{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T18:15:28Z","timestamp":1772129728992,"version":"3.50.1"},"reference-count":122,"publisher":"Informa UK Limited","issue":"20","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,10,18]]},"DOI":"10.1080\/10447318.2025.2464900","type":"journal-article","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T09:26:21Z","timestamp":1740389181000},"page":"12728-12749","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Integrating Information Security Culture and Protection Motivation to Enhance Compliance with Information Security Policies in Banking: Evidence from PLS-SEM and fsQCA"],"prefix":"10.1080","volume":"41","author":[{"given":"Ebrahim Mohammed","family":"Alrawhani","sequence":"first","affiliation":[{"name":"Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah","place":["Pekan, Malaysia"]}]},{"given":"Awanis Binti","family":"Romli","sequence":"additional","affiliation":[{"name":"Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah","place":["Pekan, Malaysia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0726-6031","authenticated-orcid":false,"given":"Mohammed A.","family":"Al-Sharafi","sequence":"additional","affiliation":[{"name":"IRC for Finance and Digital Economy, KFUPM Business School, King Fahd University of Petroleum and Minerals","place":["Dhahran, Saudi Arabia"]}]},{"given":"Gamal","family":"Alkawsi","sequence":"additional","affiliation":[{"name":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional","place":["Kajang, Malaysia"]}]}],"member":"301","published-online":{"date-parts":[[2025,2,24]]},"reference":[{"key":"e_1_3_2_2_1","first-page":"12163","volume-title":"Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion","author":"Ab Hamid M. R.","year":"2017","unstructured":"Ab Hamid, M. R., Sami, W., & Sidek, M. H. M. (2017). Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion (Vol. 890, 1st ed., pp. 12163\u201312163). IOP Publishing."},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103857"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-10-2017-0073"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.7.15"},{"key":"e_1_3_2_6_1","first-page":"1","volume-title":"Proceedings of the 16th Pacific Asia Conference on Information Systems (PACIS)","author":"Al Natheer M.","year":"2012","unstructured":"Al Natheer, M., Chan, T., & Nelson, K. (2012). Understanding and measuring information security culture [Paper presentation]. Proceedings of the 16th Pacific Asia Conference on Information Systems (PACIS), University of Science (Vietnam)\/AIS Electronic Library (AISeL) (pp. 1\u201315)."},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2024.102592"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2024.2408264"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/Tem.2023.3237789"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2024.108315"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.04.093"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101721"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107702"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.03.054"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11083383"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V71I4P220"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-10-2020-0719"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316615.3316723"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2023.102258"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2018-0006"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-10-2021-0169"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lrp.2012.10.001"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_3_2_24_1","unstructured":"Central Bank of Yemen. (2022). Cybersecurity in the banking sector in Yemen. https:\/\/www.centralbank.gov.ye\/Home\/index"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2022.101176"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.riob.2016.11.004"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.05.011"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645767"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2402126"},{"key":"e_1_3_2_30_1","unstructured":"Chia P. A. Maynard S. B. & Ruighaver A. B. (2002). Understanding organizational security culture [Paper presentation]. Proceedings of PACIS2002 (Vol. 158)."},{"key":"e_1_3_2_31_1","first-page":"655","volume-title":"How to write up and report PLS analyses","author":"Chin W. W.","year":"2009","unstructured":"Chin, W. W. (2009). How to write up and report PLS analyses (pp. 655\u2013690). Springer."},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2422757"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2019.1651113"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/15117"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0059-9"},{"key":"e_1_3_2_37_1","first-page":"145","volume-title":"IFIP TC 8 International Workshop on Information Systems Security Research","author":"D\u2019Arcy J.","year":"2009","unstructured":"D\u2019Arcy, J., & Greene, G. (2009). The multifaceted nature of security culture and its influence on end user behavior [Paper presentation]. IFIP TC 8 International Workshop on Information Systems Security Research (pp. 145\u2013157)."},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2013-0057"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.002"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.12.006"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.005"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.002"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101713"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/259210"},{"key":"e_1_3_2_45_1","first-page":"11","volume-title":"Common method variance techniques","author":"Eichhorn B. R.","year":"2014","unstructured":"Eichhorn, B. R. (2014). Common method variance techniques (Vol. 1, No. 11). Cleveland State University, Department of Operations & Supply Chain Management. SAS Institute Inc."},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJCHM-07-2021-0889"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.004"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2015.12.008"},{"key":"e_1_3_2_50_1","unstructured":"Gartner I. (2024). Gartner forecasts security and risk management spending in MENA to grow 12% in 2024. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-02-13-gartner-forecasts-security-and-risk-management-spending-in-mena-to-grow-12-percent-in-2024"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12257"},{"key":"e_1_3_2_52_1","unstructured":"Haeussinger F. & Kranz J. (2017). Antecedents of employees\u2019 information security awareness- review\u2019 synthesis and directions for future research [Paper presentation]. Presented at the 25th European Conference on Information Systems (ECIS) Guimar\u00e3es Portugal 5-10 June 2017."},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2024.100469"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80519-7"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMDA.2017.10008574"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-011-0261-6"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80519-7"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819204-7.00007-5"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2021.103574"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1108\/S1474-7979(2009)0000020014"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1432996"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1683781"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1623322"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102404"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hrmr.2011.11.006"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.2004700"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220610648355"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2024.2329128"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.017"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2021.100165"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2023.113726"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102744"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.002"},{"key":"e_1_3_2_75_1","first-page":"1","volume-title":"Assessing information security culture","author":"Martins A.","year":"2002","unstructured":"Martins, A., & Eloff, J. (2002). Assessing information security culture [Paper presentation]. Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa (pp. 1\u201314)."},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-02-2021-0020"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103489"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2017.1385212"},{"key":"e_1_3_2_80_1","unstructured":"Mou J. Cohen J. & Kim J. (2017). A meta-analytic structural equation modeling test of protection motivation theory in information security literature [Paper presentation]. Proceedings of the 38th International Conference on Information Systems (ICIS)."},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00723"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2019.1643956"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.11.003"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhydrol.2020.125243"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2016-0095"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102960"},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-06-2018-0261"},{"key":"e_1_3_2_88_1","first-page":"237","volume-title":"Security in computing","author":"Pfleeger C. P.","year":"2015","unstructured":"Pfleeger, C. P., Pfleeger, S. L. N., & Margulies, J. (2015). Security in computing (5th ed., p. 237). Prentice Hall.","edition":"5"},{"key":"e_1_3_2_89_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.10"},{"key":"e_1_3_2_90_1","unstructured":"Ponemon. (2020). Costs of insider threats: Global. https:\/\/cdw-prod.adobecqms.net\/content\/dam\/cdw\/on-domain-cdw\/brands\/proofpoint\/ponemon-global-cost-of-insider-threats-2020-report.pdf"},{"key":"e_1_3_2_91_1","volume-title":"Redesigning social inquiry: Fuzzy sets and beyond","author":"Ragin C. C.","year":"2009","unstructured":"Ragin, C. C. (2009). Redesigning social inquiry: Fuzzy sets and beyond. University of Chicago Press."},{"key":"e_1_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.016"},{"key":"e_1_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJCHM-10-2020-1164"},{"key":"e_1_3_2_94_1","volume-title":"Organisational behaviour","author":"Robbins S.","year":"2013","unstructured":"Robbins, S., Judge, T. A., Millett, B., & Boyle, M. (2013). Organisational behaviour. Pearson Higher Education AU."},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.008"},{"key":"e_1_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.037"},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ausmj.2019.05.003"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05542-8_15-1"},{"key":"e_1_3_2_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105447"},{"key":"e_1_3_2_101_1","doi-asserted-by":"crossref","unstructured":"Schlienger T. & Teufel S. (2002). Information security culture: The socio-cultural dimension in information security management [Paper presentation]. Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives (pp. 191\u2013201).","DOI":"10.1007\/978-0-387-35586-3_15"},{"key":"e_1_3_2_102_1","volume-title":"Research methods for business: A skill building approach","author":"Sekaran U.","year":"2016","unstructured":"Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach. John Wiley & Sons."},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102774"},{"key":"e_1_3_2_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_39"},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2019.1705512"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-08-2019-0217"},{"key":"e_1_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102354"},{"key":"e_1_3_2_108_1","first-page":"52","volume-title":"HAISA","author":"Tolah A.","year":"2017","unstructured":"Tolah, A., Furnell, S., & Papadaki, M. (2017). A comprehensive framework for cultivating and assessing Information Security Culture [Paper presentation]. HAISA (pp. 52\u201364)."},{"key":"e_1_3_2_109_1","doi-asserted-by":"publisher","DOI":"10.17348\/era.5.0.147-158"},{"key":"e_1_3_2_110_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.007"},{"key":"e_1_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.1108\/JABS-01-2024-0058"},{"key":"e_1_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09956-4"},{"key":"e_1_3_2_113_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.009"},{"key":"e_1_3_2_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102387"},{"key":"e_1_3_2_115_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"e_1_3_2_116_1","unstructured":"Van Niekerk J. & Von Solms R. (2006). Understanding information security culture: A conceptual framework [Paper presentation]. ISSA (pp. 1\u201310)."},{"key":"e_1_3_2_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.10.005"},{"key":"e_1_3_2_118_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-6773.2011.01344.x"},{"key":"e_1_3_2_119_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102520"},{"key":"e_1_3_2_120_1","first-page":"463","volume-title":"Moving beyond multiple regression analysis to algorithms: Calling for adoption of a paradigm shift from symmetric to asymmetric thinking in data analysis and crafting theory","author":"Woodside A. G.","year":"2013","unstructured":"Woodside, A. G. (2013). Moving beyond multiple regression analysis to algorithms: Calling for adoption of a paradigm shift from symmetric to asymmetric thinking in data analysis and crafting theory (Vol. 66, pp. 463\u2013472). Elsevier."},{"key":"e_1_3_2_121_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2331875"},{"key":"e_1_3_2_122_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2017-0013"},{"key":"e_1_3_2_123_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2022.108993"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2025.2464900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T11:52:18Z","timestamp":1759837938000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2025.2464900"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,24]]},"references-count":122,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1080\/10447318.2025.2464900"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2025.2464900","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-08-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-23","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}