{"id":"https://openalex.org/W2801344188","doi":"https://doi.org/10.1145/3183586.3183590","title":"Fear of cybercrime and the compliance with information security policies","display_name":"Fear of cybercrime and the compliance with information security policies","publication_year":2018,"publication_date":"2018-01-11","ids":{"openalex":"https://openalex.org/W2801344188","doi":"https://doi.org/10.1145/3183586.3183590","mag":"2801344188"},"language":"en","primary_location":{"id":"doi:10.1145/3183586.3183590","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3183586.3183590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on E-Education, E-Business, E-Management and E-Learning","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016342784","display_name":"Jaffar Ahmad Alalwan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jaffar Ahmad Alalwan","raw_affiliation_strings":["Institute of Public Administration, Dammam, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Institute of Public Administration, Dammam, Saudi Arabia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5016342784"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7854,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79635233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"85","last_page":"87"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11076","display_name":"Policing Practices and Perceptions","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.9225085377693176},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.6905796527862549},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6483193635940552},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.516878604888916},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5036558508872986},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4619147777557373},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18230149149894714},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.14243024587631226},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10957923531532288},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.06369951367378235}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.9225085377693176},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.6905796527862549},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6483193635940552},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.516878604888916},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5036558508872986},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4619147777557373},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18230149149894714},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.14243024587631226},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10957923531532288},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.06369951367378235}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3183586.3183590","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3183586.3183590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on E-Education, E-Business, E-Management and E-Learning","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W199221083","https://openalex.org/W594525150","https://openalex.org/W1502213794","https://openalex.org/W1545697807","https://openalex.org/W1578929691","https://openalex.org/W1994213885","https://openalex.org/W1995409817","https://openalex.org/W2007545270","https://openalex.org/W2036389121","https://openalex.org/W2099697766","https://openalex.org/W2136487122","https://openalex.org/W2148826680","https://openalex.org/W2156619121","https://openalex.org/W2610174895","https://openalex.org/W3111792730","https://openalex.org/W6649078595","https://openalex.org/W6737070299"],"related_works":["https://openalex.org/W2338899373","https://openalex.org/W199254545","https://openalex.org/W2997836625","https://openalex.org/W4252285266","https://openalex.org/W4244102749","https://openalex.org/W111175386","https://openalex.org/W2476504758","https://openalex.org/W4248464163","https://openalex.org/W1937580673","https://openalex.org/W4210648132"],"abstract_inverted_index":{"While":[0],"crimes":[1],"and":[2,10,65,84],"cybercrimes":[3],"have":[4],"huge":[5],"impact":[6],"on":[7,26,50,59],"both":[8],"individuals":[9],"societies,":[11],"we":[12,71],"argue":[13],"that":[14,75],"the":[15,29,41,45,51,60,66,77,88],"functional":[16],"effect":[17],"of":[18,35,47,62,68,79],"cybercrime":[19,48],"fear":[20,49,61,78],"can":[21],"play":[22],"a":[23,73],"significant":[24],"role":[25],"adhering":[27],"to":[28,39,54,90],"organizational":[30],"security":[31,56,92],"policy.":[32],"The":[33],"purpose":[34],"this":[36],"paper":[37],"is":[38],"set":[40],"stage":[42],"for":[43],"examining":[44],"influence":[46],"employees'":[52],"adherence":[53,89],"information":[55,91],"policies.":[57,93],"Based":[58],"crime":[63,80,85],"literature":[64],"theory":[67],"planned":[69],"behavior,":[70],"propose":[72],"model":[74],"integrates":[76],"dimension":[81],"from":[82],"psychology":[83],"literature,":[86],"with":[87]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
