{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:28:02Z","timestamp":1754155682793,"version":"3.41.2"},"reference-count":69,"publisher":"Emerald","license":[{"start":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:00:00Z","timestamp":1704844800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>IT security compliance is critical to the organization\u2019s success, and such compliance depends largely on IT leadership. Considering the prevalence of unconscious gender biases and stereotyping at the workplace and growing female leadership in IT, the authors examine how the internalization of stereotype beliefs, in the form of the employee\u2019s gender, impacts the relationships between leadership characteristics and IT security compliance intentions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>A controlled experiment using eight different vignettes manipulating Chief Information Officer (CIO) gender (male\/female), Information Technology (IT) expertise (low\/high) and leadership style (transactional\/transformational) was designed in Qualtrics. Data were gathered from MTurk workers from all over the US.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The findings suggest that both CIOs' and employees' gender play an important role in how IT leadership characteristics \u2013 perceived expertise and leadership style \u2013 influence the employees' intentions and reactance to comply with CIO security recommendations.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>This study's findings enrich the security literature by examining the role of leadership styles on reactance and compliance intentions. They also provide important theoretical implications based on gender stereotype theory alone: First, the glass ceiling effects can be witnessed in how men and women employees demonstrate prejudice against women CIO leaders through their reliance on perceived quadratic CIO IT expertise in forming compliance intentions. Secondly, this study's findings related to gender role internalization show men and women have a prejudice against gender-incongruent roles wherein women employees are least resistive to transactional male CIOs, and men employees are less inclined to comply with transactional female CIOs confirm the findings related to gender internationalization from Hentschel <jats:italic>et\u00a0al.<\/jats:italic> (2019).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>This study highlights the significance of organizations and individuals actively promoting gender equality and fostering environments that recognize women's achievements. It also underscores the importance of educating men and women about the societal implications of stereotyping gender roles that go beyond the organizational setting. This research demonstrates that a continued effort is required to eradicate biases stemming from gender stereotypes and foster social inclusion. Such efforts can positively influence how upcoming IT leaders and employees internalize gender-related factors when shaping their identities.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Social implications<\/jats:title><jats:p>This study shows that more work needs to be done to eliminate gender stereotype biases and promote social inclusion to positively impact how future IT leaders and employees shape their identities through internalization.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This study redefines the concept of \u201csticky floors\u201d to explain how subordinates can hinder and undermine female leaders, thereby contributing to the glass ceiling effect. In addition, the study elucidates how gender roles shape employees' responses to different leadership styles through gender stereotyping and internalization.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-05-2023-0524","type":"journal-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T09:37:14Z","timestamp":1704793034000},"source":"Crossref","is-referenced-by-count":3,"title":["She\u2019s worth IT: challenges for female CIOs in ensuring IT security compliance"],"prefix":"10.1108","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0775-5225","authenticated-orcid":false,"given":"Gaurav","family":"Bansal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0353-1072","authenticated-orcid":false,"given":"Zhuoli","family":"Axelton","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2024,1,10]]},"reference":[{"issue":"50","key":"key2024010914370870300_ref001","doi-asserted-by":"publisher","first-page":"E6828","DOI":"10.1073\/pnas.1518936112","article-title":"Dutch research funding, gender bias, and Simpson's paradox","volume":"112","year":"2015","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"4","key":"key2024010914370870300_ref002","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/3508484.3508487","article-title":"Do you still trust?: the role of age, gender, and privacy concern on trust after insider data breaches","volume":"52","year":"2021","journal-title":"The Data Base for Advances in Information Systems"},{"issue":"6","key":"key2024010914370870300_ref003","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1057\/ejis.2014.41","article-title":"The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern","volume":"24","year":"2015","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2024010914370870300_ref004","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1108\/itp-03-2019-0109","article-title":"Information system security policy noncompliance: the role of situation-specific ethical orientation","volume":"34","year":"2020","journal-title":"Information Technology and People"},{"key":"key2024010914370870300_ref005","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103164","article-title":"Where authorities fail and experts excel: influencing Internet users' compliance intentions","volume":"128","year":"2023","journal-title":"Computers and Security"},{"issue":"2","key":"key2024010914370870300_ref006","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1037\/h0036215","article-title":"The measurement of psychological androgyny","volume":"42","year":"1974","journal-title":"Journal of Consulting and Clinical Psychology"},{"issue":"4","key":"key2024010914370870300_ref007","doi-asserted-by":"publisher","first-page":"805","DOI":"10.2307\/25148755","article-title":"Influence processes for information technology acceptance: an elaboration likelihood model","volume":"30","year":"2006","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2024010914370870300_ref008","first-page":"3","article-title":"Power and compliance in doctor\/patient relationships","volume":"6","year":"1994","journal-title":"Journal of Health Psychology"},{"issue":"4","key":"key2024010914370870300_ref009","first-page":"145","article-title":"The future of female CEOs and their glass ceiling","volume":"3","year":"2012","journal-title":"Journal of Business Studies Quarterly"},{"issue":"3","key":"key2024010914370870300_ref010","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2024010914370870300_ref011","unstructured":"Catalyst (2007), \u201cThe double-bind dilemma for women in leadership: damned if you do, doomed if you don't\u201d, available at: https:\/\/www.catalyst.org\/research\/the-double-bind-dilemma-for-women-in-leadership-damned-if-you-do-doomed-if-you-dont\/ (accessed 23 October 2023)."},{"key":"key2024010914370870300_ref012","unstructured":"Chamorro-Premuzic, T. (2021), \u201cIf women are better leaders, then Why are they not in Charge?\u201d, available at: https:\/\/www.forbes.com\/sites\/tomaspremuzic\/2021\/03\/07\/if-women-are-better-leaders-then-why-are-they-not-in-charge\/?sh=18789dab6c88 (accessed 23 October 2023)."},{"issue":"2","key":"key2024010914370870300_ref013","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1353\/sof.2001.0091","article-title":"The glass ceiling effect","volume":"80","year":"2001","journal-title":"Social Forces"},{"issue":"6","key":"key2024010914370870300_ref014","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1111\/isj.12460","article-title":"\u2018What a waste of time\u2019: an examination of cybersecurity legitimacy","volume":"33","year":"2023","journal-title":"Information Systems Journal"},{"issue":"5","key":"key2024010914370870300_ref015","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1108\/imcs-08-2013-0057","article-title":"Security culture and the employment relationship as drivers of employees' security compliance","volume":"22","year":"2014","journal-title":"Information Management and Computer Security"},{"issue":"1","key":"key2024010914370870300_ref016","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1037\/0022-3514.44.1.113","article-title":"Measuring individual differences in empathy: evidence for a multidimensional approach","volume":"44","year":"1983","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2024010914370870300_ref017","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.dss.2015.03.005","article-title":"How are C-suite executives different? A comparative empirical study of the survival of American chief information officers","volume":"74","year":"2015","journal-title":"Decision Support Systems"},{"issue":"5","key":"key2024010914370870300_ref018","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1177\/089124399013005006","article-title":"Work hard, play hard: women and professionalization in engineering\u2014adapting to the culture","volume":"13","year":"1999","journal-title":"Gender and Society"},{"issue":"2","key":"key2024010914370870300_ref019","doi-asserted-by":"publisher","first-page":"379","DOI":"10.5465\/amj.2015.1238","article-title":"Gender-inclusive gatekeeping: how (mostly male) predecessors influence the success of female CEOs","volume":"61","year":"2018","journal-title":"Academy of Management Journal"},{"issue":"8","key":"key2024010914370870300_ref020","doi-asserted-by":"publisher","first-page":"147","DOI":"10.4324\/9780429494000-17","article-title":"Women and the labyrinth of leadership","volume":"31","year":"2012","journal-title":"Contemporary Issues in Leadership"},{"issue":"3","key":"key2024010914370870300_ref021","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1037\/0033-295x.109.3.573","article-title":"Role congruity theory of prejudice toward female leaders","volume":"109","year":"2002","journal-title":"Psychological Review"},{"key":"key2024010914370870300_ref022","doi-asserted-by":"crossref","unstructured":"Eagly, A.H. and Wood, W. (2012), \u201cSocial role theory\u201d, in van Lange, A.P., Kruglanski and Higgins, E.T. (Eds), Handbook of Theories of Social Psychology, Sage, CA: Thousand Oaks, Vol.\u00a02, pp.\u00a0458-476.","DOI":"10.4135\/9781446249222.n49"},{"key":"key2024010914370870300_ref023","unstructured":"Eagly, A.H., Wood, W. and Diekman, A.B. (2000), \u201cSocial role theory of sex differences and similarities: a current appraisal\u201d, in Eckes, T. and Trautner, H.M. (Eds), The Developmental Social Psychology of Gender, Lawrence Erlbaum Associates Publishers, Mahwah, NJ, pp.\u00a0123-174."},{"issue":"4","key":"key2024010914370870300_ref024","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1037\/0033-2909.129.4.569","article-title":"Transformational, transactional, and laissez-faire leadership styles: a meta-analysis comparing women and men","volume":"129","year":"2003","journal-title":"Psychological Bulletin"},{"issue":"3","key":"key2024010914370870300_ref025","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1037\/amp0000494","article-title":"Gender stereotypes have changed: a cross-temporal meta-analysis of US public opinion polls from 1946 to 2018","volume":"75","year":"2020","journal-title":"American Psychologist"},{"issue":"2","key":"key2024010914370870300_ref026","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1108\/00251740810854177","article-title":"Making just decisions: organizational justice, decision making, and leadership","volume":"46","year":"2008","journal-title":"Management Decision"},{"issue":"11","key":"key2024010914370870300_ref027","doi-asserted-by":"publisher","first-page":"1650","DOI":"10.17705\/1jais.00581","article-title":"How paternalistic leadership influences IT security policy compliance: the mediating role of the social bond","volume":"20","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"issue":"8","key":"key2024010914370870300_ref028","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1080\/0144929x.2018.1557745","article-title":"Understanding forced adoption of self-service technology: the impacts of users' psychological reactance","volume":"38","year":"2019","journal-title":"Behaviour and Information Technology"},{"key":"key2024010914370870300_ref029","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cose.2016.01.004","article-title":"Shaping intention to resist social engineering through transformational leadership, information security culture and awareness","volume":"59","year":"2016","journal-title":"Computers and Security"},{"key":"key2024010914370870300_ref030","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103386","article-title":"Understanding extra-role security behaviors: an integration of self-determination theory and construal level theory","volume":"132","year":"2023","journal-title":"Computers and Security"},{"issue":"6","key":"key2024010914370870300_ref031","doi-asserted-by":"publisher","first-page":"101578","DOI":"10.1016\/j.leaqua.2021.101578","article-title":"Gender stereotypes explain different mental prototypes of male and female leaders","volume":"33","year":"2022","journal-title":"The Leadership Quarterly"},{"issue":"2","key":"key2024010914370870300_ref032","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1111\/isj.12202","article-title":"The impact of leadership on employees' intended information security behaviour: an examination of the full\u2010range leadership theory","volume":"29","year":"2019","journal-title":"Information Systems Journal"},{"key":"key2024010914370870300_ref033","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.riob.2012.11.003","article-title":"Gender stereotypes and workplace bias","volume":"32","year":"2012","journal-title":"Research in Organizational Behavior"},{"key":"key2024010914370870300_ref034","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpsyg.2019.00011","article-title":"The multiple dimensions of gender stereotypes: a current look at men's and women's characterizations of others and themselves","volume":"10","year":"2019","journal-title":"Frontiers in Psychology"},{"issue":"4","key":"key2024010914370870300_ref035","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1111\/j.1540-5915.2012.00361.x","article-title":"Managing employee compliance with information security policies: the critical role of top management and organizational culture","volume":"43","year":"2012","journal-title":"Decision Sciences"},{"issue":"1","key":"key2024010914370870300_ref036","doi-asserted-by":"publisher","first-page":"107","DOI":"10.2307\/249713","article-title":"The impact of job performance evaluations on career advancement prospects: an examination of gender differences in the IS workplace","volume":"19","year":"1995","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2024010914370870300_ref037","first-page":"89","article-title":"Transformational and transactional leadership styles as a predictor of individual outcomes","volume":"17","year":"2010","journal-title":"Theoretical and Applied Economics"},{"issue":"3","key":"key2024010914370870300_ref038","doi-asserted-by":"publisher","first-page":"1603","DOI":"10.25300\/misq\/2022\/16362","article-title":"What makes one intrinsically interested in IT? An exploratory study on influences of autistic tendency and gender in the US and India","volume":"46","year":"2022","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2024010914370870300_ref039","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/a:1007774600764","article-title":"Differentiation of self and psychological reactance","volume":"22","year":"2000","journal-title":"Contemporary Family Therapy"},{"issue":"1","key":"key2024010914370870300_ref040","doi-asserted-by":"publisher","first-page":"113","DOI":"10.25300\/misq\/2015\/39.1.06","article-title":"An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric","volume":"39","year":"2015","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2024010914370870300_ref041","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1037\/a0037215","article-title":"Evidence for the social role theory of stereotype content: observations of groups' roles shape stereotypes","volume":"107","year":"2014","journal-title":"Journal of Personality and Social Psychology"},{"issue":"4","key":"key2024010914370870300_ref042","doi-asserted-by":"publisher","first-page":"317","DOI":"10.17705\/1jais.00537","article-title":"Measuring and controlling social desirability bias: applications in information systems research","volume":"20","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"key2024010914370870300_ref043","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1177\/02683962231181146","article-title":"Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: a Foucauldian perspective","volume":"38","year":"2023","journal-title":"Journal of Information Technology"},{"issue":"5","key":"key2024010914370870300_ref044","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1111\/isj.12043","article-title":"Proposing the control\u2010reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies","volume":"25","year":"2015","journal-title":"Information Systems Journal"},{"issue":"5","key":"key2024010914370870300_ref045","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1023\/b:sers.0000018894.96308.52","article-title":"The influence of social status on token women leaders' expectations about leading male-dominated groups","volume":"50","year":"2004","journal-title":"Sex Roles"},{"key":"key2024010914370870300_ref046","unstructured":"McKinsey & Co (2015), \u201cHow advancing women's equality can add $12 trillion to global growth\u201d, available at: https:\/\/www.mckinsey.com\/featured-insights\/employment-and-growth\/how-advancing-womens-equality-can-add-12-trillion-to-global-growth (accessed 23 October 2023)."},{"key":"key2024010914370870300_ref047","unstructured":"Meister, J. (2019), \u201cTen HR trends in the age of artificial intelligence\u201d, available at: https:\/\/www.forbes.com\/sites\/jeannemeister\/2019\/01\/08\/ten-hr-trends-in-the-age-of-artificial-intelligence\/?sh=3d070d7b3219 (accessed 28 October 2023)."},{"key":"key2024010914370870300_ref048","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/08874417.2023.2241413","article-title":"Predicting compliance of security policies: norms and sanctions","volume":"Online","year":"2023","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"key2024010914370870300_ref049","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1024\/0044-3514.37.1.9","article-title":"Reactance theory-40 years later","volume":"37","year":"2006","journal-title":"Zeitschrift f\u00fcr Sozialpsychologie"},{"key":"key2024010914370870300_ref050","doi-asserted-by":"publisher","first-page":"10593","DOI":"10.1073\/pnas.0809921106","article-title":"National differences in gender\u2013science stereotypes predict national sex differences in science and math achievement","year":"2009"},{"key":"key2024010914370870300_ref051","unstructured":"Purdy, A. (2021), \u201cThe US needs a stronger commitment to cybersecurity\u201d, available at: https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/07\/30\/the-us-needs-a-stronger-commitment-to-cybersecurity\/?sh=7180a3245daf (accessed 30 December 2022)."},{"issue":"5","key":"key2024010914370870300_ref052","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1057\/ejis.2010.30","article-title":"Perspectives on challenges facing women in IS: the cognitive gender gap","volume":"19","year":"2010","journal-title":"European Journal of Information Systems"},{"volume-title":"Framed by Gender: How Gender Inequality Persists in the Modern World","year":"2011","key":"key2024010914370870300_ref053"},{"volume-title":"SmartPLS 3","year":"2015","key":"key2024010914370870300_ref054"},{"issue":"3","key":"key2024010914370870300_ref055","doi-asserted-by":"publisher","first-page":"944","DOI":"10.3917\/mana.213.0944","article-title":"Leader gender stereotypes and transformational leadership: does leader sex make the difference?","volume":"21","year":"2018","journal-title":"M@n@gement"},{"key":"key2024010914370870300_ref056","doi-asserted-by":"crossref","unstructured":"Sarstedt, M., Ringle, C.M. and Hair, J.F. (2021), \u201cPartial least squares structural equation modeling\u201d, in Handbook of Market Research, Springer, pp.\u00a0587-632.","DOI":"10.1007\/978-3-319-57413-4_15"},{"issue":"1","key":"key2024010914370870300_ref057","doi-asserted-by":"publisher","first-page":"15","DOI":"10.5070\/c7231021142","article-title":"Keeping race in place: racial microaggressions and campus racial climate at the University of California, Berkeley","volume":"23","year":"2002","journal-title":"Chicano-Latino Law Review"},{"issue":"1","key":"key2024010914370870300_ref058","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1111\/j.1471-6402.1997.tb00098.x","article-title":"The attitudes toward women scale and attitude change in college students","volume":"21","year":"1997","journal-title":"Psychology of Women Quarterly"},{"key":"key2024010914370870300_ref059","unstructured":"Sprenger, J. and Weinberger, N. (2021), \u201cSimpson's paradox\u201d, in Zalta, E.N. (Ed.), The Stanford Encyclopedia of Philosophy (Summer 2021 Edition), pp.\u00a01-27."},{"issue":"4","key":"key2024010914370870300_ref060","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1027\/2151-2604\/a000222","article-title":"Understanding psychological reactance: new developments and findings","volume":"223","year":"2015","journal-title":"Zeitschrift f\u00fcr Psychologie"},{"issue":"1","key":"key2024010914370870300_ref061","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1093\/sf\/sov042","article-title":"Status beliefs and the spirit of capitalism: accounting for gender biases in entrepreneurship and innovation","volume":"94","year":"2015","journal-title":"Social Forces"},{"key":"key2024010914370870300_ref062","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2023.1034258","article-title":"Gender stereotypes in leadership: analyzing the content and evaluation of stereotypes about typical, male, and female leaders","volume":"14","year":"2023","journal-title":"Frontiers in Psychology"},{"issue":"4","key":"key2024010914370870300_ref063","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1177\/1548051813502086","article-title":"Leadership in the context of temporary organizations: a study on the effects of transactional and transformational leadership on followers' commitment in projects","volume":"21","year":"2014","journal-title":"Journal of Leadership and Organizational Studies"},{"issue":"2","key":"key2024010914370870300_ref064","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.obhdp.2013.06.001","article-title":"Gender makes the difference: the moderating role of leader gender on the relationship between leadership styles and subordinate performance","volume":"122","year":"2013","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"11-12","key":"key2024010914370870300_ref065","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s11199-015-0480-2","article-title":"Two traditions of research on gender identity","volume":"73","year":"2015","journal-title":"Sex Roles"},{"year":"2018","key":"key2024010914370870300_ref066","article-title":"Critical role of ethical leadership on information security climate and employee ISP violation behavior"},{"issue":"1","key":"key2024010914370870300_ref067","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/ocj-02-2021-0002","article-title":"Ethical leadership and employee information security policy (ISP) violation: exploring dual-mediation paths","volume":"1","year":"2021","journal-title":"Organizational Cybersecurity Journal: Practice, Process and People"},{"key":"key2024010914370870300_ref068","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103390","article-title":"Employees' in-role and extra-role information security behaviors from the PE fit perspective","volume":"133","year":"2023","journal-title":"Computers and Security"},{"issue":"2","key":"key2024010914370870300_ref069","doi-asserted-by":"publisher","first-page":"79","DOI":"10.20982\/tqmp.09.2.p079","article-title":"A beginner's guide to factor analysis: focusing on exploratory factor analysis","volume":"9","year":"2013","journal-title":"Tutorials in Quantitative Methods for Psychology"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-05-2023-0524\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-05-2023-0524\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:54:55Z","timestamp":1753394095000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/38\/3\/1305-1327\/1246818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,10]]},"references-count":69,"alternative-id":["10.1108\/ITP-05-2023-0524"],"URL":"https:\/\/doi.org\/10.1108\/itp-05-2023-0524","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2024,1,10]]}}}