{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T11:16:22Z","timestamp":1770981382256,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T00:00:00Z","timestamp":1447804800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"crossref","award":["B09C1100020"],"award-info":[{"award-number":["B09C1100020"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["239010522"],"award-info":[{"award-number":["239010522"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10799-015-0252-2","type":"journal-article","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T00:29:04Z","timestamp":1447806544000},"page":"179-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["The impacts of organizational culture on information security culture: a case study"],"prefix":"10.1007","volume":"17","author":[{"given":"Mincong","family":"Tang","sequence":"first","affiliation":[]},{"given":"Meng\u2019gang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"issue":"1","key":"252_CR1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1057\/palgrave.ejis.3000418","volume":"11","author":"H Akkermans","year":"2002","unstructured":"Akkermans H, van Helden K (2002) Vicious and virtuous cycles in ERP implementation: a case study of interrelations between critical success factors. Eur J Inform Syst 11(1):35\u201346","journal-title":"Eur J Inform Syst"},{"issue":"9","key":"252_CR2","first-page":"5","volume":"41","author":"NG Carr","year":"2003","unstructured":"Carr NG (2003) It doesn\u2019t matter. Harv Bus Rev 41(9):5\u201312","journal-title":"Harv Bus Rev"},{"issue":"3","key":"252_CR3","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1108\/02635570710734316","volume":"107","author":"S Chang","year":"2007","unstructured":"Chang S, Lin C (2007) Exploring organizational culture for information security management. Ind Manag Data Syst 107(3):438\u2013458","journal-title":"Ind Manag Data Syst"},{"issue":"1","key":"252_CR4","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.cose.2012.09.010","volume":"32","author":"R Crossler","year":"2013","unstructured":"Crossler R, Johnston A, Lowry P, Hu Q, Warkentin M, Baskerville R (2013) Future directions for behavioral information security research. Comput Secur 32(1):90\u2013101","journal-title":"Comput Secur"},{"key":"252_CR5","volume-title":"Corporate cultures: the rites and rituals of organizational life","author":"T Deal","year":"1982","unstructured":"Deal T, Kennedy A (1982) Corporate cultures: the rites and rituals of organizational life. Addison-Wesley, Boston"},{"key":"252_CR6","doi-asserted-by":"crossref","first-page":"532","DOI":"10.5465\/amr.1989.4308385","volume":"14","author":"K Eisenhardt","year":"1989","unstructured":"Eisenhardt K (1989) Building theories from case study research. Acad Manag Rev 14:532\u2013550","journal-title":"Acad Manag Rev"},{"key":"252_CR7","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.jsis.2011.06.001","volume":"20","author":"K Hedstr\u00f6m","year":"2011","unstructured":"Hedstr\u00f6m K, Kolkowska E, Karlsson F, Allen JP (2011) Value conflicts for information security management. J Strateg Inf Syst 20:373\u2013384","journal-title":"J Strateg Inf Syst"},{"key":"252_CR8","doi-asserted-by":"crossref","unstructured":"Helokunnas T, Kuusisto R (2003) Information security culture in a value net. In: IEEE Engineering management conference, 2003. IEMC'03. Managing technologically driven organizations: the human side of innovation and change, pp 190\u2013194","DOI":"10.1109\/IEMC.2003.1252258"},{"issue":"2","key":"252_CR9","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath T, Rao H (2009) Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis Support Syst 47(2):154\u2013165","journal-title":"Decis Support Syst"},{"issue":"1","key":"252_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/1467-6486.00081","volume":"35","author":"G Hofstede","year":"1998","unstructured":"Hofstede G (1998) Identifying organizational subcultures: an empirical approach. J Manage Stud 35(1):1\u201312","journal-title":"J Manage Stud"},{"issue":"2","key":"252_CR11","doi-asserted-by":"crossref","first-page":"286","DOI":"10.2307\/2393392","volume":"35","author":"G Hofstede","year":"1990","unstructured":"Hofstede G, Neuijen B, Ohayv D, Sanders G (1990) Measuring organizational cultures: a qualitative & quantitative study across twenty cases. Adm Sci Q 35(2):286\u2013316","journal-title":"Adm Sci Q"},{"issue":"1","key":"252_CR12","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo P (2012) Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput Secur 31(1):83\u201395","journal-title":"Comput Secur"},{"issue":"1","key":"252_CR13","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/S0963-8687(01)00038-5","volume":"10","author":"S Kanungo","year":"2001","unstructured":"Kanungo S, Sadavarti S, Srinivas Y (2001) Relating IT strategies & organizational culture: an empirical study of public sector units in India. J Strateg Inf Syst 10(1):29\u201357","journal-title":"J Strateg Inf Syst"},{"issue":"6","key":"252_CR14","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.cose.2005.05.002","volume":"24","author":"S Kokolakis","year":"2005","unstructured":"Kokolakis S, Karyda M, Kiountouzis E (2005) The insider threat to information systems and the effectiveness of ISO17799. Comput Secur 24(6):472\u2013484","journal-title":"Comput Secur"},{"issue":"3","key":"252_CR15","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1016\/j.cose.2009.04.006","volume":"28","author":"S Kraemer","year":"2009","unstructured":"Kraemer S, Carayon P, Clem J (2009) Human and organizational factors in computer and information security: pathways to vulnerabilities. Comput Secur 28(3):509\u2013520","journal-title":"Comput Secur"},{"issue":"1","key":"252_CR16","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1108\/09685221011035223","volume":"18","author":"D Lacey","year":"2010","unstructured":"Lacey D (2010) Understanding and transforming organizational security culture. Inf Manag Comput Secur 18(1):4\u201313","journal-title":"Inf Manag Comput Secur"},{"issue":"2","key":"252_CR17","doi-asserted-by":"crossref","first-page":"357","DOI":"10.2307\/25148735","volume":"30","author":"D Leidner","year":"2006","unstructured":"Leidner D, Kayworth T (2006) A review of culture in information systems research: toward a theory of information technology culture conflict. MIS Q 30(2):357\u2013399","journal-title":"MIS Q"},{"key":"252_CR18","volume-title":"Information security and employee behaviour: how to reduce risk through employee education, training and awareness","author":"A Mcllwraith","year":"2006","unstructured":"Mcllwraith A (2006). Information security and employee behaviour: how to reduce risk through employee education, training and awareness. Gower Publishing Company, Burlington"},{"key":"252_CR19","first-page":"46","volume":"31","author":"T Schlienger","year":"2003","unstructured":"Schlienger T, Teufel S (2003) Information security culture - from analysis to change. S Afr Comput J 31:46\u201352","journal-title":"S Afr Comput J"},{"issue":"10","key":"252_CR20","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/S1361-3723(06)70430-4","volume":"2006","author":"K Thomson","year":"2006","unstructured":"Thomson K, von Solms R, Louw L (2006) Cultivating an organizational information security culture. Comput Fraud Secur 2006(10):7\u201311","journal-title":"Comput Fraud Secur"},{"issue":"1","key":"252_CR21","first-page":"147","volume":"11","author":"A Veiga","year":"2007","unstructured":"Veiga A, Martins N, Eloff J (2007) Information security culture-validation of an assessment instrument. S Afr Bus Rev 11(1):147\u2013166","journal-title":"S Afr Bus Rev"},{"issue":"3","key":"252_CR22","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.cose.2004.01.012","volume":"23","author":"C Vroom","year":"2004","unstructured":"Vroom C, Von Solms R (2004) Towards information security behavioral compliance. Comput Secur 23(3):191\u2013198","journal-title":"Comput Secur"},{"issue":"1","key":"252_CR23","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1108\/09685220910944722","volume":"17","author":"R Werlinger","year":"2009","unstructured":"Werlinger R, Hawkey K, Beznosov K (2009) An integrated view of human, organizational, and technological challenges of IT security management. Inf Manag Comput Secur 17(1):4\u201319","journal-title":"Inf Manag Comput Secur"},{"key":"252_CR24","volume-title":"Applications of case study research","author":"RK Yin","year":"2003","unstructured":"Yin RK (2003), Applications of case study research, 2nd edn. Sage, Thousand Oaks","edition":"2"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0252-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-015-0252-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0252-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T12:59:08Z","timestamp":1567342748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-015-0252-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,18]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["252"],"URL":"https:\/\/doi.org\/10.1007\/s10799-015-0252-2","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,18]]}}}