchers":[117],"have":[118],"identified":[119],"humans":[120],"be":[122],"central":[123],"ensuring":[125],"To":[128],"effect,":[130],"study":[132],"provides":[133],"empirical":[134],"evidence":[135],"role":[138],"behaviour.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-22T08:38:42.863108","created_date":"2025-10-10T00:00:00"}
