1. Almukhlifi, A., Deng, H., Kam, B.: E-government adoption in Saudi Arabia: the moderation effect of Wastta. In: Proceedings of the international conference on information resources management, Ningbo, China (2018)
2. Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18(2), 106–125 (2009)
3. Kolkowska, E., Dhillon, G.: Organizational power and information security rule compliance. Comput. Secur. (2012)
4. Nasser, A.A., Al-Khulaidi, A.A., Aljober, M.N.: Measuring the information security maturity of enterprises under uncertainty using fuzzy. IJ Inf. Technol. Comput. Sci. 4, 10–25 (2018)
5. Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–548 (2010)