{"id":"https://openalex.org/W2884728845","doi":"https://doi.org/10.1108/itp-02-2017-0052","title":"Are users competent to comply with information security policies? An analysis of professional competence models","display_name":"Are users competent to comply with information security policies? An analysis of professional competence models","publication_year":2018,"publication_date":"2018-07-17","ids":{"openalex":"https://openalex.org/W2884728845","doi":"https://doi.org/10.1108/itp-02-2017-0052","mag":"2884728845"},"language":"en","primary_location":{"id":"doi:10.1108/itp-02-2017-0052","is_oa":false,"landing_page_url":"https://doi.org/10.1108/itp-02-2017-0052","pdf_url":null,"source":{"id":"https://openalex.org/S185256354","display_name":"Information Technology and People","issn_l":"0959-3845","issn":["0959-3845","1758-5813"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Technology &amp; People","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080067713","display_name":"Aggeliki Tsohou","orcid":"https://orcid.org/0000-0003-2200-3651"},"institutions":[{"id":"https://openalex.org/I187792471","display_name":"Ionian University","ror":"https://ror.org/01xm4n520","country_code":"GR","type":"education","lineage":["https://openalex.org/I187792471"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Aggeliki Tsohou","raw_affiliation_strings":["Department of Informatics, Ionian University, Corfu, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Ionian University, Corfu, Greece","institution_ids":["https://openalex.org/I187792471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054313498","display_name":"P Holtkamp","orcid":null},"institutions":[{"id":"https://openalex.org/I94722563","display_name":"University of Jyv\u00e4skyl\u00e4","ror":"https://ror.org/05n3dz165","country_code":"FI","type":"education","lineage":["https://openalex.org/I94722563"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Philipp Holtkamp","raw_affiliation_strings":["Department of Computer Science and Information Systems, Jyvaskylan Yliopisto, Jyvaskyla, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, Jyvaskylan Yliopisto, Jyvaskyla, Finland","institution_ids":["https://openalex.org/I94722563"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080067713"],"corresponding_institution_ids":["https://openalex.org/I187792471"],"apc_list":null,"apc_paid":null,"fwci":7.3908,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.97299404,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"31","issue":"5","first_page":"1047","last_page":"1068"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/competence","display_name":"Competence (human resources)","score":0.789738655090332},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6144804954528809},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.6052395701408386},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5723749995231628},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.5505136847496033},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.5482162237167358},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.39827001094818115},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.36524176597595215},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.28490757942199707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2618163228034973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18226486444473267},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09201502799987793},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.08853700757026672}],"concepts":[{"id":"https://openalex.org/C100521375","wikidata":"https://www.wikidata.org/wiki/Q2015382","display_name":"Competence (human resources)","level":2,"score":0.789738655090332},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6144804954528809},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.6052395701408386},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5723749995231628},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.5505136847496033},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.5482162237167358},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39827001094818115},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.36524176597595215},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.28490757942199707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2618163228034973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18226486444473267},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09201502799987793},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.08853700757026672},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/itp-02-2017-0052","is_oa":false,"landing_page_url":"https://doi.org/10.1108/itp-02-2017-0052","pdf_url":null,"source":{"id":"https://openalex.org/S185256354","display_name":"Information Technology and People","issn_l":"0959-3845","issn":["0959-3845","1758-5813"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Technology &amp; People","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W4477077","https://openalex.org/W12535498","https://openalex.org/W65111988","https://openalex.org/W95376426","https://openalex.org/W129912261","https://openalex.org/W130442676","https://openalex.org/W143657432","https://openalex.org/W186798271","https://openalex.org/W208044974","https://openalex.org/W234027687","https://openalex.org/W416981147","https://openalex.org/W791969853","https://openalex.org/W1489049849","https://openalex.org/W1526281128","https://openalex.org/W1536398137","https://openalex.org/W1592840912","https://openalex.org/W1602619638","https://openalex.org/W1607912078","https://openalex.org/W1829171255","https://openalex.org/W1913850770","https://openalex.org/W1964088509","https://openalex.org/W1966997002","https://openalex.org/W1970809283","https://openalex.org/W1992342542","https://openalex.org/W1993957541","https://openalex.org/W1997603734","https://openalex.org/W1999104069","https://openalex.org/W2005033099","https://openalex.org/W2010902645","https://openalex.org/W2017043670","https://openalex.org/W2017609493","https://openalex.org/W2024419606","https://openalex.org/W2029699977","https://openalex.org/W2033213440","https://openalex.org/W2049593696","https://openalex.org/W2053319398","https://openalex.org/W2062477794","https://openalex.org/W2081430061","https://openalex.org/W2099647042","https://openalex.org/W2105992541","https://openalex.org/W2111628838","https://openalex.org/W2135298789","https://openalex.org/W2140256961","https://openalex.org/W2150659349","https://openalex.org/W2156241021","https://openalex.org/W2159399759","https://openalex.org/W2170899042","https://openalex.org/W2216034841","https://openalex.org/W2348056408","https://openalex.org/W2536988621","https://openalex.org/W2622838936","https://openalex.org/W2949086256","https://openalex.org/W3005993375","https://openalex.org/W3121768791","https://openalex.org/W4241004881","https://openalex.org/W4242592406","https://openalex.org/W4243161795","https://openalex.org/W4244216206","https://openalex.org/W4250074889"],"related_works":["https://openalex.org/W1592840912","https://openalex.org/W2394303444","https://openalex.org/W3152251045","https://openalex.org/W2401586698","https://openalex.org/W1967902260","https://openalex.org/W3152521371","https://openalex.org/W2884728845","https://openalex.org/W2322414415","https://openalex.org/W4200502275","https://openalex.org/W3126877883"],"abstract_inverted_index":{"Purpose":[0],"Information":[1],"security":[2,44,50,163,231,248,253],"policies":[3],"(ISPs)":[4],"are":[5,76,110,208],"used":[6],"by":[7,201,222],"organizations":[8],"to":[9,58,71,105,115,220],"communicate":[10],"rules":[11],"on":[12,156,177,203,228],"the":[13,25,60,73,79,84,88,93,118,130,136,145,152,157,179,198,204,224,229,244,260,263,266,269],"use":[14],"of":[15,49,54,159,181,226,246,262],"information":[16,162,230,247,252],"systems":[17,255],"(IS).":[18],"Research":[19,170],"studies":[20],"show":[21],"that":[22,33,75,132,207,272],"compliance":[23,66,82,90,98,139,150,173,183,190,275],"with":[24,63,78,112,135,148],"ISPs":[26],"is":[27,57,268],"not":[28],"a":[29,278],"straightforward":[30],"issue":[31,199],"and":[32,92,128,151,193,251],"several":[34],"factors":[35],"influence":[36],"individual":[37,47],"behavior":[38,276],"toward":[39],"ISP":[40,65,81,89,97,138,149,172,182,189,274],"compliance,":[41],"such":[42],"as":[43],"awareness":[45,249],"or":[46],"perception":[48],"threats.":[51],"The":[52,101,142,185,215,238],"purpose":[53],"this":[55],"paper":[56,239,267],"investigate":[59],"competencies":[61,74,131,146,206],"associated":[62,77,147],"users\u2019":[64,80],"behavior.":[67,184],"Design/methodology/approach":[68],"In":[69],"order":[70],"reveal":[72],"behavior,":[83],"authors":[85,94,102,119,143,153,186],"systematically":[86],"analyze":[87,120],"literature":[91],"develop":[95],"an":[96,188],"competency":[99,191],"model.":[100],"then":[103],"target":[104],"explore":[106],"if":[107],"IS":[108,211],"users":[109],"equipped":[111],"these":[113],"competencies;":[114],"do":[116],"so,":[117],"professional":[121,167,205,235,279],"competence":[122,168,236,280],"models":[123],"from":[124,277],"various":[125],"industry":[126],"sectors":[127],"compare":[129],"they":[133],"include":[134],"developed":[137],"competencies.":[140],"Findings":[141],"identify":[144],"provide":[154],"evidence":[155],"lack":[158,225],"attention":[160,227],"in":[161,166,196,234,256],"responsibilities":[164,232],"demonstrated":[165,233],"frameworks.":[169,237],"limitations/implications":[171],"research":[174],"has":[175],"focused":[176],"identifying":[178],"antecedents":[180],"offer":[187,217],"model":[192],"guide":[194],"researchers":[195],"investigating":[197],"further":[200],"focusing":[202],"necessary":[209],"for":[210,243],"users.":[212],"Practical":[213],"implications":[214,242],"findings":[216],"new":[218],"contributions":[219],"practitioners":[221],"highlighting":[223],"also":[240],"provides":[241],"design":[245],"programs":[250],"management":[254],"organizations.":[257],"Originality/value":[258],"To":[259],"best":[261],"authors\u2019":[264],"knowledge,":[265],"first":[270],"study":[271],"addresses":[273],"perspective.":[281]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
