{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T16:16:38Z","timestamp":1663776998558},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T00:00:00Z","timestamp":1412035200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s10660-014-9155-2","type":"journal-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T15:38:14Z","timestamp":1412005094000},"page":"293-319","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Public IT service strategy for social information security in the intelligence all-things environment"],"prefix":"10.1007","volume":"14","author":[{"given":"Jinho","family":"Yoo","sequence":"first","affiliation":[]},{"given":"Hangbae","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,30]]},"reference":[{"issue":"5\u20136","key":"9155_CR1","first-page":"207","volume":"17","author":"A Tsohoua","year":"2008","unstructured":"Tsohoua, A., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2008). Investigating information security awareness: Research and practice gaps. Information Security Journal: A Global Perspective, 17(5\u20136), 207\u2013227.","journal-title":"Information Security Journal: A Global Perspective"},{"issue":"3","key":"9155_CR2","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s10660-009-9036-2","volume":"9","author":"DG Taylor","year":"2009","unstructured":"Taylor, D. G., Davis, D. F., & Jillapalli, R. (2009). Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203\u2013223.","journal-title":"Electronic Commerce Research"},{"key":"9155_CR3","unstructured":"ISO\/IEC 27002:2005 (2005). Information technology Security techniques Code of practice for information security management."},{"issue":"1","key":"9155_CR4","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.dss.2008.06.005","volume":"46","author":"C Jahyun Goo","year":"2008","unstructured":"Jahyun Goo, C., & Huang, D. (2008). Facilitating relational governance through service level agreements in IT outsourcing: An application of the commitment-trust theory. Decision Support Systems, 46(1), 216\u2013232.","journal-title":"Decision Support Systems"},{"issue":"1","key":"9155_CR5","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1023\/B:ELEC.0000045977.47306.16","volume":"5","author":"JH Kaufman","year":"2005","unstructured":"Kaufman, J. H., Edlund, S., Ford, D. A., & Powers, C. (2005). The social contract core. Electronic Commerce Research, 5(1), 141\u2013165.","journal-title":"Electronic Commerce Research"},{"issue":"2","key":"9155_CR6","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","volume":"29","author":"A Veiga Da","year":"2010","unstructured":"Da Veiga, A., & Eloff, J. H. P. (2010). A framework and assessment instrument for information security culture. Computers and Security, 29(2), 196\u2013207.","journal-title":"Computers and Security"},{"issue":"60","key":"9155_CR7","first-page":"37","volume":"3","author":"WO Baggett","year":"2003","unstructured":"Baggett, W. O. (2003). Creating a culture of security. The Internal Auditor, 3(60), 37\u201341.","journal-title":"The Internal Auditor"},{"issue":"1","key":"9155_CR8","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1108\/09685229710168006","volume":"5","author":"R Solms Von","year":"2000","unstructured":"Von Solms, R. (2000). Driving safely on the information superhighway. Information Management & Computer Security, 5(1), 20\u201322.","journal-title":"Information Management & Computer Security"},{"issue":"1","key":"9155_CR9","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79\u201398.","journal-title":"Information Systems Research"},{"issue":"4","key":"9155_CR10","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1080\/10580530701586136","volume":"24","author":"A Veiga Da","year":"2007","unstructured":"Da Veiga, A., & Eloff, J. H. P. (2007). An information security governance framework. Information Systems Management, 24(4), 361\u2013372.","journal-title":"Information Systems Management"},{"issue":"9","key":"9155_CR11","first-page":"35","volume":"104","author":"N Richards","year":"2002","unstructured":"Richards, N. (2002). The critical importance of information security to financial institutions. Business Credit, 104(9), 35\u201336.","journal-title":"Business Credit"},{"issue":"2","key":"9155_CR12","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10660-007-9002-9","volume":"7","author":"R Smith","year":"2007","unstructured":"Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89\u2013116.","journal-title":"Electronic Commerce Research"},{"issue":"1","key":"9155_CR13","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R. H. (2010). Internet of things\u2014new security and privacy challenges. Computer Law & Security Review, 26(1), 23\u201330.","journal-title":"Computer Law & Security Review"},{"key":"9155_CR14","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.cose.2006.10.008","volume":"26","author":"AB Ruighaver","year":"2007","unstructured":"Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organisational security, culture: Extending the end-user perspective. Computers and Security, 26, 56\u201362.","journal-title":"Computers and Security"},{"key":"9155_CR15","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-642-17226-7_15","volume":"6462","author":"F Mattern","year":"2010","unstructured":"Mattern, F., & Floerkemeier, C. (2010). From the internet of computers to the internet of things. Lecture Notes in Computer Science, 6462, 242\u2013259.","journal-title":"Lecture Notes in Computer Science"},{"key":"9155_CR16","unstructured":"Chang, H., HyukjunKwon, J. K., & Kim, Y. (2011). A case study on intelligent service design in ubiquitous computing. Computing and Informatics, 30, 513\u2013529."},{"issue":"3\u20134","key":"9155_CR17","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1023\/A:1023487309176","volume":"3","author":"H Pham","year":"2003","unstructured":"Pham, H., Ye, Y., & Nguyen, V. (2003). Autonomous mapping of e-business demands and supplies via invisible internet agents. Electronic Commerce Research, 3(3\u20134), 365\u2013395.","journal-title":"Electronic Commerce Research"},{"key":"9155_CR18","unstructured":"Hellriegel, D., Slocum Jr., J. W., & Woodman R. W. (1998). Organizational behavior, Eighth edition, South-Western College Publishing."},{"issue":"3","key":"9155_CR19","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10660-009-9035-3","volume":"9","author":"K Mackenzie","year":"2009","unstructured":"Mackenzie, K., Buckby, S., & Irvine, H. (2009). A framework for evaluating business lead users\u2019 virtual reality innovations in second life. Electronic Commerce Research, 9(3), 183\u2013202.","journal-title":"Electronic Commerce Research"},{"issue":"4","key":"9155_CR20","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.cose.2006.02.008","volume":"25","author":"HA Kruger","year":"2006","unstructured":"Kruger, H. A., & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers and Security, 25(4), 289\u2013296.","journal-title":"Computers and Security"},{"issue":"3\u20134","key":"9155_CR21","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.cose.2008.11.007","volume":"28","author":"MT Dlamini","year":"2009","unstructured":"Dlamini, M. T., Eloff, J. H. P., & Eloff, M. M. (2009). Information security: The moving target. Computers & Security, 28(3\u20134), 189\u2013198.","journal-title":"Computers & Security"},{"issue":"1","key":"9155_CR22","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.lisr.2003.11.006","volume":"26","author":"PT Jaeger","year":"2004","unstructured":"Jaeger, P. T., & Thompson, K. M. (2004). Social information behavior and the democratic process: Information poverty, normative behavior, and electronic government in the United States. Library & Information Science Research, 26(1), 94\u2013107.","journal-title":"Library & Information Science Research"},{"key":"9155_CR23","volume-title":"Common sense guide to prevention and detection of insider threats","author":"D Cappelli","year":"2006","unstructured":"Cappelli, D., Moore, A., Shimeall, T. J., & Trzeciak, R. (2006). Common sense guide to prevention and detection of insider threats. Pittsburgh: Carnegie Mellon University CyLab."},{"key":"9155_CR24","doi-asserted-by":"crossref","unstructured":"Liu, D., Wang, X. F., & Jean Camp, L. (2009). Mitigating inadvertent insider threats with incentives. Financial Cryptography and Data Security, 5628, 1\u201316.","DOI":"10.1007\/978-3-642-03549-4_1"},{"key":"9155_CR25","unstructured":"Donaldson, W. H., & U.S., (2005). Capital markets in the post-Sarbanes-Oxley world: Why our markets should matter to foreign issuers. London School of Economics and Political Science: U.S. Securities and Exchange Commission."},{"issue":"3","key":"9155_CR26","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.cose.2004.01.012","volume":"23","author":"C Vroom","year":"2004","unstructured":"Vroom, C., & Von Solms, R. (2004). Towards information security behavioural compliance. Computers and Security, 23(3), 191\u2013198.","journal-title":"Computers and Security"},{"issue":"1","key":"9155_CR27","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s10660-010-9043-3","volume":"10","author":"T Regner","year":"2010","unstructured":"Regner, T., Barria, J. A., Pitt, J. V., & Neville, B. (2010). Governance of digital content in the era of mass participation. Electronic Commerce Research, 10(1), 99\u2013110.","journal-title":"Electronic Commerce Research"},{"issue":"48","key":"9155_CR28","first-page":"24","volume":"34","author":"D Verton","year":"2000","unstructured":"Verton, D. (2000). Companies aim to build security awareness. Computerworld, 34(48), 24.","journal-title":"Computerworld"},{"issue":"6","key":"9155_CR29","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/j.cose.2005.07.003","volume":"24","author":"SH Solms Von","year":"2000","unstructured":"Von Solms, S. H. (2000). Information security governance-compliance management vs. operational management. Computers and Security, 24(6), 443\u2013447.","journal-title":"Computers and Security"},{"key":"9155_CR30","unstructured":"Yeats, D., Cadle, J. (1996). Project management for information systems (2nd ed.). London: Pearson Professional."},{"key":"9155_CR31","doi-asserted-by":"crossref","unstructured":"Martins, A. (2002). Information security culture. Master\u2019s dissertation, Rand Afrikaans University, Johannesburg.","DOI":"10.1007\/978-0-387-35586-3_16"},{"key":"9155_CR32","unstructured":"Martins, A., Eloff, J. H. P. (2002). Information security culture, IFIP\/SEC2002. In: Security in the information society (pp. 203\u201314). Boston: Kluwer Academic."},{"key":"9155_CR33","unstructured":"Robbins, S., Odendaal, A., Roodt, G. (2003). Organisational behaviour - global and southern African perspectives. Cape Town: Pearson Education South Africa."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-014-9155-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-014-9155-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-014-9155-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T11:30:07Z","timestamp":1565868607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-014-9155-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,30]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["9155"],"URL":"https:\/\/doi.org\/10.1007\/s10660-014-9155-2","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,30]]}}}