{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:21:06Z","timestamp":1742923266804,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031813214"},{"type":"electronic","value":"9783031813221"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81322-1_26","type":"book-chapter","created":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T20:59:44Z","timestamp":1740862784000},"page":"382-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Security Success Perception: The Role of\u00a0Response Cost"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7434-9964","authenticated-orcid":false,"given":"Mariusz","family":"Grabowski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2149-8675","authenticated-orcid":false,"given":"Robert","family":"Paj\u0105k","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5608-179X","authenticated-orcid":false,"given":"Adam","family":"Sagan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,2]]},"reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.chb.2015.03.054","volume":"49","author":"A Alhogail","year":"2015","unstructured":"Alhogail, A.: Design and validation of information security culture framework. Comput. Hum. Behav. 49, 567\u2013575 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.cose.2017.11.001","volume":"73","author":"S Aurigemma","year":"2018","unstructured":"Aurigemma, S., Mattson, T.: Exploring the effect of uncertainty avoidance on taking voluntary protective security actions. Comput. Secur. 73, 219\u2013234 (2018)","journal-title":"Comput. Secur."},{"unstructured":"Bandura, A.: Social Foundations of Thought and Action: A Social Cognitive Theory. Prentice-Hall, Inc. (1986)","key":"26_CR4"},{"issue":"3","key":"26_CR5","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523\u2013548 (2010)","journal-title":"MIS Q."},{"issue":"2","key":"26_CR6","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","volume":"29","author":"A Da Veiga","year":"2010","unstructured":"Da Veiga, A., Eloff, J.H.P.: A framework and assessment instrument for information security culture. Comput. Secur. 29(2), 196\u2013207 (2010)","journal-title":"Comput. Secur."},{"issue":"3","key":"26_CR7","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"1","key":"26_CR8","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1287\/isre.3.1.60","volume":"3","author":"WH DeLone","year":"1992","unstructured":"DeLone, W.H., McLean, E.R.: Information systems success: the quest for the dependent variable. Inf. Syst. Res. 3(1), 60\u201395 (1992)","journal-title":"Inf. Syst. Res."},{"doi-asserted-by":"crossref","unstructured":"Dhillon, G., Tejay, G., Hong, W.: Identifying governance dimensions to evaluate information systems security in organizations. In: Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS\u201907), Waikoloa, HI (2007)","key":"26_CR9","DOI":"10.1109\/HICSS.2007.257"},{"unstructured":"Dunkerley, K., Tejay, G.: Developing an information systems security success model for egovernment context. In: Nickerson, R.C., Sharda, R. (eds.) Proceedings of 15th Americas Conference for Information Systems 346, San Francisco, CA (2009)","key":"26_CR10"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"341","DOI":"10.4018\/978-1-4666-0170-3.ch017","volume-title":"Measuring Organizational Information Systems Success: New Technologies and Practices","author":"KD Dunkerley","year":"2012","unstructured":"Dunkerley, K.D., Tejay, G.: The development of a model for information systems security success. In: Belkhamza, Z., Wafa, S.A. (eds.) Measuring Organizational Information Systems Success: New Technologies and Practices, pp. 341\u2013366. IGI Global, Hershey (2012)"},{"key":"26_CR12","volume-title":"The Silent Language","author":"ET Hall","year":"1959","unstructured":"Hall, E.T.: The Silent Language. Anchor Books, Garden City (1959)"},{"issue":"1","key":"26_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1146\/annurev.soc.23.1.191","volume":"23","author":"M Hechter","year":"1997","unstructured":"Hechter, M., Kanazawa, S.: Sociological rational choice theory. Ann. Rev. Sociol. 23(1), 191\u2013214 (1997)","journal-title":"Ann. Rev. Sociol."},{"issue":"2","key":"26_CR14","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, R.: Protection motivation and deterrence: a framework for security policy compliance in organizations. Eur. J. Inf. Syst. 18(2), 106\u2013125 (2009)","journal-title":"Eur. J. Inf. Syst."},{"key":"26_CR15","volume-title":"Culture\u2019s Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations","author":"G Hofstede","year":"2001","unstructured":"Hofstede, G.: Culture\u2019s Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations. Sage, Thousand Oaks (2001)"},{"issue":"1","key":"26_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31(1), 83\u201395 (2012)","journal-title":"Comput. Secur."},{"unstructured":"Lim, J.S., Chang, S., Maynard, S., Ahmad, A.: Exploring the relationship between organizational culture and information security culture. In: Proceedings of the 7th Australian Information Security Management Conference, pp. 88\u201397 (2009)","key":"26_CR17"},{"issue":"6","key":"26_CR18","first-page":"220","volume":"5","author":"K Lyytinen","year":"2004","unstructured":"Lyytinen, K., King, J.L.: Nothing at the center?: Academic legitimacy in the information systems field. J. Assoc. Inf. Syst. 5(6), 220\u2013246 (2004)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"3","key":"26_CR19","first-page":"237","volume":"17","author":"M-D McLaughlin","year":"2018","unstructured":"McLaughlin, M.-D., Gogan, J.: Challenges and best practices in information security management. MIS Q. Exec. 17(3), 237\u2013262 (2018)","journal-title":"MIS Q. Exec."},{"issue":"1","key":"26_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.25300\/MISQ\/2018\/13853","volume":"42","author":"GD Moody","year":"2018","unstructured":"Moody, G.D., Siponen, M., Pahnila, S.: Toward a unified model of information security policy compliance. MIS Q. 42(1), 285\u2013311 (2018)","journal-title":"MIS Q."},{"issue":"4","key":"26_CR21","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/07421222.2015.1138374","volume":"32","author":"C Posey","year":"2015","unstructured":"Posey, C., Roberts, T., Lowry, P.: The impact of organizational commitment on insiders\u2019 motivation to protect organizational information assets. J. Manag. Inf. Syst. 32(4), 179\u2013214 (2015)","journal-title":"J. Manag. Inf. Syst."},{"issue":"1","key":"26_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change. J. Psychol. 91(1), 93\u2013114 (1975)","journal-title":"J. Psychol."},{"issue":"1","key":"26_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"M Siponen","year":"2000","unstructured":"Siponen, M.: A conceptual foundation for organizational information security awareness. Inf. Manag. Comput. Secur. 8(1), 31\u201341 (2000)","journal-title":"Inf. Manag. Comput. Secur."},{"issue":"3","key":"26_CR24","doi-asserted-by":"publisher","first-page":"504","DOI":"10.2307\/25750689","volume":"34","author":"JL Spears","year":"2010","unstructured":"Spears, J.L., Barki, H.: User participation in information systems security risk management. MIS Q. 34(3), 504\u2013522 (2010)","journal-title":"MIS Q."},{"unstructured":"Total spending on global information security market 2017-2024, by segment. https:\/\/www.statista.com\/statistics\/790834\/spending-global-security-technology-and-services-market-by-segment\/. Accessed 25 May 2024","key":"26_CR25"},{"unstructured":"Szamota, B.: General deterrence research: some methodological problems. Arch. Criminol. (XI), 93\u2013122 (1984)","key":"26_CR26"},{"issue":"3","key":"26_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103751","volume":"60","author":"GPS Tejay","year":"2023","unstructured":"Tejay, G.P.S., Mohammed, Z.A.: Cultivating security culture for information security success: a mixed-methods study based on anthropological perspective. Inf. Manag. 60(3), 103751 (2023)","journal-title":"Inf. Manag."},{"issue":"3\u20134","key":"26_CR28","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance, A., Siponen, M., Pahnila, S.: Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manag. 49(3\u20134), 190\u2013198 (2012)","journal-title":"Inf. Manag."},{"key":"26_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102313","volume":"106","author":"K van der Schyff","year":"2021","unstructured":"van der Schyff, K., Flowerday, S.: Mediating effects of information security awareness. Comput. Secur. 106, 102313 (2021)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Youssef-Morgan, C.M., Luthans, F.: Psychological capital theory: toward a positive holistic model. In: Bakker, A.B. (ed.) Advances in Positive Organizational Psychology. Advances in Positive Organizational Psychology, vol. 1, pp. 145\u2013166. Emerald Group Publishing Limited, Leeds (2013)","key":"26_CR30","DOI":"10.1108\/S2046-410X(2013)0000001009"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81322-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T20:59:50Z","timestamp":1740862790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81322-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031813214","9783031813221"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81322-1_26","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/emcis.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}