{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:51:51Z","timestamp":1773622311808,"version":"3.50.1"},"reference-count":106,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003170","name":"Swedish Knowledge Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003170","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3190373","type":"journal-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T19:30:57Z","timestamp":1657740657000},"page":"73907-73930","source":"Crossref","is-referenced-by-count":14,"title":["Organisational Privacy Culture and Climate: A Scoping Review"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9005-0543","authenticated-orcid":false,"given":"Leonardo Horn","family":"Iwaya","sequence":"first","affiliation":[{"name":"Department of Psychology, Graduate Program in Psychology, Federal University of Santa Catarina&#x2014;UFSC, Florian&#x00F3;polis, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1075-9294","authenticated-orcid":false,"given":"Gabriel Horn","family":"Iwaya","sequence":"additional","affiliation":[{"name":"Department of Psychology, Graduate Program in Psychology, Federal University of Santa Catarina&#x2014;UFSC, Florian&#x00F3;polis, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6938-4466","authenticated-orcid":false,"given":"Simone","family":"Fischer-Hubner","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Privacy and Security (PriSec) Research Group, Karlstad University, 65188, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7853-6532","authenticated-orcid":false,"given":"Andrea Valeria","family":"Steil","sequence":"additional","affiliation":[{"name":"Department of Psychology, Graduate Program in Psychology, Federal University of Santa Catarina&#x2014;UFSC, Florian&#x00F3;polis, Brazil"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation)","volume":"119","year":"2016","journal-title":"Off. J. Eur. Union"},{"key":"ref2","article-title":"The California consumer privacy act of 2018","year":"2018","journal-title":"AB, Chau. Privacy, Pers. Inf., Bus."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/e22040429"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.47975\/IJDL.magalhaes.v.2.n.2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.12821\/ijispm090102"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5325\/jinfopoli.11.2021.0063"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipab024"},{"key":"ref8","article-title":"Privacy by design in law, policy and practice\u2014A white paper for regulators, decision-makers and policy-makers","author":"Cavoukian","year":"2011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09995-z"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445768"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/1364557032000119616"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.7326\/m18-0850"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-59"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/hrlr\/ngu014"},{"key":"ref18","volume-title":"Privacy and Freedom","author":"Westin","year":"2015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31668-5_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8062"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.81.4.358"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1983.tb00500.x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-113011-143809"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/JOSM-11-2018-0363"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105559"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1108\/TQM-03-2021-0092"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-021-02617-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/su13052800"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/2392246"},{"key":"ref30","volume-title":"Organizational Culture and Leadership","author":"Schein","year":"2010"},{"key":"ref31","volume-title":"Culture\u2019s Consequences: International Differences in Work-Related Values","author":"Hofstede","year":"1980"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.9707\/2307-0919.1014"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1037\/a0021987"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2006.20786086"},{"issue":"2","key":"ref35","first-page":"56","article-title":"Impact of organizational culture on employees job performance: An empirical study of software houses in Pakistan","volume":"5","author":"Shahzad","year":"2013","journal-title":"J. Bus. Stud. Quart."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2017.08.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9299.1993.tb00991.x"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1108\/IJQRM-01-2021-0002"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.09.119"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3130515.3130518"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.23919\/PICMET.2017.8125471"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON51383.2020.9284952"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/00208825.1983.11656358"},{"key":"ref45","volume-title":"The Corporate Culture Survival Guide","volume":"158","author":"Schein","year":"2009"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/0007-6813(83)90092-7"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1186\/s12874-016-0116-4"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1186\/2046-4053-4-1"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3190373"},{"key":"ref50","volume-title":"OPCC Scoping Review\u2014Replication Package","author":"Iwaya","year":"2022"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0021-6"},{"key":"ref52","volume-title":"Research Design: Qualitative, Quantitative, and Mixed Methods Approaches","author":"Creswell","year":"2017"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201262"},{"key":"ref54","volume-title":"Critical Appraisal Checklist for a Qualitative Study","year":"2014"},{"key":"ref55","volume-title":"Critical Appraisal Checklist For Cross-Sectional Study","year":"2014"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.91.1.221"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2866769"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1177\/0893318917692896"},{"key":"ref60","article-title":"Management ethics: How social media affects employees\u2019 privacy and organizational climate?","author":"Henry","year":"2020"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAS.2019.8703636"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1177\/0149206319869435"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.2307\/20650322"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-08-2020-0135"},{"key":"ref65","first-page":"1","article-title":"WiP: Factors affecting the implementation of privacy and security practices in software development: A narrative review","volume-title":"Proc. 8th Annu. Hot Topics Sci. Secur. Symp. (HoTSoS)","author":"Nurgalieva"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3026326"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-07-2014-0197"},{"issue":"2","key":"ref68","first-page":"147","article-title":"Information security in practices: Exploring privacy and trust in computer and internet surveillance","volume":"31","author":"Chang","year":"2016","journal-title":"Comput. Syst. Sci. Eng."},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04204"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10158-0"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/s0742-7301(06)25003-5"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(00)00114-3"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.163"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2015.7231407"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00420"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-021-01267-0"},{"key":"ref77","first-page":"1","article-title":"Future of flexible work in the digital age: Bring your own device challenges of privacy protection","volume-title":"Proc. 40th Int. Conf. Inf. Syst. (ICIS)","author":"Degirmenci"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/S1047-8310(01)00042-6"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/163298.163349"},{"issue":"6","key":"ref80","first-page":"171","article-title":"Theoretical explanations for firms\u2019 information privacy behaviors","volume":"6","author":"Greenaway","year":"2005","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1108\/eb029006"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1097\/00006216-200207000-00009"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1177\/154230500305700307"},{"issue":"1","key":"ref84","first-page":"27","article-title":"Privacy by design: Taking CTRL of big data","volume":"65","author":"Everson","year":"2016","journal-title":"Cleveland State Law Rev."},{"issue":"659","key":"ref85","first-page":"71","article-title":"Designing without privacy","volume":"55","author":"Waldman","year":"2018","journal-title":"Houston Law Rev."},{"issue":"1","key":"ref86","first-page":"147","article-title":"Information security culture-validation of an assessment instrument","volume":"11","author":"Da Veiga","year":"2007","journal-title":"Southern Afr. Bus. Rev."},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.002"},{"key":"ref88","volume-title":"Organizational Culture and Leadership","author":"Schein","year":"1985"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.65.1.96"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.90.4.616"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1080\/10686967.2008.11918054"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1002\/job.2417"},{"key":"ref93","article-title":"Privacy and security by design: An enterprise architecture approach","author":"Cavoukian","year":"2013"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"ref95","volume-title":"CEBMa Guideline for Critically Appraised Topics in Management and Organizations","year":"2017"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116688035"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101480"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.2307\/2393392"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2543-0_1"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.4135\/9781473957992.n14"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.16"},{"issue":"1","key":"ref102","first-page":"106","article-title":"Artificial intelligence: Risks to privacy and democracy","volume":"21","author":"Manheim","year":"2019","journal-title":"Yale JL Technol."},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045078"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2725339"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2853985"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.4324\/9780080461687"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09828399.pdf?arnumber=9828399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T06:32:48Z","timestamp":1706769168000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9828399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":106,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3190373","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}