{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:54:46Z","timestamp":1776830086828,"version":"3.51.2"},"reference-count":87,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2020,6,19]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to determine which factors influence information system security policy compliance. It examines how different norms influence compliance intention.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Based on relevant literature on information system security policy compliance, a research model was developed and validated. An online questionnaire was used to gather data from respondents and partial least square structural equation modelling (PLS-SEM) was used to analyse 432 responses received.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The results indicated that attitude towards information security compliance mediates the effects of personal norms on compliance intention. In addition, descriptive and subjective norms are significant predictors of personal norms.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>Though advancement in technology has reached significant heights, it is still inadequate to guaranteed information systems\u2019 security. Researchers have identified humans to be central in ensuring information security. To this effect, this study provides empirical evidence of the role of norms in influence information security behaviour.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ics-08-2019-0095","type":"journal-article","created":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T09:02:49Z","timestamp":1592557369000},"page":"743-761","source":"Crossref","is-referenced-by-count":21,"title":["The role of norms in information security policy compliance"],"prefix":"10.1108","volume":"28","author":[{"given":"Isaac","family":"Wiafe","sequence":"first","affiliation":[]},{"given":"Felix Nti","family":"Koranteng","sequence":"additional","affiliation":[]},{"given":"Abigail","family":"Wiafe","sequence":"additional","affiliation":[]},{"given":"Emmanuel Nyarko","family":"Obeng","sequence":"additional","affiliation":[]},{"given":"Winfred","family":"Yaokumah","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"3","key":"key2020110313135135400_ref001","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","article-title":"User preference of cyber security awareness delivery methods","volume":"33","year":"2014","journal-title":"Behaviour and Information Technology"},{"key":"key2020110313135135400_ref002","first-page":"1","article-title":"Moral and subjective norms: how do they effect information security compliance?","volume-title":"Emergent Research Forum (ERF), Twenty-Fourth Americas Conference on Information Systems","year":"2018"},{"issue":"2","key":"key2020110313135135400_ref003","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"key2020110313135135400_ref004","article-title":"Rational choice, deterrence, and social learning theory in criminology: the path not taken","volume":"81","year":"1990","journal-title":"Journal of Criminal Law and Criminology"},{"key":"key2020110313135135400_ref005","first-page":"113","article-title":"Culture, cognition and E-Commerce behaviour","year":"2013","journal-title":"International Conference on Informatics and Semiotics in Organisation (ICISO)"},{"key":"key2020110313135135400_ref006","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","article-title":"Security awareness of computer users: a phishing threat avoidance perspective","volume":"38","year":"2014","journal-title":"Computers in Human Behavior"},{"key":"key2020110313135135400_ref007","article-title":"Social norms background reader. Learning collaborative: advancing research and practice on normative change for adolescent sexual and reproductive health and well-being","year":"2016"},{"key":"key2020110313135135400_ref008","first-page":"3248","article-title":"A composite framework for behavioral compliance with information security policies","volume-title":"45th Hawaii International Conference on System Science (HICSS)","year":"2012"},{"issue":"1","key":"key2020110313135135400_ref009","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/BF02723327","article-title":"On the evaluation of structural equation models","volume":"16","year":"1988","journal-title":"Journal of the Academy of Marketing Science"},{"key":"key2020110313135135400_ref010","article-title":"Albert bandura and social learning theory","volume-title":"Learning Theories for Early Years Practice","year":"2018"},{"issue":"2","key":"key2020110313135135400_ref011","first-page":"285","article-title":"The partial least squares (PLS) approach to casual modeling: Personal computer adoption and use as an illustration","volume":"2","year":"1995","journal-title":"Technology Studies"},{"issue":"3","key":"key2020110313135135400_ref012","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/3130515.3130519","article-title":"From information security awareness to reasoned compliant action: analyzing information security policy compliance in a large banking organization","volume":"48","year":"2017","journal-title":"ACM SIGMIS Database: The DATABASE for Advances in Information Systems"},{"issue":"7","key":"key2020110313135135400_ref013","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.im.2017.01.003","article-title":"Determinants of early conformance with information security policies","volume":"54","year":"2017","journal-title":"Information and Management"},{"issue":"351","key":"key2020110313135135400_ref014","first-page":"45","article-title":"The outer influence inside us: exploring the relation between social and personal norms","volume":"112","year":"2016","journal-title":"Resources, Conservation and Recycling"},{"key":"key2020110313135135400_ref015","volume-title":"Completing Your Qualitative Dissertation: A Road Map from Beginning to End","year":"2008"},{"issue":"3","key":"key2020110313135135400_ref016","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s10551-012-1390-7","article-title":"Analyzing the role of social norms in tax compliance behavior","volume":"115","year":"2013","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"key2020110313135135400_ref017","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1111\/j.1468-2885.2006.00006.x","article-title":"The role of positive and negative signaling communication by strong and weak ties in the shaping of safe sex subjective norms of adolescents in South Africa","volume":"16","year":"2006","journal-title":"Communication Theory"},{"key":"key2020110313135135400_ref018","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.resconrec.2014.12.004","article-title":"Extending the theory of planned behavior in the context of recycling: the role of moral norms and of demographic predictors","volume":"95","year":"2015","journal-title":"Resources, Conservation and Recycling"},{"key":"key2020110313135135400_ref019","volume-title":"Explaining Norms","year":"2013"},{"issue":"3","key":"key2020110313135135400_ref020","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2020110313135135400_ref021","unstructured":"Cavusoglu, H., Son, J.Y. and Benbasat, I. (2009), \u201cInformation security control resources in organizations: a multidimensional view and their key drivers\u201d, UBC Working Paper."},{"issue":"8","key":"key2020110313135135400_ref022","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1016\/j.im.2018.05.011","article-title":"Sanction severity and employees\u2019 information security policy compliance: Investigating mediating, moderating, and control variables","volume":"55","year":"2018","journal-title":"Information and Management"},{"key":"key2020110313135135400_ref023","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.cose.2013.09.009","article-title":"Understanding the violation of is security policy in organizations: an integrated model based on social control and deterrence theory","volume":"39","year":"2013","journal-title":"Computers and Security"},{"key":"key2020110313135135400_ref024","first-page":"151","article-title":"Social influence: social norms, conformity and compliance","volume-title":"The Handbook of Social Psychology","year":"1998"},{"issue":"3","key":"key2020110313135135400_ref025","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1037\/1040-3590.7.3.309","article-title":"Constructing validity: Basic issues in objective scale development","volume":"7","year":"1995","journal-title":"Psychological Assessment"},{"key":"key2020110313135135400_ref087","volume-title":"Statistical Power Analysis for the Behavioral Sciences","year":"2013"},{"issue":"12","key":"key2020110313135135400_ref026","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1016\/j.jbusres.2008.01.013","article-title":"Formative versus reflective measurement models: two applications of formative measurement","volume":"61","year":"2008","journal-title":"Journal of Business Research"},{"issue":"1","key":"key2020110313135135400_ref027","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1080\/0144929X.2017.1397193","article-title":"How senior management and workplace norms influence information security attitudes and self-efficacy","volume":"37","year":"2018","journal-title":"Behaviour and Information Technology"},{"issue":"6","key":"key2020110313135135400_ref028","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1016\/S0167-4048(02)01006-4","article-title":"Policy enforcement in the workplace","volume":"21","year":"2002","journal-title":"Computers and Security"},{"issue":"1","key":"key2020110313135135400_ref029","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1111\/joop.12083","article-title":"Smartphone use and work\u2013home interference: the moderating role of social norms and employee work engagement","volume":"88","year":"2015","journal-title":"Journal of Occupational and Organizational Psychology"},{"key":"key2020110313135135400_ref030","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ecolecon.2017.04.017","article-title":"Social norms and pro-environmental behavior: a review of the evidence","volume":"140","year":"2017","journal-title":"Ecological Economics"},{"key":"key2020110313135135400_ref031","volume-title":"A Theory of Cognitive Dissonance (Vol. 2)","year":"1962"},{"issue":"2","key":"key2020110313135135400_ref032","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1111\/j.1468-2885.2003.tb00287.x","article-title":"Using theory to design effective health behavior interventions","volume":"13","year":"2003","journal-title":"Communication Theory"},{"key":"key2020110313135135400_ref033","first-page":"1","article-title":"Evaluating structural equation modeling for travel behavior research","volume":"37","year":"1981","journal-title":"Transportation Research Part B, University of Michigan"},{"issue":"2","key":"key2020110313135135400_ref034","doi-asserted-by":"crossref","first-page":"iii","DOI":"10.2307\/23044042","article-title":"Editor\u2019s comments: an update and extension to SEM guidelines for administrative and social science research","volume":"35","year":"2011","journal-title":"Mis Quarterly"},{"issue":"2","key":"key2020110313135135400_ref035","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.hlpt.2013.03.006","article-title":"Changing building user attitude and organisational policy towards sustainable resource use in healthcare","volume":"2","year":"2013","journal-title":"Health Policy and Technology"},{"issue":"3","key":"key2020110313135135400_ref036","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/s11747-011-0261-6","article-title":"An assessment of the use of partial least squares structural equation modeling in marketing research","volume":"40","year":"2012","journal-title":"Journal of the Academy of Marketing Science"},{"key":"key2020110313135135400_ref037","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM","year":"2016"},{"key":"key2020110313135135400_ref038","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.cose.2016.12.016","article-title":"An integrative model of information security policy compliance with psychological contract: examining a bilateral perspective","volume":"66","year":"2017","journal-title":"Computers and Security"},{"issue":"12","key":"key2020110313135135400_ref039","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1111\/j.1559-1816.1999.tb00123.x","article-title":"Explaining proenvironmental intention and behavior by personal norms and the theory of planned behavior 1","volume":"29","year":"1999","journal-title":"Journal of Applied Social Psychology"},{"issue":"1","key":"key2020110313135135400_ref040","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1024\/0044-3514.38.1.7","article-title":"Cognitive dissonance theory after 50 years of development","volume":"38","year":"2007","journal-title":"Zeitschrift F\u00fcr Sozialpsychologie"},{"issue":"1","key":"key2020110313135135400_ref041","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1037\/xge0000043","article-title":"If all your friends jumped off a bridge: the effect of others\u2019 actions on engagement in and recommendation of risky behaviors","volume":"144","year":"2015","journal-title":"Journal of Experimental Psychology: General"},{"key":"key2020110313135135400_ref042","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.paid.2014.11.016","article-title":"A good thing isn\u2019t always a good thing: Dispositional attitudes predict non-normative judgments","volume":"75","year":"2015","journal-title":"Personality and Individual Differences"},{"issue":"2","key":"key2020110313135135400_ref043","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","article-title":"Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness","volume":"47","year":"2009","journal-title":"Decision Support Systems"},{"issue":"1\/2","key":"key2020110313135135400_ref044","first-page":"46","article-title":"National cultures in four dimensions: a research-based theory of cultural differences among nations","volume":"13","year":"1983","journal-title":"International Studies of Management and Organization"},{"issue":"1","key":"key2020110313135135400_ref045","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","year":"2012","journal-title":"Computers and Security"},{"issue":"1","key":"key2020110313135135400_ref046","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","article-title":"Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition","volume":"51","year":"2014","journal-title":"Information and Management"},{"issue":"2","key":"key2020110313135135400_ref047","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0268-4012(02)00105-6","article-title":"An integrative study of information systems security effectiveness","volume":"23","year":"2003","journal-title":"International Journal of Information Management"},{"issue":"2","key":"key2020110313135135400_ref048","first-page":"351","article-title":"Toward a theory of information systems security behaviors of organizational employees: a dialectical process perspective","volume":"30","year":"2019","journal-title":"Information Systems Research"},{"issue":"4","key":"key2020110313135135400_ref049","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jec.2010100101","article-title":"Using WarpPLS in e-collaboration studies: an overview of five main analysis steps","volume":"6","year":"2010","journal-title":"International Journal of e-Collaboration"},{"issue":"4","key":"key2020110313135135400_ref050","first-page":"113","article-title":"Modeling the iinfluence of group norms and self-regulatory efficacy on workplace deviant behaviour","volume":"9","year":"2013","journal-title":"Asian Social Science"},{"issue":"2","key":"key2020110313135135400_ref051","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1111\/j.1468-2885.2005.tb00329.x","article-title":"An explication of social norms","volume":"15","year":"2005","journal-title":"Communication Theory"},{"issue":"2","key":"key2020110313135135400_ref052","first-page":"49","article-title":"Workplace management and employee misuse: does punishment matter","volume":"50","year":"2009","journal-title":"Journal of Computer Information Systems"},{"key":"key2020110313135135400_ref053","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.chb.2018.10.031","article-title":"Examining the impact of deterrence factors and norms on resistance to information systems security","volume":"92","year":"2019","journal-title":"Computers in Human Behavior"},{"key":"key2020110313135135400_ref054","first-page":"4183","article-title":"The impact of training and social norms on information security compliance: a pilot study","volume-title":"International Conference on Information Systems","year":"2012"},{"issue":"4","key":"key2020110313135135400_ref055","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: a health belief perspective","volume":"46","year":"2009","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2020110313135135400_ref056","first-page":"28","article-title":"Persuasive systems design: Key issues, process model, and system features","volume":"24","year":"2009","journal-title":"Communications of the Association for Information Systems"},{"key":"key2020110313135135400_ref057","first-page":"30","article-title":"Persuasion and culture: individualism-collectivism and susceptibility to influence strategies","volume":"1582","year":"2016","journal-title":"CEUR Workshop Proceedings"},{"key":"key2020110313135135400_ref058","doi-asserted-by":"crossref","first-page":"142","DOI":"10.4018\/978-1-5225-2604-9.ch006","article-title":"Fortifying Corporate Human Wall: A Literature Review of Security Awareness and Training","volume-title":"Information Technology Risk Management and Compliance in Modern Organizations","year":"2018"},{"key":"key2020110313135135400_ref059","first-page":"231","article-title":"Factors that influence information security behavior: an Australian web-based study","volume-title":"International Conference on Human Aspects of Information Security, Privacy, and Trust","year":"2015"},{"issue":"9\/10","key":"key2020110313135135400_ref060","first-page":"961","article-title":"Perceiving the community norms of alcohol use among students: Some research implications for campus alcohol education programming","volume":"21","year":"1986","journal-title":"International Journal of the Addictions"},{"issue":"8","key":"key2020110313135135400_ref061","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","article-title":"Self-efficacy in information security: Its influence on end users\u2019 information security practice behavior","volume":"28","year":"2009","journal-title":"Computers and Security"},{"key":"key2020110313135135400_ref062","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/j.econmod.2013.08.011","article-title":"A customer loyalty formation model in electronic commerce","volume":"35","year":"2013","journal-title":"Economic Modelling"},{"key":"key2020110313135135400_ref063","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.cose.2015.10.006","article-title":"Information security policy compliance model in organizations","volume":"56","year":"2016","journal-title":"Computers and Security"},{"key":"key2020110313135135400_ref064","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.jisa.2017.11.001","article-title":"Motivation and opportunity based model to reduce information security insider threats in organisations","volume":"40","year":"2018","journal-title":"Journal of Information Security and Applications"},{"key":"key2020110313135135400_ref065","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","article-title":"Information security conscious care behaviour formation in organizations","volume":"53","year":"2015","journal-title":"Computers and Security"},{"key":"key2020110313135135400_ref066","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/S0065-2601(08)60358-5","article-title":"Normative influences on altruism","volume":"10","year":"1977","journal-title":"Advances in Experimental Social Psychology"},{"issue":"2","key":"key2020110313135135400_ref067","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","article-title":"Employees\u2019 adherence to information security policies: an exploratory field study","volume":"51","year":"2014","journal-title":"Information and Management"},{"issue":"3","key":"key2020110313135135400_ref068","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: New insights into the problem of employee information systems security policy violations","volume":"34","author":"Siponen and Vance","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2020110313135135400_ref069","first-page":"257","article-title":"A review of the theory of planned behaviour in the context of information security policy compliance","volume-title":"IFIP International Information Security Conference","year":"2013"},{"issue":"2","key":"key2020110313135135400_ref070","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1108\/ICS-04-2014-0025","article-title":"The sufficiency of the theory of planned behavior for explaining information security policy compliance","volume":"23","year":"2015","journal-title":"Information and Computer Security"},{"issue":"1","key":"key2020110313135135400_ref071","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1108\/IMCS-08-2012-0045","article-title":"Variables influencing information security policy compliance: a systematic review of quantitative studies","volume":"22","year":"2014","journal-title":"Information Management and Computer Security"},{"issue":"1","key":"key2020110313135135400_ref072","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/17524032.2015.1047887","article-title":"YouTube, social norms and perceived salience of climate change in the American mind","volume":"11","year":"2017","journal-title":"Environmental Communication"},{"issue":"2","key":"key2020110313135135400_ref073","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","article-title":"Analysis of end user security behaviors","volume":"24","year":"2005","journal-title":"Computers and Security"},{"issue":"3","key":"key2020110313135135400_ref074","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1111\/j.1540-4560.1972.tb00036.x","article-title":"Instigation to goodness: the role of social norms and interpersonal influence","volume":"28","year":"1972","journal-title":"Journal of Social Issues"},{"key":"key2020110313135135400_ref075","volume-title":"The social psychology of groups","year":"2017","edition":"1st ed.,"},{"issue":"4","key":"key2020110313135135400_ref076","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1023\/A:1006225711603","article-title":"The ethical consumer. Moral norms and packaging choice","volume":"22","year":"1999","journal-title":"Journal of Consumer Policy"},{"key":"key2020110313135135400_ref077","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: a protection motivation theory perspective","volume":"59","year":"2016","journal-title":"Computers and Security"},{"issue":"3\/4","key":"key2020110313135135400_ref078","first-page":"190","article-title":"Motivating is security compliance: Insights from habit and protection motivation theory","volume":"49","year":"2012","journal-title":"Information and Management"},{"issue":"3","key":"key2020110313135135400_ref079","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","year":"2003","journal-title":"MIS Quarterly"},{"key":"key2020110313135135400_ref080","first-page":"193","article-title":"Analyzing the persuasion context of the persuasive systems design model with the 3D-RAB model","volume-title":"Lecture Notes in Computer Science (Design for Health and Safety): Vol. 7284 LNCS","year":"2012"},{"issue":"4","key":"key2020110313135135400_ref081","article-title":"Factors that affect acceptance and use of information systems within the Maritime industry in developing countries","volume":"22","year":"2019","journal-title":"Journal of Systems and Information Technology"},{"issue":"7","key":"key2020110313135135400_ref082","doi-asserted-by":"crossref","first-page":"1677","DOI":"10.1007\/s00779-014-0782-3","article-title":"Categorizing users in behavior change support systems based on cognitive dissonance","volume":"18","year":"2014","journal-title":"Personal and Ubiquitous Computing"},{"key":"key2020110313135135400_ref083","first-page":"186","article-title":"Considering user attitude and behaviour in persuasive systems design: the 3d-rab model","year":"2011"},{"issue":"1","key":"key2020110313135135400_ref084","doi-asserted-by":"crossref","first-page":"17","DOI":"10.2307\/3250957","article-title":"An empirical investigation of the factors affecting data warehousing success","volume":"25","year":"2001","journal-title":"MIS Quarterly"},{"key":"key2020110313135135400_ref085","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.dss.2016.09.009","article-title":"Employees\u2019 information security policy compliance: a norm activation perspective","volume":"92","year":"2016","journal-title":"Decision Support Systems"},{"issue":"4","key":"key2020110313135135400_ref086","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1108\/09685220910993980","article-title":"Impact of perceived technical protection on security behaviors","volume":"17","year":"2009","journal-title":"Information Management and Computer Security"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-08-2019-0095\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-08-2019-0095\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:08Z","timestamp":1753406588000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/28\/5\/743-761\/110962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":87,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,6,19]]}},"alternative-id":["10.1108\/ICS-08-2019-0095"],"URL":"https:\/\/doi.org\/10.1108\/ics-08-2019-0095","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2020,6,19]]}}}