{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:32:04Z","timestamp":1769729524158,"version":"3.49.0"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076195","type":"print"},{"value":"9783319076201","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_32","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:55:03Z","timestamp":1402419303000},"page":"361-372","source":"Crossref","is-referenced-by-count":11,"title":["The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture"],"prefix":"10.1007","author":[{"given":"Karen","family":"Renaud","sequence":"first","affiliation":[]},{"given":"Wendy","family":"Goucher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Chia, P., Maynard, S., Ruighaver, A.: Understanding organizational security culture. In: Proceedings of PACIS 2002, Japan (2002)"},{"issue":"4","key":"32_CR2","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.cose.2006.11.004","volume":"26","author":"E. Albrechtsen","year":"2007","unstructured":"Albrechtsen, E.: A qualitative study of users\u2019 view on information security. Computers & Security\u00a026(4), 276\u2013289 (2007)","journal-title":"Computers & Security"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Pahnila, S., Siponen, M., Mahmood, A.: Employees\u2019 behavior towards is security policy compliance. In: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007, p. 156b. IEEE (2007)","DOI":"10.1109\/HICSS.2007.206"},{"key":"32_CR4","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-0-387-72367-9_12","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"M. Siponen","year":"2007","unstructured":"Siponen, M., Pahnila, S., Mahmood, A.: Employees adherence to information security policies: an empirical study. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol.\u00a0232, pp. 133\u2013144. Springer, Boston (2007)"},{"key":"32_CR5","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger pass- word authentication using browser extensions. In: Proceedings of the 14th Usenix Security Symposium, vol.\u00a01998 (2005)"},{"issue":"2","key":"32_CR6","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S1386-5056(00)00115-5","volume":"60","author":"N. Gaunt","year":"2000","unstructured":"Gaunt, N.: Practical approaches to creating a security culture. International Journal of Medical Informatics\u00a060(2), 151\u2013157 (2000)","journal-title":"International Journal of Medical Informatics"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Gundu, T., Flowerday, S.V.: The enemy within: A behavioural intention model and an information security awareness process. In: Information Security for South Africa (ISSA), pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/ISSA.2012.6320437"},{"key":"32_CR8","unstructured":"Skinner, B.F.: Beyond freedom and dignity. Bantam Vintage (1972)"},{"key":"32_CR9","unstructured":"Locke, J.: Some thoughts concerning education. In: Eliot, C.W. (ed.) The Harvard Classics, ch.\u00a0XXXVII. P.F. Collier & Son, New York (1909-1914)"},{"key":"32_CR10","unstructured":"Gloucestershire Citizen, Poundland staff in Gloucester given 10p discount for Christmas bonus (December 22, 2013), http:\/\/www.gloucestercitizen.co.uk\/Poundland-staff-Gloucester-given-10p-discount\/story-20353454-detail\/story.html"},{"key":"32_CR11","unstructured":"Hawkes, S.: IKEA rewards thousands of staff with pension bonus. The Telegraph (December 19, 2013)"},{"key":"32_CR12","unstructured":"Taylor, F.W.: The principles of scientific management, New York, vol.\u00a0202 (1911)"},{"issue":"4","key":"32_CR13","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1037\/h0054346","volume":"50","author":"A.H. Maslow","year":"1943","unstructured":"Maslow, A.H.: A theory of human motivation. Psychological Review\u00a050(4), 370 (1943)","journal-title":"Psychological Review"},{"issue":"7 Series II","key":"32_CR14","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1111\/j.2164-0947.1947.tb01277.x","volume":"9","author":"A. Roe","year":"1947","unstructured":"Roe, A.: Section of psychology: Personality and vocation. Transactions of the New York Academy of Sciences\u00a09(7 Series II), 257\u2013267 (1947)","journal-title":"Transactions of the New York Academy of Sciences"},{"issue":"1","key":"32_CR15","first-page":"44","volume":"1","author":"D. Rock","year":"2008","unstructured":"Rock, D.: SCARF: a brain-based model for collaborating with and influencing others. NeuroLeadership Journal\u00a01(1), 44\u201352 (2008)","journal-title":"NeuroLeadership Journal"},{"issue":"1","key":"32_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.2753\/JEI0021-3624450104","volume":"45","author":"H. Lopes","year":"2011","unstructured":"Lopes, H.: Why do people work? Individual wants versus common goods. Journal of Economic Issues\u00a045(1), 57\u201374 (2011)","journal-title":"Journal of Economic Issues"},{"issue":"1","key":"32_CR17","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1037\/h0032355","volume":"22","author":"E.L. Deci","year":"1972","unstructured":"Deci, E.L.: Intrinsic motivation, extrinsic reinforcement, and inequity. Journal of Personality and Social Psychology\u00a022(1), 113 (1972)","journal-title":"Journal of Personality and Social Psychology"},{"key":"32_CR18","unstructured":"Pink, D.H.: The surprising truth about what motivates us. Soundview Executive Book Summaries (2010)"},{"issue":"4","key":"32_CR19","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1037\/0022-3514.69.4.719","volume":"69","author":"C.D. Ryff","year":"1995","unstructured":"Ryff, C.D., Keyes, C.L.M.: The structure of psychological well-being revisited. Journal of Personality and Social Psychology\u00a069(4), 719 (1995)","journal-title":"Journal of Personality and Social Psychology"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/S0065-2601(08)60108-2","volume":"2","author":"J.S. Adams","year":"1965","unstructured":"Adams, J.S.: Inequity in social exchange. Advances in Experimental Social Psychology\u00a02, 267\u2013299 (1965)","journal-title":"Advances in Experimental Social Psychology"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Ajzen, I.: From intentions to actions: A theory of planned behavior. Springer (1985)","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Norman, D.A.: Cognitive engineering. In: User Centered System Design, pp. 31\u201361 (1986)","DOI":"10.1201\/b15703"},{"issue":"1","key":"32_CR23","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1002\/ejsp.233","volume":"35","author":"T.L. Webb","year":"2005","unstructured":"Webb, T.L., Sheeran, P.: Integrating concepts from goal theories to understand the achievement of personal goals. European Journal of Social Psychology\u00a035(1), 69\u201396 (2005)","journal-title":"European Journal of Social Psychology"},{"issue":"2","key":"32_CR24","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1348\/0144666041501688","volume":"43","author":"R. Cooke","year":"2004","unstructured":"Cooke, R., Sheeran, P.: Moderation of cognition-intention and cognition- behaviour relations: A meta-analysis of properties of variables from the theory of planned behaviour. British Journal of Social Psychology\u00a043(2), 159\u2013186 (2004)","journal-title":"British Journal of Social Psychology"},{"key":"32_CR25","unstructured":"Dinev, T., Hu, Q.: The centrality of awareness in the formation of user behavioral intention toward preventive technologies in the context of voluntary use. In: The Fourth Annual Workshop on HCI Research in MIS, International Conference of Information Systems, ICIS (2005)"},{"issue":"5","key":"32_CR26","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1037\/0033-295X.86.5.452","volume":"86","author":"P.M. Bentler","year":"1979","unstructured":"Bentler, P.M., Speckart, G.: Models of attitude\u2013behavior relations. Psychological Review\u00a086(5), 452 (1979)","journal-title":"Psychological Review"},{"issue":"2","key":"32_CR27","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T. Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems\u00a018(2), 106\u2013125 (2009)","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"32_CR28","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1108\/IMCS-08-2012-0043","volume":"21","author":"K. Hedstrom","year":"2013","unstructured":"Hedstrom, K., Karlsson, F., Kolkowska, E.: Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Information Management & Computer Security\u00a021(4), 266\u2013287 (2013)","journal-title":"Information Management & Computer Security"},{"issue":"5","key":"32_CR29","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","volume":"19","author":"J.E. Maddux","year":"1983","unstructured":"Maddux, J.E., Rogers, R.W.: Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology\u00a019(5), 469\u2013479 (1983)","journal-title":"Journal of Experimental Social Psychology"},{"key":"32_CR30","doi-asserted-by":"crossref","unstructured":"Vroom, V.H., Yetton, P.W.: Leadership and decision-making. University of Pittsburgh Press (1973)","DOI":"10.2307\/j.ctt6wrc8r"},{"issue":"1","key":"32_CR31","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.im.2004.01.002","volume":"42","author":"C. Liu","year":"2004","unstructured":"Liu, C., Marchewka, J.T., Lu, J., Yu, C.-S.: Beyond concern: a privacy\u2013trust\u2013behavioral intention model of electronic commerce. Information & Management\u00a042(1), 127\u2013142 (2004)","journal-title":"Information & Management"},{"issue":"2","key":"32_CR32","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1177\/00957984930192007","volume":"19","author":"M.E. Damond","year":"1993","unstructured":"Damond, M.E., Breuer, N.L., Pharr, A.E.: The evaluation of setting and a culturally specific HIV\/AIDS curriculum: HIV\/AIDS knowledge and behavioral intent of african american adolescents. Journal of Black Psychology\u00a019(2), 169\u2013189 (1993)","journal-title":"Journal of Black Psychology"},{"key":"32_CR33","doi-asserted-by":"crossref","unstructured":"Goo, J., Yim, M.-S., Kim, D.J.: A path way to successful management of individual intention to security compliance: A role of organizational security climate. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 2959\u20132968. IEEE (2013)","DOI":"10.1109\/HICSS.2013.51"},{"issue":"4","key":"32_CR34","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1108\/09685221211267666","volume":"20","author":"K. Renaud","year":"2012","unstructured":"Renaud, K., Goucher, W.: Health service employees and information security policies: an uneasy partnership? Information Management & Computer Security\u00a020(4), 296\u2013311 (2012)","journal-title":"Information Management & Computer Security"},{"key":"32_CR35","doi-asserted-by":"crossref","unstructured":"Shelton, D.: Commitment and compliance: The role of non-binding norms in the international legal system. Oxford University Press (2003)","DOI":"10.1093\/acprof:oso\/9780199270989.001.0001"},{"issue":"4","key":"32_CR36","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1037\/0021-9010.69.4.673","volume":"69","author":"R.P. Steel","year":"1984","unstructured":"Steel, R.P., Ovalle, N.K.: A review and meta-analysis of research on the relationship between behavioral intentions and employee turnover. Journal of Applied Psychology\u00a069(4), 673 (1984)","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"32_CR37","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1080\/03634529009378813","volume":"39","author":"D.M. Christophel","year":"1990","unstructured":"Christophel, D.M.: The relationships among teacher immediacy behaviors, student motivation, and learning. Communication Education\u00a039(4), 323\u2013340 (1990)","journal-title":"Communication Education"},{"issue":"5","key":"32_CR38","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1086\/503335","volume":"27","author":"M. Whitby","year":"2006","unstructured":"Whitby, M., McLaws, M.-L., Ross, M.W.: Why healthcare workers don\u2019t wash their hands: a behavioral explanation. Infection Control and Hospital Epidemiology\u00a027(5), 484\u2013492 (2006)","journal-title":"Infection Control and Hospital Epidemiology"},{"issue":"1","key":"32_CR39","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/hrm.20004","volume":"43","author":"A.B. Bakker","year":"2004","unstructured":"Bakker, A.B., Demerouti, E., Verbeke, W.: Using the job demands-resources model to predict burnout and performance. Human Resource Management\u00a043(1), 83\u2013104 (2004)","journal-title":"Human Resource Management"},{"issue":"3","key":"32_CR40","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1361-3723(12)70053-2","volume":"2012","author":"S. Furnell","year":"2012","unstructured":"Furnell, S., Rajendran, A.: Understanding the influences on information security behaviour. Computer Fraud & Security\u00a02012(3), 12\u201315 (2012)","journal-title":"Computer Fraud & Security"},{"key":"32_CR41","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.cose.2013.09.004","volume":"39","author":"D. Ashenden","year":"2013","unstructured":"Ashenden, D., Sasse, A.: CISOs and organisational culture: Their own worst enemy? Computers & Security\u00a039, 396\u2013405 (2013)","journal-title":"Computers & Security"},{"issue":"4","key":"32_CR42","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.cose.2009.10.005","volume":"29","author":"J. Niekerk Van","year":"2010","unstructured":"Van Niekerk, J., Von Solms, R.: Information security culture: A management perspective. Computers & Security\u00a029(4), 476\u2013486 (2010)","journal-title":"Computers & Security"},{"issue":"8","key":"32_CR43","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/S0167-4048(03)00007-5","volume":"22","author":"J. Leach","year":"2003","unstructured":"Leach, J.: Improving user security behaviour. Computers & Security\u00a022(8), 685\u2013692 (2003)","journal-title":"Computers & Security"},{"issue":"2","key":"32_CR44","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1111\/j.1559-1816.2004.tb02547.x","volume":"34","author":"C. Pornpitakpan","year":"2004","unstructured":"Pornpitakpan, C.: The persuasiveness of source credibility: A critical review of five decades\u2019 evidence. Journal of Applied Social Psychology\u00a034(2), 243\u2013281 (2004)","journal-title":"Journal of Applied Social Psychology"},{"issue":"2","key":"32_CR45","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(09)70019-3","volume":"2009","author":"S. Furnell","year":"2009","unstructured":"Furnell, S., Thomson, K.-L.: From culture to disobedience: Recognising the varying user acceptance of it security. Computer Fraud & Security\u00a02009(2), 5\u201310 (2009)","journal-title":"Computer Fraud & Security"},{"issue":"3","key":"32_CR46","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1177\/0013916510371754","volume":"43","author":"C. Schelly","year":"2011","unstructured":"Schelly, C., Cross, J.E., Franzen, W.S., Hall, P., Reeve, S.: Reducing energy consumption and creating a conservation culture in organizations: A case study of one public school district. Environment and Behavior\u00a043(3), 316\u2013343 (2011)","journal-title":"Environment and Behavior"},{"issue":"2","key":"32_CR47","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1037\/0033-2909.132.2.249","volume":"132","author":"T.L. Webb","year":"2006","unstructured":"Webb, T.L., Sheeran, P.: Does changing behavioral intentions engender behavior change? a meta-analysis of the experimental evidence. Psychological Bulletin\u00a0132(2), 249 (2006)","journal-title":"Psychological Bulletin"},{"key":"32_CR48","first-page":"114","volume-title":"The Sociology of Organizations: Classic, Contemporary, and Critical Readings","author":"R.E. Walton","year":"2003","unstructured":"Walton, R.E.: From control to commitment in the workplace. In: The Sociology of Organizations: Classic, Contemporary, and Critical Readings, pp. 114\u2013122. Sage Publications, California (2003)"},{"issue":"4","key":"32_CR49","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s40171-013-0047-4","volume":"14","author":"A.N. Singh","year":"2013","unstructured":"Singh, A.N., Picot, A., Kranz, J., Gupta, M., Ojha, A.: Information security management (ism) practices: Lessons from select cases from India and Germany. Global Journal of Flexible Systems Management\u00a014(4), 225\u2013239 (2013)","journal-title":"Global Journal of Flexible Systems Management"},{"key":"32_CR50","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1080\/07448480009595691","volume":"48","author":"J.D. Foubert","year":"2000","unstructured":"Foubert, J.D.: The longitudinal effects of a rape-prevention program on fraternity mens attitudes, behavioral intent, and behavior. Journal of American College Health\u00a048, 158\u2013163 (2000)","journal-title":"Journal of American College Health"},{"issue":"1","key":"32_CR51","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1037\/0033-2909.124.1.54","volume":"124","author":"J.A. Ouellette","year":"1998","unstructured":"Ouellette, J.A., Wood, W.: Habit and intention in everyday life: the multiple processes by which past behavior predicts future behavior. Psychological Bulletin\u00a0124(1), 54 (1998)","journal-title":"Psychological Bulletin"},{"key":"32_CR52","doi-asserted-by":"crossref","unstructured":"Gollwitzer, P.M., Bayer, U.C., McCulloch, K.C.: The control of the unwanted. In: The New Unconscious, pp. 485\u2013515 (2005)","DOI":"10.1093\/acprof:oso\/9780195307696.003.0018"},{"issue":"10","key":"32_CR53","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1361-3723(06)70430-4","volume":"2006","author":"K.-L. Thomson","year":"2006","unstructured":"Thomson, K.-L., von Solms, R., Louw, L.: Cultivating an organizational information security culture. Computer Fraud & Security\u00a02006(10), 7\u201311 (2006)","journal-title":"Computer Fraud & Security"},{"issue":"3","key":"32_CR54","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s12144-003-1018-2","volume":"22","author":"A. Rivis","year":"2003","unstructured":"Rivis, A., Sheeran, P.: Descriptive norms as an additional predictor in the theory of planned behaviour: A meta-analysis. Current Psychology\u00a022(3), 218\u2013233 (2003)","journal-title":"Current Psychology"},{"key":"32_CR55","doi-asserted-by":"crossref","unstructured":"Sheppard, B.H., Hartwick, J., Warshaw, P.R.: The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 325\u2013343 (1988)","DOI":"10.1086\/209170"},{"issue":"1","key":"32_CR56","doi-asserted-by":"crossref","first-page":"47","DOI":"10.5465\/amr.1984.4277934","volume":"9","author":"D.C. Feldman","year":"1984","unstructured":"Feldman, D.C.: The development and enforcement of group norms. Academy of Management Review\u00a09(1), 47\u201353 (1984)","journal-title":"Academy of Management Review"},{"issue":"1","key":"32_CR57","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1108\/09685220610648355","volume":"14","author":"K.J. Knapp","year":"2006","unstructured":"Knapp, K.J., Marshall, T.E., Rainer, R.K., Ford, F.N.: Information security: management\u2019s effect on culture and policy. Information Management & Computer Security\u00a014(1), 24\u201336 (2006)","journal-title":"Information Management & Computer Security"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T05:01:44Z","timestamp":1689310904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}