{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:18:48Z","timestamp":1754158728430,"version":"3.41.2"},"reference-count":25,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T00:00:00Z","timestamp":1497225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2017,6,12]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Generic behavioural threshold analysis is presented and then applied in the domain of information security by collecting data on the behavioural thresholds of individuals in a group setting and how the individuals influence each other when it comes to security behaviour.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Initial experimental results show that behavioural threshold analysis is feasible in the context of information security and may provide useful guidelines on how to construct information security awareness programmes.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>Threshold analysis may contribute in a number of ways to information security, e.g. identification of security issues that are susceptible to peer pressure and easily influenced by peer behaviour; serve as a countermeasure against security fatigue; contribute to the economics of information security awareness programmes; track progress of security awareness campaigns; and provide a new measure for determining the importance of security awareness issues.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper describes the very first experiment to test the behavioural threshold analysis concepts in the context of information security.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-03-2017-0015","type":"journal-article","created":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T07:54:51Z","timestamp":1493279691000},"page":"152-164","source":"Crossref","is-referenced-by-count":6,"title":["The application of behavioural thresholds to analyse collective behaviour in information security"],"prefix":"10.1108","volume":"25","author":[{"given":"Dirk","family":"Snyman","sequence":"first","affiliation":[]},{"given":"Hennie","family":"Kruger","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"2","key":"key2020120707003389300_ref001","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"volume-title":"CSI\/FBI Computer Crime and Security Survey: 2011-2012","year":"2011","key":"key2020120707003389300_ref002"},{"issue":"3","key":"key2020120707003389300_ref003","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020120707003389300_ref004","first-page":"63","article-title":"Interpreting information security culture: an organizational transformation case study","volume":"56","year":"2016","journal-title":"Computers & Security"},{"issue":"1","key":"key2020120707003389300_ref005","first-page":"75","article-title":"Multiple processes by which attitudes guide behavior: the MODE model as an integrative framework","volume":"23","year":"1990","journal-title":"Advances in Experimental Social Psychology"},{"issue":"2","key":"key2020120707003389300_ref006","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1086\/209351","article-title":"Social desirability bias and the validity of indirect questioning","volume":"20","year":"1993","journal-title":"Journal of Consumer Research"},{"first-page":"217","article-title":"Human aspects of information assurance: a questionnaire-based quantitative approach to assessment","year":"2014","key":"key2020120707003389300_ref007"},{"issue":"11","key":"key2020120707003389300_ref008","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/S1361-3723(09)70139-3","article-title":"Recognising and addressing \u2018security fatigue\u2019","volume":"2009","year":"2009","journal-title":"Computer Fraud & Security"},{"issue":"6","key":"key2020120707003389300_ref009","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1086\/226707","article-title":"Threshold models of collective behavior","volume":"83","year":"1978","journal-title":"American Journal of Sociology"},{"issue":"3","key":"key2020120707003389300_ref010","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1080\/0022250X.1983.9989941","article-title":"Threshold models of diffusion and collective behavior","volume":"9","year":"1983","journal-title":"Journal of Mathematical Sociology"},{"key":"key2020120707003389300_ref011","first-page":"108","article-title":"I will if you will: individual thresholds and group behavior \u2013 applications of algebra to group behavior","volume-title":"Modules in Undergraduate Mathematics and Its Applications \u2013 Tools for Teaching","year":"1983"},{"issue":"2","key":"key2020120707003389300_ref012","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","article-title":"Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness","volume":"47","year":"2009","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2020120707003389300_ref013","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","year":"2012","journal-title":"Computers & Security"},{"issue":"5","key":"key2020120707003389300_ref014","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1108\/ICS-04-2016-0029","article-title":"Theorising on risk homeostasis in the context of information security behaviour","volume":"24","year":"2016","journal-title":"Information & Computer Security"},{"issue":"6","key":"key2020120707003389300_ref015","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.im.2015.05.002","article-title":"The attitude cube \u2013 a three-dimensional model of situational factors in IS adoption and their impact on the attitude \u2013 behavior relationship","volume":"52","year":"2015","journal-title":"Information & Management"},{"first-page":"2978","article-title":"Employees\u2019 information security awareness and behavior: a literature review","year":"2013","key":"key2020120707003389300_ref016"},{"issue":"2","key":"key2020120707003389300_ref017","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1108\/ICS-01-2016-0009","article-title":"Assessing information security attitudes: a comparison of two studies","volume":"24","year":"2016","journal-title":"Information & Computer Security"},{"volume-title":"15th Annual 2010\/2011 Computer Crime and Security Survey","year":"2011","key":"key2020120707003389300_ref018"},{"volume-title":"CSI Computer Crime and Security Survey","year":"2008","key":"key2020120707003389300_ref019"},{"issue":"1","key":"key2020120707003389300_ref020","first-page":"442","article-title":"An information security knowledge sharing model in organizations","volume":"57","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2020120707003389300_ref021","first-page":"70","article-title":"Information security policy compliance model in organizations","volume":"56","year":"2016","journal-title":"Computers & Security"},{"issue":"2","key":"key2020120707003389300_ref022","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.ijinfomgt.2015.11.009","article-title":"Information security management needs more holistic approach: a literature review","volume":"36","year":"2016","journal-title":"International Journal of Information Management"},{"issue":"5","key":"key2020120707003389300_ref023","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1177\/0013916502034005001","article-title":"Toward a social psychology of place predicting behavior from place-based cognitions, attitude, and identity","volume":"34","year":"2002","journal-title":"Environment and Behavior"},{"issue":"1","key":"key2020120707003389300_ref024","first-page":"128","article-title":"Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs","volume":"52","year":"2015","journal-title":"Computers & Security"},{"issue":"4","key":"key2020120707003389300_ref025","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.ijinfomgt.2010.10.006","article-title":"Factors influencing information security management in small-and medium-sized enterprises: a case study from Turkey","volume":"31","year":"2011","journal-title":"International Journal of Information Management"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-03-2017-0015\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-03-2017-0015\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:45Z","timestamp":1753406565000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/25\/2\/152-164\/111015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,12]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6,12]]}},"alternative-id":["10.1108\/ICS-03-2017-0015"],"URL":"https:\/\/doi.org\/10.1108\/ics-03-2017-0015","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2017,6,12]]}}}