{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:28:42Z","timestamp":1756992522243,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030574031"},{"type":"electronic","value":"9783030574048"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57404-8_22","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:20:00Z","timestamp":1597965600000},"page":"289-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SMEs\u2019 Confidentiality Concerns for Security Information Sharing"],"prefix":"10.1007","author":[{"given":"Alireza","family":"Shojaifar","sequence":"first","affiliation":[]},{"given":"Samuel A.","family":"Fricker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"22_CR1","unstructured":"Cranor, L.F.: A framework for reasoning about the human in the loop. In: 1st Conference on Usability, Psychology and Security. San Francisco, CA, USA (2008)"},{"key":"22_CR2","unstructured":"Shojaifar, A., Fricker, S., Gwerder, M.: Elicitation of SME requirements for cybersecurity solutions by studying adherence to recommendations. In: REFSQ Workshops (2018)"},{"key":"22_CR3","unstructured":"Lewis, R., Louvieris, P., Abbott, P., Clewley, N., Jones, K.: Cybersecurity information sharing: a framework for sustainable information security management in UK SME supply chains. In: Proceedings of the European Conference on Information Systems (ECIS) (2014)"},{"issue":"1","key":"22_CR4","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1037\/0003-066X.55.1.68","volume":"55","author":"RM Ryan","year":"2000","unstructured":"Ryan, R.M., Deci, E.L.: Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. Am. Psychol. 55(1), 68\u201378 (2000)","journal-title":"Am. Psychol."},{"issue":"4","key":"22_CR5","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1037\/0021-9010.74.4.580","volume":"74","author":"EL Deci","year":"1989","unstructured":"Deci, E.L., Connell, J.P., Ryan, R.M.: Self-determination in a work organisation. J. Appl. Psychol. 74(4), 580\u2013590 (1989)","journal-title":"J. Appl. Psychol."},{"issue":"6","key":"22_CR6","doi-asserted-by":"publisher","first-page":"3038","DOI":"10.1016\/j.chb.2006.09.001","volume":"23","author":"KM Christopherson","year":"2007","unstructured":"Christopherson, K.M.: The positive and negative implications of anonymity in Internet social interactions: \u2018\u2018On the Internet, Nobody Knows You\u2019re a Dog\u2019\u2019. Comput. Hum. Behav. 23(6), 3038\u20133056 (2007)","journal-title":"Comput. Hum. Behav."},{"key":"22_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-2271-7","volume-title":"Intrinsic Motivation and Self-determination in Human Behaviour","author":"EL Deci","year":"1985","unstructured":"Deci, E.L., Ryan, R.M.: Intrinsic Motivation and Self-determination in Human Behaviour. Plenum Publishing Co, New York (1985)"},{"issue":"6","key":"22_CR8","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/S0305-0483(00)00021-9","volume":"28","author":"D Gefen","year":"2000","unstructured":"Gefen, D.: E-Commerce: The role of familiarity and trust. Omega 28(6), 725\u2013737 (2000)","journal-title":"Omega"},{"key":"22_CR9","unstructured":"Robinson, N., Disley, E.: Incentives and challenges for information sharing in the context of network and information security. In: European Network and Information Security Agency (ENISA) (2010)"},{"key":"22_CR10","volume-title":"Case Study Research: Design and Methods","author":"RK Yin","year":"2009","unstructured":"Yin, R.K.: Case Study Research: Design and Methods. Sage, Thousand Oaks, CA (2009)"},{"issue":"5\/6","key":"22_CR11","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1108\/09576050210447037","volume":"15","author":"SM Furnell","year":"2002","unstructured":"Furnell, S.M., Gennatou, M., Dowland, P.S.: A prototype tool for information security awareness and training. Log. Inf. Manag. 15(5\/6), 352\u2013357 (2002)","journal-title":"Log. Inf. Manag."},{"key":"22_CR12","unstructured":"Muller, P., Julius, J., Herr, D., Koch, L., Peycheva, V., McKiernan, S.: Annual report on European SMEs 2016\/2017: Focus on self-employment. European Commission (2017)"},{"issue":"4","key":"22_CR13","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1108\/09685220510614425","volume":"13","author":"A Gupta","year":"2005","unstructured":"Gupta, A., Hammond, R.: Information systems security issues and decisions for small businesses. Inf. Manag. Comput. Secur. 13(4), 297\u2013310 (2005)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"22_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034","volume-title":"Case Study Research in Software Engineering - Guidelines and Examples","author":"P Runeson","year":"2012","unstructured":"Runeson, P., H\u00f6st, M., Rainer, A., Regnell, B.: Case Study Research in Software Engineering - Guidelines and Examples. Wiley, Hoboken (2012)"},{"issue":"8","key":"22_CR15","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.cose.2011.08.004","volume":"30","author":"K-KR Choo","year":"2011","unstructured":"Choo, K.-K.R.: The cyber threat landscape: Challenges and future research directions. Comput. Secur. 30(8), 719\u2013731 (2011)","journal-title":"Comput. Secur."},{"issue":"4","key":"22_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1330311.1330320","volume":"51","author":"R West","year":"2008","unstructured":"West, R.: The psychology of security. CACM 51(4), 34\u201340 (2008)","journal-title":"CACM"},{"issue":"3","key":"22_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(15)30017-8","volume":"2015","author":"T Kurpjuhn","year":"2015","unstructured":"Kurpjuhn, T.: The SME security challenge. Comput. Fraud Secur. 2015(3), 5\u20137 (2015)","journal-title":"Comput. Fraud Secur."},{"issue":"2","key":"22_CR18","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/isre.1050.0053","volume":"16","author":"E Gal-Or","year":"2005","unstructured":"Gal-Or, E., Chose, A.: The economic incentives for sharing security information. Inf. Syst. Res. 16(2), 186\u2013208 (2005)","journal-title":"Inf. Syst. Res."},{"issue":"8","key":"22_CR19","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","volume":"28","author":"H Rhee","year":"2009","unstructured":"Rhee, H., Kim, C., Ryu, Y.: Self-efficacy in information security: It\u2019s influence on end users\u2019 information security practice behavior. Comput. Secur. 28(8), 816\u2013826 (2009)","journal-title":"Comput. Secur."},{"issue":"4","key":"22_CR20","doi-asserted-by":"publisher","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"P Puhakainen","year":"2010","unstructured":"Puhakainen, P., Siponen, M.: Improving employees\u2019 compliance through information systems security training: an action research study. MIS Q. 34(4), 757\u2013778 (2010)","journal-title":"MIS Q."},{"key":"22_CR21","unstructured":"Bedrijfsrevisoren, D., Muynck, J.D., Portesi, S.: Cyber security information sharing: An overview of regulatory and non-regulatory approaches. In: The European Union Agency for Network and Information Security (ENISA) (2015)"},{"key":"22_CR22","unstructured":"Beebe, N.L., Rao, V.S.: Examination of organizational information security strategy: A pilot study. In: Americas Conference on Information Systems (AMCIS), USA (2009)"},{"key":"22_CR23","unstructured":"Birk\u00e1s, B., Bourgue, R.: EISAS-european information sharing and alerting system. In: European Union Agency for Network and Information Security (2013)"},{"key":"22_CR24","unstructured":"Osborn, E.: Business versus technology: Sources of the perceived lack of cyber security in SMEs. In: The 1st International Conference on Cyber Security for Sustainable Society (2014)"},{"issue":"2","key":"22_CR25","doi-asserted-by":"publisher","first-page":"379","DOI":"10.5465\/amr.1995.9507312923","volume":"20","author":"LT Hosmer","year":"1995","unstructured":"Hosmer, L.T.: Trust: The connecting link between organisational theory and philosophical ethics. Acad. Manag. Rev. 20(2), 379\u2013403 (1995)","journal-title":"Acad. Manag. Rev."},{"issue":"11","key":"22_CR26","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1080\/0144929X.2012.702355","volume":"31","author":"C Yoon","year":"2012","unstructured":"Yoon, C., Rolland, E.: Knowledge-sharing in virtual communities: familiarity, anonymity and self-determination theory. Behav. Inf. Tech. 31(11), 1133\u20131143 (2012)","journal-title":"Behav. Inf. Tech."},{"key":"22_CR27","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/S0065-2601(08)60019-2","volume":"29","author":"RJ Vallerand","year":"1997","unstructured":"Vallerand, R.J.: Toward a hierarchical model of intrinsic and extrinsic motivation. Adv. Exp. Soc. Psychol. 29, 271\u2013360 (1997)","journal-title":"Adv. Exp. Soc. Psychol."},{"issue":"1","key":"22_CR28","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.im.2010.11.001","volume":"48","author":"HH Chang","year":"2011","unstructured":"Chang, H.H., Chuang, S.: Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator. Inf. Manag. 48(1), 9\u201318 (2011)","journal-title":"Inf. Manag."},{"issue":"2","key":"22_CR29","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0092-6566(85)90023-6","volume":"19","author":"EL Deci","year":"1985","unstructured":"Deci, E.L., Ryan, R.M.: The General Causality Orientations Scale: Self-determination in personality. J. Res. Pers. 19(2), 109\u2013134 (1985)","journal-title":"J. Res. Pers."},{"issue":"4","key":"22_CR30","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSECP.2003.1219053","volume":"1","author":"D Geer Jr","year":"2003","unstructured":"Geer Jr., D., Hoo, K.S., Jaquith, A.: Information security: Why the future belongs to the quants. IEEE Secur. Priv. 1(4), 24\u201332 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR31","unstructured":"European Commission. What is an SME? https:\/\/ec.europa.eu\/growth\/smes\/business-friendly-environment\/sme-definition_en"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57404-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T12:41:57Z","timestamp":1724330517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57404-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030574031","9783030574048"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57404-8_22","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene, Lesbos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The symposium was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}