{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:55:06Z","timestamp":1776830106336,"version":"3.51.2"},"reference-count":144,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Profess. Commun."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/tpc.2014.2374011","type":"journal-article","created":{"date-parts":[[2014,12,6]],"date-time":"2014-12-06T00:20:03Z","timestamp":1417825203000},"page":"286-308","source":"Crossref","is-referenced-by-count":67,"title":["A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate"],"prefix":"10.1109","volume":"57","author":[{"given":"Jahyun","family":"Goo","sequence":"first","affiliation":[]},{"given":"Myung-Seong","family":"Yim","sequence":"additional","affiliation":[]},{"given":"Dan J.","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00219.x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076238"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: An empirical study","volume":"34","author":"johnston","year":"2010","journal-title":"MIS Quart"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1086\/227168"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"ref34","first-page":"577","article-title":"?Best practices? in information security management?","volume":"15","author":"ma","year":"2005","journal-title":"Commun Assoc Inf Syst"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/248772"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2003.1244259"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/249574"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.74.5.739"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/2392563"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2005.10855772"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/09685229810227649"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1037\/1076-8998.5.3.347"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00507-7"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.2307\/257334"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1108\/09685229510792988"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2307\/255959"},{"key":"ref51","author":"meyer","year":"1997","journal-title":"Commitment in the Workplace"},{"key":"ref59","article-title":"Organizational climate: Its measurement and relationship to work group performance","author":"campbell","year":"0","journal-title":"Annual Meet Amer Psychological Assoc"},{"key":"ref58","first-page":"5","author":"reichers","year":"1990","journal-title":"Organizational Climate and Culture"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.4.605"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.05.002"},{"key":"ref55","author":"hirschi","year":"1969","journal-title":"Causes of Delinquency"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.2307\/30040635"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/1053-4822(91)90011-Z"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/hrdq.1038"},{"key":"ref40","first-page":"151","author":"falcione","year":"1988","journal-title":"Handbook of Organizational Communication"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness","volume":"34","author":"bulgurcu","year":"2010","journal-title":"MIS Quart"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.2307\/256962"},{"key":"ref9","first-page":"386","article-title":"The centrality of awareness in the formation of user behavioral intention toward protective information technologies <formula formulatype=\"inline\"><tex Notation=\"TeX\">$\\ast$<\/tex><\/formula>","volume":"8","author":"dinev","year":"2007","journal-title":"J Assoc Inf Syst"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.87.2.220"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.65.1.96"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1177\/0092070303031003005"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.2307\/2786945"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025089819456"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.89.2.322"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/0022-4375(91)90017-P"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2006.03.004"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.10"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/23044045","article-title":"Construct measurement and validation procedures in mis and behavioral research: Integrating new and existing techniques","volume":"35","author":"mackenzie","year":"2011","journal-title":"MIS Quart"},{"key":"ref125","author":"tabachnick","year":"1996","journal-title":"Using Multivariate Statistics"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"ref73","article-title":"Assessing the impact of security culture and the employee-organization relationship on IS security compliance","author":"greene","year":"2010","journal-title":"5th Annu Symp Inf Assurance New York USA"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(88)90007-7"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"311","DOI":"10.2307\/25148681","article-title":"Information technology relatedness, knowledge management capability, and performance of multibusiness firms1","volume":"29","author":"tanriverdi","year":"2005","journal-title":"MIS Quart"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1108\/09685220610648355"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.38.2.269.18845"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2010.10.002"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.2307\/2393203"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1108\/02635570810883969"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00007-5"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.02.008"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.97.3.562"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.33.4.525"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.10.005"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.4.377"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1002\/job.372"},{"key":"ref136","doi-asserted-by":"crossref","first-page":"290","DOI":"10.2307\/270723","author":"sobel","year":"1982","journal-title":"Sociological Methodology"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.114"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8325.1990.tb00525.x"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.2307\/256188"},{"key":"ref60","author":"campbell","year":"1970","journal-title":"Managerial Behaviour Performance and Effectiveness"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.108.2.171"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615139"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.81.4.358"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.2307\/2667123"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/287831.287843"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.2307\/249541"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1037\/h0037511"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.2307\/256406"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.2307\/258997"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"657","DOI":"10.2307\/30036552","article-title":"Sources of influcence on beliefs about information technology use: An empirical study of knowledge workers","volume":"27","author":"lewis","year":"2003","journal-title":"MIS Quart"},{"key":"ref142","first-page":"365","volume":"12","author":"ostroff","year":"2003","journal-title":"Comprehensive Handbook of Psychology"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.2307\/249393"},{"key":"ref143","author":"ajzen","year":"1980","journal-title":"Understanding Attitudes and Predicting Social Behavior"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00361.x"},{"key":"ref2","year":"0"},{"key":"ref144","first-page":"209","article-title":"Towards a theory of organizational socialization","volume":"1","author":"van maanen","year":"1979","journal-title":"Res Organiz Behav"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.012"},{"key":"ref95","article-title":"IT services contracts?Strategic objective statement","author":"grigg","year":"2001","journal-title":"Gartner Group COM-14-3318"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.110.1.67"},{"key":"ref94","author":"fox","year":"1974","journal-title":"Beyond Contract Work Power and Trust Relations"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1037\/h0029874"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.58.6.1015"},{"key":"ref93","author":"reichers","year":"1990","journal-title":"Organizational Climate and Culture"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/0001-8791(79)90072-1"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.2307\/249751"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1993.1045"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1999.tb02298.x"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(00)00125-9"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00289.x"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"viswanath","year":"2003","journal-title":"MIS Quart"},{"key":"ref111","first-page":"1","article-title":"Negative word of mouth: Substitute for or supplement to consumer complaints","volume":"15","author":"halstead","year":"2002","journal-title":"Consumer Satisfaction Dissatisfaction and Complaining Behavior"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.2006.21318920"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.2307\/258513"},{"key":"ref99","first-page":"266","article-title":"Security awareness and security training: An attitudinal perspective","author":"wipawayangkool","year":"2009","journal-title":"SWDSI Proceedings"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005155903801"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.05.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0393"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: An empirical study","volume":"33","author":"johnston","year":"2010","journal-title":"MIS Quart"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","article-title":"Improving employees' compliance through information systems security training: An action research study","volume":"34","author":"puhakainen","year":"2010","journal-title":"MIS Quart"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000592"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1953122.1953142"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.01.011"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: New insights into the problem of employee information systems security policy violations","volume":"34","author":"siponen","year":"2010","journal-title":"MIS Quart"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"567","DOI":"10.2307\/20650309","article-title":"Investigating user resistance to information systems implementation: A status quo bias perspective","volume":"33","author":"kim","year":"2009","journal-title":"MIS Quart"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-010-0687-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"ref81","first-page":"24","author":"rest","year":"1984","journal-title":"Morality Moral Behavior and Moral Development"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1080\/014492996120094"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(92)90046-I"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1991.16"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"461","DOI":"10.2307\/25148692","article-title":"A multilevel model of resistance to information technology implementation","volume":"29","author":"lapointe","year":"2005","journal-title":"MIS Quart"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.12.2.117.10115"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/1346325.1346328"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8325.1990.tb00506.x"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1177\/001872678103401205"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.2307\/4132321"},{"key":"ref120","author":"ringle","year":"2005","journal-title":"SmartPLS"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1037\/\/0021-9010.71.3.492"},{"key":"ref121","first-page":"vii","article-title":"Issues and opinion on structural equation modeling","volume":"22","author":"chin","year":"1998","journal-title":"MIS Quart"},{"key":"ref122","author":"nunnally","year":"1978","journal-title":"Psychometric Theory"},{"key":"ref123","author":"johnson","year":"2007","journal-title":"Applied multivariate statistical analysis"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/07421222.1985.11517734","article-title":"Managing the risks associated with end-user computing","volume":"2","author":"alavi","year":"1985","journal-title":"J Manage Inf Syst"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0314"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.2307\/258140"},{"key":"ref88","article-title":"The influence of human factors on vulnerability to information security breaches","author":"ma\ufffdada","year":"0","journal-title":"AMCIS"}],"container-title":["IEEE Transactions on Professional Communication"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/47\/6979776\/06977993.pdf?arnumber=6977993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:39Z","timestamp":1642003179000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6977993\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":144,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tpc.2014.2374011","relation":{},"ISSN":["0361-1434","1558-1500"],"issn-type":[{"value":"0361-1434","type":"print"},{"value":"1558-1500","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]}}}