{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:28:43Z","timestamp":1763684923067,"version":"3.41.2"},"reference-count":24,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:00:00Z","timestamp":1737331200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2025,1,20]]},"DOI":"10.1108\/ics-03-2025-265","type":"journal-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T11:44:47Z","timestamp":1737027887000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Guest editorial: New frontiers in information security management"],"prefix":"10.1108","volume":"33","author":[{"given":"Fredrik","family":"Karlsson","sequence":"first","affiliation":[]},{"given":"Shang","family":"Gao","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2025,1,20]]},"reference":[{"issue":"2","key":"key2025011616444278800_ref001","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1080\/0960085X.2020.1743051","article-title":"Artefactual and empirical contributions in information systems research","volume":"29","year":"2020","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2025011616444278800_ref002","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/ICS-12-2017-0097","article-title":"A framework for reporting and dealing with end-user security policy compliance","volume":"27","year":"2019","journal-title":"Information and Computer Security"},{"issue":"3","key":"key2025011616444278800_ref003","doi-asserted-by":"crossref","first-page":"103623","DOI":"10.1016\/j.im.2022.103623","article-title":"Standardizing information security \u2013 a structurational analysis","volume":"59","year":"2022","journal-title":"Information and Management"},{"issue":"2","key":"key2025011616444278800_ref004","first-page":"209","article-title":"Developing an information classification method","volume":"29","year":"2020","journal-title":"Information and Computer Security"},{"issue":"3","key":"key2025011616444278800_ref005","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2025011616444278800_ref006","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2024-0102","article-title":"The role of artificial intelligence (AI) in improving technical and managerial cybersecurity tasks\u2019 efficiency","volume":"32","year":"2024","journal-title":"Information and Computer Security"},{"issue":"3","key":"key2025011616444278800_ref007","doi-asserted-by":"crossref","first-page":"611","DOI":"10.2307\/25148742","article-title":"The nature of theory in information systems","volume":"30","year":"2006","journal-title":"MIS Quarterly"},{"year":"2023","key":"key2025011616444278800_ref008","article-title":"Chatbots: a framework for improving information security behaviours using ChatGPT"},{"issue":"3","key":"key2025011616444278800_ref009","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1177\/0268396219832004","article-title":"The process of information systems theorizing as a discursive practice","volume":"34","year":"2019","journal-title":"Journal of Information Technology"},{"issue":"4","key":"key2025011616444278800_ref010","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.jsis.2011.06.001","article-title":"Value conflicts for information security management","volume":"20","year":"2011","journal-title":"The Journal of Strategic Information Systems"},{"issue":"4","key":"key2025011616444278800_ref011","first-page":"752","article-title":"Security education, training, and awareness programs: literature review","volume":"62","year":"2021","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"key2025011616444278800_ref012","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1080\/10580530.2015.1117868","article-title":"Critical times for organizations: what should be done to curb workers\u2019 noncompliance with is security policy guidelines?","volume":"33","year":"2016","journal-title":"Information Systems Management"},{"key":"key2025011616444278800_ref013","doi-asserted-by":"crossref","first-page":"102267","DOI":"10.1016\/j.cose.2021.102267","article-title":"Enhancing employees information security awareness in private and public organisations: a systematic literature review","volume":"106","year":"2021","journal-title":"Computers and Security"},{"key":"key2025011616444278800_ref014","first-page":"70","article-title":"Revolutionizing social engineering awareness raising, education and training: generative ai-powered investigations in the Maritime domain","volume-title":"HCI for Cybersecurity, Privacy and Trust - 6th International Conference, HCI-CPT 2024. Held as Part of the 26th HCI International Conference, HCII 2024 Washington, DC, June 29 \u2013 July 4, 2024 Proceedings, Part II","year":"2024"},{"issue":"3","key":"key2025011616444278800_ref015","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/ICS-03-2018-0032","article-title":"The effect of resilience and job stress on information security awareness","volume":"26","year":"2018","journal-title":"Information and Computer Security"},{"issue":"1","key":"key2025011616444278800_ref016","doi-asserted-by":"crossref","first-page":"285","DOI":"10.25300\/MISQ\/2018\/13853","article-title":"Toward a unified model of information security policy compliance","volume":"42","year":"2018","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2025011616444278800_ref017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1057\/s41303-016-0025-y","article-title":"Information systems security policy implementation in practice: from best practices to situated practices","volume":"26","year":"2017","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"key2025011616444278800_ref018","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1177\/1555343415575152","article-title":"The influence of organizational information security culture on information security decision making","volume":"9","year":"2015","journal-title":"Journal of Cognitive Engineering and Decision Making"},{"key":"key2025011616444278800_ref019","doi-asserted-by":"crossref","first-page":"103804","DOI":"10.1016\/j.cose.2024.103804","article-title":"ChatGPT or Bard: who is a better certified ethical hacker?","volume":"140","year":"2024","journal-title":"Computers and Security"},{"issue":"3","key":"key2025011616444278800_ref020","doi-asserted-by":"crossref","first-page":"463","DOI":"10.2307\/25750687","article-title":"Circuits of power: a study of mandated compliance to an information systems security \u2018De jure\u2019 standard in a government organization","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2025011616444278800_ref021","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1080\/08874417.2017.1368421","article-title":"The theory of planned behavior and information security policy compliance","volume":"59","year":"2019","journal-title":"Journal of Computer Information Systems"},{"issue":"7","key":"key2025011616444278800_ref022","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.im.2011.07.002","article-title":"Out of fear or desire? Toward a better understanding of employees\u2019 motivation to follow IS security policies","volume":"48","year":"2011","journal-title":"Information and Management"},{"volume-title":"Artificial Intelligence: A Modern Approach","year":"2020","key":"key2025011616444278800_ref023"},{"issue":"3","key":"key2025011616444278800_ref024","doi-asserted-by":"crossref","first-page":"371","DOI":"10.2307\/2393788","article-title":"What theory is not, theorizing is","volume":"40","year":"1995","journal-title":"Administrative Science Quarterly"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-03-2025-265\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-03-2025-265\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:49Z","timestamp":1753406569000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/33\/1\/1-4\/1239968"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,20]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1,20]]},"published-print":{"date-parts":[[2025,1,20]]}},"alternative-id":["10.1108\/ICS-03-2025-265"],"URL":"https:\/\/doi.org\/10.1108\/ics-03-2025-265","relation":{},"ISSN":["2056-4961","2056-497X"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"electronic","value":"2056-497X"}],"subject":[],"published":{"date-parts":[[2025,1,20]]}}}