{"id":"https://openalex.org/W2995416612","doi":"https://doi.org/10.1108/ics-12-2018-0142","title":"Assessing the current state of information security policies in academic organizations","display_name":"Assessing the current state of information security policies in academic organizations","publication_year":2019,"publication_date":"2019-11-21","ids":{"openalex":"https://openalex.org/W2995416612","doi":"https://doi.org/10.1108/ics-12-2018-0142","mag":"2995416612"},"language":"en","primary_location":{"id":"doi:10.1108/ics-12-2018-0142","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-12-2018-0142","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088449745","display_name":"Jake Weidman","orcid":"https://orcid.org/0000-0003-4727-4271"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jake Weidman","raw_affiliation_strings":["Department of Informatics, Pennsylvania State University, University Park, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Pennsylvania State University, University Park, Pennsylvania, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063714878","display_name":"Jens Gro\u00dfklags","orcid":"https://orcid.org/0000-0003-1093-1282"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jens Grossklags","raw_affiliation_strings":["Technical University of Munich, Freising, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, Freising, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088449745"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":1.0174,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.84014726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"28","issue":"3","first_page":"423","last_page":"444"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.7910726070404053},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.7195945382118225},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5958480834960938},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5818468332290649},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5362229943275452},{"id":"https://openalex.org/keywords/information-security-standards","display_name":"Information security standards","score":0.5166290402412415},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.5161920189857483},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5013389587402344},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.49882960319519043},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.37880730628967285},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.336341917514801},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.33067864179611206},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3072916567325592},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29636502265930176},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1934535801410675},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.18028795719146729},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.12054955959320068},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.11438077688217163}],"concepts":[{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.7910726070404053},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.7195945382118225},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5958480834960938},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5818468332290649},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5362229943275452},{"id":"https://openalex.org/C139547956","wikidata":"https://www.wikidata.org/wiki/Q6031202","display_name":"Information security standards","level":5,"score":0.5166290402412415},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.5161920189857483},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5013389587402344},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.49882960319519043},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.37880730628967285},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.336341917514801},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33067864179611206},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3072916567325592},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29636502265930176},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1934535801410675},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.18028795719146729},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.12054955959320068},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.11438077688217163},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-12-2018-0142","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-12-2018-0142","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W44950679","https://openalex.org/W186798271","https://openalex.org/W769255836","https://openalex.org/W1516597575","https://openalex.org/W1525451939","https://openalex.org/W1602619638","https://openalex.org/W1936725236","https://openalex.org/W1969641949","https://openalex.org/W2019312772","https://openalex.org/W2030762751","https://openalex.org/W2044935933","https://openalex.org/W2058818389","https://openalex.org/W2091494072","https://openalex.org/W2104619000","https://openalex.org/W2133944470","https://openalex.org/W2136006189","https://openalex.org/W2138958508","https://openalex.org/W2145811653","https://openalex.org/W2434589599","https://openalex.org/W2463111258","https://openalex.org/W2524919294","https://openalex.org/W2534519866","https://openalex.org/W2588966343","https://openalex.org/W2626788661","https://openalex.org/W2950833377","https://openalex.org/W2970434416","https://openalex.org/W3124506642","https://openalex.org/W4236533540"],"related_works":["https://openalex.org/W2366423890","https://openalex.org/W2126017555","https://openalex.org/W2746393072","https://openalex.org/W2049188895","https://openalex.org/W4285359482","https://openalex.org/W2380583381","https://openalex.org/W2142515455","https://openalex.org/W2481421941","https://openalex.org/W2263437148","https://openalex.org/W2394303444"],"abstract_inverted_index":{"Purpose":[0],"Colleges":[1],"and":[2,11,48,106,118,138,167,241,248],"universities":[3,105,160],"across":[4],"the":[5,21,29,46,57,92,109,112,136,148,157,168,185,246,254],"USA":[6,110],"have":[7,233],"seen":[8],"data":[9],"breaches":[10],"intellectual":[12],"property":[13],"theft":[14],"rise":[15],"at":[16,228],"a":[17,51,129,192,199,223,238],"heightened":[18],"rate":[19],"over":[20],"past":[22],"several":[23],"years.":[24],"An":[25],"integral":[26],"step":[27],"in":[28,73,83,108],"first":[30],"line":[31],"of":[32,37,50,59,95,114,121,131,140,156,188,195,202,222,250],"defense":[33],"against":[34],"various":[35],"forms":[36],"attacks":[38],"are":[39],"(written)":[40],"security":[41,97,165],"policies":[42,98,102,169,190,209],"designed":[43,133],"to":[44,90,134,244],"prescribe":[45],"construction":[47,139],"function":[49],"technical":[52],"system,":[53],"while":[54],"simultaneously":[55],"guiding":[56],"actions":[58],"individuals":[60],"operating":[61],"within":[62],"said":[63],"system.":[64],"Unfortunately,":[65],"policy":[66],"analysis":[67,243],"is":[68,219],"an":[69,220],"insufficiently":[70],"discussed":[71],"topic":[72],"many":[74],"academic":[75],"communities":[76],"with":[77,111,175],"very":[78],"little":[79,176],"research":[80,256],"being":[81],"conducted":[82],"this":[84,127,251],"space.":[85],"Design/methodology/approach":[86],"This":[87,217],"work":[88,218,252],"aims":[89],"assess":[91],"current":[93],"state":[94],"information":[96,164],"by":[99],"analyzing":[100],"in-use":[101],"from":[103],"200":[104,159],"colleges":[107],"goal":[113],"identifying":[115],"important":[116],"features":[117],"general":[119],"attributes":[120],"these":[122,141,189],"documents.":[123],"The":[124,180,231],"authors":[125,149,181,232],"accomplish":[126],"through":[128],"series":[130],"analyzes":[132,236],"examine":[135],"language":[137,206],"policies.":[142],"Findings":[143],"To":[144],"summarize":[145],"high-level":[146],"results,":[147],"found":[150,183],"that":[151,170,184,210,225],"only":[152],"54":[153],"per":[154],"cent":[155],"top":[158],"had":[161],"publicly":[162],"accessible":[163],"policies,":[166],"were":[171],"examined":[172],"lacked":[173,191],"consistency":[174],"shared":[177],"source":[178],"material.":[179],"also":[182],"tonal":[186,242],"makeup":[187],"great":[193],"deal":[194],"emotion,":[196],"but":[197],"contained":[198],"high":[200],"amount":[201],"tentative":[203],"or":[204],"ambiguous":[205],"leading":[207],"toward":[208],"could":[211],"be":[212],"viewed":[213],"as":[214],"\u201cunclear.\u201d":[215],"Originality/value":[216],"extension":[221],"paper":[224],"was":[226],"presented":[227],"ECIS":[229],"2018.":[230],"added":[234],"additional":[235],"including":[237],"cross-policy":[239],"content":[240],"strengthen":[245],"findings":[247],"implications":[249],"for":[253],"wider":[255],"audience.":[257]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
