{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:44:45Z","timestamp":1732034685817},"reference-count":51,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["European Journal of Information Systems"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1057\/ejis.2013.27","type":"journal-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T08:52:38Z","timestamp":1380617558000},"page":"38-58","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":65,"title":["Managing the introduction of information security awareness programmes in organisations"],"prefix":"10.1080","volume":"24","author":[{"given":"Aggeliki","family":"Tsohou","sequence":"first","affiliation":[{"name":"Department of Information Processing ScienceUniversity of Oulu Finland"}]},{"given":"Maria","family":"Karyda","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Systems EngineeringUniversity of the Aegean Greece"}]},{"given":"Spyros","family":"Kokolakis","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Systems EngineeringUniversity of the Aegean Greece"}]},{"given":"Evangelos","family":"Kiountouzis","sequence":"additional","affiliation":[{"name":"Department of InformaticsAthens University of Economics and Business Greece"}]}],"member":"301","published-online":{"date-parts":[[2017,12,19]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1108\/09593840110384762"},{"issue":"19","key":"CIT0002","first-page":"1","volume":"2","author":"Baskerville RL","year":"1999","journal-title":"Communications of the Association for Information Systems"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/026839696345289"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000298"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.08.009"},{"issue":"3","key":"CIT0006","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"Bulgurcu B","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0007","first-page":"196","volume-title":"Power, Action and Belief: A New Sociology of Knowledge","author":"Callon M","year":"1986"},{"key":"CIT0008","volume-title":"Proceedings of the 19th Australasian Conference on Information Systems (ACIS)","author":"Cecez-Kecmanovic D","year":"2008"},{"issue":"1","key":"CIT0009","first-page":"1","volume":"24","author":"Chen CC","year":"2006","journal-title":"Information Technology Learning and Performance Journal"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2008.00297.x"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"CIT0012","first-page":"496","volume-title":"Proceedings of the Eleventh European Conference on Information Systems","author":"Cordella A","year":"2003"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.009"},{"key":"CIT0020","volume-title":"Network Security Policies and Procedures (Advances in Information Security)","author":"Frye WD","year":"2007"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2005.00197.x"},{"key":"CIT0022","doi-asserted-by":"crossref","volume-title":"Central Problems in Social Theory","author":"Giddens A","year":"1979","DOI":"10.1007\/978-1-349-16161-4"},{"key":"CIT0023","volume-title":"The Constitution of Society","author":"Giddens A","year":"1984"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/43298.9.6.20010102\/30985.4"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00361.x"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1980.tb00087.x"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(99)00032-4"},{"issue":"3","key":"CIT0031","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"Johnston CA","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"CIT0032","doi-asserted-by":"crossref","first-page":"127","DOI":"10.2307\/25148831","volume":"32","author":"Jones RM","year":"2008","journal-title":"MIS Quarterly"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.08.011"},{"issue":"8","key":"CIT0034","doi-asserted-by":"crossref","first-page":"518","DOI":"10.17705\/1jais.00274","volume":"12","author":"Karjalainen M","year":"2011","journal-title":"Journal of the Association for Information Systems"},{"key":"CIT0035","volume-title":"Science in Action: How to Follow Scientists and Engineers Through Society","author":"Latour B","year":"1987"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1177\/001872674700100103"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0427"},{"key":"CIT0038","first-page":"49","volume-title":"Proceedings of the Securing Electronic Business Processes Highlights of the Information Security Solutions Europe Conference","author":"Maeyer DD","year":"2007"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1108\/09593840410542510"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701747237"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/45241.14.2.20050501\/88292.6"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1987.tb00467.x"},{"key":"CIT0044","volume-title":"Managing Change for Competitive Success","author":"Pettigrew A","year":"1993"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.163"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(06)70355-4"},{"issue":"4","key":"CIT0047","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"Puhakainen P","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"issue":"3","key":"CIT0049","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","volume":"34","author":"Siponen M","year":"2010","journal-title":"MIS Quarterly"},{"issue":"3","key":"CIT0050","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25750689","volume":"34","author":"Spears J","year":"2010","journal-title":"MIS Quarterly"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219182"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1108\/09685229810227649"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"CIT0055","volume-title":"Interpreting Information Systems in Organisations","author":"Walsham G","year":"1993"},{"key":"CIT0056","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1007\/978-0-387-35309-8_23","volume-title":"Information Systems and Qualitative Research","author":"Walsham G","year":"1997"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.72"}],"container-title":["European Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/ejis.2013.27.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1057\/ejis.2013.27\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1057\/ejis.2013.27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/ejis.2013.27.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,27]],"date-time":"2019-07-27T17:48:55Z","timestamp":1564249735000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1057\/ejis.2013.27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":51,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,12,19]]},"published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1057\/ejis.2013.27"],"URL":"https:\/\/doi.org\/10.1057\/ejis.2013.27","relation":{},"ISSN":["0960-085X","1476-9344"],"issn-type":[{"value":"0960-085X","type":"print"},{"value":"1476-9344","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}