{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:05:39Z","timestamp":1776780339551,"version":"3.51.2"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030794538","type":"print"},{"value":"9783030794545","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79454-5_2","type":"book-chapter","created":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T08:02:57Z","timestamp":1624608177000},"page":"12-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Tackling Cybersecurity Regulatory Challenges: A Proposed Research Framework"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0021-1305","authenticated-orcid":false,"given":"Angelica","family":"Marotta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9240-2573","authenticated-orcid":false,"given":"Stuart","family":"Madnick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,26]]},"reference":[{"key":"2_CR1","unstructured":"Antonialli, D., Souza Abreu, J.: InternetLab Files Amicus Brief to Microsoft Warrant Case in the US Supreme Court. InternetLab. http:\/\/www.internetlab.org.br\/en\/privacy-and-surveillance\/internetlab-files-amicus-brief-to-microsoft-warrant-case-in-the-us-supreme-court (2018). Accessed 20 Nov 2020"},{"key":"2_CR2","unstructured":"Alfawaz, S., Nelson, K., Mohannak, K.: Information security culture: a behaviour compliance conceptual framework. In: Information Security 2010: AISC 2010 Proceedings of the Eighth Australasian Conference on Information Security [Conferences in Research and Practice in Information Technology, Volume 105], pp. 51\u201360. Australian Computer Society (2010)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Aurigemma, S., Panko, R.: A composite framework for behavioral compliance with information security policies. In: 2012 45th Hawaii International Conference on System Sciences, pp. 3248\u20133257. IEEE (2012)","DOI":"10.1109\/HICSS.2012.49"},{"key":"2_CR4","unstructured":"Bartol, N., O\u2019Malley, B., Bickford, J., Coden, M.: Radically Simplifying Regulatory Compliance in Cybersecurity. Boston Consulting Group (2019). https:\/\/www.bcg.com\/en-ch\/capabilities\/technology-digital\/simplifying-compliance-in-cybersecurity.aspx. Accessed 11 Oct 2020"},{"key":"2_CR5","unstructured":"Abramatic, J.F.: Privacy bridges. In: 37th International Privacy Conference Amsterdam (2015). https:\/\/privacybridges.mit.edu\/sites\/default\/files\/documents\/PrivacyBridges-FINAL.pdf"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523\u2013548 (2010)","journal-title":"MIS Q."},{"key":"2_CR7","unstructured":"A Charter of Fundamental Rights of the European Union: Official Journal of the European Communities (2000). http:\/\/www.europarl.europa.eu\/charter\/pdf\/text_en.pdf. Accessed 10 Nov 2020"},{"key":"2_CR8","unstructured":"Financial Services Sector Cybersecurity Profile v.10: an Overview and User Guide: Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security (2018). https:\/\/www.fsscc.org\/files\/galleries\/Financial_Services_Sector_Cybersecurity_Profile_Overview_and_User_Guide_2018-10-25.pdf. Accessed 10 Nov 2020"},{"key":"2_CR9","unstructured":"GDPR and Brexit- are You Sure you are Compliant? (2018). Simplisys. https:\/\/www.simplisys.co.uk\/news\/gdpr-brexit-sure-compliant\/. Accessed 10 Nov 2020"},{"key":"2_CR10","unstructured":"Gross, G.: Update: Breach Exposes Data on 110 Million Customers, Target Now Says, Computer World (2014). https:\/\/www.computerworld.com\/article\/2487587\/update--breach-exposes-data-on-110-million-customers--target-now-says.html. Accessed 10 Nov 2020"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"G\u00fcrses, S.: Can you engineer privacy? Commun. ACM 57(8), 20\u201323 (2014). https:\/\/limo.libis.be\/primo-explore\/fulldisplay?docid=LIRIAS1662104&context=L&vid=Lirias&search_scope=Lirias&tab=default_tab&lang=en_US&fromSitemap=1","DOI":"10.1145\/2633029"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Hwang, I., Kim, D., Kim, T., Kim, S.: Why not comply with information security? An empirical approach for the causes of non-compliance. Online Information Review (2017)","DOI":"10.1108\/OIR-11-2015-0358"},{"key":"2_CR13","unstructured":"Johnson, L.: Infosecurity Europe 2017 Survey Report-GDPR. AT&T (2017). https:\/\/www.alienvault.com\/who-we-are\/press-releases\/infosecurity-europe-2017-survey-report-gdpr. Accessed 10 Nov 2020"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Julisch, K.: Security compliance: the next frontier in security research. In: Proceedings of the 2008 New Security Paradigms Workshop, pp. 71\u201374 (2008)","DOI":"10.1145\/1595676.1595687"},{"key":"2_CR15","unstructured":"Krebs, B.: Transcription Service Leaked Medical Records. Krebson Security (2018). https:\/\/krebsonsecurity.com\/2018\/04\/transcription-service-leaked-medical-records\/. Accessed 10 Nov 2020"},{"key":"2_CR16","unstructured":"Kwon, J., Johnson, M.E.: The impact of security practices on regulatory Compliance and security performance. In: Proceedings of the 32nd International Conference on Information Systems, AIS (2011)"},{"key":"2_CR17","unstructured":"Marotta, A., Pearlson, K.: A culture of cybersecurity at Banca Popolare di Sondrio. In: Proceedings of AMCIS 2019 (Americas Conference on Information Systems) (2019). https:\/\/aisel.aisnet.org\/amcis2019\/info_security_privacy\/info_security_privacy\/24\/"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Marotta, A., Madnick, S.: Analyzing the interplay between regulatory compliance and cybersecurity. In: 19th Annual Security Conference, Las Vegas, NV (2020). http:\/\/dx.doi.org\/10.2139\/ssrn.3542563","DOI":"10.2139\/ssrn.3569902"},{"key":"2_CR19","unstructured":"Moldes, C.J.: PCI DSS and Security Breaches: Preparing for a Security Breach that Affects Cardholder Data. SANS Institute (2018). https:\/\/www.sans.org\/readingroom\/whitepapers\/breaches\/pci-dss-security-breaches-preparing-security-breachaffects-cardholder-data-38340"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Moody, G.D., Siponen, M., Pahnila, S.: Toward a unified model of information security policy compliance.\u00a0MIS Q. 42(1) (2018)","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"2_CR21","unstructured":"Morrow, L.: SolarWinds Federal Cybersecurity Survey Summary Report, SolarWinds, Market Connections, Slideshare.net (2017). https:\/\/www.slideshare.net\/SolarWinds\/solarwinds-federal-cybersecurity-survey-2017-government-regulations-it-modernization-and-careless-insiders-undermine-federal-agencies-security-posture\/1. Accessed 10 Nov 2020"},{"key":"2_CR22","unstructured":"New Cybersecurity Industry Survey Exposes Widespread Concern about Upcoming GDPR (2018). GDPR. https:\/\/eugdpr.com\/news\/new-cybersecurity-industry-survey-exposes-widespread-concern-upcoming-gdpr\/. Accessed 10 Nov 2020"},{"key":"2_CR23","unstructured":"PCI and DSS Requirement 1- Install & Maintain a Firewall Configuration (2020). PCI-Guide. https:\/\/www.pci-guide.co.uk\/section-1.html. Accessed 10 Nov 2020"},{"key":"2_CR24","unstructured":"Report on Cybersecurity Practices. (2015). Financial Industry Regulatory Authority. https:\/\/www.finra.org\/sites\/default\/files\/p602363%20Report%20on%20Cybersecurity%20Practices_0.pdf. Accessed 10 Nov 2020"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.cose.2015.10.006","volume":"56","author":"NS Safa","year":"2016","unstructured":"Safa, N.S., Von Solms, R., Furnell, S.: Information security policy compliance model in organizations. Comput. Secur. 56, 70\u201382 (2016)","journal-title":"Comput. Secur."},{"key":"2_CR26","unstructured":"Scorsim, E.M.: Brazil and the United States of America: Jurisdiction and the Application of Domestic Laws on Internet Application and Technology Companies. Mgalhas International. https:\/\/www.migalhas.com\/HotTopics\/63,MI273592,61044-Brazil+and+the+United+States+of+America+Jurisdiction+and+the (2018). Accessed 10 Nov 2020"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Sommestad, T., Hallberg, J., Lundholm, K., Bengtsson, J.: Variables influencing information security policy compliance.\u00a0Inf. Manage. Comput. Secur. (2014)","DOI":"10.1108\/IMCS-08-2012-0045"},{"key":"2_CR28","unstructured":"Stefanelli, S.: First GDPR Sanctions are Underway: The German Case. Europrivacy. Blog.europrivacy.info (2018). https:\/\/europrivacy.info\/2018\/12\/15\/first-gdpr-sanctions-are-underway-the-german-case\/. Accessed 10 Nov 2020"},{"key":"2_CR29","unstructured":"Vance, A., Siponen, M., Pahnila, S.: Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manage. (2012). http:\/\/130.18.86.27\/faculty\/warkentin\/SecurityPapers\/Newer\/VanceSiponenPahnila012_I&M49_HabitPMT.pdf"},{"issue":"3","key":"2_CR30","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cose.2004.01.012","volume":"23","author":"C Vroom","year":"2004","unstructured":"Vroom, C., Von Solms, R.: Towards information security behavioural compliance. Comput. Secur. 23(3), 191\u2013198 (2004)","journal-title":"Comput. Secur."},{"key":"2_CR31","unstructured":"Woodside, S.: How not to do Healthcare Security. Medstack (2018). https:\/\/medstack.co\/blog\/not-healthcare-security\/. Accessed 10 Nov 2020"}],"container-title":["Lecture Notes in Business Information Processing","The Role of e-Business during the Time of Grand Challenges"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79454-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T08:05:01Z","timestamp":1624608301000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79454-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030794538","9783030794545"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79454-5_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WeB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on E-Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"web2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.ebizworkshop.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}