{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T06:40:04Z","timestamp":1741243204689,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214233"},{"type":"electronic","value":"9783642214240"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_15","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T11:52:47Z","timestamp":1308138767000},"page":"185-196","source":"Crossref","is-referenced-by-count":2,"title":["Organizational Power and Information Security Rule Compliance"],"prefix":"10.1007","author":[{"given":"Ella","family":"Kolkowska","sequence":"first","affiliation":[]},{"given":"Gurpreet","family":"Dhillon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Mattia, A., Dhillon, G.: Applying Double Loop Learning to Interpret Implications for Information Systems Security Design. In: The IEEE Systems, Man & Cybernetics Conference, Washington DC, October 5-8 (2003)","DOI":"10.1109\/ICSMC.2003.1244262"},{"key":"15_CR2","unstructured":"Lapke, M., Dhillon, G.: A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study. In: The Americas Conference on Information Systems (AMCIS 2006), Acapulco, Mexico (2006)"},{"issue":"6","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1086\/381913","volume":"109","author":"D.A. McFarland","year":"2004","unstructured":"McFarland, D.A.: Resistance as a Social Drama: A Study of Change-Oriented Encounters. The American Journal of Sociology\u00a0109(6), 1249\u20131318 (2004)","journal-title":"The American Journal of Sociology"},{"issue":"6","key":"15_CR4","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1145\/358141.358148","volume":"26","author":"M.L. Markus","year":"1983","unstructured":"Markus, M.L.: Power, politics and MIS implementation. Communications of the ACM\u00a026(6), 430\u2013444 (1983)","journal-title":"Communications of the ACM"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1111\/j.1467-8551.1996.tb00144.x","volume":"7","author":"C. Hardy","year":"1996","unstructured":"Hardy, C.: Understanding power: bringing about strategic change. British Journal of Management\u00a07, Special issue, S3\u2013S16 (1996)","journal-title":"British Journal of Management"},{"key":"15_CR6","volume-title":"The structure of social action","author":"T. Parson","year":"1968","unstructured":"Parson, T.: The structure of social action. Free Press, New York (1968)"},{"key":"15_CR7","volume-title":"Principles of information systems security: text and cases","author":"G. Dhillon","year":"2007","unstructured":"Dhillon, G.: Principles of information systems security: text and cases. Wiley Inc., Hoboken (2007)"},{"key":"15_CR8","volume-title":"A comparative analysis of complex organizations: On power, involvement, and their correlates","author":"A. Etzioni","year":"1975","unstructured":"Etzioni, A.: A comparative analysis of complex organizations: On power, involvement, and their correlates. Free Press, New York (1975)"},{"issue":"1","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2392223","volume":"25","author":"S. Ranson","year":"1980","unstructured":"Ranson, S., Hinings, B., Royston, G.: The Structuring of Organizational Structures. Administrative Science Quarterly\u00a025(1), 1\u201317 (1980)","journal-title":"Administrative Science Quarterly"},{"issue":"1","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2391741","volume":"22","author":"J.K. Benson","year":"1977","unstructured":"Benson, J.K.: Organizations: A Dialectical View. Administrative Science Quarterly\u00a022(1), 1\u201321 (1977)","journal-title":"Administrative Science Quarterly"},{"key":"15_CR11","unstructured":"PWC: Security Breaches Survey 2008. Enterprise and Regulatory Reform (BERR). PricewaterhouseCoopers on behalf of the UK Department of Business (2008)"},{"key":"15_CR12","volume-title":"Principles of Information Security","author":"M.E. Whitman","year":"2008","unstructured":"Whitman, M.E., Mattord, H.: Principles of Information Security, 3rd edn. Course Technology, Boston (2008)","edition":"3"},{"key":"15_CR13","unstructured":"Nash, K.S. Greenwood, D.: The global state of information security. CIO Magazine (2008)"},{"issue":"2","key":"15_CR14","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"J.M. Stanton","year":"2005","unstructured":"Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Computers & Security\u00a024(2), 124\u2013133 (2005)","journal-title":"Computers & Security"},{"key":"15_CR15","unstructured":"Lapke, M. Dhillon, G.: Power relationships in information systems security policy formulation and implementation. In: The 16th Annual European Conference on Information Systems (ECIS 2008), Galway, Ireland (2008)"},{"issue":"1","key":"15_CR16","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/0306-4573(91)90034-J","volume":"27","author":"S.H. Kim","year":"1991","unstructured":"Kim, S.H., Lee, J.: A contingent analysis of the relationship between IS implementation strategies and IS success. Information Processing & Management\u00a027(1), 111\u2013128 (1991)","journal-title":"Information Processing & Management"},{"issue":"2","key":"15_CR17","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T. Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems\u00a047(2), 154\u2013165 (2009)","journal-title":"Decision Support Systems"},{"issue":"2","key":"15_CR18","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0268-4012(02)00105-6","volume":"23","author":"A. Kankanhalli","year":"2003","unstructured":"Kankanhalli, A., Teo, H.H., Tan, B.C., Wei, K.K.: An Integrative Study of Information Systems Security Effectiveness. International Journal of Information Management\u00a023(2), 139\u2013154 (2003)","journal-title":"International Journal of Information Management"},{"issue":"2","key":"15_CR19","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1287\/isre.1.2.225","volume":"1","author":"D. Straub","year":"1990","unstructured":"Straub, D.: Effective IS security: an empirical study. Information System Research\u00a01(2), 225\u2013270 (1990)","journal-title":"Information System Research"},{"issue":"4","key":"15_CR20","doi-asserted-by":"publisher","first-page":"441","DOI":"10.2307\/249551","volume":"22","author":"D. Straub","year":"1998","unstructured":"Straub, D., Welke, R.J.: Coping with systems risks: security planning models for management decision making. MIS Quarterly\u00a022(4), 441\u2013469 (1998)","journal-title":"MIS Quarterly"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1057\/ejis.2009.8","volume":"18","author":"S.R. Boss","year":"2009","unstructured":"Boss, S.R., Kirsch, L.J., Angermeier, I., Shingler, R.A., Boss, R.W.: If someone is watchning, I\u2019ll do what I\u2019m asked: mandatoriness, control, and information security. European Journal of Information Systems\u00a018, 151\u2013164 (2009)","journal-title":"European Journal of Information Systems"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Phanila, S., Siponen, M., Mahmood, A.: Employees\u2019 Behavior towards IS Security Policy Compliance. In 40th Annual Hawaii International Conference on System Sciences (HICSS 2007) (2007)","DOI":"10.1109\/HICSS.2007.206"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Thomson, K.L., von Solms, R., Louw, L.: Cultivating an organizational information security culture. Computer Fraud and Security (10), 7\u201311 (2006)","DOI":"10.1016\/S1361-3723(06)70430-4"},{"key":"15_CR24","unstructured":"Thomson, K.L.: Information Security Conscience: a precondition to an Information Security Culture. In: 8th Annual Security Conference, Las Vegas, NV, USA, April 15-16 (2009)"},{"issue":"3","key":"15_CR25","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cose.2004.01.012","volume":"23","author":"C. Vroom","year":"2004","unstructured":"Vroom, C., von Solms, R.: Towards information security behavioural compliance. Computers & Security\u00a023(3), 191\u2013198 (2004)","journal-title":"Computers & Security"},{"key":"15_CR26","volume-title":"A Design Theory for Information Security Awareness","author":"P. Puhakainen","year":"2006","unstructured":"Puhakainen, P.: A Design Theory for Information Security Awareness. University of Oulu, Oulu (2006)"},{"issue":"1","key":"15_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"M. Siponen","year":"2000","unstructured":"Siponen, M.: A Conceptual Foundation for Organizational Information Security Awareness. Information Management & Computer Security\u00a08(1), 31\u201341 (2000)","journal-title":"Information Management & Computer Security"},{"issue":"5","key":"15_CR28","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1108\/09576050210447037","volume":"15","author":"S.M. Furnell","year":"2002","unstructured":"Furnell, S.M., Gennatou, M., Dowland, P.S.: A prototype tool for information security awareness and training. Logistics Information Management\u00a015(5), 352\u2013357 (2002)","journal-title":"Logistics Information Management"},{"key":"15_CR29","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1016\/j.im.2003.02.001","volume":"41","author":"G. Dhillon","year":"2004","unstructured":"Dhillon, G.: Dimensions of power and IS implementation. Information & Management\u00a041, 635\u2013644 (2004)","journal-title":"Information & Management"},{"key":"15_CR30","doi-asserted-by":"crossref","DOI":"10.4135\/9781446279267","volume-title":"Frameworks of power","author":"S. Clegg","year":"1989","unstructured":"Clegg, S.: Frameworks of power. Sage Publications, London (1989)"},{"issue":"3","key":"15_CR31","doi-asserted-by":"crossref","first-page":"518","DOI":"10.5465\/amr.1993.9309035149","volume":"18","author":"B. Townley","year":"1993","unstructured":"Townley, B.: Foucault, power\/knowledge and its relevance for Human Resource Management. Academy of Management Review\u00a018(3), 518\u2013545 (1993)","journal-title":"Academy of Management Review"},{"issue":"3","key":"15_CR32","doi-asserted-by":"publisher","first-page":"369","DOI":"10.2307\/248684","volume":"11","author":"I. Benbasat","year":"1987","unstructured":"Benbasat, I., Goldstein, D.K., Mead, M.: The case research strategy in studies of information systems. MIS Quarterly\u00a011(3), 369\u2013388 (1987)","journal-title":"MIS Quarterly"},{"key":"15_CR33","doi-asserted-by":"crossref","DOI":"10.4135\/9781036208417","volume-title":"Qualitative research in business & management","author":"M.D. Myers","year":"2009","unstructured":"Myers, M.D.: Qualitative research in business & management. Sage Publications, London (2009)"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Hedstr\u00f6m, K., Dhillon, G., Karlsson, F.: Using Actor Network Theory to Understand Information Security Management. In: The 25th Annual IFIP TC 11, Brisbane, Australia, September 20-23 (2010)","DOI":"10.1007\/978-3-642-15257-3_5"},{"key":"15_CR35","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-14454-9","volume-title":"Managing Information System Security","author":"G. Dhillon","year":"1997","unstructured":"Dhillon, G.: Managing Information System Security. Macmillan, London (1997)"},{"key":"15_CR36","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-02248-9","volume-title":"Power: a radical view","author":"S. Lukes","year":"1974","unstructured":"Lukes, S.: Power: a radical view. Macmillan, London (1974)"},{"key":"15_CR37","doi-asserted-by":"publisher","first-page":"570","DOI":"10.2307\/2392363","volume":"24","author":"A.M. Pettigrew","year":"1979","unstructured":"Pettigrew, A.M.: On studying organizational cultures. Administrative Science Quarterly\u00a024, 570\u2013581 (1979)","journal-title":"Administrative Science Quarterly"},{"issue":"4","key":"15_CR38","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.cose.2004.01.013","volume":"23","author":"R. Solms von","year":"2004","unstructured":"von Solms, R., von Solms, B.: From policies to culture. Computers & Security\u00a023(4), 275\u2013279 (2004)","journal-title":"Computers & Security"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T06:10:16Z","timestamp":1741241416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_15","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}