{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:02:10Z","timestamp":1777338130792,"version":"3.51.4"},"reference-count":106,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T00:00:00Z","timestamp":1665532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T00:00:00Z","timestamp":1665532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007471","name":"Northern Borders University","doi-asserted-by":"publisher","award":["IF 2020 NBU 303"],"award-info":[{"award-number":["IF 2020 NBU 303"]}],"id":[{"id":"10.13039\/501100007471","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s10257-022-00575-2","type":"journal-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T17:03:08Z","timestamp":1665594188000},"page":"123-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Moving beyond cyber security awareness and training to engendering security knowledge sharing"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9179-8326","authenticated-orcid":false,"given":"Saad","family":"Alahmari","sequence":"first","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]},{"given":"Inah","family":"Omoronyia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,12]]},"reference":[{"key":"575_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy J (2014) User preference of cyber security awareness delivery methods. Behav & Info Technol 33:237\u2013248","journal-title":"Behav & Info Technol"},{"key":"575_CR2","unstructured":"Ahmed G, Ragsdell G, Olphert W (2014) Knowledge sharing and information security: a paradox? In: 15th european conference on knowledge management (ECKM 2014), Polytechnic Institute of Santar\u00e9m Portugal. pp. 1083\u20131090"},{"key":"575_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed M, Kambam HR, Liu Y, Uddin MN (2019) Impact of human factors in cloud data breach. In: International conference on intelligent and interactive systems and applications, Springer. pp. 568\u2013577","DOI":"10.1007\/978-3-030-34387-3_70"},{"key":"575_CR4","unstructured":"Al\u00a0Ahmari S, Renaud K, Omoronyia I (2018) A systematic review of information security knowledge-sharing research. In: Proceedings of the twelfth international symposium on human aspects of information security & assurance (HAISA 2018), p. 101"},{"key":"575_CR5","doi-asserted-by":"crossref","unstructured":"Aladawy D, Beckers K, Pape S (2018) Persuaded: fighting social engineering attacks with a serious game. In: International conference on trust and privacy in digital business, Springer. pp. 103\u2013118","DOI":"10.1007\/978-3-319-98385-1_8"},{"key":"575_CR6","doi-asserted-by":"crossref","unstructured":"Alahmari S, Renaud K, Omoronyia I (2019) A model for describing and maximising security knowledge sharing to enhance security awareness. In: European, mediterranean and middle eastern conference on information systems, Springer. pp. 376\u2013390","DOI":"10.1007\/978-3-030-44322-1_28"},{"key":"575_CR7","doi-asserted-by":"crossref","unstructured":"Alahmari S, Renaud K, Omoronyia I (2020) Implement a model for describing and maximising security knowledge sharing. In: 2020 15th international conference for internet technology and secured transactions (ICITST), IEEE. pp. 1\u20134","DOI":"10.23919\/ICITST51030.2020.9351318"},{"key":"575_CR8","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/fi11030073","volume":"11","author":"H Aldawood","year":"2019","unstructured":"Aldawood H, Skinner G (2019) Reviewing cyber security social engineering training and awareness programs-pitfalls and ongoing issues. Fut Intern 11:73","journal-title":"Fut Intern"},{"key":"575_CR9","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.chb.2018.09.033","volume":"91","author":"A Ali","year":"2019","unstructured":"Ali A, Wang H, Khan AN (2019) Mechanism to enhance team creative performance through social media: a transactive memory system approach. Comp Human Behav 91:115\u2013126","journal-title":"Comp Human Behav"},{"key":"575_CR10","doi-asserted-by":"crossref","unstructured":"Alkaldi N, Renaud K (2019) Encouraging password manager adoption by meeting adopter self-determination needs. In: Proceedings of the 52nd Hawai\u2019i international conference on system sciences. January, Maui","DOI":"10.24251\/HICSS.2019.582"},{"key":"575_CR11","first-page":"569","volume":"6","author":"F Alotaibi","year":"2018","unstructured":"Alotaibi F, Furnell S, Stengel I, Papadaki M (2018) Design and evaluation of mobile games for enhancing cyber security awareness. J Intern Technol Secur Trans 6:569\u2013578","journal-title":"J Intern Technol Secur Trans"},{"key":"575_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.17083\/ijsg.v6i4.315","volume":"6","author":"A Alzahrani","year":"2019","unstructured":"Alzahrani A, Johnson C (2019) Autonomy motivators, serious games and intention toward ISP compliance. Int J Seri Game 6:67\u201385","journal-title":"Int J Seri Game"},{"key":"575_CR13","doi-asserted-by":"crossref","unstructured":"Alzahrani A, Johnson C, Altamimi S (2018) Information security policy compliance: investigating the role of intrinsic motivation towards policy compliance in the organisation. In: 2018 4th International conference on information management (ICIM), IEEE. pp. 125\u2013132","DOI":"10.1109\/INFOMAN.2018.8392822"},{"key":"575_CR14","first-page":"231","volume":"25","author":"ML Ambrose","year":"1999","unstructured":"Ambrose ML, Kulik CT (1999) Old friends, new faces: motivation research in the 1990s. J Manag 25:231\u2013292","journal-title":"J Manag"},{"key":"575_CR15","unstructured":"Arachchilage, NAG (2016) Serious games for cyber security education. arXiv preprint arXiv:1610.09511"},{"key":"575_CR16","doi-asserted-by":"publisher","first-page":"2045","DOI":"10.1111\/j.1559-1816.2004.tb02690.x","volume":"34","author":"PP Baard","year":"2004","unstructured":"Baard PP, Deci EL, Ryan RM (2004) Intrinsic need satisfaction: a motivational basis of performance and weil-being in two work settings. J Appl Soci Psychol 34:2045\u20132068","journal-title":"J Appl Soci Psychol"},{"key":"575_CR17","unstructured":"Bada M, Sasse AM, Nurse JR (2019) Cyber security awareness campaigns: why do they fail to change behaviour? arXiv preprint arXiv:1901.02672"},{"key":"575_CR18","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5120\/cae2016652369","volume":"5","author":"A Battou","year":"2016","unstructured":"Battou A, Baz O, Mammass D (2016) Learning design approaches for designing virtual learning environments. Commun Appl Electr 5:31\u201337","journal-title":"Commun Appl Electr"},{"key":"575_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/3130515.3130519","volume":"48","author":"S Bauer","year":"2017","unstructured":"Bauer S, Bernroider EW (2017) From information security awareness to reasoned compliant action: analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database: the DATABASE Adv Info Sys 48:44\u201368","journal-title":"ACM SIGMIS Database: the DATABASE Adv Info Sys"},{"key":"575_CR20","doi-asserted-by":"publisher","DOI":"10.4324\/9781315715117","volume-title":"Knowledge management: systems and processes","author":"I Becerra-Fernandez","year":"2014","unstructured":"Becerra-Fernandez I, Sabherwal R (2014) Knowledge management: systems and processes. Routledge"},{"key":"575_CR21","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quart 34:523\u2013548","journal-title":"MIS Quart"},{"key":"575_CR22","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1080\/09585190500083020","volume":"16","author":"EF Cabrera","year":"2005","unstructured":"Cabrera EF, Cabrera A (2005) Fostering knowledge sharing through people management practices. Int J Human Res Manag 16:720\u2013735","journal-title":"Int J Human Res Manag"},{"key":"575_CR23","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1016\/j.im.2014.03.007","volume":"51","author":"YH Chen","year":"2014","unstructured":"Chen YH, Lin TP, Yen DC (2014) How to facilitate inter-organizational knowledge sharing: the impact of trust. Info Manag 51:568\u2013578","journal-title":"Info Manag"},{"key":"575_CR24","doi-asserted-by":"publisher","first-page":"855","DOI":"10.2307\/25750708","volume":"34","author":"SY Choi","year":"2010","unstructured":"Choi SY, Lee H, Yoo Y (2010) The impact of information technology and transactive memory systems on knowledge sharing, application, and team performance: a field study. MIS Quart 34:855\u2013870","journal-title":"MIS Quart"},{"key":"575_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.cose.2006.10.005","volume":"26","author":"BD Cone","year":"2007","unstructured":"Cone BD, Irvine CE, Thompson MF, Nguyen TD (2007) A video game for cyber security training and awareness. Comput Secur 26:63\u201372","journal-title":"Comput Secur"},{"key":"575_CR26","doi-asserted-by":"publisher","first-page":"761","DOI":"10.5465\/amr.2007.25275511","volume":"32","author":"MA Cronin","year":"2007","unstructured":"Cronin MA, Weingart LR (2007) Representational gaps, information processing, and conflict in functionally diverse teams. Acad Manag Rev 32:761\u2013773","journal-title":"Acad Manag Rev"},{"key":"575_CR27","first-page":"1","volume":"30","author":"D Dang","year":"2017","unstructured":"Dang D, Nkhoma M (2017) Effects of team collaboration on sharing information security advice: insights from network analysis. Info Resour Manag J (IRMJ) 30:1\u201315","journal-title":"Info Resour Manag J (IRMJ)"},{"key":"575_CR28","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.chb.2016.10.025","volume":"67","author":"D Dang-Pham","year":"2017","unstructured":"Dang-Pham D, Pittayachawan S, Bruno V (2017) Why employees share information security advice? exploring the contributing factors and structural patterns of security advice sharing in the workplace. Comp Human Behav 67:196\u2013206","journal-title":"Comp Human Behav"},{"key":"575_CR29","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy J, Hovav A, Galletta D (2009) User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Info Sys Res 20:79\u201398","journal-title":"Info Sys Res"},{"key":"575_CR30","doi-asserted-by":"publisher","DOI":"10.1177\/1548051820969137","author":"EM David","year":"2020","unstructured":"David EM, Johnson LU, Meng CY, Lopez TN (2020) Stronger together: conditional indirect effect of servant leadership on transactive memory systems. J Leaders & Organiz Stud. https:\/\/doi.org\/10.1177\/1548051820969137","journal-title":"J Leaders & Organiz Stud"},{"key":"575_CR31","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1111\/j.1365-2575.2012.00400.x","volume":"23","author":"RM Davison","year":"2013","unstructured":"Davison RM, Ou CX, Martinsons MG (2013) Information technology to support informal knowledge sharing. Info Sys J 23:89\u2013109","journal-title":"Info Sys J"},{"key":"575_CR32","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1111\/j.1559-1816.1972.tb01266.x","volume":"2","author":"R DeCharms","year":"1972","unstructured":"DeCharms R (1972) Personal causation training in the schools 1. J Appl Soci Psychol 2:95\u2013113","journal-title":"J Appl Soci Psychol"},{"key":"575_CR33","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1111\/j.1467-6494.1994.tb00797.x","volume":"62","author":"EL Deci","year":"1994","unstructured":"Deci EL, Eghrari H, Patrick BC, Leone DR (1994) Facilitating internalization: the self-determination theory perspective. J Personal 62:119\u2013142","journal-title":"J Personal"},{"key":"575_CR34","doi-asserted-by":"crossref","unstructured":"Deci EL, Ryan RM (2010) Intrinsic motivation. The Corsini Encyclopedia of Psychology, 1\u20132","DOI":"10.1002\/9780470479216.corpsy0467"},{"key":"575_CR35","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1239\/aap\/1013540166","volume":"32","author":"PJ Diggle","year":"2000","unstructured":"Diggle PJ, Mateu J, Clough HE (2000) A comparison between parametric and non-parametric approaches to the analysis of replicated spatial point patterns. Adv Appl Probabil 32:331\u2013343","journal-title":"Adv Appl Probabil"},{"key":"575_CR36","first-page":"269","volume":"22","author":"L Dinneen","year":"1973","unstructured":"Dinneen L, Blakesley B (1973) Algorithm as 62: a generator for the sampling distribution of the mann-whitney u statistic. J Royal Stat Soci Series C (Appl Stat) 22:269\u2013273","journal-title":"J Royal Stat Soci Series C (Appl Stat)"},{"key":"575_CR37","doi-asserted-by":"crossref","unstructured":"Dixon M, Gamagedara\u00a0Arachchilage NA, Nicholson J (2019) Engaging users with educational games: The case of phishing. In: Extended abstracts of the 2019 CHI conference on human factors in computing systems, pp. 1\u20136","DOI":"10.1145\/3290607.3313026"},{"key":"575_CR38","volume-title":"Common knowledge: how companies thrive by sharing what they know","author":"NM Dixon","year":"2000","unstructured":"Dixon NM (2000) Common knowledge: how companies thrive by sharing what they know. Harvard Business School Press, Brighton"},{"key":"575_CR39","doi-asserted-by":"crossref","unstructured":"Feledi D, Fenz S (2012) Challenges of web-based information security knowledge sharing. In: 2012 seventh international conference on availability, reliability and security, IEEE. pp. 514\u2013521","DOI":"10.1109\/ARES.2012.59"},{"key":"575_CR40","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.istr.2013.03.004","volume":"17","author":"D Feledi","year":"2013","unstructured":"Feledi D, Fenz S, Lechner L (2013) Toward web-based information security knowledge sharing. Infor Secur Tech Report 17:199\u2013209","journal-title":"Infor Secur Tech Report"},{"key":"575_CR41","doi-asserted-by":"crossref","unstructured":"Gagn\u00e9 M (2009) A model of knowledge-sharing motivation. Human Resource Management: published in Cooperation with the School of Business Administration, The University of Michigan and in alliance with the Society of Human Resources Management 48:571\u2013589","DOI":"10.1002\/hrm.20298"},{"key":"575_CR42","doi-asserted-by":"publisher","DOI":"10.4324\/9780203838761","volume-title":"E-learning in the 21st century: a framework for research and practice","author":"DR Garrison","year":"2011","unstructured":"Garrison DR (2011) E-learning in the 21st century: a framework for research and practice. Routledge, New York"},{"key":"575_CR43","doi-asserted-by":"crossref","unstructured":"Gcaza N, von Solms R (2017) Cybersecurity culture: An ill-defined problem. In: IFIP World conference on information security education, Springer. pp. 98\u2013109","DOI":"10.1007\/978-3-319-58553-6_9"},{"key":"575_CR44","first-page":"5","volume":"16","author":"D Gefen","year":"2005","unstructured":"Gefen D, Straub D (2005) A practical guide to factorial validity using pls-graph: tutorial and annotated example. Commun Associat Info Sys 16:5","journal-title":"Commun Associat Info Sys"},{"key":"575_CR45","first-page":"236","volume":"9","author":"A Ghazvini","year":"2018","unstructured":"Ghazvini A, Shukur Z (2018) A Serious game for healthcare industry: information security awareness training program for hospital universiti kebangsaan Malaysia. Int J Adv Comp Sci Appl 9:236\u2013245","journal-title":"Int J Adv Comp Sci Appl"},{"key":"575_CR46","doi-asserted-by":"publisher","DOI":"10.1201\/9781315110479","volume-title":"Nonparametric statistical inference","author":"JD Gibbons","year":"2020","unstructured":"Gibbons JD, Chakraborti S (2020) Nonparametric statistical inference. CRC Press, Cambridge"},{"key":"575_CR47","doi-asserted-by":"crossref","unstructured":"Gjertsen, E.G.B., Gj\u00e6re EA, Bartnes M, Flores WR (2017) Gamification of information security awareness and training. In: ICISSP, pp. 59\u201370","DOI":"10.5220\/0006128500590070"},{"key":"575_CR48","volume-title":"Ethical issues: qualitative research in health care","author":"D Goodwin","year":"2006","unstructured":"Goodwin D, Mays N, Pope C (2006) Ethical issues: qualitative research in health care, 3rd edn. Wiley, Hoboken","edition":"3"},{"key":"575_CR49","doi-asserted-by":"crossref","unstructured":"Hadlington L (2021) The \u201chuman factor\u201d in cybersecurity: Exploring the accidental insider. In: Research anthology on artificial intelligence applications in security. IGI Global, pp. 1960\u20131977","DOI":"10.4018\/978-1-7998-7705-9.ch087"},{"key":"575_CR50","unstructured":"Haeussinger F, Kranz J (2013) Understanding the antecedents of information security awareness-an empirical study. In: Proceedings of the nineteenth americas conference on information systems, Chicago, Illinois"},{"key":"575_CR51","doi-asserted-by":"crossref","unstructured":"Hamari J, Koivisto J, Sarsa H (2014) Does gamification work? A literature review of empirical studies on gamification. In: 2014 47th Hawaii international conference on system sciences, pp. 3025\u20133034","DOI":"10.1109\/HICSS.2014.377"},{"key":"575_CR52","doi-asserted-by":"publisher","first-page":"101827","DOI":"10.1016\/j.cose.2020.101827","volume":"95","author":"S Hart","year":"2020","unstructured":"Hart S, Margheri A, Paci F, Sassone V (2020) Riskio: a serious game for cyber security awareness and education. Comp Secur 95:101827","journal-title":"Comp Secur"},{"key":"575_CR53","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1080\/17538157.2016.1255629","volume":"42","author":"Y He","year":"2017","unstructured":"He Y, Johnson C (2017) Challenges of information security incident learning: an industrial case study in a chinese healthcare organization. Info Health Social Care 42:393\u2013408","journal-title":"Info Health Social Care"},{"key":"575_CR54","first-page":"34","volume":"4","author":"SG Heilmann","year":"2013","unstructured":"Heilmann SG, Bartczak SE, Hobbs SE, Leach SE (2013) Assessing influences on perceived training transfer: If I only knew then what I need to know now. J Bus Educat Leadership 4:34","journal-title":"J Bus Educat Leadership"},{"key":"575_CR55","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ijhcs.2006.09.003","volume":"65","author":"MH Hsu","year":"2007","unstructured":"Hsu MH, Ju TL, Yen CH, Chang CM (2007) Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy and outcome expectations. Int J Human-Comp Stud 65:153\u2013169","journal-title":"Int J Human-Comp Stud"},{"key":"575_CR56","doi-asserted-by":"crossref","unstructured":"Jackson P, Klobas J (2008) The organization as a transactive memory system. In: Becoming Virtual. Springer, pp. 111\u2013133","DOI":"10.1007\/978-3-7908-1958-8_8"},{"key":"575_CR57","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.chb.2016.09.012","volume":"66","author":"M Junger","year":"2017","unstructured":"Junger M, Montoya L, Overink FJ (2017) Priming and warnings are not effective to prevent social engineering attacks. Comp Human Behav 66:75\u201387","journal-title":"Comp Human Behav"},{"key":"575_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102267","author":"K Khando","year":"2021","unstructured":"Khando K, Gao S, Islam SM, Salman A (2021) Enhancing employees information security awareness in private and public organisations: a systematic literature review. Comp Secur. https:\/\/doi.org\/10.1016\/j.cose.2021.102267","journal-title":"Comp Secur"},{"key":"575_CR59","doi-asserted-by":"publisher","DOI":"10.1201\/9780203488751","volume-title":"Information security architecture: an integrated approach to security in the organization","author":"J Killmeyer","year":"2006","unstructured":"Killmeyer J (2006) Information security architecture: an integrated approach to security in the organization. CRC Press, Cambridge"},{"key":"575_CR60","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1111\/j.1540-6210.2006.00595.x","volume":"66","author":"S Kim","year":"2006","unstructured":"Kim S, Lee H (2006) The impact of organizational context and information technology on employee knowledge-sharing capabilities. Public Administr Rev 66:370\u2013385","journal-title":"Public Administr Rev"},{"key":"575_CR61","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1177\/0093650212469402","volume":"42","author":"J Kotlarsky","year":"2015","unstructured":"Kotlarsky J, van den Hooff B, Houtman L (2015) Are we on the same page? knowledge boundaries and transactive memory system development in cross-functional teams. Commun Res 42:319\u2013344","journal-title":"Commun Res"},{"key":"575_CR62","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.cose.2006.02.008","volume":"25","author":"HA Kruger","year":"2006","unstructured":"Kruger HA, Kearney WD (2006) A prototype for assessing information security awareness. Comp Secur 25:289\u2013296","journal-title":"Comp Secur"},{"key":"575_CR63","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1108\/MRR-04-2013-0085","volume":"37","author":"B Lebek","year":"2014","unstructured":"Lebek B, Uffen J, Neumann M, Hohler B, Breitner HM (2014) Information security awareness and behavior: a theory-based literature review. Manag Res Rev 37:1049\u20131092","journal-title":"Manag Res Rev"},{"key":"575_CR64","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1023\/A:1026516627735","volume":"2","author":"F Lehner","year":"2000","unstructured":"Lehner F, Maier RK (2000) How can organizational memory theories contribute to organizational memory systems? Info Sys Front 2:277\u2013298","journal-title":"Info Sys Front"},{"key":"575_CR65","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1037\/0021-9010.88.4.587","volume":"88","author":"K Lewis","year":"2003","unstructured":"Lewis K (2003) Measuring transactive memory systems in the field: scale development and validation. J Appl Psychol 88:587\u2013604","journal-title":"J Appl Psychol"},{"key":"575_CR66","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1287\/orsc.1110.0647","volume":"22","author":"K Lewis","year":"2011","unstructured":"Lewis K, Herndon B (2011) Transactive memory systems: current issues and future research directions. Organiz Sci 22:1254\u20131265","journal-title":"Organiz Sci"},{"key":"575_CR67","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1177\/0146167295214009","volume":"21","author":"DW Liang","year":"1995","unstructured":"Liang DW, Moreland R, Argote L (1995) Group versus individual training and group performance: the mediating role of transactive memory. Personal Soc Psychol Bull 21:384\u2013393","journal-title":"Personal Soc Psychol Bull"},{"key":"575_CR68","doi-asserted-by":"publisher","first-page":"7798","DOI":"10.1016\/j.eswa.2008.11.041","volume":"36","author":"J Luengo","year":"2009","unstructured":"Luengo J, Garc\u00eda S, Herrera F (2009) A study on the use of statistical tests for experimentation with neural networks: Analysis of parametric test conditions and non-parametric tests. Expert Sys Appl 36:7798\u20137808","journal-title":"Expert Sys Appl"},{"key":"575_CR69","doi-asserted-by":"crossref","unstructured":"Mejias RJ (2012) An integrative model of information security awareness for assessing information systems security risk. In: 2012 45th Hawai\u2019i international conference on system sciences, IEEE. pp. 3258\u20133267","DOI":"10.1109\/HICSS.2012.104"},{"key":"575_CR70","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1080\/07421222.2017.1394083","volume":"34","author":"P Menard","year":"2017","unstructured":"Menard P, Bott GJ, Crossler RE (2017) User motivations in protecting information security: Protection motivation theory versus self-determination theory. J Manag Info Sys 34:1203\u20131230","journal-title":"J Manag Info Sys"},{"key":"575_CR71","unstructured":"Mermoud A, Keupp M, Huguenin K, Palmi\u00e9, M., David DP (2018) Incentives for human agents to share security information: a model and an empirical test. In: 17th workshop on the economics of information security (WEIS), pp. 1\u201322"},{"key":"575_CR72","volume-title":"Qualitative methods overview","author":"J Moriarty","year":"2011","unstructured":"Moriarty J (2011) Qualitative methods overview. National Institute for Health Research School for Social Care, London"},{"key":"575_CR73","volume-title":"Resear Info Sys Comp","author":"BJ Oates","year":"2005","unstructured":"Oates BJ (2005) Resear Info Sys Comp. Sage, London"},{"key":"575_CR74","unstructured":"Olusegun OJ, Ithnin NB (2013) People are the answer to security: establishing a sustainable information security awareness training (ISAT) program in organization. arXiv preprint arXiv:1309.0188"},{"key":"575_CR75","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.chb.2017.07.031","volume":"76","author":"J Ortiz","year":"2017","unstructured":"Ortiz J, Chang SH, Chih WH, Wang CH (2017) The contradiction between self-protection and self-presentation on knowledge sharing behavior. Comp Human Behav 76:406\u2013416","journal-title":"Comp Human Behav"},{"key":"575_CR76","volume-title":"Reward management: alternatives, consequences and contexts","author":"SJ Perkins","year":"2020","unstructured":"Perkins SJ, Jones S (2020) Reward management: alternatives, consequences and contexts. Kogan Page Publishers, London"},{"key":"575_CR77","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1108\/13673270310505386","volume":"7","author":"JD Politis","year":"2003","unstructured":"Politis JD (2003) The connection between trust and knowledge management: what are its implications for team performance. J Knowl Manag 7:55\u201366","journal-title":"J Knowl Manag"},{"key":"575_CR78","doi-asserted-by":"publisher","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"P Puhakainen","year":"2010","unstructured":"Puhakainen P, Siponen M (2010) Improving employees\u2019 compliance through information systems security training: an action research study. MIS Quart 34:757\u2013778","journal-title":"MIS Quart"},{"key":"575_CR79","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1108\/K-12-2014-0283","volume":"44","author":"NHA Rahim","year":"2015","unstructured":"Rahim NHA, Hamid S, Mat Kiah ML, Shamshirband S, Furnell S (2015) A systematic review of approaches to assessing cybersecurity awareness. Kybernetes 44:606\u2013622","journal-title":"Kybernetes"},{"key":"575_CR80","doi-asserted-by":"publisher","first-page":"163","DOI":"10.5465\/amr.2008.27751276","volume":"33","author":"R Rico","year":"2008","unstructured":"Rico R, S\u00e1nchez-Manzanares M, Gil F, Gibson C (2008) Team implicit coordination processes: a team knowledge-based approach. Acad Manag Rev 33:163\u2013184","journal-title":"Acad Manag Rev"},{"key":"575_CR81","doi-asserted-by":"crossref","DOI":"10.5040\/9798400658105","volume-title":"Glued to games: how video games draw us in and hold us spellbound: how video games draw us in and hold us spellbound","author":"S Rigby","year":"2011","unstructured":"Rigby S, Ryan RM (2011) Glued to games: how video games draw us in and hold us spellbound: how video games draw us in and hold us spellbound. Greenwood Publishing Group, Santa Barbara"},{"key":"575_CR82","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1016\/j.chb.2007.06.001","volume":"24","author":"JC Roca","year":"2008","unstructured":"Roca JC, Gagn\u00e9 M (2008) Understanding e-learning continuance intention in the workplace: a self-determination theory perspective. Comp Human Behav 24:1585\u20131604","journal-title":"Comp Human Behav"},{"key":"575_CR83","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1108\/IMCS-11-2013-0083","volume":"22","author":"W Rocha Flores","year":"2014","unstructured":"Rocha Flores W, Holm H, Svensson G, Ericsson G (2014) Using phishing experiments and scenario-based surveys to understand security behaviours in practice. Info Manag & Comp Secur 22:393\u2013406","journal-title":"Info Manag & Comp Secur"},{"key":"575_CR84","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1037\/0003-066X.55.1.68","volume":"55","author":"RM Ryan","year":"2000","unstructured":"Ryan RM, Deci EL (2000) Self-determination theory and the facilitation of intrinsic motivation, social development and well-being. Am Psychol 55:68","journal-title":"Am Psychol"},{"key":"575_CR85","first-page":"3","volume":"2","author":"RM Ryan","year":"2002","unstructured":"Ryan RM, Deci EL (2002) Overview of self-determination theory: an organismic dialectical perspective. Handbk Self-Determ Res 2:3\u201333","journal-title":"Handbk Self-Determ Res"},{"key":"575_CR86","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1049\/iet-ifs.2017.0257","volume":"12","author":"NS Safa","year":"2017","unstructured":"Safa NS, Maple C, Watson T, Furnell S (2017) Information security collaboration formation in organisations. IET Info Secur 12:238\u2013245","journal-title":"IET Info Secur"},{"key":"575_CR87","first-page":"247","volume":"40","author":"NS Safa","year":"2018","unstructured":"Safa NS, Maple C, Watson T, Von Solms R (2018) Motivation and opportunity based model to reduce information security insider threats in organisations. J Info Secur Appl 40:247\u2013257","journal-title":"J Info Secur Appl"},{"key":"575_CR88","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.chb.2015.12.037","volume":"57","author":"NS Safa","year":"2016","unstructured":"Safa NS, Von Solms R (2016) An information security knowledge sharing model in organizations. Comp Human Behav 57:442\u2013451","journal-title":"Comp Human Behav"},{"key":"575_CR89","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.chb.2016.12.033","volume":"69","author":"M Sailer","year":"2017","unstructured":"Sailer M, Hense JU, Mayr SK, Mandl H (2017) How gamification motivates: an experimental study of the effects of specific game design elements on psychological need satisfaction. Comp Human Behav 69:371\u2013380","journal-title":"Comp Human Behav"},{"key":"575_CR90","doi-asserted-by":"publisher","first-page":"2396","DOI":"10.1108\/JKM-10-2020-0777","volume":"25","author":"M S\u00e1iz-Pardo","year":"2021","unstructured":"S\u00e1iz-Pardo M, Dom\u00ednguez MCH, Molina LM (2021) Transactive memory systems mediation role in the relationship between motivation and internal knowledge transfers in a military environment. J Knowl Manag 25:2396\u20132419. https:\/\/doi.org\/10.1108\/JKM-10-2020-0777","journal-title":"J Knowl Manag"},{"key":"575_CR91","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"MT Siponen","year":"2000","unstructured":"Siponen MT (2000) A conceptual foundation for organizational information security awareness. Info Manag Comp Secur 8:31\u201341","journal-title":"Info Manag Comp Secur"},{"key":"575_CR92","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.im.2011.07.002","volume":"48","author":"JY Son","year":"2011","unstructured":"Son JY (2011) Out of fear or desire? toward a better understanding of employees\u2019 motivation to follow is security policies. Info Manag 48:296\u2013302","journal-title":"Info Manag"},{"key":"575_CR93","volume-title":"Using multivariate statistics","author":"BG Tabachnick","year":"2007","unstructured":"Tabachnick BG, Fidell LS, Ullman JB (2007) Using multivariate statistics, vol 5. Pearson, Boston, MA"},{"key":"575_CR94","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1108\/09685229810227649","volume":"6","author":"ME Thomson","year":"1998","unstructured":"Thomson ME, von Solms R (1998) Information security awareness: educating your users effectively. Info Manag Comp Secur 6:167\u2013173","journal-title":"Info Manag Comp Secur"},{"key":"575_CR95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/14778238.2021.1909430","volume":"19","author":"G Tortorella","year":"2021","unstructured":"Tortorella G, Narayanamurthy G, Staines J (2021) Covid-19 implications on the relationship between organizational learning and performance. Knowl Manag Res & Pract 19:1\u201314","journal-title":"Knowl Manag Res & Pract"},{"key":"575_CR96","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1057\/ejis.2013.27","volume":"24","author":"A Tsohou","year":"2015","unstructured":"Tsohou A, Karyda M, Kokolakis S, Kiountouzis E (2015) Managing the introduction of information security awareness programmes in organisations. Eur J Info Sys 24:38\u201358","journal-title":"Eur J Info Sys"},{"key":"575_CR97","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance A, Siponen M, Pahnila S (2012) Motivating is security compliance: insights from habit and protection motivation theory. Info Manag 49:190\u2013198","journal-title":"Info Manag"},{"key":"575_CR98","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/joeuc.2012010102","volume":"24","author":"A Vance","year":"2012","unstructured":"Vance A, Siponen MT (2012) Is security policy violations: a rational choice perspective. J Organiz User Comp (JOEUC) 24:21\u201341","journal-title":"J Organiz User Comp (JOEUC)"},{"key":"575_CR99","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infoandorg.2014.11.001","volume":"25","author":"WT Wang","year":"2015","unstructured":"Wang WT, Hou YP (2015) Motivations of employees\u2019 knowledge sharing behaviors: a self-determination perspective. Info Organiz 25:1\u201326","journal-title":"Info Organiz"},{"key":"575_CR100","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.ijinfomgt.2018.04.001","volume":"41","author":"Y Wang","year":"2018","unstructured":"Wang Y, Huang Q, Davison RM, Yang F (2018) Effect of transactive memory systems on team performance mediated by knowledge transfer. Int J Info Manag 41:65\u201379","journal-title":"Int J Info Manag"},{"key":"575_CR101","doi-asserted-by":"crossref","unstructured":"Wegner DM (1987) Transactive memory: A contemporary analysis of the group mind. In: Theories of Group Behavior. Springer, pp. 185\u2013208","DOI":"10.1007\/978-1-4612-4634-3_9"},{"key":"575_CR102","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1108\/03055721211227255","volume":"42","author":"V Wickramasinghe","year":"2012","unstructured":"Wickramasinghe V, Widyaratne R (2012) Effects of interpersonal trust, team leader support, rewards and knowledge sharing mechanisms on knowledge sharing in project teams. Vine 42:214\u2013236","journal-title":"Vine"},{"key":"575_CR103","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1177\/0093650206298067","volume":"34","author":"YC Yuan","year":"2007","unstructured":"Yuan YC, Fulk J, Monge PR (2007) Access to information in connective and communal transactive memory systems. Commun Res 34:131\u2013155","journal-title":"Commun Res"},{"key":"575_CR104","unstructured":"Zhang T (2018) Knowledge expiration in security awareness training. In: Annual ADFSL conference on digital forensics, security and law, pp. 197\u2013212"},{"key":"575_CR105","doi-asserted-by":"publisher","DOI":"10.1108\/VJIKMS-11-2018-0108","author":"T Zhang","year":"2019","unstructured":"Zhang T, Wang WYC, Techatassanasoontorn AA (2019) User\u2019s feedback contribution to enhance professional online community: a motivational process. VINE J Info Knowl Manag Sys. https:\/\/doi.org\/10.1108\/VJIKMS-11-2018-0108","journal-title":"VINE J Info Knowl Manag Sys"},{"key":"575_CR106","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.ijinfomgt.2011.11.001","volume":"32","author":"X Zhong","year":"2012","unstructured":"Zhong X, Huang Q, Davison RM, Yang X, Chen H (2012) Empowering teams through social network ties. Int J Info Manag 32:209\u2013220","journal-title":"Int J Info Manag"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-022-00575-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10257-022-00575-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-022-00575-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:58:57Z","timestamp":1744207137000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10257-022-00575-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,12]]},"references-count":106,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["575"],"URL":"https:\/\/doi.org\/10.1007\/s10257-022-00575-2","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,12]]},"assertion":[{"value":"5 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}