{"id":"https://openalex.org/W2619540529","doi":"https://doi.org/10.1108/ics-12-2015-0046","title":"A general morphological analysis: delineating a cyber-security culture","display_name":"A general morphological analysis: delineating a cyber-security culture","publication_year":2017,"publication_date":"2017-05-24","ids":{"openalex":"https://openalex.org/W2619540529","doi":"https://doi.org/10.1108/ics-12-2015-0046","mag":"2619540529"},"language":"en","primary_location":{"id":"doi:10.1108/ics-12-2015-0046","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-12-2015-0046","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024969187","display_name":"Noluxolo Gcaza","orcid":"https://orcid.org/0009-0002-5773-3566"},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Noluxolo Gcaza","raw_affiliation_strings":["Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa"],"affiliations":[{"raw_affiliation_string":"Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020056259","display_name":"Rossouw von Solms","orcid":"https://orcid.org/0000-0002-9860-2346"},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Rossouw von Solms","raw_affiliation_strings":["Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa"],"affiliations":[{"raw_affiliation_string":"Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058516861","display_name":"Marthie Grobler","orcid":"https://orcid.org/0000-0001-6933-0145"},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Marthie M. Grobler","raw_affiliation_strings":["Department of Defence Peace Safety and Security, Council for Scientific and Industrial Research, Pretoria, Gauteng, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Defence Peace Safety and Security, Council for Scientific and Industrial Research, Pretoria, Gauteng, South Africa","institution_ids":["https://openalex.org/I21360634"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030339004","display_name":"Joey Jansen van Vuuren","orcid":"https://orcid.org/0000-0002-2836-9403"},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Joey Jansen van Vuuren","raw_affiliation_strings":["Department of Defence Peace Safety and Security, Council for Scientific and Industrial Research, Pretoria, Gauteng, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Defence Peace Safety and Security, Council for Scientific and Industrial Research, Pretoria, Gauteng, South Africa","institution_ids":["https://openalex.org/I21360634"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024969187"],"corresponding_institution_ids":["https://openalex.org/I99712911"],"apc_list":null,"apc_paid":null,"fwci":1.1701,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.83824216,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"25","issue":"3","first_page":"259","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13062","display_name":"Cognitive Computing and Networks","score":0.9661999940872192,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13062","display_name":"Cognitive Computing and Networks","score":0.9661999940872192,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13307","display_name":"Diverse Scientific and Engineering Research","score":0.9650999903678894,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14345","display_name":"Scientific Research and Philosophical Inquiry","score":0.9546999931335449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5556346774101257},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.5499470233917236},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4889124929904938},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4657764136791229},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.44849893450737},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44359055161476135},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.36646220088005066},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.34531307220458984},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3352981507778168},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3127073049545288},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.20924553275108337},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10112673044204712},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09087085723876953},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08288294076919556}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5556346774101257},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.5499470233917236},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4889124929904938},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4657764136791229},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.44849893450737},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44359055161476135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36646220088005066},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.34531307220458984},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3352981507778168},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3127073049545288},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.20924553275108337},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10112673044204712},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09087085723876953},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08288294076919556},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-12-2015-0046","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-12-2015-0046","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W47498180","https://openalex.org/W125992922","https://openalex.org/W147937939","https://openalex.org/W173352366","https://openalex.org/W238692967","https://openalex.org/W416981147","https://openalex.org/W1494928303","https://openalex.org/W1500529282","https://openalex.org/W1511039991","https://openalex.org/W1517753279","https://openalex.org/W1591380056","https://openalex.org/W1654805921","https://openalex.org/W1794662576","https://openalex.org/W1852743503","https://openalex.org/W1963547174","https://openalex.org/W1967425545","https://openalex.org/W1973868983","https://openalex.org/W1975581111","https://openalex.org/W1976366291","https://openalex.org/W1979005473","https://openalex.org/W1979517429","https://openalex.org/W1995948119","https://openalex.org/W2002356434","https://openalex.org/W2019377602","https://openalex.org/W2019593251","https://openalex.org/W2030684361","https://openalex.org/W2031702207","https://openalex.org/W2039858940","https://openalex.org/W2051917704","https://openalex.org/W2052352158","https://openalex.org/W2057450999","https://openalex.org/W2065806213","https://openalex.org/W2071524391","https://openalex.org/W2076698718","https://openalex.org/W2077670523","https://openalex.org/W2084713025","https://openalex.org/W2094540703","https://openalex.org/W2112601310","https://openalex.org/W2115377109","https://openalex.org/W2125524641","https://openalex.org/W2135670868","https://openalex.org/W2137079713","https://openalex.org/W2149180891","https://openalex.org/W2185304806","https://openalex.org/W2187327494","https://openalex.org/W2246958676","https://openalex.org/W2336079045","https://openalex.org/W2397493916","https://openalex.org/W2403831698","https://openalex.org/W2465403051","https://openalex.org/W2497179706","https://openalex.org/W2513235682","https://openalex.org/W2949643954","https://openalex.org/W3120293766","https://openalex.org/W4285719527","https://openalex.org/W7046411062"],"related_works":["https://openalex.org/W2147805813","https://openalex.org/W38011785","https://openalex.org/W3160956717","https://openalex.org/W3023142714","https://openalex.org/W565579149","https://openalex.org/W2384598124","https://openalex.org/W4245347819","https://openalex.org/W241834393","https://openalex.org/W2247050466","https://openalex.org/W2608133077"],"abstract_inverted_index":{"Purpose":[0],"The":[1,143],"purpose":[2],"of":[3,49,76,145,158,170,177,191,224,235,244],"this":[4],"paper":[5,129],"is":[6,44,84,94,104,115,180],"to":[7,26,36,117,153,164,213,218,232,261],"define":[8],"and":[9,108,120,174,249],"delineate":[10],"cyber":[11,29,50,70,82,91,123,138,148,159,225,252],"security":[12,15,30,51,71,83,92,124,139,149,160,253],"culture.":[13,72,126,140,161],"Cyber":[14],"has":[16],"been":[17],"a":[18,65,69,78,137,172,181,268,273,276],"concern":[19],"for":[20,275],"many":[21],"years.":[22],"In":[23],"an":[24],"effort":[25],"mitigate":[27],"the":[28,38,47,60,74,102,122,131,146,154,165,184,189,197,208,228,233,251,263],"risks,":[31],"technology-centred":[32],"measures":[33],"were":[34],"deemed":[35],"be":[37,214],"ultimate":[39],"solution.":[40],"Nowadays,":[41],"however,":[42],"it":[43,62],"accepted":[45],"that":[46,206,211,239,265],"process":[48],"requires":[52],"much":[53],"more":[54,256],"than":[55],"mere":[56],"technical":[57],"controls.":[58],"On":[59],"contrary,":[61],"now":[63],"demands":[64],"human-centred":[66],"approach,":[67],"including":[68],"Although":[73],"role":[75,269],"cultivating":[77,136,219,271],"culture":[79,93,223,254,274],"in":[80,96,135,183,203,216,270],"pursuing":[81],"well":[85],"appreciated,":[86],"research":[87,166],"focusing":[88],"intensely":[89],"on":[90,101],"still":[95],"its":[97,220],"infancy.":[98],"Additionally,":[99,227],"knowledge":[100],"subject":[103],"not":[105,241],"clearly":[106],"bounded":[107],"defined.":[109],"Design/methodology/approach":[110],"General":[111],"morphological":[112],"analysis":[113],"(GMA)":[114],"used":[116],"define,":[118],"structure":[119],"analyse":[121],"environment":[125],"Findings":[127],"This":[128],"identifies":[130],"most":[132],"important":[133],"variables":[134],"Research":[141],"implications":[142,195],"delineation":[144],"national":[147,222,277],"domain":[150,157,192,255],"will":[151,230],"contribute":[152,163,231,260],"relatively":[155],"new":[156],"They":[162],"community":[167],"by":[168],"means":[169,238],"promoting":[171],"shared":[173],"common":[175],"understanding":[176],"terms.":[178],"It":[179],"step":[182],"right":[185],"direction":[186],"towards":[187],"eliminating":[188],"ambiguity":[190],"assumptions.":[193],"Practical":[194],"Practically,":[196],"study":[198],"can":[199],"assist":[200],"developing":[201],"nations":[202],"constructing":[204],"strategies":[205],"addresses":[207],"key":[209],"factors":[210],"need":[212],"apparent":[215],"lieu":[217],"envisaged":[221],"security.":[226],"GMA":[229],"development":[234],"solutions":[236],"or":[237],"do":[240],"overlook":[242],"interrelations":[243],"such":[245,272],"factors.":[246],"Originality/value":[247],"Delineating":[248],"defining":[250],"precisely":[257],"could":[258],"greatly":[259],"realizing":[262],"elements":[264],"collectively":[266],"play":[267],"perspective.":[278]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
