{"id":"https://openalex.org/W2077783999","doi":"https://doi.org/10.1108/imcs-04-2012-0022","title":"Push and pull effects of homeland information security incentives","display_name":"Push and pull effects of homeland information security incentives","publication_year":2013,"publication_date":"2013-07-12","ids":{"openalex":"https://openalex.org/W2077783999","doi":"https://doi.org/10.1108/imcs-04-2012-0022","mag":"2077783999"},"language":"en","primary_location":{"id":"doi:10.1108/imcs-04-2012-0022","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imcs-04-2012-0022","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045478076","display_name":"Kai S. Koong","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kai S. Koong","raw_affiliation_strings":["Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA","(Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA","institution_ids":[]},{"raw_affiliation_string":"(Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088004218","display_name":"Mohammad I. Merhi","orcid":"https://orcid.org/0000-0003-2933-1965"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammad I. Merhi","raw_affiliation_strings":["Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA","(Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA","institution_ids":[]},{"raw_affiliation_string":"(Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA)","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084127905","display_name":"Jun Sun","orcid":"https://orcid.org/0000-0002-0325-1951"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Sun","raw_affiliation_strings":["Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA","(Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA","institution_ids":[]},{"raw_affiliation_string":"(Department of Computer Information Systems and Quantitative Methods, University of Texas Pan American, Edinburg, Texas, USA)","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045478076"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.18514212,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"21","issue":"3","first_page":"155","last_page":"176"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.8629604578018188},{"id":"https://openalex.org/keywords/homeland-security","display_name":"Homeland security","score":0.8118642568588257},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.6334463357925415},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6162977814674377},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5765386819839478},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5165137648582458},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.5089504718780518},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46484842896461487},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.44764208793640137},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.260906457901001},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.21920430660247803},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1993495523929596},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.17779189348220825},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.1706041693687439},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.0868498682975769}],"concepts":[{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.8629604578018188},{"id":"https://openalex.org/C506469952","wikidata":"https://www.wikidata.org/wiki/Q181467","display_name":"Homeland security","level":3,"score":0.8118642568588257},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.6334463357925415},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6162977814674377},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5765386819839478},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5165137648582458},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.5089504718780518},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46484842896461487},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.44764208793640137},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.260906457901001},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.21920430660247803},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1993495523929596},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.17779189348220825},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.1706041693687439},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0868498682975769},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/imcs-04-2012-0022","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imcs-04-2012-0022","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W147350318","https://openalex.org/W1483280370","https://openalex.org/W1579572282","https://openalex.org/W1595738880","https://openalex.org/W1602619638","https://openalex.org/W1603962791","https://openalex.org/W1665332082","https://openalex.org/W1877071610","https://openalex.org/W1963608776","https://openalex.org/W1964165805","https://openalex.org/W1966684751","https://openalex.org/W1978918141","https://openalex.org/W1982563504","https://openalex.org/W1985044911","https://openalex.org/W1998501368","https://openalex.org/W2000667443","https://openalex.org/W2007227619","https://openalex.org/W2013689373","https://openalex.org/W2018757680","https://openalex.org/W2023360494","https://openalex.org/W2024422012","https://openalex.org/W2026428831","https://openalex.org/W2038551506","https://openalex.org/W2041433384","https://openalex.org/W2042305664","https://openalex.org/W2044046254","https://openalex.org/W2044935933","https://openalex.org/W2048584594","https://openalex.org/W2048759110","https://openalex.org/W2053563318","https://openalex.org/W2055847123","https://openalex.org/W2056075452","https://openalex.org/W2062493711","https://openalex.org/W2063054617","https://openalex.org/W2066253814","https://openalex.org/W2068132697","https://openalex.org/W2075643716","https://openalex.org/W2081068606","https://openalex.org/W2085095413","https://openalex.org/W2101440347","https://openalex.org/W2105992541","https://openalex.org/W2115071827","https://openalex.org/W2119587968","https://openalex.org/W2126782589","https://openalex.org/W2153038337","https://openalex.org/W2159381847","https://openalex.org/W2162857443","https://openalex.org/W2167547004","https://openalex.org/W2169294797","https://openalex.org/W2460654603","https://openalex.org/W2521824253","https://openalex.org/W3144765733","https://openalex.org/W4239751935","https://openalex.org/W4285719527","https://openalex.org/W6718761234"],"related_works":["https://openalex.org/W2508914475","https://openalex.org/W2741061559","https://openalex.org/W2793054839","https://openalex.org/W4390655704","https://openalex.org/W2149739119","https://openalex.org/W2777401565","https://openalex.org/W2517937949","https://openalex.org/W1974991139","https://openalex.org/W2183721768","https://openalex.org/W2403291514"],"abstract_inverted_index":{"Purpose":[0],"The":[1,69,182,278,346],"purpose":[2],"of":[3,17,37,40,52,73,93,101,117,203,210,222,232,282,307,362,415,418,436,452,454,474],"this":[4,245,251,292,329,353,394,421,447],"study":[5,46,252,330,354,380,398],"is":[6,200,395],"to":[7,12,161,172,187,219,234,254,358,388,428],"find":[8],"out":[9],"whether":[10,215],"efforts":[11],"improve":[13],"the":[14,35,41,48,57,60,79,83,91,107,114,142,165,188,192,201,207,213,220,223,236,255,271,285,298,304,325,332,339,343,359,396,408,416,424,430,434,437,443,450,455,462,470,475],"information":[15,22,38,49,70,135,162,305,340,364,411,471],"security":[16,23,39,50,71,163,238,306,320,341,365,412,472],"government":[18,42,308],"agencies":[19,55,75,103,108,125,145,155,214,224,287,309],"and":[20,27,98,109,265,319,348,367],"homeland":[21,363],"have":[24,129,156,385,404],"paid":[25,158],"off":[26],"also":[28,151,323,356],"different":[29,311,401],"incentives":[30,100,176,366,402,456],"(internal/external)":[31],"impact":[32],"s":[33],"on":[34,263,373,407],"improvement":[36],"agencies?":[43],"Design/methodology/approach":[44],"This":[45,379],"examines":[47,381],"status":[51,72],"24":[53],"federal":[54,102,286],"in":[56,82,134,174,212,250,291,328,342,352,420,446,461],"USA":[58],"over":[59,164],"period":[61,116],"2002":[62],"through":[63],"2007":[64],"using":[65,228],"latent":[66],"growth":[67],"modeling.":[68],"these":[74],"was":[76],"tracked":[77],"with":[78],"grades":[80],"revealed":[81,152],"Federal":[84,193,409],"Computer":[85,194],"Security":[86,195],"Report":[87,196],"Cards.":[88,197],"In":[89],"addition,":[90],"number":[92,202,209],"employees":[94,204,211],"(internal":[95],"threat":[96],"incentives)":[97],"budgets":[99],"were":[104],"gathered":[105],"from":[106],"other":[110,178],"governmental":[111],"websites":[112],"for":[113,284,297,303,331,370],"same":[115],"time.":[118],"Findings":[119],"Results":[120,150],"indicated":[121],"that":[122,153,205,288,300,336,384,399,403,457,468],"high":[123],"critical\u2010information":[124,144],"even":[126],"though":[127],"they":[128,137,216],"an":[130,405],"overall":[131],"low":[132,143],"performance":[133,413,473],"security,":[136],"are":[138,169,185,217,289,301],"performing":[139],"better":[140,333],"than":[141,177],"regarding":[146],"solving":[147],"external":[148],"threats.":[149],"whereas":[154],"generally":[157],"more":[159,170,242],"attention":[160],"years,":[166],"their":[167],"performances":[168],"pertinent":[171],"change":[173],"budget":[175,233],"incentives.":[179],"Research":[180],"limitations/implications":[181],"outcomes":[183,326],"reported":[184,327],"confined":[186],"data":[189,419],"presented":[190],"by":[191],"Another":[198],"limitation":[199],"counts":[206],"total":[208],"related":[218],"systems":[221],"or":[225],"not.":[226],"Finally,":[227],"a":[229,465],"time\u2010lag":[230],"analysis":[231],"predict":[235],"current":[237,360],"score":[239],"would":[240],"be":[241,248,281,368,389],"straightforward,":[243],"but":[244,442],"could":[246],"not":[247,386],"applied":[249],"due":[253],"insufficient":[256],"sample":[257],"size,":[258],"as":[259,294,296,464],"\u201cthe":[260],"House":[261],"Committee":[262],"Oversight":[264],"Government":[266],"Reform\u201d":[267],"no":[268],"longer":[269],"released":[270],"report":[272],"cards":[273],"after":[274],"2007.":[275],"Practical":[276],"implications":[277],"results":[279,444],"should":[280],"interest":[283],"included":[290],"study,":[293],"well":[295],"organizations":[299],"responsible":[302],"at":[310],"levels.":[312],"Policy":[313],"makers,":[314],"IT":[315],"managers,":[316],"software":[317],"developers":[318],"specialists":[321],"can":[322,337],"use":[324],"decision":[334],"making":[335],"enhance":[338],"public":[344],"sector.":[345],"theoretical":[347],"methodological":[349],"framework":[350],"used":[351,427],"may":[355],"contribute":[357],"literature":[361,463],"helpful":[369],"future":[371],"studies":[372],"its":[374],"critical":[375],"success":[376],"factors.":[377],"Originality/value":[378],"fundamental":[382],"issues":[383],"yet":[387],"established.":[390],"To":[391],"our":[392],"knowledge,":[393],"first":[397],"assesses":[400],"effect":[406],"agencies'":[410],"because":[414],"lack":[417],"domain.":[422],"Also,":[423],"statistical":[425],"techniques":[426],"test":[429],"research":[431,448],"propositions":[432],"fit":[433],"objective":[435],"study.":[438],"Not":[439],"only":[440],"this,":[441],"found":[445],"assure":[449],"importance":[451],"one":[453],"has":[458],"been":[459],"identified":[460],"crucial":[466],"element":[467],"affects":[469],"organizations.":[476]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
