{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:18:37Z","timestamp":1754158717007,"version":"3.41.2"},"reference-count":18,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2018,6,11]]},"DOI":"10.1108\/ics-02-2018-0019","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T19:18:22Z","timestamp":1524683902000},"page":"146-149","source":"Crossref","is-referenced-by-count":4,"title":["Guest editorial"],"prefix":"10.1108","volume":"26","author":[{"given":"Fredrik","family":"Karlsson","sequence":"first","affiliation":[]},{"given":"Ella","family":"Kolkowska","sequence":"additional","affiliation":[]},{"given":"Marianne","family":"T\u00f6rner","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"4","key":"key2020092816371810400_ref001","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.cose.2006.11.004","article-title":"A qualitative study of user\u2019s view on information security","volume":"26","year":"2007","journal-title":"Computers & Security"},{"issue":"6","key":"key2020092816371810400_ref002","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1016\/j.cose.2009.01.003","article-title":"The information security digital divide between information security managers and users","volume":"28","year":"2009","journal-title":"Computers & Security"},{"issue":"3","key":"key2020092816371810400_ref003","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.cose.2003.09.002","article-title":"Computer security impaired by legitimate users","volume":"23","year":"2004","journal-title":"Computer & Security"},{"issue":"3","key":"key2020092816371810400_ref004","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","article-title":"Value-focused assessment of information security in organizations","volume":"16","year":"2006","journal-title":"Information Systems Journal"},{"issue":"4","key":"key2020092816371810400_ref005","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1108\/IMCS-08-2012-0043","article-title":"Social action theory for understanding information security non-compliance in hospitals: the importance of user rationale","volume":"21","year":"2013","journal-title":"Information Management & Computer Security"},{"issue":"4","key":"key2020092816371810400_ref006","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.jsis.2011.06.001","article-title":"Value conflicts for information security management","volume":"20","year":"2011","journal-title":"Journal of Strategic Information Systems"},{"issue":"2","key":"key2020092816371810400_ref007","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1177\/0021886314524909","article-title":"Reflections: a perspective on paradox and its application to modern management","volume":"50","year":"2014","journal-title":"Journal of Applied Behavioral Science"},{"key":"key2020092816371810400_ref008","first-page":"267","article-title":"Practice-based discourse analysis of information security policies","volume":"67","year":"2016","journal-title":"Computer & Security"},{"issue":"3","key":"key2020092816371810400_ref009","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1108\/ICS-11-2016-0084","article-title":"Measuring employees\u2019 compliance \u2013 the importance of value pluralism","volume":"25","year":"2017","journal-title":"Information and Computer Security"},{"key":"key2020092816371810400_ref010","first-page":"70","article-title":"\u2018Comply or die\u2019 is dead: long live security-aware principal agents","volume-title":"Financial Cryptography and Data Security \u2013 FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers","year":"2013"},{"issue":"1","key":"key2020092816371810400_ref011","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jsis.2016.08.005","article-title":"Towards analysing the rationale of information security noncompliance: devising a value-based compliance analysis method","volume":"26","year":"2017","journal-title":"Journal of Strategic Information Systems"},{"issue":"2","key":"key2020092816371810400_ref012","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1177\/0021886314522322","article-title":"Paradox as a metatheoretical perspective: sharpening the focus and widening the scope","volume":"50","year":"2014","journal-title":"Journal of Applied Behavioral Science"},{"issue":"11","key":"key2020092816371810400_ref013","doi-asserted-by":"crossref","first-page":"1771","DOI":"10.1177\/0018726710365090","article-title":"A multiple climates approach to understanding business unit effectiveness","volume":"63","year":"2010","journal-title":"Human Relations"},{"issue":"2","key":"key2020092816371810400_ref014","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1057\/ejis.2009.10","article-title":"What levels of moral reasoning and values explain adherence to information security rules? An empirical study","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"key2020092816371810400_ref015","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1287\/mnsc.29.3.363","article-title":"A spatial model of effectiveness criteria: towards a competing values approach to organizational analysis","volume":"29","year":"1983","journal-title":"Management Science"},{"issue":"7","key":"key2020092816371810400_ref016","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.im.2011.07.002","article-title":"Out of fear or desire? Toward a better understanding of employees\u2019 motivation to follow IS security policies","volume":"48","year":"2011","journal-title":"Information and Management"},{"issue":"1","key":"key2020092816371810400_ref017","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1177\/0021886316671577","article-title":"Coping with paradoxical demands through an organizational climate of perceived organizational support. An empirical study among workers in construction and mining industry","volume":"53","year":"2017","journal-title":"Journal of Applied Behavioral Science"},{"issue":"2","key":"key2020092816371810400_ref018","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.jsis.2007.05.003","article-title":"Danger is in the eye of the beholders: social representations of information systems security in healthcare","volume":"16","year":"2007","journal-title":"Journal of Strategic Information Systems"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2018-0019\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2018-0019\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:40Z","timestamp":1753406560000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/26\/2\/146-149\/189357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,11]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6,11]]}},"alternative-id":["10.1108\/ICS-02-2018-0019"],"URL":"https:\/\/doi.org\/10.1108\/ics-02-2018-0019","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2018,6,11]]}}}