{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T12:55:44Z","timestamp":1778072144191,"version":"3.51.4"},"reference-count":67,"publisher":"Informa UK Limited","issue":"1","funder":[{"DOI":"10.13039\/100012974","name":"Cape Breton University","doi-asserted-by":"crossref","award":["research policy (RP) grants"],"award-info":[{"award-number":["research policy (RP) grants"]}],"id":[{"id":"10.13039\/100012974","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Systems Management"],"published-print":{"date-parts":[[2016,1,2]]},"DOI":"10.1080\/10580530.2015.1117868","type":"journal-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T19:53:43Z","timestamp":1448913223000},"page":"30-41","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":35,"title":["Critical Times for Organizations: What Should Be Done to Curb Workers\u2019 Noncompliance With IS Security Policy Guidelines?"],"prefix":"10.1080","volume":"33","author":[{"given":"Princely","family":"Ifinedo","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,11,30]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"issue":"2","key":"CIT0002","doi-asserted-by":"crossref","first-page":"115","DOI":"10.54155\/jbs.19.2.115-139","volume":"19","author":"Allen R.","year":"2002","journal-title":"Journal of Business Strategies"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.2307\/3150783"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1086\/jpe.1968.76.issue-2"},{"key":"CIT0005","volume-title":"Cost\u2013benefit analysis: Concepts and practice","author":"Boardman N. E.","year":"2006","edition":"3"},{"issue":"3","key":"CIT0006","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"Bulgurcu B.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2005.10855772"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1108\/02635570710734316"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1997.11518142"},{"issue":"1","key":"CIT0010","first-page":"vii","volume":"22","author":"Chin W.","year":"1998","journal-title":"MIS Quarterly"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.2307\/799582"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1177\/0018726710375482"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.06.005"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.08.001"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"CIT0020","volume-title":"Multivariate data analysis","author":"Hair Jr., J. F","year":"1998"},{"issue":"2","key":"CIT0021","first-page":"19","volume":"8","author":"Harris M. A.","year":"2012","journal-title":"Journal of Information Systems Security"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70122-7"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1080\/10580530903455247"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(02)06011-7"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.12.005"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1145\/1076211"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1111\/deci.2012.43.issue-4"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.05.004"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1145\/1953122"},{"key":"CIT0032","volume-title":"Marketing research: Methodological foundations (with Qualtrics Card) (10th. ed)","author":"Iacobucci D.","year":"2009"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.10.001"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1080\/17517570601088539"},{"key":"CIT0036","first-page":"373","volume-title":"Motivational systems","author":"Keller J.","year":"2006"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/45099.22.2.20050301\/87273.2"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.07.001"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.001"},{"key":"CIT0040","volume-title":"Management information systems: Managing the digital firm","author":"Laudon K.","year":"2010"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.12.005"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.004"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.206"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.2307\/3054128"},{"key":"CIT0048","volume-title":"Managing and using information systems: A strategic approach","author":"Pearlson K. E.","year":"2010"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.67.2.1.18607"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1080\/10580530701404504"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"issue":"4","key":"CIT0052","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"Puhakainen P.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1016\/S0090-2616(96)90010-8"},{"issue":"3","key":"CIT0056","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","volume":"34","author":"Siponen M.","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1145\/1610252"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.07.002"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1080\/10580530802384639"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.03.005"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.05.002"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.012"},{"key":"CIT0067","volume-title":"IT risk: Turning business threats into competitive advantage","author":"Westerman G.","year":"2007"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"issue":"13","key":"CIT0069","first-page":"245","volume":"26","author":"Young R. F.","year":"2010","journal-title":"Communications of the AIS"},{"issue":"34","key":"CIT0070","first-page":"557","volume":"24","author":"Zafar H.","year":"2009","journal-title":"Communications of the Association for Information Systems"}],"container-title":["Information Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10580530.2015.1117868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T20:09:26Z","timestamp":1653682166000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10580530.2015.1117868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,30]]},"references-count":67,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,11,30]]},"published-print":{"date-parts":[[2016,1,2]]}},"alternative-id":["10.1080\/10580530.2015.1117868"],"URL":"https:\/\/doi.org\/10.1080\/10580530.2015.1117868","relation":{},"ISSN":["1058-0530","1934-8703"],"issn-type":[{"value":"1058-0530","type":"print"},{"value":"1934-8703","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}