{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:50:38Z","timestamp":1760647838110,"version":"3.41.2"},"reference-count":88,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2023,10,30]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>A growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g. best practices, guidelines and policies) intended to strengthen CS. The purpose of this paper is to provide an overview of how specifically time pressure is addressed by CS documents.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The authors conducted a systematic search for CS documents followed by a content analysis of the identified documents. First, the authors carried out a systematic Web search and identified 92 formal and informal CS documents (e.g. security policies, procedures, guidelines, manuals and best practices). Second, they systematically analyzed the resulting documents (<jats:italic>n<\/jats:italic> = 92), using a structured approach of data familiarization and low-\/high-level coding for the identification and interpretation of themes. Based on this analysis, the authors formulated a conceptual framework that captures the sources and effects of time pressure along the themes of industry, operations and users.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The authors developed a conceptual framework that outlines the role of time pressure for the CS industry, threats and operations. This provides a shared frame of reference for researchers and practitioners to understand the antecedents and consequences of time pressure in the organizational CS context.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>While the analyzed documents acknowledge time pressure as an important factor for CS, the documents provide limited information on how to respond to these concerns. Future research could, hence, consult with CS experts and policymakers to inform the development of effective guidelines and policies on how to address time pressure in the identified areas. A dedicated analysis within each area will allow to investigate the corresponding aspects of time pressure in-depth along with a consideration for targeted guidelines and policies. Last, note that a differentiation between CS document types (e.g. formal vs informal and global vs regional) was beyond the scope of this paper and may be investigated by future work.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This study makes three main contributions to the CS literature. First, this study broadens the understanding of the role of time pressure in CS to consider the organizational perspective along the themes of industry, threats and operations. Second, this study provides the first comprehensive assessment of how organizations address time pressure through CS documents, and how this compares to existing research in academic literature. Third, by developing a conceptual framework, this study provides a shared frame of reference for researchers and practitioners to further develop CS documents that consider time pressure\u2019s role in secure behavior.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-01-2021-0013","type":"journal-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T10:14:19Z","timestamp":1689243259000},"page":"504-526","source":"Crossref","is-referenced-by-count":3,"title":["Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity"],"prefix":"10.1108","volume":"31","author":[{"given":"Noman H.","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Marc T.P.","family":"Adam","sequence":"additional","affiliation":[]},{"given":"Timm","family":"Teubner","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"key2023102616471575700_ref001","first-page":"289","article-title":"You get where you\u2019re looking for: the impact of information sources on code security","volume-title":"IEEE Symposium on Security and Privacy","year":"2016"},{"key":"key2023102616471575700_ref002","first-page":"73","article-title":"Improving the information security model by using TFI","volume-title":"IFIP International Information Security Conference","year":"2007"},{"issue":"2","key":"key2023102616471575700_ref003","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"key2023102616471575700_ref004","unstructured":"Amoroso, E. (2018), \u201cOrange book compliance: Cyber security safeguards\u201d, Cyber Attack Countermeasures. New York University Tandon School of Engineering, available at: www.coursera.org\/lecture\/cyber-attack-countermeasures\/orange-book-compliance.-Obu1F"},{"issue":"3","key":"key2023102616471575700_ref005","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"first-page":"250","article-title":"Learning representations for log data in cybersecurity","year":"2017","key":"key2023102616471575700_ref006"},{"issue":"4","key":"key2023102616471575700_ref007","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1037\/0021-9010.91.4.963","article-title":"The curvilinear relation between experienced creative time pressure and creativity: Moderating effects of openness to experience and support for creativity","volume":"91","year":"2006","journal-title":"Journal of Applied Psychology"},{"issue":"5\/6","key":"key2023102616471575700_ref008","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1108\/09576050210447019","article-title":"An information security meta-policy for emergent organizations","volume":"15","year":"2002","journal-title":"Logistics Information Management"},{"first-page":"171","article-title":"International standards and organizational security needs: Bridging the gap","year":"1993","key":"key2023102616471575700_ref009"},{"issue":"4","key":"key2023102616471575700_ref010","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","article-title":"What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviours","volume":"39","year":"2015","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2023102616471575700_ref011","first-page":"1","article-title":"Document analysis as a qualitative research method","volume":"9","year":"2009","journal-title":"Qualitative Research Journal"},{"issue":"3","key":"key2023102616471575700_ref012","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2023102616471575700_ref013","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1080\/01436597.2020.1729729","article-title":"Transnational governance of cybersecurity: Policy challenges and global inequalities in cyber capacity building","volume":"41","year":"2020","journal-title":"Third World Quarterly"},{"first-page":"389","article-title":"Social cyber-security","year":"2018","key":"key2023102616471575700_ref014"},{"issue":"2","key":"key2023102616471575700_ref015","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1080\/02681102.2013.836699","article-title":"Institutions for cyber security: International responses and global imperatives","volume":"20","year":"2014","journal-title":"Information Technology for Development"},{"first-page":"1","article-title":"The impact of time pressure on human cybersecurity behavior: an integrative framework","year":"2018","key":"key2023102616471575700_ref016"},{"issue":"12","key":"key2023102616471575700_ref017","first-page":"1","article-title":"The impact of time pressure on cybersecurity behaviour: a systematic literature review","volume":"38","year":"2019","journal-title":"Behaviour and Information Technology"},{"key":"key2023102616471575700_ref018","first-page":"1","article-title":"Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures","volume":"97","year":"2020","journal-title":"Computers and Security"},{"key":"key2023102616471575700_ref019","first-page":"1","article-title":"The rise of crypto-ransomware in a changing cybercrime landscape: taxonomising countermeasures","volume":"87","year":"2019","journal-title":"Computers and Security"},{"article-title":"Employee security behaviour: the importance of education and policies in organisational settings","volume-title":"Advances in Information Systems Development Methods, Tools and Management. Lecture Notes in Information Systems and Organisation","year":"2018","key":"key2023102616471575700_ref020"},{"issue":"4","key":"key2023102616471575700_ref021","doi-asserted-by":"crossref","first-page":"763","DOI":"10.2307\/258395","article-title":"Developing a process model of problem recognition","volume":"11","year":"1986","journal-title":"The Academy of Management Review"},{"issue":"4","key":"key2023102616471575700_ref022","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1111\/ablj.12055","article-title":"Proactive cybersecurity: a comparative industry and regulatory analysis","volume":"52","year":"2015","journal-title":"American Business Law Journal"},{"first-page":"520","article-title":"Effects of recipient information and urgency cues on phishing detection","year":"2020","key":"key2023102616471575700_ref023"},{"issue":"3","key":"key2023102616471575700_ref024","first-page":"32","article-title":"The five elements of our time-pressed society","volume":"30","year":"1989","journal-title":"Management Quarterly"},{"issue":"SI","key":"key2023102616471575700_ref025","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/3210530.3210533","article-title":"Security on autopilot: Why current security theories hijack our thinking and lead us astray","volume":"49","year":"2018","journal-title":"ACM SIGMIS Database: The DATABASE for Advances in Information Systems"},{"key":"key2023102616471575700_ref026","first-page":"27","article-title":"Security management and policy","volume-title":"Information Security Handbook","year":"1991"},{"key":"key2023102616471575700_ref027","unstructured":"ENISA (2018), ENISA Threat Landscape Report 2018."},{"key":"key2023102616471575700_ref028","unstructured":"European Commission (2013), \u201cCybersecurity strategy of the European Union: an open, safe and secure cyberspace\u201d, available at: www.eeas.europa.eu\/archives\/docs\/policies\/eu-cyber-security\/cybsec_comm_en.pdf"},{"issue":"1","key":"key2023102616471575700_ref029","first-page":"1","article-title":"An investigation into users\u2019 considerations towards using password managers","volume":"7","year":"2017","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"4","key":"key2023102616471575700_ref030","first-page":"1","article-title":"The checklist manifesto: How to get things right","volume":"1","year":"2011","journal-title":"Journal of Nursing Regulation"},{"issue":"4","key":"key2023102616471575700_ref031","first-page":"209","article-title":"Sometimes it is not so bad to decide in a hurry: Influence of different levels of temporal opportunity on the elaboration of purchasing intention","volume":"39","year":"2008","journal-title":"Polish Psychological Bulletin"},{"issue":"1","key":"key2023102616471575700_ref032","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1146\/annurev-psych-120709-145346","article-title":"Heuristic decision making","volume":"62","year":"2011","journal-title":"Annual Review of Psychology"},{"key":"key2023102616471575700_ref033","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.cose.2018.09.009","article-title":"Design recommendations for online cybersecurity courses","volume":"80","year":"2019","journal-title":"Computers and Security"},{"article-title":"Cyber security breaches survey 2018: Statistical release","year":"2018","author":"GOV.UK","key":"key2023102616471575700_ref034"},{"issue":"3","key":"key2023102616471575700_ref035","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1111\/j.1540-6210.2011.02366.x","article-title":"The new policy world of cybersecurity","volume":"71","year":"2011","journal-title":"Public Administration Review"},{"issue":"4","key":"key2023102616471575700_ref036","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1080\/07421222.2014.1001255","article-title":"The role of self-control in information security violations: Insights from a cognitive neuroscience perspective","volume":"31","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2023102616471575700_ref037","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","year":"2012","journal-title":"Computers and Security"},{"issue":"212","key":"key2023102616471575700_ref038","first-page":"59","article-title":"The effect of ERP system workarounds on organizational control: an interpretivist case study","volume":"21","year":"2009","journal-title":"Scandinavian Journal of Information Systems"},{"key":"key2023102616471575700_ref088","unstructured":"Insightexpress (2008), \u201cData leakage worldwide: the effectiveness of corporate security policies\u201d, available at: www.cisco.com\/en\/US\/solutions\/collateral\/ns170\/ns896\/ns895\/Cisco_STL_Data_Leakage_2008_.pdf"},{"key":"key2023102616471575700_ref039","unstructured":"ISC2.org (2021), \u201cInternational information system security certification consortium cybersecurity workforce study\u201d, available at: www.isc2.org\/Research\/Workforce-Study#"},{"issue":"3","key":"key2023102616471575700_ref040","doi-asserted-by":"crossref","first-page":"69","DOI":"10.4018\/jiscrm.2009070104","article-title":"Knowledge management in support of crisis response","volume":"1","year":"2009","journal-title":"International Journal of Information Systems for Crisis Response and Management"},{"key":"key2023102616471575700_ref041","unstructured":"Johnson, M. (2017), \u201cCyber security: the biggest challenges and how to overcome them\u201d, Intercity Technology, available at: www.intercity.technology\/blog\/cyber-security-biggest-challenges"},{"key":"key2023102616471575700_ref042","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-1-4757-6846-6_7","article-title":"Adapting to time constraints","volume-title":"Time Pressure and Stress in Human Judgment and Decision Making","year":"1993"},{"issue":"3","key":"key2023102616471575700_ref043","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: an empirical study","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"9","key":"key2023102616471575700_ref044","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1037\/0003-066X.58.9.697","article-title":"A perspective on judgment and choice: mapping bounded rationality","volume":"58","year":"2003","journal-title":"American Psychologist"},{"key":"key2023102616471575700_ref045","first-page":"145","article-title":"Content, context, process analysis of is security policy formation","volume-title":"IFIP International Information Security Conference","year":"2003"},{"key":"key2023102616471575700_ref046","first-page":"1","article-title":"Learning from \u201cshadow security\u201d: why understanding non-compliant behaviors provides the basis for effective security","volume-title":"USEC\u201914 Workshop on Usable Security","year":"2014"},{"issue":"3","key":"key2023102616471575700_ref047","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/J.JEBO.2004.11.013","article-title":"Time is money\u2014time pressure, incentives, and the quality of decision-making","volume":"61","year":"2006","journal-title":"Journal of Economic Behavior and Organization"},{"volume-title":"Cybersecurity and Tailored Deterrence","year":"2013","key":"key2023102616471575700_ref048"},{"key":"key2023102616471575700_ref049","unstructured":"Langner, R. (2013), \u201cTo kill a centrifuge: a technical analysis of what Stuxnet\u2019s creators tried to achieve\u201d, The Langner Group, available at: www.langner.com\/wp-content\/uploads\/2017\/03\/to-kill-a-centrifuge.pdf"},{"key":"key2023102616471575700_ref050","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/ES.2014.66","article-title":"Does explicit information security policy affect employees\u2019 cyber security behavior? A pilot study","volume-title":"2014 Enterprise Systems Conference","year":"2014"},{"issue":"8","key":"key2023102616471575700_ref051","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1016\/0167-4048(96)81709-3","article-title":"A new model for information security policies","volume":"14","year":"1995","journal-title":"Computers and Security"},{"key":"key2023102616471575700_ref052","first-page":"1","article-title":"Information security policies: a content analysis","volume-title":"PACIS - The Pacific Asia Conference on Information Systems","year":"2012"},{"issue":"3","key":"key2023102616471575700_ref053","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1080\/10447318.2019.1631545","article-title":"Correlations between human performance in information seeking, information integration, and overall process in diagnostic tasks","volume":"36","year":"2020","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"key2023102616471575700_ref054","unstructured":"Maginot Revisited (2015), \u201cCybersecurity\u2019s Maginot line: a real-world assessment of the defense-in-depth model\u201d, available at: www.www2.fireeye.com\/rs\/fireye\/images\/fireeye-real-world-assessment.pdf"},{"key":"key2023102616471575700_ref055","first-page":"173","article-title":"The human factor in cybersecurity: robust and intelligent defense","volume-title":"Advances in Information Security","year":"2015"},{"key":"key2023102616471575700_ref056","first-page":"2527","article-title":"Motivational aspects of information security policies","volume-title":"2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme-System Security and Assurance (Cat. No. 03CH37483)","year":"2003"},{"key":"key2023102616471575700_ref057","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.cor.2016.05.005","article-title":"Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender\u2013attacker model","volume":"75","year":"2016","journal-title":"Computers and Operations Research"},{"first-page":"123","article-title":"If it\u2019s urgent or it is stopping me from doing something, then i might just go straight at it\u201d: a study into home data security decisions","year":"2017","key":"key2023102616471575700_ref058"},{"issue":"12","key":"key2023102616471575700_ref059","first-page":"1937","article-title":"Satisficing in split-second decision making is characterized by strategic cue discounting","volume":"42","year":"2016","journal-title":"Journal of Experimental Psychology: Learning, Memory, and Cognition"},{"key":"key2023102616471575700_ref060","first-page":"1","article-title":"Employees\u2019 behavior towards is security policy compliance","volume-title":"2007 40th Annual HI International Conference on System Sciences (HICSS\u201907)","year":"2007"},{"issue":"1","key":"key2023102616471575700_ref061","doi-asserted-by":"crossref","first-page":"57","DOI":"10.2307\/2667031","article-title":"The time famine: toward a sociology of work time","volume":"44","year":"1999","journal-title":"Administrative Science Quarterly"},{"issue":"3","key":"key2023102616471575700_ref062","first-page":"73","article-title":"Prerequisites of virtual teamwork in security operations centers: knowledge, skills, abilities and other characteristics","volume":"16","year":"2017","journal-title":"AARMS\u2013Academic and Applied Research in Military and Public Management Science"},{"key":"key2023102616471575700_ref063","first-page":"107","article-title":"Big data technologies for cybersecurity","volume-title":"CEUR Workshop","year":"2017"},{"volume-title":"Security in Computing Second Edition","year":"1997","key":"key2023102616471575700_ref064"},{"issue":"1","key":"key2023102616471575700_ref065","first-page":"121","article-title":"Identifying patterns in informal sources of security information","volume":"1","year":"2015","journal-title":"Journal of Cybersecurity"},{"key":"key2023102616471575700_ref066","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.ienj.2015.09.006","article-title":"Momentary fitting in a fluid environment: a grounded theory of triage nurse decision making","volume":"26","year":"2016","journal-title":"International Emergency Nursing"},{"key":"key2023102616471575700_ref067","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ergon.2018.12.001","article-title":"Human performance metrics for the nuclear domain: a tool for evaluating measures of workload, situation awareness and teamwork","volume":"69","year":"2019","journal-title":"International Journal of Industrial Ergonomics"},{"first-page":"1","article-title":"Towards an integrative theoretical framework of IT-mediated interruptions","year":"2017","key":"key2023102616471575700_ref068"},{"key":"key2023102616471575700_ref069","unstructured":"Robertson, J. and Michael, R. (2018), \u201cThe big hack: How China used a tiny chip to infiltrate U.S. Companies\u201d, Bloomberg, available at: www.bloomberg.com\/news\/features\/2018-10-04\/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies"},{"issue":"1","key":"key2023102616471575700_ref070","first-page":"1","article-title":"Content analysis of cyber insurance policies: How do carriers price cyber risk?","volume":"5","year":"2019","journal-title":"Journal of Cybersecurity"},{"issue":"4","key":"key2023102616471575700_ref071","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1108\/JIC-03-2019-0041","article-title":"Strategy and organisational cybersecurity: a knowledge-problem perspective","volume":"20","year":"2019","journal-title":"Journal of Intellectual Capital"},{"key":"key2023102616471575700_ref072","unstructured":"SANS (2023), \u201cInformation security policy templates\u201d, Security Policy Templates, available at: www.sans.org\/information-security-policy\/"},{"issue":"5","key":"key2023102616471575700_ref073","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1080\/01436597.2017.1408403","article-title":"The cyber frontier and digital pitfalls in the global South","volume":"39","year":"2018","journal-title":"Third World Quarterly"},{"key":"key2023102616471575700_ref074","first-page":"1","article-title":"Determining components of national cyber security framework using grounded theory","volume-title":"2017 Second International Conference on Informatics and Computing (ICIC)","year":"2017"},{"key":"key2023102616471575700_ref075","first-page":"106","article-title":"An overview of the development Indonesia national cyber security","volume":"6","year":"2012","journal-title":"International Journal of Information and Computer Science"},{"key":"key2023102616471575700_ref076","first-page":"259","article-title":"International relations theory and cyber security","volume-title":"The Oxford Handbook of International Political Theory","year":"2018"},{"issue":"3","key":"key2023102616471575700_ref077","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.cose.2006.03.004","article-title":"Information security - The fourth wave","volume":"25","year":"2006","journal-title":"Computers and Security"},{"issue":"2","key":"key2023102616471575700_ref078","doi-asserted-by":"crossref","first-page":"127","DOI":"10.2307\/257088","article-title":"The timing of adaptive group responses to nonroutine events","volume":"42","year":"1999","journal-title":"Academy of Management Journal"},{"issue":"11","key":"key2023102616471575700_ref079","doi-asserted-by":"crossref","first-page":"1534","DOI":"10.1287\/mnsc.1040.0210","article-title":"Effects of adaptive behaviors and shared mental models on control crew performance","volume":"50","year":"2004","journal-title":"Management Science"},{"issue":"12","key":"key2023102616471575700_ref080","doi-asserted-by":"crossref","first-page":"1634","DOI":"10.1080\/00140139.2017.1329941","article-title":"Developing a taxonomy of coordination behaviours in nuclear power plant control rooms during emergencies","volume":"60","year":"2017","journal-title":"Ergonomics"},{"issue":"4","key":"key2023102616471575700_ref081","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TPC.2012.2208392","article-title":"Phishing susceptibility: an investigation into the processing of a targeted spear phishing email","volume":"55","year":"2012","journal-title":"IEEE Transactions on Professional Communication"},{"issue":"3","key":"key2023102616471575700_ref082","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1057\/ejis.2010.72","article-title":"The influence of the informal social learning environment on information privacy policy compliance efficacy and intention","volume":"20","year":"2011","journal-title":"European Journal of Information Systems"},{"key":"key2023102616471575700_ref083","doi-asserted-by":"crossref","first-page":"9","DOI":"10.4018\/978-1-878289-78-0.ch002","article-title":"Information systems security and the need for policy","volume-title":"Information Security Management: Global Challenges in the New Millennium","year":"2001"},{"edition":"4th ed","volume-title":"Engineering Psychology and Human Performance","year":"2013","key":"key2023102616471575700_ref084"},{"volume-title":"Information Security Policies Made Easy Version 6","year":"1997","key":"key2023102616471575700_ref085"},{"issue":"5","key":"key2023102616471575700_ref086","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1037\/h0037186","article-title":"The harassed decision maker: time pressures, distractions, and the use of evidence","volume":"59","year":"1974","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"key2023102616471575700_ref087","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1108\/ICS-03-2017-0013","article-title":"Organisational culture, procedural countermeasures, and employee security behaviour: a qualitative study","volume":"25","year":"2017","journal-title":"Information and Computer Security"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-01-2021-0013\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-01-2021-0013\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:38Z","timestamp":1753406558000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.emerald.com\/ics\/article\/31\/4\/504-526\/111535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":88,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,7,17]]},"published-print":{"date-parts":[[2023,10,30]]}},"alternative-id":["10.1108\/ICS-01-2021-0013"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1108\/ics-01-2021-0013","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"electronic","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2023,7,17]]}}}