{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T08:29:52Z","timestamp":1776068992191,"version":"3.50.1"},"reference-count":86,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2022,5,27]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The survey using the Organizational Culture Assessment Instrument was sent to white-collar workers in Sweden (<jats:italic>n<\/jats:italic> = 674), asking about compliance with information security policies. The survey instrument is an operationalization of the Competing Values Framework that distinguishes between four different types of organizational culture: clan, adhocracy, market and bureaucracy.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The results indicate that organizational cultures with an internal focus are positively related to employees\u2019 information security policy compliance. Differences in organizational culture with regards to control and flexibility seem to have less effect. The analysis shows that a bureaucratic form of organizational culture is most fruitful for fostering employees\u2019 information security policy compliance.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The results suggest that differences in organizational culture are important for employees\u2019 information security policy compliance. This justifies further investigating the mechanisms linking organizational culture to information security compliance.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>Practitioners should be aware that the different organizational cultures do matter for employees\u2019 information security compliance. In businesses and the public sector, the authors see a development toward customer orientation and marketization, i.e. the opposite an internal focus, that may have negative ramifications for the information security of organizations.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Few information security policy compliance studies exist on the consequences of different organizational\/information cultures.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-06-2021-0073","type":"journal-article","created":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T08:55:02Z","timestamp":1639731302000},"page":"382-401","source":"Crossref","is-referenced-by-count":30,"title":["The effect of perceived organizational culture on employees\u2019 information security compliance"],"prefix":"10.1108","volume":"30","author":[{"given":"Martin","family":"Karlsson","sequence":"first","affiliation":[]},{"given":"Fredrik","family":"Karlsson","sequence":"additional","affiliation":[]},{"given":"Joachim","family":"\u00c5str\u00f6m","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Denk","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,12,21]]},"reference":[{"key":"key2022052516415759300_ref001","article-title":"Global information security spending to exceed $124B in 2019, privacy concerns driving demand","volume-title":"Forbes","year":"2018"},{"key":"key2022052516415759300_ref002","first-page":"6","article-title":"A study of information security awareness and practices in Saudi Arabia","year":"2012"},{"key":"key2022052516415759300_ref003","article-title":"A conceptual model for explaining violations of the information security policy (ISP): a cross cultural perspective","year":"2008"},{"issue":"3","key":"key2022052516415759300_ref004","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/s11115-010-0136-1","article-title":"From bureaucracy to debureaucratization?","volume":"10","year":"2010","journal-title":"Public Organization Review"},{"key":"key2022052516415759300_ref005","first-page":"39396","article-title":"CISOs and organisational culture: their own worst enemy?","year":"2013","journal-title":"Computers and Security"},{"issue":"3","key":"key2022052516415759300_ref006","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1093\/geront\/gnt129","article-title":"The role of organizational culture in retaining nursing workforce","volume":"55","year":"2015","journal-title":"The Gerontologist"},{"key":"key2022052516415759300_ref007","first-page":"46","article-title":"Corporate culture and banking","volume":"176","year":"2021","journal-title":"Journal of Economic Behvior and Organization"},{"issue":"12","key":"key2022052516415759300_ref022aa","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1108\/01443570610710579","article-title":"Dynamics of performance measurement and organizational culture","volume":"26","year":"2006","journal-title":"International Journal of Operations & Production Management"},{"issue":"2","key":"key2022052516415759300_ref008","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1057\/ejis.2009.8","article-title":"If someone is watching, I\u2019ll do what I\u2019m asked: mandatoriness, control and information security","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"key2022052516415759300_ref009","first-page":"1555","article-title":"The role of a stress model in the development of information security culture","year":"2012"},{"issue":"5","key":"key2022052516415759300_ref010","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1287\/orsc.7.5.557","article-title":"Competing values in organizations: contextual influences and structural consequences","volume":"7","year":"1996","journal-title":"Organization Science"},{"issue":"3","key":"key2022052516415759300_ref011","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2022052516415759300_ref012","volume-title":"Diagnosing and Changing Organizational Culture \u2013 Based on the Competing Values Framework","year":"2006"},{"issue":"3","key":"key2022052516415759300_ref013","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1108\/02635570710734316","article-title":"Exploring organizational culture for information security management","volume":"107","year":"2007","journal-title":"Industrial Management and Data Systems"},{"issue":"3","key":"key2022052516415759300_ref014","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/08874417.2015.11645767","article-title":"Impacts of comprehensive information security programs on information security culture","volume":"55","year":"2015","journal-title":"Journal of Computer Information Systems"},{"key":"key2022052516415759300_ref015","article-title":"A crash course in good and bad controls","year":"2020"},{"key":"key2022052516415759300_ref016","unstructured":"Cisco (2018), \u201cCisco 2018 Annual Security Report\u201d."},{"key":"key2022052516415759300_ref017","article-title":"Information systems security: the role of cultural aspects in organisational settings","year":"2013"},{"key":"key2022052516415759300_ref018","first-page":"105","article-title":"Investigation of cultural aspects within information systems security research","year":"2012"},{"issue":"4","key":"key2022052516415759300_ref019","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1080\/10580530.2019.1651113","article-title":"Information security behavior: a Cross-Cultural comparison of irish and US employees","volume":"36","year":"2019","journal-title":"Information Systems Management"},{"issue":"2","key":"key2022052516415759300_ref020","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","article-title":"A framework and assessment instrument for information security culture","volume":"29","year":"2010","journal-title":"Computers and Security"},{"key":"key2022052516415759300_ref021","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.cose.2014.12.006","article-title":"Improving the information security culture through monitoring and implementation actions illustrated through a case study","volume":"49","year":"2015","journal-title":"Computers and Security"},{"key":"key2022052516415759300_ref022","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.cose.2017.05.002","article-title":"Defining and identifying dominant information security cultures and subcultures","volume":"70","year":"2017","journal-title":"Computers and Security"},{"issue":"5","key":"key2022052516415759300_ref023","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1108\/ICS-08-2017-0056","article-title":"An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture","volume":"26","year":"2018","journal-title":"Information and Computer Security"},{"key":"key2022052516415759300_ref024","first-page":"92101713","article-title":"Defining organisational information security culture \u2013 perspectives from academia and industry","year":"2020","journal-title":"Computers and Security"},{"issue":"5","key":"key2022052516415759300_ref025","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1108\/IMCS-08-2013-0057","article-title":"Security culture and the employment relationship as drivers of employees\u2019 security compliance","volume":"22","year":"2014","journal-title":"Information Management and Computer Security"},{"issue":"1","key":"key2022052516415759300_ref026","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information security misuse: a deterrence approach","volume":"20","year":"2009","journal-title":"Information Systems Research"},{"issue":"2","key":"key2022052516415759300_ref027","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1080\/095851900339927","article-title":"The interplay between organizational and national cultures: a comparison of organizational practices in Canada and South Korea using the competing values framework","volume":"11","year":"2000","journal-title":"The International Journal of Human Resource Management"},{"key":"key2022052516415759300_ref028","volume-title":"Information Security \u2013 Text and Cases","year":"2017"},{"key":"key2022052516415759300_ref029","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.cose.2015.10.001","article-title":"Interpreting information security culture: an organizational transformation case study","volume":"56","year":"2016","journal-title":"Computers and Security"},{"key":"key2022052516415759300_ref030","article-title":"Enabling information security culture: influences and challenges for Australian SMEs","year":"2010"},{"key":"key2022052516415759300_ref031","unstructured":"Donahue, S.E. (2011), \u201cAssessing the impact that organizational culture has on enterprise information security incidents\u201d, Doctor of Philosophy PhD, Capella University."},{"key":"key2022052516415759300_ref032","volume-title":"Ernst and Young 2008 Global Information Security Survey","author":"Ernst and Young","year":"2008"},{"key":"key2022052516415759300_ref033","volume-title":"Borderless security \u2013 Ernst and Young\u2019s 2010 Global Information Security Survey","author":"Ernst and Young","year":"2010"},{"issue":"2","key":"key2022052516415759300_ref034","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(09)70019-3","article-title":"From culture to disobedience: recognising the varying user acceptance of IT security","volume":"2009","year":"2009","journal-title":"Computer Fraud and Security"},{"key":"key2022052516415759300_ref035","article-title":"IFIP workshop \u2013 information security culture","volume-title":"Computer and Security","year":"2007"},{"issue":"7","key":"key2022052516415759300_ref036","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.im.2009.06.005","article-title":"Estimating the market impact of security breach announcements on firm values","volume":"46","year":"2009","journal-title":"Information and Management"},{"key":"key2022052516415759300_ref037","first-page":"2959","article-title":"A path way to successful management of individual intention to security compliance: a role of organizational security climate","year":"2013"},{"key":"key2022052516415759300_ref038","first-page":"190","article-title":"Information security culture in a value net","year":"2003"},{"issue":"2","key":"key2022052516415759300_ref039","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation and deterrence: a framework for security policy compliance in organisations","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2022052516415759300_ref040","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1002\/hrm.3930320103","article-title":"On cultural change: using the competing values framework to help leaders execute a transformational strategy","volume":"32","year":"1993","journal-title":"Human Resource Management"},{"issue":"2","key":"key2022052516415759300_ref041","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.im.2011.12.005","article-title":"Applying an extended model of deterrence across cultures: an investigation of information systems misuse in the U.S. and South Korea","volume":"49","year":"2012","journal-title":"Information and Management"},{"key":"key2022052516415759300_ref054a","first-page":"54","article-title":"Top management championship and individual behaviour towards information security: an integrative model","year":"2008"},{"issue":"4","key":"key2022052516415759300_ref042","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1111\/j.1540-5915.2012.00361.x","article-title":"Managing employee compliance with information security policies: the critical role of top management and organizational culture","volume":"43","year":"2012","journal-title":"Decision Sciences"},{"issue":"1","key":"key2022052516415759300_ref043","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/25148780","article-title":"The relationship between organizational culture and the deployment of systems development methodologies","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"key":"key2022052516415759300_ref044","first-page":"34549","article-title":"Fear appeals and information security behaviors: an empirical study","year":"2010","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2022052516415759300_ref045","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1111\/j.1540-6210.2009.02066.x","article-title":"Instruments for exploring organizational culture: a review of the literature","volume":"69","year":"2009","journal-title":"Public Administration Review"},{"issue":"3","key":"key2022052516415759300_ref046","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1108\/ICS-05-2014-0033","article-title":"Information security culture \u2013 state-of-the-art review between 2000 and 2013","volume":"23","year":"2015","journal-title":"Information and Computer Security"},{"issue":"2","key":"key2022052516415759300_ref047","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1108\/ICS-08-2017-0058","article-title":"Perceptions of organizational culture and value conflicts in information security management","volume":"26","year":"2018","journal-title":"Information and Computer Security"},{"key":"key2022052516415759300_ref048","article-title":"Security subcultures in an organization-exploring value conflicts","year":"2011"},{"issue":"1","key":"key2022052516415759300_ref049","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1504\/IJITST.2012.045147","article-title":"Cultural and organisational commitment in the context of e-banking","volume":"4","year":"2012","journal-title":"International Journal of Internet Technology and Secured Transactions"},{"key":"key2022052516415759300_ref050","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.cose.2016.02.004","article-title":"Understanding information security stress: focusing on the type of information security compliance activity","volume":"59","year":"2016","journal-title":"Computers and Security"},{"key":"key2022052516415759300_ref051","article-title":"Is your banker leaking your personal information? The roles of ethics and Individual-Level cultural characteristics in predicting organizational computer abuse","volume":"4","year":"2013","journal-title":"Journal of Business Ethics"},{"key":"key2022052516415759300_ref052","first-page":"361","article-title":"What is security culture? Does it differ in content from general organisational culture?","year":"2009"},{"key":"key2022052516415759300_ref053","article-title":"Information security culture","volume-title":"Security in the Information Society: Visions and Perspectives","year":"2002"},{"key":"key2022052516415759300_ref054","article-title":"An investigation of the impact of corporate culture on employee information systems security behaviour","year":"2009"},{"key":"key2022052516415759300_ref055","article-title":"Cybersecurity market reaches $75 billion in 2015; expected to reach $170 billion by 2020","volume-title":"Forbes","year":"2015"},{"issue":"2","key":"key2022052516415759300_ref056","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1057\/ejis.2009.10","article-title":"What levels of moral reasoning and values explain adherence to information security rules? An empirical study","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"key2022052516415759300_ref057","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jisa.2018.11.003","article-title":"An analysis on the dimensions of information security culture concept: a review","volume":"44","year":"2019","journal-title":"Journal of Information Security and Applications"},{"issue":"6","key":"key2022052516415759300_ref058","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1080\/03075079.2016.1196353","article-title":"Her majesty the student:rganizati higher education and the narcissistic (dis) satisfactions of the student-consumer","volume":"43","year":"2018","journal-title":"Studies in Higher Education"},{"issue":"2","key":"key2022052516415759300_ref059","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1177\/1555343415575152","article-title":"The influence of organizational information security culture on information security decision making","volume":"9","year":"2015","journal-title":"Journal of Cognitive Engineering and Decision Making"},{"key":"key2022052516415759300_ref060","unstructured":"Pwc (2014), \u201cThe information security breaches survey \u2013 Technical report\u201d, Department for Business, Innovation and Skills (BIS), London."},{"key":"key2022052516415759300_ref061","unstructured":"Pwc (2018), \u201cThe Global State of Information Security Survey 2018\u201d, PriceWaterhouseCoopers."},{"issue":"3","key":"key2022052516415759300_ref062","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1287\/mnsc.29.3.363","article-title":"A spatial model of effectiveness criteria: towards a competing values approach to organizational analysis","volume":"29","year":"1983","journal-title":"Management Science"},{"issue":"8","key":"key2022052516415759300_ref022a","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1108\/02621710310487873","article-title":"The influence of corporate culture and organizational commitment on performance","volume":"22","year":"2003","journal-title":"Journal of Management Development"},{"issue":"12","key":"key2022052516415759300_ref063","first-page":"1628","article-title":"Information security service culture \u2013 information security for end-users","volume":"18","year":"2012","journal-title":"Journal of Universal Computer Science"},{"issue":"1","key":"key2022052516415759300_ref064","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.cose.2006.10.008","article-title":"Organisational security culture: extending the end-user perspective","volume":"26","year":"2007","journal-title":"Computers and Security"},{"key":"key2022052516415759300_ref042a","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.cose.2015.10.006","article-title":"Information security policy compliance model in organizations","volume":"56","year":"2016","journal-title":"Computers & Security"},{"issue":"2","key":"key2022052516415759300_ref065","first-page":"3","article-title":"Coming to a new awareness of organizational culture","volume":"25","year":"1984","journal-title":"Sloan Management Review"},{"key":"key2022052516415759300_ref066","first-page":"405","article-title":"Analyzing information security culture: Increased trust by an appropriate information security culture","year":"2003"},{"key":"key2022052516415759300_ref067","first-page":"191","article-title":"Information security culture \u2013 the socio- cultural dimension in information security management","volume-title":"Security in the Information Society: Visions and Perspectives","year":"2002"},{"issue":"3","key":"key2022052516415759300_ref068","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: new insights into the problem of employee information systems security policy violations","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2022052516415759300_ref069","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1108\/JEIM-08-2019-0217","article-title":"The influence of organisational culture and information security culture on employee compliance behaviour","volume":"34","year":"2021","journal-title":"Journal of Enterprise Information Management"},{"issue":"5","key":"key2022052516415759300_ref070","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1108\/ICS-08-2017-0054","article-title":"Work-related groups and information security policy compliance","volume":"26","year":"2018","journal-title":"Information and Computer Security"},{"key":"key2022052516415759300_ref071","article-title":"A review of the theory of planned behaviour in the context of information security policy compliance","year":"2013"},{"issue":"4","key":"key2022052516415759300_ref072","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1080\/08874417.2017.1368421","article-title":"The theory of planned behavior and information security policy compliance","volume":"59","year":"2019","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"key2022052516415759300_ref012a","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1108\/IMCS-08-2012-0045","article-title":"Variables influencing information security policy compliance: a systematic review of quantitative studies","volume":"22","year":"2014","journal-title":"Information Management and Computer Security"},{"issue":"3","key":"key2022052516415759300_ref073","first-page":"503","article-title":"Internet users\u2019 information privacy-protective responses: a taxonomy and a nomological model","volume":"32","year":"2009","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2022052516415759300_ref074","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","article-title":"Analysis of end user security behaviors","volume":"24","year":"2005","journal-title":"Computers and Security"},{"issue":"2","key":"key2022052516415759300_ref075","article-title":"Effective is security: an empirical study","volume":"1","year":"1990","journal-title":"Information System Research"},{"issue":"2","key":"key2022052516415759300_ref076","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s10799-015-0252-2","article-title":"The impacts of organizational culture on information security culture: a case study","volume":"17","year":"2016","journal-title":"Information Technology and Management"},{"issue":"3-4","key":"key2022052516415759300_ref077","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","article-title":"Motivating is security compliance: insights from habit and protection motivation theory","volume":"49","year":"2012","journal-title":"Information and Management"},{"key":"key2022052516415759300_ref078","first-page":"19615","article-title":"Information security \u2013 the third wave?","volume-title":"Computers and Security","year":"2000"},{"issue":"3","key":"key2022052516415759300_ref079","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.cose.2004.01.012","article-title":"Towards information security behavioural compliance","volume":"23","year":"2004","journal-title":"Computers and Security"},{"issue":"3","key":"key2022052516415759300_ref080","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1080\/01446190701874397","article-title":"Organizational culture and TQM implementation in construction firms in Singapore","volume":"26","year":"2008","journal-title":"Construction Management and Economics"},{"key":"key2022052516415759300_ref081","first-page":"437","article-title":"Internalisation of information security culture amongst employees through basic security knowledge","year":"2006"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-06-2021-0073\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-06-2021-0073\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:59Z","timestamp":1753406579000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/30\/3\/382-401\/189714"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":86,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,12,21]]},"published-print":{"date-parts":[[2022,5,27]]}},"alternative-id":["10.1108\/ICS-06-2021-0073"],"URL":"https:\/\/doi.org\/10.1108\/ics-06-2021-0073","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,12,21]]}}}