{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:40:03Z","timestamp":1746265203909,"version":"3.40.4"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_22","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:55:03Z","timestamp":1402419303000},"page":"246-257","source":"Crossref","is-referenced-by-count":4,"title":["End User Development and Information Security Culture"],"prefix":"10.1007","author":[{"given":"Fredrik","family":"Karlsson","sequence":"first","affiliation":[]},{"given":"Karin","family":"Hedstr\u00f6m","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1145\/162124.162138","volume":"25","author":"J.C. Brancheau","year":"1993","unstructured":"Brancheau, J.C., Brown, C.V.: The Management of End-User Computing: Status and Directions. ACM Computing Surveys\u00a025, 437\u2013481 (1993)","journal-title":"ACM Computing Surveys"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1046\/j.1365-2575.1998.00005.x","volume":"8","author":"M.J. Taylor","year":"1998","unstructured":"Taylor, M.J., Moynihan, E.P., Wood-Harper, A.T.: End-user computing and information systems methodologies. Information Systems Journal\u00a08, 85\u201396 (1998)","journal-title":"Information Systems Journal"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","volume":"29","author":"A. Veiga Da","year":"2010","unstructured":"Da Veiga, A., Eloff, J.H.P.: A framework and assessment instrument for information security culture. Computers & Security\u00a029, 196\u2013207 (2010)","journal-title":"Computers & Security"},{"key":"22_CR4","first-page":"146","volume":"11","author":"A.D. Veiga","year":"2007","unstructured":"Veiga, A.D., Martins, N., Eloff, J.H.P.: Information security culture \u2013 validation of an assessment instrument. Southern African Business Review\u00a011, 146\u2013166 (2007)","journal-title":"Southern African Business Review"},{"key":"22_CR5","series-title":"Studies in Sociotechnical Change","first-page":"259","volume-title":"Shaping Technology\/Building Society","author":"M. Akrich","year":"1992","unstructured":"Akrich, M., Latour, B.: A summary of a convenient vocabulary for the semiotics of human and nonhuman assemblies. In: Bijker, W.E., Law, J. (eds.) Shaping Technology\/Building Society. Studies in Sociotechnical Change, pp. 259\u2013264. MIT Press, Cambridge (1992)"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1015864.1015883","volume":"47","author":"A. Sutcliffe","year":"2004","unstructured":"Sutcliffe, A., Mehandjiev, N.: End-User Development. Communication of the ACM\u00a047, 31\u201332 (2004)","journal-title":"Communication of the ACM"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.4018\/joeuc.2006100102","volume":"18","author":"T. McGill","year":"2006","unstructured":"McGill, T., Klisc, C.: End-User Perceptions of the Benefits and Risks of End-User Web Development. Journal of Organizational and End User Computing\u00a018, 22\u201342 (2006)","journal-title":"Journal of Organizational and End User Computing"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1017816.1017818","volume":"18","author":"M. Summer","year":"1987","unstructured":"Summer, M., Klepper, R.: Information Systems Strategy and End-User Application Development. ACM SIGMIS Database\u00a018, 19\u201330 (1987)","journal-title":"ACM SIGMIS Database"},{"key":"22_CR9","first-page":"60","volume":"11","author":"S. Ditlea","year":"1987","unstructured":"Ditlea, S.: Spreadsheets can be hazardous to your health. Personal Computing\u00a011, 60\u201369 (1987)","journal-title":"Personal Computing"},{"key":"22_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1jais.00016","volume":"2","author":"R.R. Panko","year":"2001","unstructured":"Panko, R.R., Halverson, R.P.: An Experiment In Collaborative Development To Reduce Spreadsheet Errors. Journal of the Association of Information Systems\u00a02, 1\u201331 (2001)","journal-title":"Journal of the Association of Information Systems"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Karlsson, F.: Using Two Heads in Practice. In: Fourth Workshop on End-User Software Engineering (WEUSE IV) ACM Digital Library (2008)","DOI":"10.1145\/1370847.1370857"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Kankuzi, B., Ayalew, Y.: An End-User Oriented Graph-Based Visualization for Spreadsheets. In: Fourth Workshop on End-User Software Engineering (WEUSE IV) ACM Digital Library (2008)","DOI":"10.1145\/1370847.1370866"},{"key":"22_CR13","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/07421222.1996.11518117","volume":"13","author":"D.T. Edberg","year":"1996","unstructured":"Edberg, D.T., Bowman, B.J.: User-developed applications: An empirical study of application quality and developer productivity. Journal of Management Information Systems\u00a013, 167\u2013185 (1996)","journal-title":"Journal of Management Information Systems"},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/S0167-9236(97)00038-9","volume":"22","author":"R.R. Panko","year":"1998","unstructured":"Panko, R.R., Sprague Jr., R.H.: Hitting the wall: errors in developing and code inspecting a \u2018simple\u2019 spreadsheet model. Decision Support Systems\u00a022, 337\u2013353 (1998)","journal-title":"Decision Support Systems"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Thomson, K.-L., von Solms, R., Louw, L.: Cultivating an organizational information security culture. Computer Fraud & Security, pp. 7\u201311 (October 2006)","DOI":"10.1016\/S1361-3723(06)70430-4"},{"key":"22_CR16","unstructured":"Hitchings, J.: Achieving an Integrated Design: the Way Forward for Information Security. In: The IFIP TC11 11th International Conference on Information Security, pp. 269\u2013283 (1995)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"James, H.L.: Managing information systems security: a soft approach. In: Proceedings of the 1996 Information Systems Conference of New Zealand (ISCNZ 1996), pp. 10\u201320. IEEE Society Press (1996)","DOI":"10.1109\/ISCNZ.1996.554947"},{"key":"22_CR18","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/0-306-47007-1_8","volume-title":"Advances in Information Security Management & Small Systems Security","author":"M. Siponen","year":"2001","unstructured":"Siponen, M., Baskerville, R.: A new paradigm for adding security into IS development methods. In: Eloff, J., Labuschange, L., Solms, R., Dhillon, G. (eds.) Advances in Information Security Management & Small Systems Security, pp. 99\u2013111. Kluwer Academic Publishers, Boston (2001)"},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s00766-009-0092-x","volume":"15","author":"F. Fabian","year":"2010","unstructured":"Fabian, F., G\u00fcrses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requirements Engineering\u00a015, 7\u201340 (2010)","journal-title":"Requirements Engineering"},{"key":"22_CR20","volume-title":"Qualitative evaluation and research methods","author":"M.Q. Patton","year":"1990","unstructured":"Patton, M.Q.: Qualitative evaluation and research methods. Sage, Newbury Park (1990)"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1057\/ejis.1995.9","volume":"4","author":"G. Walsham","year":"1995","unstructured":"Walsham, G.: Interpretive case studies in IS research: nature and method. European Journal of Information Systems\u00a04, 74\u201381 (1995)","journal-title":"European Journal of Information Systems"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/249410","volume":"23","author":"H.K. Klein","year":"1999","unstructured":"Klein, H.K., Myers, M.D.: A set of principles for conducting and evaluating interpretative field studies in information system. MIS Quarterly\u00a023, 67\u201394 (1999)","journal-title":"MIS Quarterly"},{"key":"22_CR23","volume-title":"Science in action: how to follow scientists and engineers through society","author":"B. Latour","year":"1987","unstructured":"Latour, B.: Science in action: how to follow scientists and engineers through society. Harvard University Press, Cambridge (1987)"},{"key":"22_CR24","unstructured":"Akrich, M.: The De-Scription of Technical Objects. In: Bijker, W., Law, J. (eds.) Shaping Technology\/Building Society. Studies in Sociotechnical Change. The MIT Press, Cambridge (1992)"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/S0959-8022(97)00008-8","volume":"7","author":"O. Hanseth","year":"1997","unstructured":"Hanseth, O., Monteiro, E.: Inscribing behaviour in information infrastructure standards. Accounting, Management & Information Technology\u00a07, 183\u2013211 (1997)","journal-title":"Accounting, Management & Information Technology"},{"key":"22_CR26","first-page":"103","volume-title":"A Sociology of Monsters: Essays on Power, Technology and Domination","author":"B. Latour","year":"1991","unstructured":"Latour, B.: Technology is society made durable. In: Law, J. (ed.) A Sociology of Monsters: Essays on Power, Technology and Domination, pp. 103\u2013131. Routledge, London (1991)"},{"key":"22_CR27","unstructured":"ISO: ISO\/IEC 27001:2005, Information Technology - Security Techniques - Information Security Management Systems - Requirements. International Organization for Standardization (ISO) (2005)"},{"key":"22_CR28","first-page":"103","volume":"2","author":"G.B. Davis","year":"1988","unstructured":"Davis, G.B.: The Hidden Costs of End-User Computing. Accounting Horizons\u00a02, 103\u2013106 (1988)","journal-title":"Accounting Horizons"},{"key":"22_CR29","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/S0959-8022(99)00006-5","volume":"9","author":"T.S.H. Teo","year":"1999","unstructured":"Teo, T.S.H., Tan, M.: Spreadsheet development and \u2019what-if\u2019 analysis: quantitative versus qualitative errors. Accounting Management and Information Technologies\u00a09, 141\u2013160 (1999)","journal-title":"Accounting Management and Information Technologies"},{"key":"22_CR30","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering\u00a010, 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"22_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0378-7206(92)90002-W","volume":"22","author":"D.F. Galletta","year":"1992","unstructured":"Galletta, D.F., Hufnagel, E.M.: A model of end-user computing policy \u2013 context, process, content and compliance. Information & Management\u00a022, 1\u201318 (1992)","journal-title":"Information & Management"},{"key":"22_CR32","first-page":"35","volume":"50","author":"L.E. Rittenberg","year":"1993","unstructured":"Rittenberg, L.E., Senn, A.: End-user computing. The Intenal Auditor\u00a050, 35\u201340 (1993)","journal-title":"The Intenal Auditor"},{"key":"22_CR33","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/S0378-7206(97)00004-9","volume":"32","author":"C. Speier","year":"1997","unstructured":"Speier, C., Brown, C.V.: Differences in end-user computing support and control across user departments. Information & Management\u00a032, 85\u201399 (1997)","journal-title":"Information & Management"},{"key":"22_CR34","volume-title":"Information Security Management Handbook","author":"P.D. Howard","year":"2007","unstructured":"Howard, P.D.: The Security Policy Life Cycle. In: Tipton, H.F., Krause, M. (eds.) Information Security Management Handbook. CRC Press, Boca Raton (2007)"},{"key":"22_CR35","doi-asserted-by":"publisher","DOI":"10.1201\/9780203488737","volume-title":"Information security policies and procedures - a practitioner\u2019s reference","author":"T.R. Peltier","year":"2004","unstructured":"Peltier, T.R.: Information security policies and procedures - a practitioner\u2019s reference. Auerbach Publications, Boca Raton (2004)"},{"key":"22_CR36","unstructured":"Smith, R.: The Definitive Guide to Writing Effective Information Security Policies and Procedures. Createspace (2010)"},{"key":"22_CR37","volume-title":"Information security policies made easy","author":"C.C. Wood","year":"2001","unstructured":"Wood, C.C.: Information security policies made easy. Information Shield, Huston (2001)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:06:15Z","timestamp":1746263175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}