{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:25:10Z","timestamp":1726039510102},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811317972"},{"type":"electronic","value":"9789811317996"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1799-6_41","type":"book-chapter","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T09:03:05Z","timestamp":1565341385000},"page":"393-401","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Information Security Policy Compliance Model at Indonesian Government Institutions: A Conceptual Framework"],"prefix":"10.1007","author":[{"given":"Hadi","family":"Syahrial","sequence":"first","affiliation":[]},{"given":"Harjanto","family":"Prabowo","sequence":"additional","affiliation":[]},{"given":"Dyah","family":"Budiastuti","sequence":"additional","affiliation":[]},{"given":"Ford Lumban","family":"Gaol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,10]]},"reference":[{"key":"41_CR1","volume-title":"Ian Brown","author":"Y Nugraha","year":"2015","unstructured":"Nugraha, Y.: Ian Brown. An adaptive wideband delphi method to study state cyber-defence requirements, IEEE, Ashwin Sasongko Sastrosubroto (2015)"},{"key":"41_CR2","unstructured":"Indonesia Gov-CSIRT: indonesia government computer security incident response team, security incident report (2014)"},{"key":"41_CR3","volume-title":"Best Practices in Email","author":"Osterman Research","year":"2014","unstructured":"Osterman Research: Best Practices in Email. Osterman Research, Inc, Web and Social Media Security (2014)"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Li, H., Zhang, J., Sarathy, R.: Understanding compliance with internet use policy from the perspective of rational choice theory, Decision Support Systems, Elsevier (2009)","DOI":"10.1016\/j.dss.2009.12.005"},{"key":"41_CR5","unstructured":"Van Kessel, P.: Moving beyond compliance\u2014ernt and young global information security survey (2008)"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Al-Omari, A., El-Gayar, O., Deokar, A.: Security policy compliance: user acceptance perspective. In: 45th Hawaii International Conference on System Sciences, IEEE (2012)","DOI":"10.1109\/HICSS.2012.516"},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34, 523\u2013548 (2010)","journal-title":"MIS Q."},{"key":"41_CR8","unstructured":"Pramanik, S., Sankaranarayanan, V., Upadhyaya, S.: Security policies to mitigate insider threat in the document control domain. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC\u201904), IEEE (2004)"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Lebek, B., Uffen, J., Breitner, M.H., Neumann, M., Hohler, B.: Employees\u2019 information security awareness and behavior: a literature review, IEEE (2012)","DOI":"10.1109\/HICSS.2013.192"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Beznosov, K., Beznosova, O.: On the imbalance of the security problem space and its expected consequences, information management & computer security, vol. 15 (2007)","DOI":"10.1108\/09685220710831152"},{"key":"41_CR11","unstructured":"Royd, J.: Virtual battlefield, CIR Magazine: August (2009)"},{"issue":"4","key":"41_CR12","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1111\/j.1540-5915.2012.00361.x","volume":"43","author":"Qing Hu","year":"2012","unstructured":"Hu, Q., Dinev, T., Hart, P., Cooke, D.: Managing employee compliance with information security policies: the critical role of top management and organizational culture. Decis. Sci. J. 43(4) (2012)","journal-title":"Decision Sciences"},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Colwill, C.: Human factors in information security: the insider threat\u2014who can you trust these days? Information Security Technical Report, ScienceDirect, Elsevier (2010)","DOI":"10.1016\/j.istr.2010.04.004"},{"issue":"4","key":"41_CR14","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.infoandorg.2005.02.005","volume":"15","author":"M Gallivan","year":"2005","unstructured":"Gallivan, M., Srite, M.: Information technology and culture: identifying fragmentary and holistic perspectives of culture. Inf. Organ. 15(4), 295\u2013338 (2005)","journal-title":"Inf. Organ."},{"key":"41_CR15","unstructured":"Qwaider, W.Q.: The organizational and national culture impact of information system (IS). In: International Conference in Philadelphia University Amman\u2014Jordan, 26\u201328 of November (2010)"},{"key":"41_CR16","unstructured":"Connolly, L., Lang, M.: Data protection and employee behaviour: the role of information systems security culture, IADIS WWW\/Internet 2012 Conference (2012)"},{"key":"41_CR17","doi-asserted-by":"crossref","unstructured":"Straub, D., Loch, K., Hill, C.: Transfer of information technology to the arab world: a test of cultural influence modeling, Advanced Topics in Global Information Management, Hershey, PA: Idea Group Publishing, pp. 141\u2013172 (2003)","DOI":"10.4018\/978-1-59140-064-6.ch009"},{"key":"41_CR18","unstructured":"Alnatheer, M. Nelson, K.: proposed framework for understanding information security culture and practices in the saudi context. In: Proceedings of the 7th Australian Information Security Management Conference (2009)"},{"key":"41_CR19","volume-title":"Culture\u2019s consequences: international differences in work-related values","author":"G Hofstede","year":"1980","unstructured":"Hofstede, G.: Culture\u2019s consequences: international differences in work-related values. Sage Publications, Beverly Hills (1980)"},{"key":"41_CR20","volume-title":"Cultures and Organizations: software of the Mind, revised and expanded","author":"G Hofstede","year":"2010","unstructured":"Hofstede, G., Hofstede, G.J., Minkov, M.: Cultures and Organizations: software of the Mind, revised and expanded, 3rd edn. McGraw-Hill, New York, NY (2010)","edition":"3"},{"key":"41_CR21","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/ijhc.1996.0040","volume":"45","author":"Davis and Venkatesh","year":"1996","unstructured":"Davis and Venkatesh: A critical assessment of potential measurement biases in the technology ac-ceptance model: three experiments. Int. J. Hum.-Comput. Stud. 45, 19\u201345 (1996)","journal-title":"Int. J. Hum.-Comput. Stud."},{"issue":"3","key":"41_CR22","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"3","key":"41_CR23","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cose.2004.01.012","volume":"23","author":"C Vroom","year":"2004","unstructured":"Vroom, C., Von Solms, R.: Towards information security behavioral compliance. Comput. Secur. 23(3), 191\u2013198 (2004)","journal-title":"Comput. Secur."},{"key":"41_CR24","unstructured":"Jones, C.M., McCarthy, R.V., Halawi, L., Mujtaba, B.: Utilizing the technology acceptance model to assess the adoption of information system security measures. Issues Inf. Syst. XI(1) (2010)"},{"issue":"2","key":"41_CR25","doi-asserted-by":"publisher","first-page":"357","DOI":"10.2307\/25148735","volume":"30","author":"DE Leidner","year":"2006","unstructured":"Leidner, D.E., Kayworth, T.: Review: a review of culture in information systems research: toward a theory of information technology culture conflict. MIS Q. 30(2), 357\u2013399 (2006)","journal-title":"MIS Q."},{"issue":"2","key":"41_CR26","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.leaqua.2005.12.001","volume":"17","author":"AS Tsui","year":"2006","unstructured":"Tsui, A.S., Zhang, Z.-X., Wang, H., Xin, K.R., Wu, J.B.: Unpacking the relationship between CEO leadership behavior and organizational culture. Leadersh. Quart. 17(2), 113\u2013137 (2006)","journal-title":"Leadersh. Quart."},{"key":"41_CR27","volume-title":"Beyond rational management","author":"RE Quinn","year":"1988","unstructured":"Quinn, R.E.: Beyond rational management. Jossey-Bass, San Francisco, CA (1988)"},{"key":"41_CR28","unstructured":"Van Muijen, J.J., Koopman, P., De Witte, K., De Cock, G., Susanj, Z., Lemoine, C., Bourantas, D., Papalexandris, N., Branyicski, I., Spaltro, E., Jesuino, J., Neves, J.G.D., Pitariu, H., Konrad, E., Peir\u00b4O, J., Gonz\u00b4alez-Rom\u00b4a, V., & Turnipseed, D.: Organizational culture: The focus questionnaire. Eur. J. Work Organ. Psychol. 8(4), 551\u2013568 (1999)"},{"key":"41_CR29","unstructured":"Zakour, A.B.: Cultural differences and information technology acceptance. In: Proceeding of the 7th Annual Conference of the Southern Association for Information Systems (2003)"},{"key":"41_CR30","volume-title":"Cultures and organizations: software of the mind","author":"G Hofstede","year":"2004","unstructured":"Hofstede, G., Hofstede, G.-J.: Cultures and organizations: software of the mind. McGraw-Hill, New York (2004)"},{"key":"41_CR31","volume-title":"Attitudes, personality, and behavior","author":"I Ajzen","year":"1988","unstructured":"Ajzen, I.: Attitudes, personality, and behavior. Open University Press, Milton Keynes, England (1988)"},{"key":"41_CR32","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage. Sci. 46, 186\u2013204 (2003)","journal-title":"Manage. Sci."},{"issue":"2","key":"41_CR33","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.A.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144\u2013176 (1995)","journal-title":"Inf. Syst. Res."}],"container-title":["Lecture Notes in Electrical Engineering","Proceedings of the International Conference on Data Engineering 2015 (DaEng-2015)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1799-6_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T10:48:51Z","timestamp":1610794131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1799-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811317972","9789811317996"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1799-6_41","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}