{"id":"https://openalex.org/W2065416859","doi":"https://doi.org/10.1145/1655925.1655927","title":"A comparative study on structure of the motivation for information security by security incident experiences","display_name":"A comparative study on structure of the motivation for information security by security incident experiences","publication_year":2009,"publication_date":"2009-11-24","ids":{"openalex":"https://openalex.org/W2065416859","doi":"https://doi.org/10.1145/1655925.1655927","mag":"2065416859"},"language":"en","primary_location":{"id":"doi:10.1145/1655925.1655927","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1655925.1655927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066165352","display_name":"Yasuko Kanno","orcid":null},"institutions":[{"id":"https://openalex.org/I96679780","display_name":"Chuo University","ror":"https://ror.org/03qvqb743","country_code":"JP","type":"education","lineage":["https://openalex.org/I96679780"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yasuko Kanno","raw_affiliation_strings":["Chuo University, Bunkyo-ku, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Chuo University, Bunkyo-ku, Tokyo, Japan","institution_ids":["https://openalex.org/I96679780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049863813","display_name":"Masato Terada","orcid":null},"institutions":[{"id":"https://openalex.org/I96679780","display_name":"Chuo University","ror":"https://ror.org/03qvqb743","country_code":"JP","type":"education","lineage":["https://openalex.org/I96679780"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masato Terada","raw_affiliation_strings":["Chuo University, Bunkyo-ku, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Chuo University, Bunkyo-ku, Tokyo, Japan","institution_ids":["https://openalex.org/I96679780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063808469","display_name":"Hidehiro Yajima","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134060","display_name":"Information-Technology Promotion Agency","ror":"https://ror.org/034e1cb35","country_code":"JP","type":"government","lineage":["https://openalex.org/I1287223417","https://openalex.org/I4210134060"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hidehiro Yajima","raw_affiliation_strings":["Information-technology Promotion Agency (IPA), Japan"],"affiliations":[{"raw_affiliation_string":"Information-technology Promotion Agency (IPA), Japan","institution_ids":["https://openalex.org/I4210134060"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083179194","display_name":"Toshinari Kamamura","orcid":null},"institutions":[{"id":"https://openalex.org/I96679780","display_name":"Chuo University","ror":"https://ror.org/03qvqb743","country_code":"JP","type":"education","lineage":["https://openalex.org/I96679780"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toshinari Kamamura","raw_affiliation_strings":["Chuo University, Bunkyo-ku, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Chuo University, Bunkyo-ku, Tokyo, Japan","institution_ids":["https://openalex.org/I96679780"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084008792","display_name":"Norihisa Doi","orcid":null},"institutions":[{"id":"https://openalex.org/I96679780","display_name":"Chuo University","ror":"https://ror.org/03qvqb743","country_code":"JP","type":"education","lineage":["https://openalex.org/I96679780"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Norihisa Doi","raw_affiliation_strings":["Chuo University, Bunkyo-ku, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Chuo University, Bunkyo-ku, Tokyo, Japan","institution_ids":["https://openalex.org/I96679780"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5066165352"],"corresponding_institution_ids":["https://openalex.org/I96679780"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.1387973,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"9","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9624000191688538,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.7070024013519287},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6933898329734802},{"id":"https://openalex.org/keywords/affect","display_name":"Affect (linguistics)","score":0.5765906572341919},{"id":"https://openalex.org/keywords/intrinsic-motivation","display_name":"Intrinsic motivation","score":0.4750618636608124},{"id":"https://openalex.org/keywords/exploratory-factor-analysis","display_name":"Exploratory factor analysis","score":0.46334466338157654},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.42764905095100403},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4216766953468323},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39664363861083984},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3850914537906647},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.37625041604042053},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.29206204414367676},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.28275617957115173},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.23286762833595276},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2126847207546234}],"concepts":[{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.7070024013519287},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6933898329734802},{"id":"https://openalex.org/C2776035688","wikidata":"https://www.wikidata.org/wiki/Q1606558","display_name":"Affect (linguistics)","level":2,"score":0.5765906572341919},{"id":"https://openalex.org/C2985564149","wikidata":"https://www.wikidata.org/wiki/Q644302","display_name":"Intrinsic motivation","level":2,"score":0.4750618636608124},{"id":"https://openalex.org/C165957694","wikidata":"https://www.wikidata.org/wiki/Q5421350","display_name":"Exploratory factor analysis","level":3,"score":0.46334466338157654},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.42764905095100403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4216766953468323},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39664363861083984},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3850914537906647},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.37625041604042053},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.29206204414367676},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.28275617957115173},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.23286762833595276},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2126847207546234},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1655925.1655927","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1655925.1655927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1487774469","https://openalex.org/W1518638857","https://openalex.org/W2062493711","https://openalex.org/W2076425680","https://openalex.org/W2079240142","https://openalex.org/W2107420202","https://openalex.org/W2154696832","https://openalex.org/W2936723565"],"related_works":["https://openalex.org/W2385721021","https://openalex.org/W2508914475","https://openalex.org/W4310892428","https://openalex.org/W2120971814","https://openalex.org/W2777401565","https://openalex.org/W1974991139","https://openalex.org/W3154625549","https://openalex.org/W3159280571","https://openalex.org/W2248314326","https://openalex.org/W10189584"],"abstract_inverted_index":{"Clarifying":[0],"information":[1,11,30,54,87],"security":[2,31,103],"motivation":[3,51,84,96,129],"factors":[4,52,73],"and":[5,23,59,79,93,108],"their":[6,128],"structure":[7,85],"helps":[8],"to":[9],"promote":[10],"security.":[12,88],"In":[13],"this":[14],"study,":[15],"we":[16,40],"conducted":[17,41],"a":[18,48,83],"questionnaire":[19],"survey":[20],"about":[21],"drives":[22,58],"disincentives":[24],"that":[25],"affect":[26],"the":[27,34,37,65,68,122],"implementation":[28],"of":[29,50,67,71,116],"measures.":[32],"Using":[33],"answers":[35],"from":[36],"932":[38],"respondents,":[39],"Exploratory":[42],"Factor":[43],"Analysis.":[44],"The":[45],"result":[46],"showed":[47],"number":[49],"for":[53,98],"security,":[55],"including":[56],"six":[57],"five":[60],"disincentives.":[61],"We":[62,89],"also":[63],"verified":[64],"validity":[66],"structural":[69],"model":[70],"those":[72,99,105,109],"using":[74],"Structural":[75],"Equation":[76],"Modeling":[77],"(SEM)":[78],"came":[80],"up":[81],"with":[82],"concerning":[86],"further":[90],"examined":[91],"commonality":[92,126],"differences":[94,135],"in":[95,127,136],"structures":[97,130],"who":[100,106,110],"have":[101,111],"had":[102,112,125],"incidents,":[104],"haven't,":[107],"near-but-not-real":[113],"incidents.":[114],"Regardless":[115],"having":[117],"such":[118],"experience":[119],"or":[120],"not,":[121],"three":[123],"groups":[124],"but":[131],"there":[132],"were":[133],"some":[134],"individual":[137],"factors.":[138]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
