{"id":"https://openalex.org/W2921794429","doi":"https://doi.org/10.5220/0007258702050212","title":"Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour","display_name":"Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2921794429","doi":"https://doi.org/10.5220/0007258702050212","mag":"2921794429"},"language":"en","primary_location":{"id":"doi:10.5220/0007258702050212","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007258702050212","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007258702050212","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072430860","display_name":"Dirk Snyman","orcid":"https://orcid.org/0000-0001-7360-3214"},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"D. Snyman","raw_affiliation_strings":["School of Computer Science and Information Systems, North-West University, 11 Hoffman Street, Potchefstroom and South Africa, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Systems, North-West University, 11 Hoffman Street, Potchefstroom and South Africa, --- Select a Country ---","institution_ids":["https://openalex.org/I27765905"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065158139","display_name":"Hennie Kruger","orcid":"https://orcid.org/0000-0001-8514-4422"},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"H. Kruger","raw_affiliation_strings":["School of Computer Science and Information Systems, North-West University, 11 Hoffman Street, Potchefstroom and South Africa, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Systems, North-West University, 11 Hoffman Street, Potchefstroom and South Africa, --- Select a Country ---","institution_ids":["https://openalex.org/I27765905"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072430860"],"corresponding_institution_ids":["https://openalex.org/I27765905"],"apc_list":null,"apc_paid":null,"fwci":1.0174,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.81979657,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.957099974155426,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.659855842590332},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6150627732276917},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4133462607860565},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.3617713451385498},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.33089905977249146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2741873860359192},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.21511024236679077},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.11153540015220642},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08634486794471741}],"concepts":[{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.659855842590332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6150627732276917},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4133462607860565},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.3617713451385498},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.33089905977249146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2741873860359192},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.21511024236679077},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.11153540015220642},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08634486794471741},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0007258702050212","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007258702050212","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:dspace.nwu.ac.za:10394/32438","is_oa":false,"landing_page_url":"http://insticc.org/node/TechnicalProgram/icissp/presentationDetails/72587","pdf_url":null,"source":{"id":"https://openalex.org/S4306402268","display_name":"Boloka Institutional Repository (North-west University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114027177","host_organization_name":"University of North Carolina at Chapel Hill","host_organization_lineage":["https://openalex.org/I114027177"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Presentation"}],"best_oa_location":{"id":"doi:10.5220/0007258702050212","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007258702050212","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W19838944","https://openalex.org/W194527685","https://openalex.org/W296901124","https://openalex.org/W1502707211","https://openalex.org/W2010210047","https://openalex.org/W2041157860","https://openalex.org/W2075416597","https://openalex.org/W2099697766","https://openalex.org/W2140950724","https://openalex.org/W2174850379","https://openalex.org/W2575085750","https://openalex.org/W2626529610","https://openalex.org/W2766241343","https://openalex.org/W2793422791","https://openalex.org/W2801351590","https://openalex.org/W2883289607","https://openalex.org/W3122000667","https://openalex.org/W4255369429"],"related_works":["https://openalex.org/W1506342006","https://openalex.org/W1498291074","https://openalex.org/W2133519579","https://openalex.org/W2949728573","https://openalex.org/W2045947906","https://openalex.org/W3202580120","https://openalex.org/W1471978974","https://openalex.org/W2055158982","https://openalex.org/W1519792900","https://openalex.org/W2035219111","https://openalex.org/W2490465703","https://openalex.org/W2765163299","https://openalex.org/W1483830883","https://openalex.org/W2417837030","https://openalex.org/W991257793","https://openalex.org/W322117477","https://openalex.org/W2560076015","https://openalex.org/W3005685346","https://openalex.org/W1597358011","https://openalex.org/W2059169705"],"abstract_inverted_index":{"Human":[0],"behaviour":[1,21,40],"is":[2,22,31,51,88],"an":[3,26,100],"ever-present":[4],"aspect":[5],"in":[6,53,80,132],"information":[7,17,30,56,83,107,113],"security":[8,20,57,114],"and":[9,36,109,127],"requires":[10],"special":[11],"attention":[12],"when":[13],"seeking":[14],"to":[15,72,90,102],"secure":[16],"systems.":[18],"Information":[19,59],"often":[23],"based":[24,63],"on":[25,64,112,121],"informed":[27],"decision":[28],"where":[29],"obtained":[32],"by":[33,119],"previous":[34],"experience":[35],"observation":[37],"of":[38,41,48,55,82,106,124],"the":[39,46,104,122,125],"others.":[42],"In":[43],"this":[44,133],"research,":[45],"concept":[47],"sequential":[49,65,110],"decision-making":[50,75,111],"contextualised":[52],"terms":[54,81],"behaviour.":[58,115],"cascades,":[60],"which":[61],"are":[62,67,130],"decision-making,":[66],"theorised":[68],"as":[69,99],"a":[70],"model":[71],"explain":[73],"how":[74,92],"(i.e.":[76],"behaviour)":[77],"takes":[78],"place":[79],"security.":[84],"A":[85],"case":[86],"study":[87],"presented":[89,131],"illustrate":[91],"behavioural":[93],"threshold":[94],"analysis":[95],"can":[96],"be":[97],"employed":[98],"instrument":[101],"evaluate":[103],"effect":[105],"cascades":[108],"The":[116],"paper":[117],"concludes":[118],"theorising":[120],"applicability":[123],"models":[126],"approaches":[128],"that":[129],"research":[134]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
