{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:33:57Z","timestamp":1761006837913,"version":"build-2065373602"},"reference-count":24,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2010,11,18]],"date-time":"2010-11-18T00:00:00Z","timestamp":1290038400000},"content-version":"vor","delay-in-days":686,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2009,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p><jats:italic>Data Leakage Worldwide<\/jats:italic>, a 2008 research study commissioned by Cisco Systems, Inc. explored the information security behaviors of information technology (IT) users and decision makers in ten countries around the world. Based upon an online survey, the results published by Cisco Systems concluded that end users engage in risky information security behaviors that negatively impacted the companies for which the worked. The survey also revealed differences in awareness of proper security practices between end users and IT decision makers, as well as a lack of effectiveness in company security policies. One important aspect of the research was the exploration of differences in information security behaviors between respondents in different countries. While the Cisco study is important, a number of questions exist regarding the methods used, data collected, and conclusions made in the survey publications. But regardless of these critiques, the study provides a useful starting point for research into human information security behaviors.<\/jats:p>","DOI":"10.1002\/meet.2009.145046022","type":"journal-article","created":{"date-parts":[[2010,1,28]],"date-time":"2010-01-28T15:42:42Z","timestamp":1264693362000},"page":"1-16","source":"Crossref","is-referenced-by-count":1,"title":["Human information security behaviors: Differences across geographies and cultures in a global user survey"],"prefix":"10.1002","volume":"46","author":[{"given":"Lance","family":"Hayden","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,11,18]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"volume-title":"Looking for information","year":"2007","author":"Case D. O.","key":"e_1_2_6_3_1"},{"key":"e_1_2_6_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/570907.570911"},{"key":"e_1_2_6_5_1","unstructured":"Cisco Systems. (2008a).Data leakage worldwide: Common risks and mistakes employees make. Retrieved from Cisco Systems Inc. Web site:http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns170\/ns896\/ns895\/white_paper_c11\u2010499060.html."},{"key":"e_1_2_6_6_1","unstructured":"Cisco Systems. (2008b).Data leakage worldwider: The high cost of insider threats. Retrieved from Cisco Systems Inc. Web site:http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns170\/ns896\/ns895\/white_paper_c11\u2010506224.html."},{"key":"e_1_2_6_7_1","unstructured":"Cisco Systems. (2008c).Data leakage worldwide: The effectiveness of security policies. Retrieved from Cisco Systems Inc. Web site:http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns170\/ns896\/ns895\/white_paper_c11\u2010503131.html."},{"issue":"41","key":"e_1_2_6_8_1","first-page":"41","article-title":"Information needs and information\u2010seeking behavior in developing countries: A review of the research","volume":"2009","author":"Dutta R.","year":"2008","journal-title":"The International Information and Library Review"},{"key":"e_1_2_6_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"e_1_2_6_10_1","unstructured":"InsightExpress. (2008a).The challenge of data leakage for businesses and employees around the world. Retrieved from Cisco Systems Inc. Web site:http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns170\/ns896\/ns895\/Cisco_STL_Data_Leakage_2008_PR1.pdf."},{"key":"e_1_2_6_11_1","unstructured":"InsightExpress. (2008b).Data leakage worldwide: The effectiveness of corporate security policies. Retrieved from Cisco Systems Inc. Web site:http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns170\/ns896\/ns895\/Cisco_STL_Data_Leakage_2008_.pdf."},{"key":"e_1_2_6_12_1","unstructured":"InsightExpress. (2008c).Data leakage worldwide: The insider threat and the cost of data loss. Retrieved from Cisco Systems Inc. Web site:http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns170\/ns896\/ns895\/Cisco_STL_Data_Leakage_2008.pdf."},{"key":"e_1_2_6_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1994.11518019"},{"key":"e_1_2_6_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2006.12.010"},{"key":"e_1_2_6_15_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"e_1_2_6_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20249"},{"key":"e_1_2_6_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"e_1_2_6_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685229810227649"},{"key":"e_1_2_6_19_1","unstructured":"Vamosi R.(2008 September 30).Cisco study highlights data loss risks worldwide. cnet news. Retrieved fromhttp:\/\/news.cnet.com\/8301\u20101009_3\u201010054314\u201083.html."},{"issue":"4","key":"e_1_2_6_20_1","first-page":"167","article-title":"Towards information security behavioral compliance","volume":"6","author":"Vroom C.","year":"2004","journal-title":"Information Management & Computer Security"},{"key":"e_1_2_6_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0268-4012(86)90003-4"},{"key":"e_1_2_6_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(97)00028-9"},{"key":"e_1_2_6_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410610714912"},{"key":"e_1_2_6_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"e_1_2_6_25_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jibs.8490094"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.145046022","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.145046022","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2009.145046022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:15:47Z","timestamp":1760955347000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2009.145046022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["10.1002\/meet.2009.145046022"],"URL":"https:\/\/doi.org\/10.1002\/meet.2009.145046022","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2009,1]]}}}