{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T06:20:07Z","timestamp":1772173207404,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,7]]},"DOI":"10.1145\/3466933.3466981","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T14:08:32Z","timestamp":1625753312000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Understanding the information security culture of organizations: Results of a Survey"],"prefix":"10.1145","author":[{"given":"Pedro","family":"Santos","sequence":"first","affiliation":[{"name":"Universidade Federal de Pernambuco (UFPE)"}]},{"given":"Mariana","family":"Peixoto","sequence":"additional","affiliation":[{"name":"Universidade Federal de Pernambuco (UFPE)"}]},{"given":"J\u00e9ssyka","family":"Vilela","sequence":"additional","affiliation":[{"name":"Universidade Federal de Pernambuco (UFPE)"}]}],"member":"320","published-online":{"date-parts":[[2021,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIST.2013.6747661"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTS.2014.7010591"},{"key":"e_1_3_2_1_3_1","unstructured":"Iveruska Carmen Jatob\u00e1\u00a0Bastos Arteiro. 2015. Como a cultura organizacional influencia iniciativas de gest\u00e3o de processos de neg\u00f3cios: um estudo de caso explorat\u00f3rio. Master\u2019s thesis. Universidade Federal de Pernambuco.  Iveruska Carmen Jatob\u00e1\u00a0Bastos Arteiro. 2015. Como a cultura organizacional influencia iniciativas de gest\u00e3o de processos de neg\u00f3cios: um estudo de caso explorat\u00f3rio. Master\u2019s thesis. Universidade Federal de Pernambuco."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Matheus Batista Andr\u00e9a Magdaleno and Marcos Kalinowski. 2017. A Survey on the use of Social BPM in Practice in Brazilian Organizations. In Anais do XIII Simp\u00f3sio Brasileiro de Sistemas de Informa\u00e7\u00e3o. SBC 436\u2013443.  Matheus Batista Andr\u00e9a Magdaleno and Marcos Kalinowski. 2017. A Survey on the use of Social BPM in Practice in Brazilian Organizations. In Anais do XIII Simp\u00f3sio Brasileiro de Sistemas de Informa\u00e7\u00e3o. SBC 436\u2013443.","DOI":"10.5753\/sbsi.2017.6073"},{"key":"e_1_3_2_1_5_1","volume-title":"Canada 5","author":"Ann Cavoukian","year":"2009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.36999\/kjc.2008.20.2.389"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.005"},{"key":"e_1_3_2_1_9_1","unstructured":"SEBRAE-NA\/ Dieese. 2013. Anu\u00e1rio do trabalho na micro e pequena empresa. www.sebrae.com.br\/Sebrae\/Portal%20Sebrae\/Anexos\/Anuario%20do%20Trabalho%20Na%20Micro%20e%20Pequena%20Empresa_2013.pdf  SEBRAE-NA\/ Dieese. 2013. Anu\u00e1rio do trabalho na micro e pequena empresa. www.sebrae.com.br\/Sebrae\/Portal%20Sebrae\/Anexos\/Anuario%20do%20Trabalho%20Na%20Micro%20e%20Pequena%20Empresa_2013.pdf"},{"key":"e_1_3_2_1_10_1","volume-title":"Guide to advanced empirical","author":"Easterbrook Steve"},{"key":"e_1_3_2_1_11_1","volume-title":"Engenharia social: conscientizando o elo mais fraco da seguran\u00e7a da informa\u00e7\u00e3o. Intelig\u00eancia de Seguran\u00e7a-Unisul Virtual","author":"Fonseca Marcelo","year":"2017"},{"key":"e_1_3_2_1_12_1","unstructured":"Edison Luiz\u00a0Gon\u00e7alves Fontes. 2017. Seguran\u00e7a da informa\u00e7\u00e3o. Saraiva Educa\u00e7\u00e3o SA.  Edison Luiz\u00a0Gon\u00e7alves Fontes. 2017. Seguran\u00e7a da informa\u00e7\u00e3o. Saraiva Educa\u00e7\u00e3o SA."},{"key":"e_1_3_2_1_13_1","unstructured":"GDPR. 2018. General Data Protection Regulation. https:\/\/eugdpr.org\/.  GDPR. 2018. General Data Protection Regulation. https:\/\/eugdpr.org\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Francisco de Assis\u00a0Fialho Henriques. 2017. A influ\u00eancia da Engenharia Social no fator humano das organiza\u00e7\u00f5es. Master\u2019s thesis. Universidade Federal de Pernambuco.  Francisco de Assis\u00a0Fialho Henriques. 2017. A influ\u00eancia da Engenharia Social no fator humano das organiza\u00e7\u00f5es. Master\u2019s thesis. Universidade Federal de Pernambuco."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1895025"},{"key":"e_1_3_2_1_16_1","unstructured":"Jule Hintzbergen Kees Hintzbergen Andr\u00e9 Smulders and Hans Baars. 2018. Fundamentos de Seguran\u00e7a da Informa\u00e7\u00e3o: com base na ISO 27001 e na ISO 27002. Brasport.  Jule Hintzbergen Kees Hintzbergen Andr\u00e9 Smulders and Hans Baars. 2018. Fundamentos de Seguran\u00e7a da Informa\u00e7\u00e3o: com base na ISO 27001 e na ISO 27002. Brasport."},{"key":"e_1_3_2_1_18_1","volume-title":"Guide to advanced empirical software engineering","author":"Kitchenham A"},{"key":"e_1_3_2_1_19_1","unstructured":"LGPD. 2018. Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais. http:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709.htm  LGPD. 2018. Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais. http:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709.htm"},{"key":"e_1_3_2_1_20_1","volume-title":"Aligning social concerns with information system security: A fundamental ontology for social engineering. Information Systems","author":"Li Tong","year":"2020"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Rodrigo Machado Diego Kreutz Giulliano Paz and Gustavo Rodrigues. 2019. Vazamentos de Dados: Hist\u00f3rico Impacto Socioecon\u00f4mico e as Novas Leis de Prote\u00e7ao de Dados. In Anais da XVII Escola Regional de Redes de Computadores. SBC 154\u2013159.  Rodrigo Machado Diego Kreutz Giulliano Paz and Gustavo Rodrigues. 2019. Vazamentos de Dados: Hist\u00f3rico Impacto Socioecon\u00f4mico e as Novas Leis de Prote\u00e7ao de Dados. In Anais da XVII Escola Regional de Redes de Computadores. SBC 154\u2013159.","DOI":"10.5753\/errc.2019.9230"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/647185.719826"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Ad\u00e9le Martins and J Eloff. 2002. Assessing Information Security Culture.. In ISSA. 1\u201314.  Ad\u00e9le Martins and J Eloff. 2002. Assessing Information Security Culture.. In ISSA. 1\u201314.","DOI":"10.1016\/S1353-4858(02)06011-7"},{"key":"e_1_3_2_1_24_1","unstructured":"Nico Martins and Adele Da\u00a0Veiga. [n.d.]. The Value of Using a Validated Information Security Culture. ([n.\u00a0d.]).  Nico Martins and Adele Da\u00a0Veiga. [n.d.]. The Value of Using a Validated Information Security Culture. ([n.\u00a0d.])."},{"key":"e_1_3_2_1_25_1","first-page":"147","article-title":"Information security culture-validation of an assessment instrument","volume":"11","author":"Martins N","year":"2007","journal-title":"Southern African Business Review"},{"key":"e_1_3_2_1_26_1","unstructured":"McAfee. 2017. Grand Theft Data: Data exfiltration study: Actors tactics and detection. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-data-exfiltration.pdf  McAfee. 2017. Grand Theft Data: Data exfiltration study: Actors tactics and detection. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-data-exfiltration.pdf"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Rodrigo Miani Bruno Zarpel\u00e3o and Leonardo Mendes. 2015. Investiga\u00e7\u00e3o sobre a Aus\u00eancia de Valida\u00e7\u00e3o nos M\u00e9todos Empregados para Quantificar Seguran\u00e7a da Informa\u00e7\u00e3o. In Anais do XI Simp\u00f3sio Brasileiro de Sistemas de Informa\u00e7\u00e3o. SBC 315\u2013322.  Rodrigo Miani Bruno Zarpel\u00e3o and Leonardo Mendes. 2015. Investiga\u00e7\u00e3o sobre a Aus\u00eancia de Valida\u00e7\u00e3o nos M\u00e9todos Empregados para Quantificar Seguran\u00e7a da Informa\u00e7\u00e3o. In Anais do XI Simp\u00f3sio Brasileiro de Sistemas de Informa\u00e7\u00e3o. SBC 315\u2013322.","DOI":"10.5753\/sbsi.2015.5832"},{"key":"e_1_3_2_1_28_1","volume-title":"A arte de enganar. S\u00e3o Paulo","author":"Mitnick D","year":"2003"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_3_2_1_31_1","unstructured":"Security Help Net. 2018. 2018 in numbers: Data breaches cost $654 billion expose 2.8 billion data records in the U.S.http:\/\/bit.do\/e25NV.  Security Help Net. 2018. 2018 in numbers: Data breaches cost $654 billion expose 2.8 billion data records in the U.S.http:\/\/bit.do\/e25NV."},{"key":"e_1_3_2_1_32_1","unstructured":"Security Risk Based. 2020. 2020 Q3 Report Data Breach Quick View. https:\/\/pages.riskbasedsecurity.com\/hubfs\/Reports\/2020\/2020%20Q3%20Data%20Breach%20QuickView%20Report.pdf.  Security Risk Based. 2020. 2020 Q3 Report Data Breach Quick View. https:\/\/pages.riskbasedsecurity.com\/hubfs\/Reports\/2020\/2020%20Q3%20Data%20Breach%20QuickView%20Report.pdf."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2016-0054"},{"key":"e_1_3_2_1_35_1","first-page":"407","article-title":"Exploring factors that influence students\u2019 behaviors in information security","volume":"23","author":"Yoon Cheolho","year":"2012","journal-title":"Journal of information systems education"}],"event":{"name":"SBSI 2021: XVII Brazilian Symposium on Information Systems","location":"Uberl\u00e2ndia Brazil","acronym":"SBSI 2021"},"container-title":["XVII Brazilian Symposium on Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466933.3466981","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466933.3466981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:10Z","timestamp":1750195690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466933.3466981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,7]]},"references-count":32,"alternative-id":["10.1145\/3466933.3466981","10.1145\/3466933"],"URL":"https:\/\/doi.org\/10.1145\/3466933.3466981","relation":{},"subject":[],"published":{"date-parts":[[2021,6,7]]},"assertion":[{"value":"2021-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}