{"id":"https://openalex.org/W3133990685","doi":"https://doi.org/10.1108/ics-11-2020-0179","title":"Assessing information security behaviour: a self-determination theory perspective","display_name":"Assessing information security behaviour: a self-determination theory perspective","publication_year":2021,"publication_date":"2021-03-07","ids":{"openalex":"https://openalex.org/W3133990685","doi":"https://doi.org/10.1108/ics-11-2020-0179","mag":"3133990685"},"language":"en","primary_location":{"id":"doi:10.1108/ics-11-2020-0179","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-11-2020-0179","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034044805","display_name":"Yotamu Gangire","orcid":"https://orcid.org/0000-0001-8951-6211"},"institutions":[{"id":"https://openalex.org/I165390105","display_name":"University of South Africa","ror":"https://ror.org/048cwvf49","country_code":"ZA","type":"education","lineage":["https://openalex.org/I165390105"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Yotamu Gangire","raw_affiliation_strings":["Department of Information Systems, School of Computing, College of Science Engineering and Technology, University of South Africa, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, School of Computing, College of Science Engineering and Technology, University of South Africa, Pretoria, South Africa","institution_ids":["https://openalex.org/I165390105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044951113","display_name":"Ad\u00e9le da Veiga","orcid":"https://orcid.org/0000-0001-9777-8721"},"institutions":[{"id":"https://openalex.org/I165390105","display_name":"University of South Africa","ror":"https://ror.org/048cwvf49","country_code":"ZA","type":"education","lineage":["https://openalex.org/I165390105"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Ad\u00e9le Da Veiga","raw_affiliation_strings":["Department of Information Systems, School of Computing, College of Science Engineering and Technology, University of South Africa, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, School of Computing, College of Science Engineering and Technology, University of South Africa, Pretoria, South Africa","institution_ids":["https://openalex.org/I165390105"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046657726","display_name":"Marlien Herselman","orcid":"https://orcid.org/0000-0003-1089-3925"},"institutions":[{"id":"https://openalex.org/I165390105","display_name":"University of South Africa","ror":"https://ror.org/048cwvf49","country_code":"ZA","type":"education","lineage":["https://openalex.org/I165390105"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Marlien Herselman","raw_affiliation_strings":["School of Computing, College of Science Engineering and Technology, University of South Africa, Pretoria, South Africa and Department of Next Generation Enterprises and Institutions, CSIR, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"School of Computing, College of Science Engineering and Technology, University of South Africa, Pretoria, South Africa and Department of Next Generation Enterprises and Institutions, CSIR, Pretoria, South Africa","institution_ids":["https://openalex.org/I165390105"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034044805"],"corresponding_institution_ids":["https://openalex.org/I165390105"],"apc_list":null,"apc_paid":null,"fwci":3.1165,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.92396977,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"29","issue":"4","first_page":"625","last_page":"646"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/competence","display_name":"Competence (human resources)","score":0.7681044340133667},{"id":"https://openalex.org/keywords/cronbachs-alpha","display_name":"Cronbach's alpha","score":0.759584367275238},{"id":"https://openalex.org/keywords/autonomy","display_name":"Autonomy","score":0.7074123620986938},{"id":"https://openalex.org/keywords/exploratory-factor-analysis","display_name":"Exploratory factor analysis","score":0.6058928966522217},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.5794331431388855},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.5236799120903015},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4549597501754761},{"id":"https://openalex.org/keywords/questionnaire","display_name":"Questionnaire","score":0.4338873028755188},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.42279064655303955},{"id":"https://openalex.org/keywords/applied-psychology","display_name":"Applied psychology","score":0.390613853931427},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.3865547180175781},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3843803405761719},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.23289912939071655},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.17978975176811218},{"id":"https://openalex.org/keywords/psychometrics","display_name":"Psychometrics","score":0.1797640323638916},{"id":"https://openalex.org/keywords/developmental-psychology","display_name":"Developmental psychology","score":0.17671409249305725},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14697229862213135},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09306856989860535},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0797339677810669}],"concepts":[{"id":"https://openalex.org/C100521375","wikidata":"https://www.wikidata.org/wiki/Q2015382","display_name":"Competence (human resources)","level":2,"score":0.7681044340133667},{"id":"https://openalex.org/C106906290","wikidata":"https://www.wikidata.org/wiki/Q1140909","display_name":"Cronbach's alpha","level":3,"score":0.759584367275238},{"id":"https://openalex.org/C65414064","wikidata":"https://www.wikidata.org/wiki/Q484105","display_name":"Autonomy","level":2,"score":0.7074123620986938},{"id":"https://openalex.org/C165957694","wikidata":"https://www.wikidata.org/wiki/Q5421350","display_name":"Exploratory factor analysis","level":3,"score":0.6058928966522217},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.5794331431388855},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.5236799120903015},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4549597501754761},{"id":"https://openalex.org/C59364581","wikidata":"https://www.wikidata.org/wiki/Q747810","display_name":"Questionnaire","level":2,"score":0.4338873028755188},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.42279064655303955},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.390613853931427},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.3865547180175781},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3843803405761719},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.23289912939071655},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.17978975176811218},{"id":"https://openalex.org/C171606756","wikidata":"https://www.wikidata.org/wiki/Q506132","display_name":"Psychometrics","level":2,"score":0.1797640323638916},{"id":"https://openalex.org/C138496976","wikidata":"https://www.wikidata.org/wiki/Q175002","display_name":"Developmental psychology","level":1,"score":0.17671409249305725},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14697229862213135},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09306856989860535},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0797339677810669},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-11-2020-0179","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-11-2020-0179","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W18574022","https://openalex.org/W60643473","https://openalex.org/W122221712","https://openalex.org/W657411145","https://openalex.org/W1512740566","https://openalex.org/W1602619638","https://openalex.org/W1607912078","https://openalex.org/W1903961850","https://openalex.org/W1966997002","https://openalex.org/W1992342542","https://openalex.org/W2008556210","https://openalex.org/W2009661351","https://openalex.org/W2017836055","https://openalex.org/W2018125809","https://openalex.org/W2029699977","https://openalex.org/W2058144115","https://openalex.org/W2078076646","https://openalex.org/W2081526168","https://openalex.org/W2101873293","https://openalex.org/W2118934859","https://openalex.org/W2132253094","https://openalex.org/W2141846678","https://openalex.org/W2156438052","https://openalex.org/W2177150280","https://openalex.org/W2183877827","https://openalex.org/W2207884471","https://openalex.org/W2265901161","https://openalex.org/W2522058319","https://openalex.org/W2556038167","https://openalex.org/W2567769395","https://openalex.org/W2568632554","https://openalex.org/W2573374390","https://openalex.org/W2573816186","https://openalex.org/W2575418267","https://openalex.org/W2598077924","https://openalex.org/W2606858076","https://openalex.org/W2620886469","https://openalex.org/W2742548922","https://openalex.org/W2747294120","https://openalex.org/W2781481152","https://openalex.org/W2783084910","https://openalex.org/W2789825598","https://openalex.org/W2801347047","https://openalex.org/W2901563683","https://openalex.org/W2943353660","https://openalex.org/W2943793991","https://openalex.org/W2967317239","https://openalex.org/W3020491973","https://openalex.org/W3037017500","https://openalex.org/W3080992816","https://openalex.org/W3081388862","https://openalex.org/W3121768791","https://openalex.org/W3140755942","https://openalex.org/W4242883546","https://openalex.org/W4253947779"],"related_works":["https://openalex.org/W1959773857","https://openalex.org/W2790705157","https://openalex.org/W2375662571","https://openalex.org/W2756013788","https://openalex.org/W2557832904","https://openalex.org/W2185029529","https://openalex.org/W4295204285","https://openalex.org/W4385968791","https://openalex.org/W2288821242","https://openalex.org/W1944187853"],"abstract_inverted_index":{"Purpose":[0],"This":[1,155,172,214],"paper":[2,19,215],"outlines":[3],"the":[4,25,30,53,65,74,178,199,226,229],"development":[5],"of":[6,17,228],"a":[7,38,45,105,117,158,161,169,210,217],"validated":[8],"questionnaire":[9,26,75,200],"for":[10,64,191,220],"assessing":[11,221],"information":[12,148,207,222],"security":[13,149,208,223],"behaviour.":[14],"The":[15,80,97,132],"purpose":[16],"this":[18],"is":[20,76],"to":[21,51,201,205],"present":[22],"data":[23],"from":[24,209,225],"validation":[27],"process":[28],"and":[29,78,93,112,123,126,129,138,164,187],"quantitative":[31,39],"study":[32,133,156,179],"results.":[33,180],"Design/methodology/approach":[34],"Data":[35],"obtained":[36],"through":[37],"survey":[40],"(N":[41],"=":[42],"263)":[43],"at":[44],"South":[46],"African":[47],"university":[48],"were":[49,68],"used":[50,157],"validate":[52],"questionnaire.":[54],"Findings":[55],"Exploratory":[56],"factor":[57],"analysis":[58,99],"produced":[59],"11":[60,66],"factors.":[61,114,131],"Cronbach\u2019s":[62],"alpha":[63],"factors":[67,111],"all":[69],"above":[70],"0.7,":[71],"suggesting":[72],"that":[73,83,102,136],"valid":[77],"reliable.":[79],"responses":[81],"show":[82,101],"autonomy":[84,113,122,139],"questions":[85,92],"received":[86],"positive":[87],"perception,":[88],"followed":[89],"by":[90],"competence":[91,110,128,137],"lastly":[94],"relatedness":[95,124,130,145],"questions.":[96],"correlation":[98],"results":[100,134],"there":[103],"was":[104,116,165],"statistically":[106],"significant":[107,119],"relationship":[108,120],"between":[109,121,127],"There":[115],"partial":[118],"factors,":[125],"suggest":[135],"could":[140,173,183],"be":[141],"more":[142],"important":[143],"than":[144],"in":[146,168],"fostering":[147],"behaviour":[150,211,224],"among":[151],"employees.":[152],"Research":[153],"limitations/implications":[154],"convenience":[159],"sampling,":[160],"cross-sectional":[162],"design,":[163],"carried":[166],"out":[167],"single":[170],"organisation.":[171],"pose":[174],"limitations":[175],"when":[176],"generalising":[177],"Future":[181],"studies":[182],"use":[184,198],"random":[185],"sampling":[186],"consider":[188],"other":[189],"universities":[190],"further":[192],"validation.":[193],"Practical":[194],"implications":[195],"Universities":[196],"can":[197],"identify":[202],"developmental":[203],"areas":[204],"improve":[206],"perspective.":[212],"Originality/value":[213],"provides":[216],"research":[218],"instrument":[219],"perspective":[227],"self-determination":[230],"theory.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":6},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
