{"id":"https://openalex.org/W2042720915","doi":"https://doi.org/10.1145/1595676.1595684","title":"The compliance budget","display_name":"The compliance budget","publication_year":2008,"publication_date":"2008-09-22","ids":{"openalex":"https://openalex.org/W2042720915","doi":"https://doi.org/10.1145/1595676.1595684","mag":"2042720915"},"language":"en","primary_location":{"id":"doi:10.1145/1595676.1595684","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1595676.1595684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 New Security Paradigms Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040188332","display_name":"Adam Beautement","orcid":null},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Adam Beautement","raw_affiliation_strings":["University College London, Malet Place, London","University College London, Malet Place, London#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University College London, Malet Place, London","institution_ids":["https://openalex.org/I45129253"]},{"raw_affiliation_string":"University College London, Malet Place, London#TAB#","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108226584","display_name":"M. Angela Sasse","orcid":"https://orcid.org/0000-0003-1823-5505"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"M. Angela Sasse","raw_affiliation_strings":["University College London, Malet Place, London","University College London, Malet Place, London#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University College London, Malet Place, London","institution_ids":["https://openalex.org/I45129253"]},{"raw_affiliation_string":"University College London, Malet Place, London#TAB#","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041683470","display_name":"Mike Wonham","orcid":null},"institutions":[{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mike Wonham","raw_affiliation_strings":["Hewlett-Packard Labs, Bristol"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Hewlett-Packard Labs, Bristol","institution_ids":["https://openalex.org/I1324840837"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040188332"],"corresponding_institution_ids":["https://openalex.org/I45129253"],"apc_list":null,"apc_paid":null,"fwci":21.0042,"has_fulltext":false,"cited_by_count":287,"citation_normalized_percentile":{"value":0.9919077,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"47","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.7801024913787842},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6664049625396729},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.5362737774848938},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.46271559596061707},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.34502941370010376},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.15558600425720215},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07512849569320679}],"concepts":[{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.7801024913787842},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6664049625396729},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.5362737774848938},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.46271559596061707},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.34502941370010376},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.15558600425720215},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07512849569320679},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1595676.1595684","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1595676.1595684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 New Security Paradigms Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W102566232","https://openalex.org/W142213678","https://openalex.org/W1485200701","https://openalex.org/W1983424002","https://openalex.org/W2000117884","https://openalex.org/W2000431168","https://openalex.org/W2028171449","https://openalex.org/W2037202491","https://openalex.org/W2084044852","https://openalex.org/W2097457752","https://openalex.org/W2123508202","https://openalex.org/W2132317998","https://openalex.org/W2136773629","https://openalex.org/W2303413189","https://openalex.org/W2402859497","https://openalex.org/W2739383818","https://openalex.org/W2912944677","https://openalex.org/W2914982603","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2982321410","https://openalex.org/W95465806","https://openalex.org/W2392004567","https://openalex.org/W2046296964","https://openalex.org/W2940029036","https://openalex.org/W2756595502","https://openalex.org/W2010789764","https://openalex.org/W2187233292","https://openalex.org/W2219281195"],"abstract_inverted_index":{"A":[0],"significant":[1],"number":[2],"of":[3,40,91,118,127,137,181],"security":[4,13,23,37,50,71,131,140,152,183],"breaches":[5],"result":[6],"from":[7,58],"employees'":[8],"failure":[9],"to":[10,19,47,93,102,144],"comply":[11,69],"with":[12,55,70,129],"policies.":[14,72],"Many":[15],"organizations":[16],"have":[17],"tried":[18],"change":[20],"or":[21,67],"influence":[22,145,151],"behaviour,":[24],"but":[25],"found":[26],"it":[27],"a":[28,44,107,116,135,177],"major":[29,60],"challenge.":[30],"Drawing":[31],"on":[32,35],"previous":[33],"research":[34],"usable":[36],"and":[38,86,89,97,100,125,133,160,174],"economics":[39],"security,":[41],"we":[42],"propose":[43],"new":[45,108],"approach":[46],"managing":[48],"employee":[49],"behaviour.":[51],"We":[52,105],"conducted":[53],"interviews":[54],"17":[56],"employees":[57],"two":[59],"commercial":[61],"organizations,":[62],"asking":[63],"why":[64],"they":[65],"do":[66],"don't":[68],"Our":[73],"results":[74],"show":[75],"that":[76,139],"key":[77],"factors":[78],"in":[79,149,162],"the":[80,84,94,103,111,123,163],"compliance":[81,92,128,171],"decision":[82],"are":[83],"actual":[85],"anticipated":[87],"cost":[88,99],"benefits":[90,101,126],"individual":[95],"employee,":[96],"perceived":[98],"organization.":[104],"present":[106],"paradigm":[109],"--":[110],"Compliance":[112,155],"Budget":[113,156],"-":[114],"as":[115,166,170],"means":[117],"understanding":[119],"how":[120],"individuals":[121],"perceive":[122],"costs":[124],"organisational":[130,182],"goals,":[132],"identify":[134],"range":[136],"approaches":[138],"managers":[141],"can":[142,175],"use":[143],"employee's":[146],"perceptions":[147],"(which,":[148],"turn,":[150],"behaviour).":[153],"The":[154],"should":[157],"be":[158],"understood":[159],"managed":[161],"same":[164],"way":[165],"any":[167],"financial":[168],"budget,":[169],"directly":[172],"affects,":[173],"place":[176],"cap":[178],"on,":[179],"effectiveness":[180],"measures.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":12},{"year":2025,"cited_by_count":25},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":20},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":16},{"year":2017,"cited_by_count":15},{"year":2016,"cited_by_count":29},{"year":2015,"cited_by_count":23},{"year":2014,"cited_by_count":32},{"year":2013,"cited_by_count":17},{"year":2012,"cited_by_count":10}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
