{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:24:45Z","timestamp":1742995485745,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030574031"},{"type":"electronic","value":"9783030574048"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57404-8_12","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:20:00Z","timestamp":1597965600000},"page":"144-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8951-6211","authenticated-orcid":false,"given":"Yotamu","family":"Gangire","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9777-8721","authenticated-orcid":false,"given":"Ad\u00e9le","family":"Da Veiga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1089-3925","authenticated-orcid":false,"given":"Marlien","family":"Herselman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","volume":"53","author":"NS Safa","year":"2015","unstructured":"Safa, N.S., Sookhak, M., Von Solms, R., et al.: Information security conscious care behaviour formation in organizations. Comput. Secur. 53, 65\u201378 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.05.012","journal-title":"Comput. Secur."},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1177\/1833358317700255","volume":"47","author":"N Humaidi","year":"2017","unstructured":"Humaidi, N., Balakrishnan, V.: Indirect effect of management support on users\u2019 compliance behaviour towards information security policies. Heal. Inf. Manag. J. 47, 17\u201327 (2017). https:\/\/doi.org\/10.1177\/1833358317700255","journal-title":"Heal. Inf. Manag. J."},{"key":"12_CR3","unstructured":"Pahnila, S., Karjalainen, M., Mikko, S.: Information security behavior\u202f: towards multi-stage models. In: Proceedings of the Pacific Asia Conference on Information Systems (PACIS 2013) (2013)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Mayer, P., Kunz, A., Volkamer, M.: Reliable behavioural factors in the information security context. In: Proceedings of the 12th International Conference on Availability, Reliability and Security - (ARES 2017), pp. 1\u201310 (2017)","DOI":"10.1145\/3098954.3098986"},{"key":"12_CR5","unstructured":"PricewaterhouseCoopers. The Global State of Information Security Survey 2018: PwC (2018). https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/library\/information-security-survey.html"},{"key":"12_CR6","unstructured":"Ponemon Institute: The third annual study on the state of endpoint security risk (2020). https:\/\/www.morphisec.com\/hubfs\/2020StateofEndpointSecurityFinal.pdf"},{"key":"12_CR7","unstructured":"Huang, H.W., Parolia, N., Cheng, K.T.: Willingness and ability to perform information security compliance behavior: psychological ownership and self-efficacy perspective. In: Proceedings of the Pacific Asia Conference on Information Systems (PACIS 2016) (2016)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Iriqat, Y.M., Ahlan, A.R., Nuha, N.M.A.: Information security policy perceived compliance among staff in palestine universities\u202f: an empirical pilot study. In: Proceedings of the Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 580\u2013585. IEEE (2019)","DOI":"10.1109\/JEEIT.2019.8717438"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Alaskar, M., Vodanovich, S., Shen, K.N.: Evolvement of information security research on employees\u2019 behavior: a systematic review and future direction. In: Proceedings of the 48th Hawaii International Conference on System Sciences, pp. 4241\u20134250. IEEE (2015)","DOI":"10.1109\/HICSS.2015.508"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","volume":"56","author":"G \u00d6\u011f\u00fct\u00e7\u00fc","year":"2016","unstructured":"\u00d6\u011f\u00fct\u00e7\u00fc, G., Testik, \u00d6.M., Chouseinoglou, O.: Analysis of personal information security behavior and awareness. Comput. Secur. 56, 83\u201393 (2016). https:\/\/doi.org\/10.1016\/j.cose.2015.10.002","journal-title":"Comput. Secur."},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","volume":"51","author":"P Ifinedo","year":"2013","unstructured":"Ifinedo, P.: Information systems security policy compliance: an empirical study of the effects of socialization, influence, and cognition. Inf. Manag. 51, 69\u201379 (2013)","journal-title":"Inf. Manag."},{"key":"12_CR12","unstructured":"Kranz, J.J., Haeussinger, F.J.: Why deterrence is not enough\u202f: The role of endogenous motivations on employees\u2019 information security behavior. In: Proceedings of the 35th International Conference on Information Systems, pp. 1\u201314. IEEE (2014)"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., et al.: Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur. 42, 165\u2013176 (2014). https:\/\/doi.org\/10.1016\/j.cose.2013.12.003","journal-title":"Comput. Secur."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Gangire, Y., Da Veiga, A., Herselman, M.: A conceptual model of information security compliant behaviour based on the self-determination theory. In: Proceedings of the 2019 Conference on Information Communications Technology and Society, (ICTAS). IEEE (2019)","DOI":"10.1109\/ICTAS.2019.8703629"},{"key":"12_CR15","unstructured":"Pattinson, M., Butavicius, M., Parsons, K., et al.: Examining attitudes toward information security behaviour using mixed methods. In: Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance (HAISA). pp. 57\u201370 (2015)"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.cose.2012.10.003","volume":"32","author":"KH Guo","year":"2013","unstructured":"Guo, K.H.: Security-related behavior in using information systems in the workplace: a review and synthesis. Comput. Secur. 32, 242\u2013251 (2013). https:\/\/doi.org\/10.1016\/j.cose.2012.10.003","journal-title":"Comput. Secur."},{"key":"12_CR17","unstructured":"Blythe, J.M., Coventry, L., Little, L.: Unpacking security policy compliance\u202f: the motivators and barriers of employees\u2019 security behaviors. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Ottawa, pp. 103\u2013122 (2015)"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"479","DOI":"10.4301\/S1807-17752016000300007","volume":"13","author":"RH Klein","year":"2016","unstructured":"Klein, R.H., Luciano, E.M.: What influences information security behavior? A study with brazilian users. J. Inf. Syst. Technol. Manag. 13, 479\u2013496 (2016). https:\/\/doi.org\/10.4301\/S1807-17752016000300007","journal-title":"J. Inf. Syst. Technol. Manag."},{"key":"12_CR19","unstructured":"Alfawaz, S., Nelson, K., Mohannak, K.: Information security culture\u202f: a behaviour compliance conceptual framework. In: Proceedings of the 8th Australasian Information Security Conference (AISC), pp. 47\u201355 (2010)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Ahmad, Z., Norhashim, M., Song, O.T., Hui, L.T.: A typology of employees\u2019 information security behaviour. In: Proceedings of the 4th International Conference on Information and Communication Technology, pp. 3\u20136 (2016)","DOI":"10.1109\/ICoICT.2016.7571929"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Alohali, M., Clarke, N., Furnell, S., Albakri, S.: Information security behavior: recognizing the influencers. In: Proceedings of the Computing Conference, pp. 844\u2013853 (2017)","DOI":"10.1109\/SAI.2017.8252194"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1037\/0003-066X.55.1.68","volume":"55","author":"MR Ryan","year":"2000","unstructured":"Ryan, M.R., Deci, L.E.: Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. Am. Psychol. 55, 68\u201378 (2000)","journal-title":"Am. Psychol."},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4419-1005-9_1620","volume-title":"Encyclopedia of Personality and Individual Differences","author":"L Legault","year":"2017","unstructured":"Legault, L.: Self determination theory. In: Zeigler-Hill, V., Shackelford, T.K. (eds.) Encyclopedia of Personality and Individual Differences, pp. 1\u20139. Springer, New York (2017). https:\/\/doi.org\/10.1007\/978-1-4419-1005-9_1620"},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.cose.2015.01.002","volume":"49","author":"J Shropshire","year":"2015","unstructured":"Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177\u2013191 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.01.002","journal-title":"Comput. Secur."},{"key":"12_CR25","unstructured":"Calic, D., Pattinson, M., Parsons, K., et al.: Na\u00efve and accidental behaviours that compromise information security\u202f: what the experts think. In: Proceedings of the 10th International Symposium on Human Aspects of Information Security & Assurance (HAISA), pp. 12\u201321 (2016)"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.im.2017.01.003","volume":"54","author":"F B\u00e9langer","year":"2017","unstructured":"B\u00e9langer, F., Collignon, S., Enget, K., Negangard, E.: Determinants of early conformance with information security policies. Inf. Manag. 54, 887\u2013901 (2017). https:\/\/doi.org\/10.1016\/j.im.2017.01.003","journal-title":"Inf. Manag."},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.cose.2017.04.009","volume":"68","author":"S Bauer","year":"2017","unstructured":"Bauer, S., Bernroider, E.W.N., Chudzikowski, K.: Prevention is better than cure! Designing information security awareness programs to overcome users\u2019 non-compliance with information security policies in banks. Comput. Secur. 68, 145\u2013159 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.04.009","journal-title":"Comput. Secur."},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/3210530.3210535","volume":"49","author":"M Curry","year":"2018","unstructured":"Curry, M., Marshall, B., Crossler, R.E., Correia, J.: InfoSec Process Action Model (IPAM): Systematically addressing individual security behavior. Database Adv. Inf. Syst. 49, 49\u201366 (2018). https:\/\/doi.org\/10.1145\/3210530.3210535","journal-title":"Database Adv. Inf. Syst."},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1108\/ICS-11-2016-0089","volume":"25","author":"S Aurigemma","year":"2017","unstructured":"Aurigemma, S., Mattson, T.: Deterrence and punishment experience impacts on ISP compliance attitudes. Inf. Comput. Secur. 25, 421\u2013436 (2017). https:\/\/doi.org\/10.1108\/ICS-11-2016-0089","journal-title":"Inf. Comput. Secur."},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Swartz, P., Da Veiga, A., Martins, N.: A conceptual privacy governance framework. In: Proceeding of the 2019 Conference on Information Communications Technology and Society (ICTAS), pp. 1\u20136 (2019)","DOI":"10.1109\/ICTAS.2019.8703636"},{"key":"12_CR31","unstructured":"NIST Security and privacy controls for federal information systems and organizations: National Institute of Standards and Technology (2017)"},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-4302-6356-2_3","volume-title":"The Privacy Engineer\u2019s Manifesto","author":"MF Dennedy","year":"2014","unstructured":"Dennedy, M.F., Fox, J., Finneran, T.R.: Data and privacy governance concepts. The Privacy Engineer\u2019s Manifesto, pp. 51\u201372. Apress, New York (2014)"},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., et al.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40\u201351 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.01.004","journal-title":"Comput. Secur."},{"key":"12_CR34","volume-title":"Researching Information Systems and Computing","author":"BJ Oates","year":"2006","unstructured":"Oates, B.J.: Researching Information Systems and Computing. Sage, London (2006)"},{"key":"12_CR35","volume-title":"Research Methods for Business Students","author":"M Saunders","year":"2016","unstructured":"Saunders, M., Lewis, P., Thornhill, A.: Research Methods for Business Students, 7th edn. Pearson Education Limited, Essex (2016)","edition":"7"},{"key":"12_CR36","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.cose.2014.12.006","volume":"49","author":"A Da Veiga","year":"2015","unstructured":"Da Veiga, A., Martins, N.: Improving the information security culture through monitoring and implementation actions illustrated through a case study. Comput. Secur. 49, 162\u2013176 (2015). https:\/\/doi.org\/10.1016\/j.cose.2014.12.006","journal-title":"Comput. Secur."},{"key":"12_CR37","doi-asserted-by":"publisher","first-page":"79","DOI":"10.20982\/tqmp.09.2.p079","volume":"9","author":"AG Yong","year":"2013","unstructured":"Yong, A.G., Pearce, S.: A beginner\u2019 s guide to factor analysis: focusing on exploratory factor analysis. Tutor. Quant. Methods Psychol. 9, 79\u201394 (2013)","journal-title":"Tutor. Quant. Methods Psychol."},{"key":"12_CR38","first-page":"1","volume":"8","author":"B Williams","year":"2010","unstructured":"Williams, B., Onsman, A., Brown, T.: Exploratory factor analysis: a five-step guide for novices. J. Emerg. Prim. Heal. Care 8, 1\u201313 (2010)","journal-title":"J. Emerg. Prim. Heal. Care"},{"key":"12_CR39","volume-title":"A Step-By-Step Approach to Using SAS for Factor Analysis and Structural Equation","author":"N O\u2019Rourke","year":"2013","unstructured":"O\u2019Rourke, N., Hatcher, L.: A Step-By-Step Approach to Using SAS for Factor Analysis and Structural Equation. SAS Institute, Cary (2013)"},{"key":"12_CR40","volume-title":"Discovering Statistics Using SPSS","author":"A Field","year":"2009","unstructured":"Field, A.: Discovering Statistics Using SPSS, 3rd edn. Sage, London (2009)","edition":"3"},{"key":"12_CR41","unstructured":"Gerber, H., Hall, N.: Quantitative research design. In: Data Acquisition - 1 day. HR Statistics, Pretoria (2017)"},{"key":"12_CR42","volume-title":"Applied Multivariate Statistics for the Social Sciences","author":"JP Stevens","year":"2002","unstructured":"Stevens, J.P.: Applied Multivariate Statistics for the Social Sciences, 4th edn. Erlbaum, Hillsdale (2002)","edition":"4"},{"key":"12_CR43","volume-title":"Essentials of Research Design and Methodology","author":"G Marczyk","year":"2005","unstructured":"Marczyk, G., Fertinger, D., DeMatteo, D.: Essentials of Research Design and Methodology. Wiley, Hoboken (2005)"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57404-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T12:40:18Z","timestamp":1724330418000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57404-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030574031","9783030574048"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57404-8_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene, Lesbos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The symposium was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}