{"id":"https://openalex.org/W3152205434","doi":"https://doi.org/10.1108/ics-11-2020-0180","title":"Collective information security behaviour: a technology-driven framework","display_name":"Collective information security behaviour: a technology-driven framework","publication_year":2021,"publication_date":"2021-04-05","ids":{"openalex":"https://openalex.org/W3152205434","doi":"https://doi.org/10.1108/ics-11-2020-0180","mag":"3152205434"},"language":"en","primary_location":{"id":"doi:10.1108/ics-11-2020-0180","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-11-2020-0180","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072430860","display_name":"Dirk Snyman","orcid":"https://orcid.org/0000-0001-7360-3214"},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Dirk P. Snyman","raw_affiliation_strings":["School of Computer Science and Information Systems, North-West University, Potchefstroom, South Africa"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","institution_ids":["https://openalex.org/I27765905"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065158139","display_name":"Hennie Kruger","orcid":"https://orcid.org/0000-0001-8514-4422"},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Hennie Kruger","raw_affiliation_strings":["School of Computer Science and Information Systems, North-West University, Potchefstroom, South Africa"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","institution_ids":["https://openalex.org/I27765905"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072430860"],"corresponding_institution_ids":["https://openalex.org/I27765905"],"apc_list":null,"apc_paid":null,"fwci":0.5639,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70658847,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"29","issue":"4","first_page":"589","last_page":"603"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6447519063949585},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.577593982219696},{"id":"https://openalex.org/keywords/conceptual-framework","display_name":"Conceptual framework","score":0.5575689077377319},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.5505160093307495},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.490726113319397},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4664309322834015},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.3597484827041626},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.24865281581878662},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.20016834139823914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1727004051208496},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.12440726161003113},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10900789499282837},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.07901889085769653}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6447519063949585},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.577593982219696},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.5575689077377319},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.5505160093307495},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.490726113319397},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4664309322834015},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.3597484827041626},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.24865281581878662},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.20016834139823914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1727004051208496},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.12440726161003113},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10900789499282837},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.07901889085769653},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-11-2020-0180","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-11-2020-0180","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1480451672","https://openalex.org/W1925725102","https://openalex.org/W1983436120","https://openalex.org/W1986456981","https://openalex.org/W1994925048","https://openalex.org/W2002071750","https://openalex.org/W2009434419","https://openalex.org/W2017836055","https://openalex.org/W2035981836","https://openalex.org/W2041157860","https://openalex.org/W2046339686","https://openalex.org/W2055847123","https://openalex.org/W2121391490","https://openalex.org/W2161459327","https://openalex.org/W2162205187","https://openalex.org/W2607918173","https://openalex.org/W2609990009","https://openalex.org/W2754794588","https://openalex.org/W2766241343","https://openalex.org/W2767994174","https://openalex.org/W2793422791","https://openalex.org/W2801008321","https://openalex.org/W2807134372","https://openalex.org/W2887199159","https://openalex.org/W2912760919","https://openalex.org/W2921794429","https://openalex.org/W2926263361","https://openalex.org/W2938830984","https://openalex.org/W2958762060","https://openalex.org/W3010104526","https://openalex.org/W3013354594","https://openalex.org/W3023396888","https://openalex.org/W3081372182"],"related_works":["https://openalex.org/W2508914475","https://openalex.org/W2120971814","https://openalex.org/W2777401565","https://openalex.org/W3154625549","https://openalex.org/W3159280571","https://openalex.org/W2248314326","https://openalex.org/W4247822198","https://openalex.org/W10189584","https://openalex.org/W4310892428","https://openalex.org/W1974991139"],"abstract_inverted_index":{"Purpose":[0],"This":[1,117],"paper":[2],"aims":[3],"to":[4,98,102,127,131,151,171,187,217],"present":[5],"the":[6,29,33,39,66,71,92,120,173,195,199,219],"development":[7],"of":[8,38,48,65,79,91,198,206,209],"a":[9,100,114,124,148,163,232],"framework":[10,41,101,121,224],"for":[11,32,191],"evaluating":[12],"group":[13,104,138,155],"behaviour":[14,105,175],"in":[15,18,77,106,113,162,178,194,231],"information":[16,54,107,136,153,183,196],"security":[17,22,55,108,137,154,174,197],"practice.":[19],"Design/methodology/approach":[20],"Information":[21],"behavioural":[23],"threshold":[24,143],"analysis":[25,144],"is":[26,42,75,145,213,225],"used":[27,186,216],"as":[28,83,85,147,160],"theoretical":[30,125],"foundation":[31],"proposed":[34,40,67,220],"framework.":[35,221],"The":[36,62,157,181,222],"suitability":[37],"evaluated":[43],"based":[44],"on":[45],"two":[46,207],"sets":[47,208],"qualitative":[49,210],"measures":[50,212],"(general":[51],"frameworks":[52],"and":[53,89,133,176,215],"frameworks)":[56],"which":[57],"were":[58],"identified":[59,72,146],"from":[60,122],"literature.":[61],"successful":[63],"evaluation":[64,73,211],"framework,":[68,159],"guided":[69],"by":[70],"measures,":[74],"presented":[76,214],"terms":[78],"positive":[80,86,192],"practical":[81,115,149,227],"applications,":[82],"well":[84],"peer":[87],"review":[88],"publication":[90],"underlying":[93],"theory.":[94],"Findings":[95],"A":[96,202],"methodology":[97],"formalise":[99],"analyse":[103],"can":[109,184],"successfully":[110],"be":[111,185],"applied":[112],"environment.":[116],"application":[118],"takes":[119],"only":[123],"conceptualisation":[126],"an":[128,189],"implementable":[129],"solution":[130],"evaluate":[132,152,218],"positively":[134],"influence":[135,190],"behaviour.":[139,156],"Practical":[140],"implications":[141],"Behavioural":[142],"mechanism":[150],"suggested":[158],"implemented":[161],"management":[164],"decision":[165],"support":[166],"system":[167],"(DSS),":[168],"allows":[169],"practitioners":[170],"assess":[172],"awareness":[177],"their":[179],"organisation.":[180,200],"resulting":[182,223],"exert":[188],"change":[193],"Originality/value":[201],"novel":[203],"conceptual":[204],"mapping":[205],"made":[226],"through":[228],"its":[229],"encapsulation":[230],"DSS.":[233]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
