{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:29Z","timestamp":1740122369027,"version":"3.37.3"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10796-022-10367-1","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T06:03:13Z","timestamp":1674021793000},"page":"2475-2491","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Workgroup Collective Efficacy to Information Security Management: Manifestation of its Antecedents and Empirical Examination"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2822-9344","authenticated-orcid":false,"given":"Chul Woo","family":"Yoo","sequence":"first","affiliation":[]},{"given":"Inkyoung","family":"Hur","sequence":"additional","affiliation":[]},{"given":"Jahyun","family":"Goo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,18]]},"reference":[{"issue":"1","key":"10367_CR1","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1006\/jvbe.2000.1753","volume":"58","author":"SL Anderson","year":"2001","unstructured":"Anderson, S. L., & Betz, N. E. (2001). Sources of social self-efficacy expectations: their measurement and relation to career development. Journal of Vocational Behavior, 58(1), 98\u2013117.","journal-title":"Journal of Vocational Behavior"},{"issue":"2","key":"10367_CR2","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","volume":"84","author":"A Bandura","year":"1977","unstructured":"Bandura, A. (1977). Self-Efficacy: toward a unifying theory of behavioral change. Psychological Review, 84(2), 191\u2013215.","journal-title":"Psychological Review"},{"issue":"2","key":"10367_CR3","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1037\/0003-066X.37.2.122","volume":"37","author":"A Bandura","year":"1982","unstructured":"Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122.","journal-title":"American Psychologist"},{"key":"10367_CR4","unstructured":"Bandura, A. (1986). Social foundation of thought and action: a social cognitive theory. PrenticeHall."},{"key":"10367_CR5","doi-asserted-by":"publisher","unstructured":"Bandura, A. (1994). Self-efficacy. Wiley Online Library.\u00a0https:\/\/doi.org\/10.1002\/9780470479216.corpsy0836","DOI":"10.1002\/9780470479216.corpsy0836"},{"key":"10367_CR6","unstructured":"Bandura, A. (1997). Self-efficacy: The exercise of control. Freeman."},{"key":"10367_CR7","volume-title":"Social cognitive theory of personality","author":"A Bandura","year":"1999","unstructured":"Bandura, A. (1999). Social cognitive theory of personality. The Guilford Press."},{"issue":"3","key":"10367_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1111\/1467-8721.00064","volume":"9","author":"A Bandura","year":"2000","unstructured":"Bandura, A. (2000). Exercise of human agency through collective efficacy. Current Directions in Psychological Science, 9(3), 75\u201378.","journal-title":"Current Directions in Psychological Science"},{"issue":"5","key":"10367_CR9","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1111\/j.1559-1816.1990.tb00417.x","volume":"20","author":"RA Baron","year":"1990","unstructured":"Baron, R. A. (1990). Environmentally Induced positive affect: its impact on self-efficacy, task performance, negotiation, and conflict 1. Journal of Applied Social Psychology, 20(5), 368\u2013384.","journal-title":"Journal of Applied Social Psychology"},{"issue":"4","key":"10367_CR10","first-page":"69","volume":"48","author":"A Bhattacherjee","year":"2008","unstructured":"Bhattacherjee, A., & Hikmet, N. (2008). Reconceptualizing organizational support and its effect on information technology usage: evidence from the health care sector. Journal of Computer Information Systems, 48(4), 69\u201376.","journal-title":"Journal of Computer Information Systems"},{"issue":"3","key":"10367_CR11","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523\u2013548.","journal-title":"MIS Quarterly"},{"key":"10367_CR12","doi-asserted-by":"crossref","unstructured":"Carroll, J. M., Rosson, M. B., & Zhou, J. (2005). Collective efficacy as a measure of community. Proceedings of The SIGCHI Conference on Human Factors in Computing Systems\u00a0(pp. 1\u201310). ACM.","DOI":"10.1145\/1054972.1054974"},{"issue":"2","key":"10367_CR13","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1037\/0021-9010.83.2.234","volume":"83","author":"D Chan","year":"1998","unstructured":"Chan, D. (1998). Functional relations among constructs in the same content domain at different levels of analysis: a typology of composition models. Journal of Applied Psychology, 83(2), 234.","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"10367_CR14","doi-asserted-by":"publisher","first-page":"471","DOI":"10.2307\/258093","volume":"13","author":"JA Conger","year":"1988","unstructured":"Conger, J. A., & Kanungo, R. N. (1988). The empowerment process: integrating theory and practice. Academy of Management Review, 13(3), 471\u2013482.","journal-title":"Academy of Management Review"},{"key":"10367_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.25300\/MISQ\/2019\/15117","volume":"43","author":"WA Cram","year":"2019","unstructured":"Cram, W. A., D\u2019Arcy, J., & Proudfoot, J. G. (2019). Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. MIS Quarterly, 43, 2.","journal-title":"MIS Quarterly"},{"issue":"2","key":"10367_CR16","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","volume":"29","author":"A Da Veiga","year":"2010","unstructured":"Da Veiga, A., & Eloff, J. H. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29(2), 196\u2013207.","journal-title":"Computers & Security"},{"issue":"6","key":"10367_CR17","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1037\/0021-9010.89.6.1035","volume":"89","author":"RP DeShon","year":"2004","unstructured":"DeShon, R. P., Kozlowski, S. W., Schmidt, A. M., Milner, K. R., & Wiechmann, D. (2004). A multiple-goal, multilevel model of feedback effects on the regulation of individual and team performance. Journal of Applied Psychology, 89(6), 1035.","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"10367_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1002\/job.2418","volume":"41","author":"AP Giordano","year":"2020","unstructured":"Giordano, A. P., Patient, D., Passos, A. M., & Sguera, F. (2020). Antecedents and consequences of collective psychological ownership: the validation of a conceptual model. Journal of Organizational Behavior, 41(1), 32\u201349.","journal-title":"Journal of Organizational Behavior"},{"issue":"3","key":"10367_CR19","doi-asserted-by":"publisher","first-page":"472","DOI":"10.2307\/258514","volume":"12","author":"ME Gist","year":"1987","unstructured":"Gist, M. E. (1987). Self-efficacy: implications for organizational behavior and human resource management. Academy of Management Review, 12(3), 472\u2013485.","journal-title":"Academy of Management Review"},{"issue":"4","key":"10367_CR20","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1111\/j.1744-6570.1989.tb00675.x","volume":"42","author":"ME Gist","year":"1989","unstructured":"Gist, M. E. (1989). The influence of training method on self-efficacy and idea generation among managers. Personnel Psychology, 42(4), 787\u2013805.","journal-title":"Personnel Psychology"},{"issue":"6","key":"10367_CR21","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1037\/0021-9010.74.6.884","volume":"74","author":"ME Gist","year":"1989","unstructured":"Gist, M. E., Schwoerer, C., & Rosen, B. (1989). Effects of alternative training methods on self-efficacy and performance in computer software training. Journal of applied psychology, 74(6), 884.","journal-title":"Journal of applied psychology"},{"issue":"3","key":"10367_CR22","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1037\/0022-0663.93.3.467","volume":"93","author":"RD Goddard","year":"2001","unstructured":"Goddard, R. D. (2001). Collective efficacy: a neglected construct in the study of schools and student achievement. Journal of Educational Psychology, 93(3), 467.","journal-title":"Journal of Educational Psychology"},{"issue":"7","key":"10367_CR23","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/S0742-051X(01)00032-4","volume":"17","author":"RD Goddard","year":"2001","unstructured":"Goddard, R. D., & Goddard, Y. L. (2001). A multilevel analysis of the relationship between teacher and collective efficacy in urban schools. Teaching and Teacher Education, 17(7), 807\u2013818.","journal-title":"Teaching and Teacher Education"},{"issue":"3","key":"10367_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3102\/0013189X033003003","volume":"33","author":"RD Goddard","year":"2004","unstructured":"Goddard, R. D., Hoy, W. K., & Hoy, A. W. (2004). Collective efficacy beliefs: theoretical developments, empirical evidence, and future directions. Educational Researcher, 33(3), 3\u201313.","journal-title":"Educational Researcher"},{"key":"10367_CR25","doi-asserted-by":"crossref","unstructured":"Goo, J., Yim, M. S., & Kim, D. J. (2014). A path to successful management of employee security compliance: An empirical study of information security climate.\u00a0IEEE Transactions on Professional Communication,\u00a057(4), 286\u2013308.","DOI":"10.1109\/TPC.2014.2374011"},{"issue":"1","key":"10367_CR26","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1146\/annurev.psych.47.1.307","volume":"47","author":"RA Guzzo","year":"1996","unstructured":"Guzzo, R. A., & Dickson, M. W. (1996). Teams in organizations: recent research on performance and effectiveness. Annual Review of Psychology, 47(1), 307\u2013338.","journal-title":"Annual Review of Psychology"},{"issue":"2","key":"10367_CR27","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154\u2013165.","journal-title":"Decision Support Systems"},{"key":"10367_CR28","doi-asserted-by":"crossref","unstructured":"Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organisations.\u00a0European Journal of Information Systems,\u00a018(2), 106\u2013125.","DOI":"10.1057\/ejis.2009.6"},{"key":"10367_CR29","doi-asserted-by":"crossref","unstructured":"Hofmann, D. A. (2004). Issues in multilevel research: Theory development, measurement, and analysis. Wiley-Blackwell.","DOI":"10.1002\/9780470756669.ch12"},{"issue":"2","key":"10367_CR30","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1287\/isre.2015.0569","volume":"26","author":"JSC Hsu","year":"2015","unstructured":"Hsu, J. S. C., Shih, S. P., Hung, Y. W., & Lowry, P. B. (2015). The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research, 26(2), 282\u2013300.","journal-title":"Information Systems Research"},{"key":"10367_CR31","unstructured":"Huber, G. P. (1996). Organizational learning: The contributing processes and literatures. Sage."},{"key":"10367_CR32","unstructured":"InfoTech (2017). Security effectiveness reports, InfoTech Research Group, Available at https:\/\/www.infotech.com\/benchmarking\/it-security\/security-effectiveness. Accessed\u00a0Oct 2020."},{"issue":"2","key":"10367_CR33","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1037\/0021-9010.78.2.306","volume":"78","author":"LR James","year":"1993","unstructured":"James, L. R., Demaree, R. G., & Wolf, G. (1993). rwg: an assessment of within-group interrater agreement. Journal of Applied Psychology, 78(2), 306.","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"10367_CR34","doi-asserted-by":"publisher","first-page":"186","DOI":"10.17705\/1jais.00533","volume":"20","author":"A Johnston","year":"2019","unstructured":"Johnston, A., Di Gangi, P., Howard, J., & Worrell, J. (2019). It takes a village: understanding the collective security efficacy of employee groups. Journal of the Association for Information Systems, 20(3), 186\u2013212.","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"10367_CR35","doi-asserted-by":"publisher","first-page":"548","DOI":"10.2307\/25750691","volume":"34","author":"AC Johnston","year":"2010","unstructured":"Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 548\u2013566.","journal-title":"MIS Quarterly"},{"issue":"4","key":"10367_CR36","doi-asserted-by":"publisher","first-page":"783","DOI":"10.2307\/25148820","volume":"31","author":"P Kanawattanachai","year":"2007","unstructured":"Kanawattanachai, P., & Yoo, Y. (2007). The impact of knowledge coordination on virtual team performance over time. MIS Quarterly, 31(4), 783\u2013808.","journal-title":"MIS Quarterly"},{"issue":"1","key":"10367_CR37","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s10796-018-9855-6","volume":"22","author":"D Kang","year":"2020","unstructured":"Kang, D., & Hovav, A. (2020). Benchmarking methodology for information security policy (BMISP): artifact development and evaluation. Information Systems Frontiers, 22(1), 221\u2013242.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"10367_CR38","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0268-4012(02)00105-6","volume":"23","author":"A Kankanhalli","year":"2003","unstructured":"Kankanhalli, A., Teo, H. H., Tan, B. C., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139\u2013154.","journal-title":"International Journal of Information Management"},{"issue":"5","key":"10367_CR39","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/BF01173005","volume":"9","author":"DJ Kavanagh","year":"1985","unstructured":"Kavanagh, D. J., & Bower, G. H. (1985). Mood and self-efficacy: impact of joy and sadness on perceived capabilities. Cognitive Therapy and Research, 9(5), 507\u2013525.","journal-title":"Cognitive Therapy and Research"},{"issue":"2","key":"10367_CR40","doi-asserted-by":"publisher","first-page":"195","DOI":"10.2307\/258703","volume":"19","author":"KJ Klein","year":"1994","unstructured":"Klein, K. J., Dansereau, F., & Hall, R. J. (1994). Levels issues in theory development, data collection, and analysis. Academy of Management Review, 19(2), 195\u2013229.","journal-title":"Academy of Management Review"},{"key":"10367_CR41","doi-asserted-by":"crossref","unstructured":"Kozlowski, S. W. J., & Bell, B. S. (2003). Work groups and teams in organizations. Wiley-Blackwell.","DOI":"10.1002\/0471264385.wei1214"},{"key":"10367_CR42","doi-asserted-by":"crossref","unstructured":"Kozlowski, S. W. J., & Bell, B. S. (2013). Work groups and teams in organizations: Review update. Wiley.","DOI":"10.1002\/9781118133880.hop212017"},{"issue":"2","key":"10367_CR43","first-page":"120","volume":"23","author":"S Kozub","year":"2000","unstructured":"Kozub, S., & McDonnell, J. (2000). Exploring the relationship between cohesion and collective efficacy in rugby teams. Journal of Sport Behaviour, 23(2), 120\u2013129.","journal-title":"Journal of Sport Behaviour"},{"issue":"3","key":"10367_CR44","doi-asserted-by":"publisher","first-page":"269","DOI":"10.2753\/MIS0742-1222280308","volume":"28","author":"Y Lee","year":"2011","unstructured":"Lee, Y., & Chen, A. N. (2011). Usability design and psychological ownership of a virtual world. Journal of Management Information Systems, 28(3), 269\u2013308.","journal-title":"Journal of Management Information Systems"},{"issue":"5","key":"10367_CR45","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1111\/isj.12043","volume":"25","author":"PB Lowry","year":"2015","unstructured":"Lowry, P. B., & Moody, G. D. (2015). Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. Information Systems Journal, 25(5), 433\u2013463.","journal-title":"Information Systems Journal"},{"issue":"12","key":"10367_CR46","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1287\/mnsc.1060.0597","volume":"52","author":"NK Malhotra","year":"2006","unstructured":"Malhotra, N. K., Kim, S. S., & Patil, A. (2006). Common method variance in IS research: a comparison of alternative approaches and a reanalysis of past research. Management Science, 52(12), 1865\u20131883.","journal-title":"Management Science"},{"key":"10367_CR47","doi-asserted-by":"crossref","unstructured":"Morenoff, J. D., Sampson, R. J., & Raudenbush, S. W. (2001). Neighborhood inequality, collective efficacy, and the spatial dynamics of urban violence.\u00a0Criminology,\u00a039(3), 517\u2013558.","DOI":"10.1111\/j.1745-9125.2001.tb00932.x"},{"issue":"1","key":"10367_CR48","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1006\/obhd.1998.2753","volume":"74","author":"PW Mulvey","year":"1998","unstructured":"Mulvey, P. W., & Klein, H. J. (1998). The impact of perceived loafing and collective efficacy on group goal processes and group performance. Organizational Behavior and Human Decision Processes, 74(1), 62\u201387.","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"4","key":"10367_CR49","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1037\/0021-9010.91.4.946","volume":"91","author":"A Neal","year":"2006","unstructured":"Neal, A., & Griffin, M. A. (2006). A study of the lagged relationships among safety climate, safety motivation, safety behavior, and accidents at the individual and group levels. Journal of Applied Psychology, 91(4), 946.","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"10367_CR50","doi-asserted-by":"publisher","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"P Puhakainen","year":"2010","unstructured":"Puhakainen, P., & Siponen, M. (2010). Improving employees\u2019 compliance through information systems security training: an action research study. MIS Quarterly, 34(4), 757\u2013778.","journal-title":"MIS Quarterly"},{"issue":"2","key":"10367_CR51","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1177\/1745691610361604","volume":"5","author":"KA Ranganath","year":"2010","unstructured":"Ranganath, K. A., Spellman, B. A., & Joy-Gaba, J. A. (2010). Cognitive \u201cCategory-Based Induction\u201d research and social \u201cPersuasion\u201d research are each about what makes arguments believable a tale of two literatures. Perspectives on Psychological Science, 5(2), 115\u2013122.","journal-title":"Perspectives on Psychological Science"},{"key":"10367_CR52","unstructured":"Ringle, C. M., Wende, S., & Will, A. (2005). SmartPLS, 2.0 (beta). Available at http:\/\/smartpls.com. Accessed 16 Jan 2023."},{"issue":"1","key":"10367_CR53","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.cose.2015.10.006","volume":"56","author":"NS Safa","year":"2016","unstructured":"Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56(1), 70\u201382.","journal-title":"Computers & Security"},{"issue":"1","key":"10367_CR54","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1177\/1046496402239577","volume":"34","author":"M Salanova","year":"2003","unstructured":"Salanova, M., Llorens, S., Cifre, E., Mart\u00ednez, I. M., & Schaufeli, W. B. (2003). Perceived collective efficacy, subjective well-being and task performance among electronic work groups an experimental study. Small Group Research, 34(1), 43\u201373.","journal-title":"Small Group Research"},{"issue":"5328","key":"10367_CR55","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1126\/science.277.5328.918","volume":"277","author":"RJ Sampson","year":"1997","unstructured":"Sampson, R. J., Raudenbush, S. W., & Earls, F. (1997). Neighborhoods and violent crime: a multilevel study of collective efficacy. Science, 277(5328), 918\u2013924.","journal-title":"Science"},{"key":"10367_CR56","doi-asserted-by":"publisher","first-page":"290","DOI":"10.2307\/270723","volume":"13","author":"ME Sobel","year":"1982","unstructured":"Sobel, M. E. (1982). Asymptotic confidence intervals for indirect effects in structural equation models. Sociological Methodology, 13, 290\u2013312.","journal-title":"Sociological Methodology"},{"issue":"6","key":"10367_CR57","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.5465\/amj.2006.23478718","volume":"49","author":"A Srivastava","year":"2006","unstructured":"Srivastava, A., Bartol, K. M., & Locke, E. A. (2006). Empowering leadership in management teams: Effects on knowledge sharing, efficacy, and performance. Academy of Management Journal, 49(6), 1239\u20131251.","journal-title":"Academy of Management Journal"},{"key":"10367_CR58","unstructured":"Team, C. K. (2015). Information Security \u2013 A collective responsibility, Enterprise Bytes, Available at http:\/\/www.cmsitservices.com\/blog\/information-security-a-collective-responsibility\/. Accessed\u00a0Oct 2020."},{"issue":"4","key":"10367_CR59","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.im.2015.03.002","volume":"52","author":"Z Tu","year":"2015","unstructured":"Tu, Z., Turel, O., Yuan, Y., & Archer, N. (2015). Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination. Information & Management, 52(4), 506\u2013517.","journal-title":"Information & Management"},{"issue":"3\/4","key":"10367_CR60","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: insights from habit and Protection Motivation Theory. Information & Management, 49(3\/4), 190\u2013198.","journal-title":"Information & Management"},{"key":"10367_CR61","unstructured":"Volz, D. D., & McCabe, J. C. (2010). ISAAC (Information Security Awareness, Assessment, and Compliance): A success story. Educause Library. Available at: https:\/\/events.educause.edu\/educauselive\/webinars\/2010\/educause-live-february-24. Accessed Oct 2020."},{"issue":"2","key":"10367_CR62","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.dss.2006.11.010","volume":"43","author":"M Vroblefski","year":"2007","unstructured":"Vroblefski, M., Chen, A., Shao, B., & Swinarski, M. (2007). Managing user relationships in hierarchies for information system security. Decision Support Systems, 43(2), 408\u2013419.","journal-title":"Decision Support Systems"},{"issue":"4","key":"10367_CR63","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1348\/0963179042596441","volume":"77","author":"FO Walumbwa","year":"2004","unstructured":"Walumbwa, F. O., Wang, P., Lawler, J. J., & Shi, K. (2004). The role of collective efficacy in the relations between transformational leadership and work outcomes. Journal of Occupational and Organizational Psychology, 77(4), 515\u2013530.","journal-title":"Journal of Occupational and Organizational Psychology"},{"issue":"1","key":"10367_CR64","doi-asserted-by":"publisher","first-page":"91","DOI":"10.25300\/MISQ\/2015\/39.1.05","volume":"39","author":"J Wang","year":"2015","unstructured":"Wang, J., Gupta, M., & Rao, H. R. (2015). Insider threats in a financial institution: analysis of attack-proneness of information systems applications. MIS Quarterly, 39(1), 91\u2013112.","journal-title":"MIS Quarterly"},{"issue":"3","key":"10367_CR65","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1057\/ejis.2010.72","volume":"20","author":"M Warkentin","year":"2011","unstructured":"Warkentin, M., Johnston, A. C., & Shropshire, J. (2011). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20(3), 267\u2013284.","journal-title":"European Journal of Information Systems"},{"key":"10367_CR66","doi-asserted-by":"crossref","unstructured":"Xu, Y., Fiedler, M. L., & Flaming, K. H. (2005). Discovering the impact of community policing: The broken windows thesis, collective efficacy, and citizens\u2019 judgment.\u00a0Journal of Research in Crime and Delinquency,\u00a042(2), 147\u2013186.","DOI":"10.1177\/0022427804266544"},{"key":"10367_CR67","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.dss.2016.09.009","volume":"92","author":"A Yazdanmehr","year":"2016","unstructured":"Yazdanmehr, A., & Wang, J. (2016). 'Employees\u2019 information security policy compliance: a norm activation perspective. Decision Support Systems, 92, 36\u201346.","journal-title":"Decision Support Systems"},{"issue":"2","key":"10367_CR68","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1287\/isre.14.2.146.16016","volume":"14","author":"MY Yi","year":"2003","unstructured":"Yi, M. Y., & Davis, F. D. (2003). Developing and validating an observational learning model of computer software training and skill acquisition. Information Systems Research, 14(2), 146\u2013169.","journal-title":"Information Systems Research"},{"issue":"2","key":"10367_CR69","doi-asserted-by":"publisher","first-page":"907","DOI":"10.25300\/MISQ\/2020\/15477","volume":"44","author":"CW Yoo","year":"2020","unstructured":"Yoo, C. W., Goo, J., & Rao, H. R. (2020). Is cybersecurity a team sport? A multilevel examination of workgroup information security effectiveness. MIS Quarterly, 44(2), 907\u2013931.","journal-title":"MIS Quarterly"},{"issue":"1","key":"10367_CR70","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.dss.2018.02.009","volume":"108","author":"CW Yoo","year":"2018","unstructured":"Yoo, C. W., Sanders, G. L., & Cerveny, R. P. (2018). Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance. Decision Support Systems, 108(1), 107\u2013118.","journal-title":"Decision Support Systems"},{"issue":"3","key":"10367_CR71","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1037\/0022-0663.81.3.329","volume":"81","author":"BJ Zimmerman","year":"1989","unstructured":"Zimmerman, B. J. (1989). A social cognitive view of self-regulated academic learning. Journal of Educational Psychology, 81(3), 329.","journal-title":"Journal of Educational Psychology"},{"issue":"4","key":"10367_CR72","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1037\/0021-9010.85.4.587","volume":"85","author":"D Zohar","year":"2000","unstructured":"Zohar, D. (2000). A group-level model of safety climate: testing the effect of group climate on microaccidents in manufacturing jobs. Journal of Applied Psychology, 85(4), 587\u2013596.","journal-title":"Journal of Applied Psychology"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10367-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10367-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10367-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T09:15:17Z","timestamp":1700817317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10367-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,18]]},"references-count":72,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["10367"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10367-1","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"type":"print","value":"1387-3326"},{"type":"electronic","value":"1572-9419"}],"subject":[],"published":{"date-parts":[[2023,1,18]]},"assertion":[{"value":"26 December 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interest"}}]}}