{"id":"https://openalex.org/W2609377184","doi":"https://doi.org/10.1108/ics-04-2017-0020","title":"Factors in an end user security expertise instrument","display_name":"Factors in an end user security expertise instrument","publication_year":2017,"publication_date":"2017-04-27","ids":{"openalex":"https://openalex.org/W2609377184","doi":"https://doi.org/10.1108/ics-04-2017-0020","mag":"2609377184"},"language":"en","primary_location":{"id":"doi:10.1108/ics-04-2017-0020","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2017-0020","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068816674","display_name":"Prashanth Rajivan","orcid":"https://orcid.org/0000-0001-8596-085X"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]},{"id":"https://openalex.org/I4210133369","display_name":"Decision Sciences (United States)","ror":"https://ror.org/03gcvf773","country_code":"US","type":"company","lineage":["https://openalex.org/I4210133369"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Prashanth Rajivan","raw_affiliation_strings":["Social and Decision Sciences, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Social and Decision Sciences, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA","institution_ids":["https://openalex.org/I4210133369","https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025254339","display_name":"Pablo Moriano","orcid":"https://orcid.org/0000-0002-1822-8885"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pablo Moriano","raw_affiliation_strings":["School of Computing and Informatics, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing and Informatics, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110580831","display_name":"Timothy Kelley","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Timothy Kelley","raw_affiliation_strings":["Psychological and Brain Sciences, Indiana University Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Psychological and Brain Sciences, Indiana University Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057479145","display_name":"L. Jean Camp","orcid":"https://orcid.org/0000-0001-8731-7884"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"L. Jean Camp","raw_affiliation_strings":["School of Computing and Informatics, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing and Informatics, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068816674"],"corresponding_institution_ids":["https://openalex.org/I4210133369","https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":13.545,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.98400888,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"25","issue":"2","first_page":"190","last_page":"205"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6335871815681458},{"id":"https://openalex.org/keywords/operationalization","display_name":"Operationalization","score":0.5534319877624512},{"id":"https://openalex.org/keywords/human-computer-interaction-in-information-security","display_name":"Human-computer interaction in information security","score":0.5132884383201599},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.45497700572013855},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.443971186876297},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.4401247203350067},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.43607014417648315},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.43136149644851685},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.42288583517074585},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4226570725440979},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.42142999172210693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3819570541381836},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3632003664970398},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.29839813709259033},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.2696874141693115},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13663652539253235},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11950534582138062},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09595504403114319},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.07575133442878723}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6335871815681458},{"id":"https://openalex.org/C9354725","wikidata":"https://www.wikidata.org/wiki/Q286017","display_name":"Operationalization","level":2,"score":0.5534319877624512},{"id":"https://openalex.org/C6353995","wikidata":"https://www.wikidata.org/wiki/Q17027910","display_name":"Human-computer interaction in information security","level":5,"score":0.5132884383201599},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.45497700572013855},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.443971186876297},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.4401247203350067},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.43607014417648315},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43136149644851685},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.42288583517074585},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4226570725440979},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.42142999172210693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3819570541381836},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3632003664970398},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.29839813709259033},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.2696874141693115},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13663652539253235},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11950534582138062},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09595504403114319},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.07575133442878723},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-04-2017-0020","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2017-0020","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.6200000047683716,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W84489289","https://openalex.org/W102466641","https://openalex.org/W1463518955","https://openalex.org/W1499166245","https://openalex.org/W1522631070","https://openalex.org/W1553243973","https://openalex.org/W1900909751","https://openalex.org/W1944720853","https://openalex.org/W1964088509","https://openalex.org/W1967042038","https://openalex.org/W1967282980","https://openalex.org/W1968533893","https://openalex.org/W1970230220","https://openalex.org/W1990857471","https://openalex.org/W1996854164","https://openalex.org/W2022122406","https://openalex.org/W2025043113","https://openalex.org/W2029699977","https://openalex.org/W2048584594","https://openalex.org/W2050618934","https://openalex.org/W2055873213","https://openalex.org/W2081046118","https://openalex.org/W2099789718","https://openalex.org/W2100566540","https://openalex.org/W2113583180","https://openalex.org/W2124553623","https://openalex.org/W2133800002","https://openalex.org/W2156438052","https://openalex.org/W2159397557","https://openalex.org/W2162532690","https://openalex.org/W2163241745","https://openalex.org/W2163322071","https://openalex.org/W2168620475","https://openalex.org/W2174896420","https://openalex.org/W2235413064","https://openalex.org/W2291435189","https://openalex.org/W2403516514","https://openalex.org/W2626045401","https://openalex.org/W3007481613","https://openalex.org/W4229833068","https://openalex.org/W4251147371"],"related_works":["https://openalex.org/W3197652951","https://openalex.org/W2953227786","https://openalex.org/W2107554062","https://openalex.org/W2092708554","https://openalex.org/W3199374449","https://openalex.org/W2061716669","https://openalex.org/W2065250680","https://openalex.org/W2349271268","https://openalex.org/W2099222119","https://openalex.org/W1993850146"],"abstract_inverted_index":{"Purpose":[0],"The":[1],"purpose":[2],"of":[3,24,81,105,116,168,184],"this":[4,175,224],"study":[5],"is":[6],"to":[7,56,87,102,126,180,191,202,228],"identify":[8,57],"factors":[9,59,111,140,214],"that":[10,60,132,141,188,215,245],"determine":[11],"computer":[12,92,128,143,151,154,169],"and":[13,27,32,51,93,109,120,129,137,146,158,162,197,260],"security":[14,31,42,94,108,117,130,156,160,185,217,240,246,257],"expertise":[15,43,62,131,195,218,247],"in":[16,29,63,112,219],"end":[17,64,220,250],"users.":[18,65,221],"They":[19],"can":[20,177],"be":[21,134,178],"significant":[22],"determinants":[23,167],"human":[25],"behaviour":[26],"interactions":[28],"the":[30,72,89,106,182],"privacy":[33],"context.":[34],"Standardized,":[35],"externally":[36],"valid":[37],"instruments":[38],"for":[39,235,249],"measuring":[40],"end-user":[41],"are":[44,124,164],"non-existent.":[45],"Design/methodology/approach":[46],"A":[47],"questionnaire":[48],"encompassing":[49],"skills":[50,145],"knowledge-based":[52],"questions":[53],"was":[54,69,85],"developed":[55],"critical":[58],"constitute":[61,142,216],"Exploratory":[66],"factor":[67],"analysis":[68,84],"applied":[70,86,101],"on":[71,239],"results":[73],"from":[74,77,174,223],"898":[75],"participants":[76],"a":[78,230],"wide":[79],"range":[80],"populations.":[82],"Cluster":[83],"characterize":[88],"relationship":[90],"between":[91],"expertise.":[95,170,241],"Ordered":[96],"logistic":[97],"regression":[98],"models":[99],"were":[100,226],"measure":[103,253],"efficacy":[104],"proposed":[107],"computing":[110],"predicting":[113],"user":[114,251],"comprehension":[115],"concepts:":[118],"phishing":[119],"certificates.":[121],"Findings":[122,173,222],"There":[123],"levels":[125,196],"peoples\u2019":[127],"could":[133],"reasonably":[135],"measured":[136],"operationalized.":[138],"Four":[139],"security-related":[144],"knowledge":[147,157],"are,":[148],"namely,":[149],"basic":[150],"skills,":[152,155,161,258],"advanced":[153,159],"these":[163],"identified":[165,212],"as":[166],"Practical":[171],"implications":[172],"work":[176,211,225,243],"used":[179],"guide":[181],"design":[183],"interfaces":[186],"such":[187],"it":[189],"caters":[190],"people":[192],"with":[193],"different":[194],"does":[198],"not":[199],"force":[200],"users":[201],"exercise":[203],"more":[204],"cognitive":[205,255],"processes":[206],"than":[207],"required.":[208],"Originality/value":[209],"This":[210,242],"four":[213],"integrated":[227],"propose":[229],"framework":[231],"called":[232],"Security":[233],"SRK":[234],"guiding":[236],"further":[237],"research":[238],"posits":[244],"instrument":[248],"should":[252],"three":[254],"dimensions:":[256],"rules":[259],"knowledge.":[261]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
