{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:36Z","timestamp":1750306296781,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T00:00:00Z","timestamp":1462752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,9]]},"DOI":"10.1145\/2908446.2908456","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T12:49:08Z","timestamp":1478263748000},"page":"228-232","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Integrated Approach to Information Systems Security Policy Violation"],"prefix":"10.1145","author":[{"given":"Tilahun Muluneh","family":"Arage","sequence":"first","affiliation":[{"name":"Addis Ababa University"}]},{"given":"Tibebe Beshah","family":"Tesema","sequence":"additional","affiliation":[{"name":"Addis Ababa University"}]}],"member":"320","published-online":{"date-parts":[[2016,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221853"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Magklaras G.B. and Furnell S.M. 2006. Towards an insider threat prediction specification language (Information Management & Computer Security Vol. 14 No. 4 2006 pp. 361--381. Emerald Group Publishing Limited 0968-5227  Magklaras G.B. and Furnell S.M. 2006. Towards an insider threat prediction specification language (Information Management & Computer Security Vol. 14 No. 4 2006 pp. 361--381. Emerald Group Publishing Limited 0968-5227","DOI":"10.1108\/09685220610690826"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"D'Arcy Hovav A. Galletta D. 2009. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach  D'Arcy Hovav A. Galletta D. 2009. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"e_1_3_2_1_5_1","unstructured":"Schiffman L.G. and L.L. Kanuk (1997) Consumer Behaviour Sixth Edition. Englewood Cliffs New Jersey: Prentice-Hall International Inc.  Schiffman L.G. and L.L. Kanuk (1997) Consumer Behaviour Sixth Edition. Englewood Cliffs New Jersey: Prentice-Hall International Inc."},{"issue":"3","key":"e_1_3_2_1_6_1","first-page":"11","article-title":". Exploring the Influence of National Cultures on Non-Compliance Behavior","volume":"10","author":"Dols T.","year":"2010","journal-title":"Communications of the IIMA"},{"volume-title":"Kyoungho. Second Pre-ICIS Workshop on Information Security and Privacy (WISP2007)","year":"2007","author":"D'Arcy J.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Hofstede G. 1980. Culture's consequences. Beverly Hills.  Hofstede G. 1980. Culture's consequences. Beverly Hills."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Shore B. Venkatachalam A.R. Solorzano E. Burn J.M. Hassan S.Z. and Janczewski L.J. 2001. Softlifting and piracy: Behavior across cultures.Technology in Society 23(4) pp. 563--581.  Shore B. Venkatachalam A.R. Solorzano E. Burn J.M. Hassan S.Z. and Janczewski L.J. 2001. Softlifting and piracy: Behavior across cultures.Technology in Society 23(4) pp. 563--581.","DOI":"10.1016\/S0160-791X(01)00037-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219683"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Husted B.W. 2000. The impact of national culture on software piracy.Journal of Business Ethics 26(3) pp. 197--211.  Husted B.W. 2000. The impact of national culture on software piracy.Journal of Business Ethics 26(3) pp. 197--211.","DOI":"10.1023\/A:1006250203828"},{"key":"e_1_3_2_1_12_1","unstructured":"Chaula J. 2006. A socio-technical analysis of information systems security assurance: A case study for effective assurance (Unpublished doctoral thesis). Stockholm University Stockholm Sweden.  Chaula J. 2006. A socio-technical analysis of information systems security assurance: A case study for effective assurance (Unpublished doctoral thesis). Stockholm University Stockholm Sweden."},{"key":"e_1_3_2_1_13_1","unstructured":"Cyber Security Watch Survey 2010. CSO Magazine U.S. Secret Service Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte. Available at URL: http:\/\/www.cert.org\/insider_threat\/  Cyber Security Watch Survey 2010. CSO Magazine U.S. Secret Service Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte. Available at URL: http:\/\/www.cert.org\/insider_threat\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Cyber Security Watch Survey 2012. CSO Magazine U.S. Secret Service Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte September 2012.Available at URL: http:\/\/www.cert.org\/insider_threat\/  Cyber Security Watch Survey 2012. CSO Magazine U.S. Secret Service Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte September 2012.Available at URL: http:\/\/www.cert.org\/insider_threat\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Verizon RISK team 2012 Data BREACH Investigations Report.United States Secret Service USA. Available at:www.verizon.com\/enterprise\/securityblog  Verizon RISK team 2012 Data BREACH Investigations Report.United States Secret Service USA. Available at:www.verizon.com\/enterprise\/securityblog"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"CSI computer crime and security survey","volume":"1","author":"Richardson R.","year":"2008","journal-title":"Computer Security Institute"},{"issue":"4","key":"e_1_3_2_1_17_1","first-page":"35","article-title":"The 9 to 5 underground: are you policing computer crimes?","volume":"30","author":"Hoffer J.A.","year":"1989","journal-title":"MIT Sloan Management Review"},{"key":"e_1_3_2_1_18_1","unstructured":"Salahuddin M. Alfawaz 2011. Information security management: A case study of an information security culture. Queensland University of Technology. Unpublished PhD dissertation. Faculty of science and technology  Salahuddin M. Alfawaz 2011. Information security management: A case study of an information security culture. Queensland University of Technology. Unpublished PhD dissertation. Faculty of science and technology"},{"key":"e_1_3_2_1_19_1","unstructured":"Arage T. Belanger F. and Beshah T. 2015. Influence of National Culture on Employees' Compliance with Information Systems Security (ISS) Policies: Towards ISS Culture in Ethiopian Companies.  Arage T. Belanger F. and Beshah T. 2015. Influence of National Culture on Employees' Compliance with Information Systems Security (ISS) Policies: Towards ISS Culture in Ethiopian Companies."},{"key":"e_1_3_2_1_20_1","unstructured":"ETHIO NEWS 24(Ethiopian News). Ethiopian Airlines axes 11 employees for system abuse: available at: http:\/\/www.ethionews24.com\/ethiopian-airlines-axes-11-employees-for-system-abuse-3  ETHIO NEWS 24(Ethiopian News). Ethiopian Airlines axes 11 employees for system abuse: available at: http:\/\/www.ethionews24.com\/ethiopian-airlines-axes-11-employees-for-system-abuse-3"},{"key":"e_1_3_2_1_21_1","unstructured":"Devamohan A. 2008. E--Banking Problems and Prospects in Ethiopia. Available at URL: http:\/\/wA.Devamohan%20%20Ebanking.htm.  Devamohan A. 2008. E--Banking Problems and Prospects in Ethiopia. Available at URL: http:\/\/wA.Devamohan%20%20Ebanking.htm."},{"key":"e_1_3_2_1_22_1","unstructured":"Bultum A.G. 2012. Adoption of Electronic Banking System in Ethiopian Banking Industry: Barriers and Driver. Available at SSRN 2058202.  Bultum A.G. 2012. Adoption of Electronic Banking System in Ethiopian Banking Industry: Barriers and Driver. Available at SSRN 2058202."},{"key":"e_1_3_2_1_23_1","first-page":"2","article-title":"Electronic Banking in Ethiopia -- Practices, Opportunities and Challenges","volume":"12","author":"Gardachew W.","year":"2010","journal-title":"Journal of Internet Banking & Commerce"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2004.tb00515.x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/3857567"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Sondergaard M.(1994). \"Hofstede's consequences: A study of reviews citation and replications \" organization studies 15(3) 447--456.  Sondergaard M.(1994). \"Hofstede's consequences: A study of reviews citation and replications \" organization studies 15(3) 447--456.","DOI":"10.1177\/017084069401500307"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294170"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250956"},{"key":"e_1_3_2_1_29_1","unstructured":"Al-Awadi M. & Renaud K. 2007. Success factors in information security implementation in organizations. Paper presented at the IADIS International Conference e-Society 2007. Lisbon Portugal.  Al-Awadi M. & Renaud K. 2007. Success factors in information security implementation in organizations. Paper presented at the IADIS International Conference e-Society 2007. Lisbon Portugal."},{"issue":"3","key":"e_1_3_2_1_30_1","first-page":"98","article-title":"IS security, trust and culture: A theoretical framework for managing IS security in multicultural settings","volume":"20","author":"Slay J.","year":"2003","journal-title":"The Emerald Research Register"},{"key":"e_1_3_2_1_31_1","unstructured":"Bjork & Jiang. 2006. Information Security and National Culture: Comparison between ERP system security implementations in Singapore and Sweden. Unpublished master thesis.  Bjork & Jiang. 2006. Information Security and National Culture: Comparison between ERP system security implementations in Singapore and Sweden. Unpublished master thesis."},{"key":"e_1_3_2_1_32_1","unstructured":"Timo D. G. 2009. \"Culture and Information Security Outsourcing IT Services in China\". (Unpublished Master thesis). Berlin Electrical Engineering and Technical University.  Timo D. G. 2009. \"Culture and Information Security Outsourcing IT Services in China\". (Unpublished Master thesis). Berlin Electrical Engineering and Technical University."}],"event":{"name":"INFOS '16: The 10th International Conference on Informatics and Systems","acronym":"INFOS '16","location":"Giza Egypt"},"container-title":["Proceedings of the 10th International Conference on Informatics and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908446.2908456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:12Z","timestamp":1750221552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908456"}},"subtitle":["The Case of Ethiopia"],"short-title":[],"issued":{"date-parts":[[2016,5,9]]},"references-count":32,"alternative-id":["10.1145\/2908446.2908456","10.1145\/2908446"],"URL":"https:\/\/doi.org\/10.1145\/2908446.2908456","relation":{},"subject":[],"published":{"date-parts":[[2016,5,9]]},"assertion":[{"value":"2016-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}