{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T12:40:25Z","timestamp":1732106425015,"version":"3.28.0"},"reference-count":220,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007659","name":"Universiteit van Tilburg","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["The Journal of Strategic Information Systems"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1016\/j.jsis.2024.101861","type":"journal-article","created":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T10:28:35Z","timestamp":1727260115000},"page":"101861","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["The whole of cyber defense: Syncing practice and theory"],"prefix":"10.1016","volume":"33","author":[{"given":"Kristel M.","family":"de Nobrega","sequence":"first","affiliation":[]},{"given":"Anne-F.","family":"Rutkowski","sequence":"additional","affiliation":[]},{"given":"Carol","family":"Saunders","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0005","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10845-012-0683-0","article-title":"Information security strategies: towards an organizational multi-strategy perspective","volume":"25","author":"Ahmad","year":"2014","journal-title":"J. Intell. Manuf."},{"key":"10.1016\/j.jsis.2024.101861_b0010","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/j.cose.2019.07.001","article-title":"Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack","author":"Ahmad","year":"2019","journal-title":"Comput. Secur."},{"issue":"17","key":"10.1016\/j.jsis.2024.101861_b0015","doi-asserted-by":"crossref","first-page":"5811","DOI":"10.3390\/app10175811","article-title":"A systematic review of defensive and offensive cybersecurity with machine learning","volume":"10","author":"Aiyanyo","year":"2020","journal-title":"Appl. Sci."},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0020","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1016\/j.im.2006.08.008","article-title":"Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust","volume":"43","author":"Alder","year":"2006","journal-title":"Inf. Manag."},{"key":"10.1016\/j.jsis.2024.101861_b0025","first-page":"204","article-title":"Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models","author":"Alharbi","year":"2018","journal-title":"International Journal of Computer and Information Technology"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0030","doi-asserted-by":"crossref","first-page":"137","DOI":"10.25300\/MISQ\/2023\/17316","article-title":"Creating proactive Cyber Threat Intelligence with hacker exploit lables: A deep transfer learning approach","volume":"48","author":"Ampel","year":"2024","journal-title":"MIS Q."},{"key":"10.1016\/j.jsis.2024.101861_b0035","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions","author":"Anderson","year":"2010","journal-title":"MIS Q."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0040","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1080\/07421222.2016.1243947","article-title":"From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it","volume":"33","author":"Anderson","year":"2016","journal-title":"J. Manag. Inf. Syst."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2022.103623","article-title":"Standardizing information security\u2013a structurational analysis","volume":"59","author":"Andersson","year":"2022","journal-title":"Inf. Manag."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0050","first-page":"12","article-title":"Impact of information technology (IT) security information sharing among competing IT firms on firm\u2019s financial performance: An empirical investigation","volume":"39","author":"Appan","year":"2016","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0055","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1287\/isre.1080.0226","article-title":"An empirical analysis of software vendors' patch release behavior: impact of vulnerability disclosure","volume":"21","author":"Arora","year":"2010","journal-title":"Inf. Syst. Res."},{"key":"10.1016\/j.jsis.2024.101861_b0060","first-page":"1","article-title":"Security by envelopment\u2013a novel approach to data-security-oriented configuration of lightweight-automation systems","author":"Asatiani","year":"2023","journal-title":"Eur. J. Inf. Syst."},{"year":"1957","author":"Ashby","series-title":"An Introduction to Cybernetics","key":"10.1016\/j.jsis.2024.101861_b0065"},{"key":"10.1016\/j.jsis.2024.101861_b0070","first-page":"1","article-title":"How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control","author":"Ayaburi","year":"2023","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0075","first-page":"46","article-title":"An analysis of the growth of computer and Internet security breaches","volume":"12","author":"Bagchi","year":"2003","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0080","first-page":"865","article-title":"Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures","volume":"15","author":"Bahrami","year":"2019","journal-title":"J. Inf. Process. Syst."},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0085","article-title":"How \u201cWhat you think you know about cybersecurity\u201d can help users make more secure decisions","volume":"60","author":"Bahreini","year":"2023","journal-title":"Inf. Manag."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0090","first-page":"10","article-title":"Global Diffusion of the Internet XIV: The Internet in Iraq and Its Societal Impact","volume":"24","author":"Banks","year":"2009","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0095","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1145\/162124.162127","article-title":"ISS design methods: implications for information systems development","volume":"25","author":"Baskerville","year":"1993","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0100","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.im.2013.11.004","article-title":"Incident-centered information security: Managing a strategic balance between prevention and response","volume":"51","author":"Baskerville","year":"2014","journal-title":"Inf. Manag."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0105","first-page":"17","article-title":"Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process","volume":"26","author":"Beebe","year":"2010","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0110","first-page":"7","article-title":"Framing information security budget requests to influence investment decisions","volume":"35","author":"Beebe","year":"2014","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0115","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.im.2017.01.003","article-title":"Determinants of early conformance with information security policies","volume":"54","author":"B\u00e9langer","year":"2017","journal-title":"Inf. Manag."},{"key":"10.1016\/j.jsis.2024.101861_b0120","doi-asserted-by":"crossref","DOI":"10.1287\/isre.2017.0714","article-title":"Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making","author":"Benaroch","year":"2018","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0125","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1080\/07421222.2016.1205918","article-title":"Examining hacker participation length in cybercriminal internet-relay-chat communities","volume":"33","author":"Benjamin","year":"2016","journal-title":"J. Manag. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0130","first-page":"1","article-title":"DICE-E: A Framework for Conducting Darknet Identification, Collection","volume":"43","author":"Benjamin","year":"2019","journal-title":"Evaluation with Ethics. MIS Quarterly"},{"issue":"7671","key":"10.1016\/j.jsis.2024.101861_b0135","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1038\/nature23474","article-title":"Quantum machine learning","volume":"549","author":"Biamonte","year":"2017","journal-title":"Nature"},{"year":"2018","author":"Bodeau","series-title":"Cyber Resiliency Metrics Catalog","key":"10.1016\/j.jsis.2024.101861_b0140"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0145","first-page":"24","article-title":"Unveiling the mask of phishing: Threats, preventive measures, and responsibilities","volume":"19","author":"Bose","year":"2007","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0150","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1057\/ejis.2009.8","article-title":"If someone is watching, I\u2019ll do what I\u2019m asked: mandatoriness, control, and information security","volume":"18","author":"Boss","year":"2009","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0155","first-page":"5","article-title":"Refining the threat calculus of technology threat avoidance theory","volume":"45","author":"Boysen","year":"2019","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0160","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1287\/isre.2022.1133","article-title":"Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse","volume":"34","author":"Burns","year":"2023","journal-title":"Inf. Syst. Res."},{"doi-asserted-by":"crossref","unstructured":"Carpenter, D., Young, D. K., Barrett, P., McLeod, A. J. 2019. Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44.","key":"10.1016\/j.jsis.2024.101861_b0165","DOI":"10.17705\/1CAIS.04422"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0170","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1287\/isre.1050.0041","article-title":"The value of intrusion detection systems in information technology security architecture","volume":"16","author":"Cavusoglu","year":"2005","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0175","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1287\/isre.2021.1014","article-title":"Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model","volume":"32","author":"Chen","year":"2021","journal-title":"Inf. Syst. Res."},{"issue":"5","key":"10.1016\/j.jsis.2024.101861_b0180","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2021.103486","article-title":"A study of social networking site use from a three-pronged security and privacy threat assessment perspective","volume":"58","author":"Chen","year":"2021","journal-title":"Inf. Manag."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0185","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2021.103575","article-title":"Beyond adaptive security coping behaviors: Theory and empirical evidence","volume":"59","author":"Chen","year":"2022","journal-title":"Inf. Manag."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0190","first-page":"26","article-title":"Talk too much? The impact of cybersecurity disclosures on investment decisions","volume":"50","author":"Cheng","year":"2022","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0195","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MCOM.2017.1600522CM","article-title":"Securing the Internet of Things in a quantum world","volume":"55","author":"Cheng","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.jsis.2024.101861_b0200","doi-asserted-by":"crossref","first-page":"1006167","DOI":"10.1016\/j.chbr.2022.100167","article-title":"Hacker types, motivations and strategies: A comprehensive framework","volume":"5","author":"Chng","year":"2022","journal-title":"Computers in Human Behavior Reports"},{"unstructured":"Clarke, M., & Oxman, A. D. 2001. Cochrane Reviewers\u2019 Handbook 4.1. Review Manager (RevMan). The Cochrane Collaboration, Updated June, 2000Version, 4.","key":"10.1016\/j.jsis.2024.101861_b0205"},{"unstructured":"Coden, M. Reeves, M, Pearlson, K. Madnick, S, & Berriman, C. 2023. An action plan for cyber resilience. Sloan Management Review, https:\/\/cams.mit.edu\/wp-content\/uploads\/2023-01-04_SMR.pdf (accessed 19 February 2023).","key":"10.1016\/j.jsis.2024.101861_b0210"},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0215","first-page":"2","article-title":"Robbing Peter to pay Paul: Surrendering privacy for security\u2019s sake in an identity ecosystem","volume":"18","author":"Crossler","year":"2017","journal-title":"J. Assoc. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0220","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security counter-measures and its impact on information systems misuse: A deterrence approach","volume":"20","author":"D\u2019Arcy","year":"2009","journal-title":"Information System Research"},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0225","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1287\/isre.2020.0939","article-title":"Too good to be true: Firm social performance and the risk of data breach","volume":"31","author":"D\u2019Arcy","year":"2020","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0230","first-page":"779","article-title":"The influences of public and institutional pressure on firms\u2019 cybersecurity disclosures","volume":"23","author":"D'Arcy","year":"2022","journal-title":"J. Assoc. Inf. Syst."},{"author":"Dbir","key":"10.1016\/j.jsis.2024.101861_b0235"},{"unstructured":"Dewar, R. S. 2017. Active cyber defense. CSS Cyberdefense Trend Analyses, 1. Center for Security Studies (CSS), ETH Z\u00fcrich. https:\/\/doi.org\/10.3929\/ethz-b-000169631.","key":"10.1016\/j.jsis.2024.101861_b0240"},{"year":"2007","author":"Dhillon","series-title":"Principles of ISS: Texts and Cases","key":"10.1016\/j.jsis.2024.101861_b0245"},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0250","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1046\/j.1365-2575.2001.00099.x","article-title":"Current directions in ISS research: towards socio-organizational perspectives","volume":"11","author":"Dhillon","year":"2001","journal-title":"Inf. Syst. J."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0255","doi-asserted-by":"crossref","DOI":"10.1016\/j.jsis.2021.101693","article-title":"ISS research agenda: Exploring the gap between research and practice","volume":"30","author":"Dhillon","year":"2021","journal-title":"J. Strateg. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0260","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","article-title":"Value-focused assessment of information system security in organizations","volume":"16","author":"Dhillon","year":"2006","journal-title":"Information System Journal"},{"key":"10.1016\/j.jsis.2024.101861_b0265","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101747","article-title":"A comprehensive model of information security factors for decision-makers","volume":"92","author":"Diesch","year":"2020","journal-title":"Comput. Secur."},{"issue":"6","key":"10.1016\/j.jsis.2024.101861_b0270","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1080\/0960085X.2020.1797546","article-title":"Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling","volume":"29","author":"Dincelli","year":"2020","journal-title":"Eur. J. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0275","doi-asserted-by":"crossref","first-page":"386","DOI":"10.17705\/1jais.00133","article-title":"The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information, Technologies","volume":"8","author":"Dinev","year":"2007","journal-title":"Journal of the Association of Information System"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0280","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1080\/0960085X.2021.1978344","article-title":"Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance","volume":"31","author":"Donalds","year":"2022","journal-title":"Eur. J. Inf. Syst."},{"issue":"6","key":"10.1016\/j.jsis.2024.101861_b0285","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1080\/02684520903320410","article-title":"Intelligence-led peacekeeping: The United Nations stabilization mission in Haiti (MINUSTAH), 2006\u201307","volume":"24","author":"Dorn","year":"2009","journal-title":"Intelligence and National Security"},{"doi-asserted-by":"crossref","unstructured":"Drias, Z., Serhrouchni, A., & Vogel, O. 2015. Analysis of cyber security for industrial control systems. In 2015 international conference on cyber security of smart cities, industrial control system and communications (ssic), 1-8.","key":"10.1016\/j.jsis.2024.101861_b0290","DOI":"10.1109\/SSIC.2015.7245330"},{"key":"10.1016\/j.jsis.2024.101861_b0295","series-title":"Computer Security. Computer and Network Security Essentials","first-page":"3","author":"Duffany","year":"2018"},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0300","doi-asserted-by":"crossref","DOI":"10.1088\/1361-6633\/aab406","article-title":"Machine learning & artificial intelligence in the quantum domain: a review of recent progress","volume":"81","author":"Dunjko","year":"2018","journal-title":"Rep. Prog. Phys."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0305","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1080\/07421222.2020.1790186","article-title":"Semi-supervised cyber threat identification in dark net markets: a transductive and deep learning approach","volume":"37","author":"Ebrahimi","year":"2020","journal-title":"J. Manag. Inf. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0310","doi-asserted-by":"crossref","DOI":"10.25300\/MISQ\/2022\/16618","article-title":"Cross-lingual cybersecurity analytics in the international dark web with adversarial deep representation learning","volume":"46","author":"Ebrahimi","year":"2022","journal-title":"MIS Q."},{"unstructured":"ECB, 2021. ECB Annual Report on supervisory activities 2021. https:\/\/www.bankingsupervision. europa.eu\/press\/publications\/annual-report\/html\/ssm.ar2021\u223c52a7d32451.en.html (accessed 30 October 2022).","key":"10.1016\/j.jsis.2024.101861_b0315"},{"unstructured":"ENISA, 2021. Post Quantum Cryptography, current state of quantum mitigation. https:\/\/www.enisa.europa.eu\/publications\/post-quantum-cryptography-current-state-and-quantum-mitigation DOI: 10.2824\/92307 (accessed 23 January 2023).","key":"10.1016\/j.jsis.2024.101861_b0320"},{"key":"10.1016\/j.jsis.2024.101861_b0325","article-title":"Cyberattack takes down Israeli government websites","author":"Fingas","year":"2022","journal-title":"Engadget."},{"key":"10.1016\/j.jsis.2024.101861_b0330","series-title":"International Conference on Critical Infrastructure Protection","article-title":"Towards a taxonomy of attacks against energy control systems","author":"Fleury","year":"2008"},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0335","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2023.103858","article-title":"Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model","volume":"60","author":"Frauenstein","year":"2023","journal-title":"Inf. Manag."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0340","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/isre.1050.0053","article-title":"The economic incentives for sharing security information","volume":"16","author":"Gal-Or","year":"2005","journal-title":"Inf. Syst. Res."},{"issue":"6","key":"10.1016\/j.jsis.2024.101861_b0345","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1080\/0960085X.2022.2096491","article-title":"Continuous improvement of information security management: an organisational learning perspective","volume":"32","author":"Ghahramani","year":"2023","journal-title":"Eur. J. Inf. Syst."},{"author":"Glick","key":"10.1016\/j.jsis.2024.101861_b0350"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0355","first-page":"2","article-title":"Anonymity vs. security: The right balance for the smart grid","volume":"36","author":"Goel","year":"2015","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0360","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.im.2009.06.005","article-title":"Estimating the market impact of security breach announcements on firm values","volume":"46","author":"Goel","year":"2009","journal-title":"Inf. Manag."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0365","first-page":"3","article-title":"The impact of federal and state notification laws on security breach announcements","volume":"34","author":"Goel","year":"2014","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0370","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2021.103447","article-title":"Can financial incentives help with the struggle for security policy compliance?","volume":"58","author":"Goel","year":"2021","journal-title":"Inf. Manag."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0375","first-page":"50","article-title":"Global sourcing of IT services and information security: Prudence before playing","volume":"20","author":"Goodman","year":"2007","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0380","first-page":"8","article-title":"Responding to Cybersecurity Challenges: Securing Vulnerable US Emergency Alert Systems","volume":"46","author":"Green","year":"2020","journal-title":"Commun. Assoc. Inf. Syst."},{"unstructured":"Greene, T. 2016. Why the \u2018cyber kill chain\u2019 needs an upgrade. Network World From IDG, https:\/\/www. Networkworld.com\/article\/3104542\/security\/why-the-cyber-kill-chain-needs-an-upgradesecurity-pros-need-to-focus-more-on-catching-attackers-aft.html, (accessed 19 February 2022).","key":"10.1016\/j.jsis.2024.101861_b0385"},{"key":"10.1016\/j.jsis.2024.101861_b0390","first-page":"268","article-title":"Quantum machine learning-using quantum computation in artificial intelligence and deep neural networks: Quantum computation and machine learning in artificial intelligence. 8th Ind","author":"Gupta","year":"2017","journal-title":"Autom. Electromechanical Eng. Conf. IEMECON"},{"key":"10.1016\/j.jsis.2024.101861_b0395","series-title":"International Workshop on Graphical Models for Security","first-page":"111","article-title":"Breaking the cyber kill chain by modelling resource costs","author":"Haga","year":"2020"},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0400","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1287\/isre.2020.0986","article-title":"The impact of executives\u2019 IT expertise on reported data security breaches","volume":"32","author":"Haislip","year":"2021","journal-title":"Inf. Syst. Res."},{"unstructured":"Hansman, S. (2003). A taxonomy of network and computer attack methodologies. Department of Computer Science and Software Engineering. University of Canterbury, Christchurch, New Zealand.","key":"10.1016\/j.jsis.2024.101861_b0405"},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0410","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1111\/j.1540-6210.2011.02366.x","article-title":"The new policy world of cybersecurity","volume":"71","author":"Harknett","year":"2011","journal-title":"Public Adm. Rev."},{"doi-asserted-by":"crossref","unstructured":"Hassan, W. U., Bates, A., & Marino, D., 2020 (May). Tactical provenance analysis for endpoint detection and response systems. 2020 IEEE Symposium on Security and Privacy (SP) 1172-1189.","key":"10.1016\/j.jsis.2024.101861_b0420","DOI":"10.1109\/SP40000.2020.00096"},{"issue":"5","key":"10.1016\/j.jsis.2024.101861_b0425","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.1111\/isj.12441","article-title":"Peering through the lens of high-reliability theory: A competencies driven security culture model of high-reliability organisations","volume":"33","author":"Hassandoust","year":"2023","journal-title":"Inf. Syst. J."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0430","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1080\/19312450709336664","article-title":"Answering the call for a standard reliability measure for coding data","volume":"1","author":"Hayes","year":"2007","journal-title":"Commun. Methods Meas."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0435","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1177\/0268396220978983","article-title":"Distributed Internet voting architecture: A thin client approach to Internet voting","volume":"36","author":"Helm","year":"2021","journal-title":"J. Inf. Technol."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0440","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1111\/j.1365-2575.2012.00420.x","article-title":"Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service","volume":"24","author":"Herath","year":"2014","journal-title":"Inf. Syst. J."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0445","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation and deterrence: a framework for security policy compliance in organisations","volume":"18","author":"Herath","year":"2009","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0450","first-page":"50","article-title":"The ripple effect of an information security breach event: A stakeholder analysis","volume":"34","author":"Hovav","year":"2014","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0455","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.jsis.2012.10.004","article-title":"The economic impact of cyber terrorism","volume":"22","author":"Hua","year":"2013","journal-title":"The Journal of Strategic Information Systems"},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0460","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1016\/j.im.2018.04.008","article-title":"Are we ready for cyberterrorist attacks?\u2014Examining the role of individual resilience","volume":"55","author":"Hua","year":"2018","journal-title":"Inf. Manag."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0465","doi-asserted-by":"crossref","first-page":"497","DOI":"10.25300\/MISQ\/2017\/41.2.08","article-title":"Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks","volume":"41","author":"Hui","year":"2017","journal-title":"MIS Q."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0470","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1287\/isre.2018.0806","article-title":"Bilateral liability-based contracts in information security outsourcing","volume":"30","author":"Hui","year":"2019","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0475","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"Hutchins","year":"2011","journal-title":"Leading Issues in Information Warfare & Security Research"},{"doi-asserted-by":"crossref","unstructured":"Hyatt, D., Cropanzano, R., Finfer, L. A., Levy, P., Ruddy, T. M., Vandaveer, V., & Walker S. 1997. Bridging the gap between academics and practice: Suggestions from the field. Ind Psychol, 35(1), 29-32L ;35(1):29\u201332. https:\/\/doi.org\/10.1108\/09604521211218936.","key":"10.1016\/j.jsis.2024.101861_b0480","DOI":"10.1108\/09604521211218936"},{"author":"Imf","key":"10.1016\/j.jsis.2024.101861_b0485"},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0495","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2019.103218","article-title":"Mapping sentiments to themes of customer reactions on social media during a security hack: a justice theory perspective","volume":"57","author":"Ivaturi","year":"2020","journal-title":"Inf. Manag."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0500","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1111\/isj.12317","article-title":"Eyes wide open: The role of situational information security awareness for security-related behaviour","volume":"31","author":"Jaeger","year":"2020","journal-title":"Inf. Syst. J."},{"issue":"11","key":"10.1016\/j.jsis.2024.101861_b0505","article-title":"How to conduct a systematic review: a narrative literature review","volume":"8","author":"Jahan","year":"2016","journal-title":"Cureus"},{"unstructured":"Jakub, P. 2022. Russia's war on Ukraine: Timeline of cyber-attacks. https:\/\/policycommons.net \/artifacts\/2476 881\/russias-war-on-ukraine\/3498934\/ (accessed 12 February 2023).","key":"10.1016\/j.jsis.2024.101861_b0510"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0515","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.jsis.2018.09.003","article-title":"Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment","volume":"28","author":"Jalali","year":"2019","journal-title":"J. Strateg. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0520","first-page":"1","article-title":"Using susceptibility claims to motivate behaviour change in IT security","author":"Jensen","year":"2020","journal-title":"Eur. J. Inf. Syst."},{"issue":"5","key":"10.1016\/j.jsis.2024.101861_b0525","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1016\/j.im.2018.11.003","article-title":"Information security breaches and IT security investments: Impacts on competitors","volume":"56","author":"Jeong","year":"2019","journal-title":"Inf. Manag."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0530","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1080\/14751798.2019.1600800","article-title":"Artificial intelligence & future warfare: implications for international security","volume":"35","author":"Johnson","year":"2019","journal-title":"Def. Secur. Anal."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0535","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1057\/ejis.2015.15","article-title":"Dispositional and situational factors: influences on information security policy violations","volume":"25","author":"Johnston","year":"2016","journal-title":"Eur. J. Inf. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0540","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1111\/isj.12374","article-title":"That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training","volume":"32","author":"Kam","year":"2022","journal-title":"Inf. Syst. J."},{"issue":"8","key":"10.1016\/j.jsis.2024.101861_b0545","first-page":"3","article-title":"Toward a new meta-theory for designing information systems (IS) security training approaches","volume":"12","author":"Karjalainen","year":"2011","journal-title":"J. Assoc. Inf. Syst."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0550","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.jsis.2005.07.006","article-title":"Modelling corporate wireless security and privacy","volume":"14","author":"Katos","year":"2005","journal-title":"J. Strateg. Inf. Syst."},{"unstructured":"Kean, 2021. Darktrace and Microsoft team up on AI cybersecurity https:\/\/www.siliconrepubli c.com\/enterprise\/darktrace-microsoft-ai-cybersecurity (accessed 19 February 2022).","key":"10.1016\/j.jsis.2024.101861_b0555"},{"key":"10.1016\/j.jsis.2024.101861_b0560","series-title":"Review into state of the art of vulnerability assessment using artificial intelligence","first-page":"3","author":"Khan","year":"2018"},{"key":"10.1016\/j.jsis.2024.101861_b0565","doi-asserted-by":"crossref","first-page":"194","DOI":"10.3389\/fpsyg.2018.00194","article-title":"Virtual human role players for studying social factors in organizational decision making","volume":"9","author":"Khooshabeh","year":"2018","journal-title":"Front. Psychol."},{"issue":"5","key":"10.1016\/j.jsis.2024.101861_b0570","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1016\/j.net.2019.11.001","article-title":"Cyberattack taxonomy for digital environment in nuclear power plants","volume":"52","author":"Kim","year":"2020","journal-title":"Nucl. Eng. Technol."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0575","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1287\/isre.2019.0858","article-title":"How do EHRs and a meaningful use initiative affect breaches of patient information?","volume":"30","author":"Kim","year":"2019","journal-title":"Inf. Syst. Res."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0580","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/MAHC.2010.44","article-title":"Cybernetics, automata studies, and the Dartmouth conference on artificial intelligence","volume":"33","author":"Kline","year":"2011","journal-title":"IEEE Ann. Hist. Comput."},{"doi-asserted-by":"crossref","unstructured":"Knapp, E.D. & Langill, J.T., 2015. Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, 2nd edition., Syngress (Elsevier), Massachusetts, USA.","key":"10.1016\/j.jsis.2024.101861_b0585","DOI":"10.1016\/B978-0-12-420114-9.00007-1"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0590","first-page":"47","article-title":"Defense mechanisms of biological cells: A framework for network security thinking","volume":"12","author":"Knapp","year":"2003","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0595","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1080\/0960085X.2022.2088414","article-title":"Adopting and integrating cyber-threat intelligence in a commercial organisation","volume":"32","author":"Kotsias","year":"2023","journal-title":"Eur. J. Inf. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0610","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1057\/ejis.2009.11","article-title":"Threat or coping appraisal: determinants of SMB executives\u2019 decision to adopt anti-malware software","volume":"18","author":"Lee","year":"2009","journal-title":"Eur. J. Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Lee, E. A., 2008 (May). Cyber physical systems: Design challenges. 11th IEEE international symposium on object and component-oriented real-time distributed computing (ISORC) (pp. 363-369). IEEE. Lexicon, 2011.","key":"10.1016\/j.jsis.2024.101861_b0615","DOI":"10.1109\/ISORC.2008.25"},{"unstructured":"Lexicon, The Cyber warfare Lexicon, v1.7.6. https:\/\/info.publicintelligence.net \/USSTRATCOM-CyberWarfareLexicon.pdf (accessed May 2024).","key":"10.1016\/j.jsis.2024.101861_b0620"},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0625","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1080\/07421222.2016.1267528","article-title":"Identifying and profiling key sellers in cyber carding community: AZSecure text mining system","volume":"33","author":"Li","year":"2016","journal-title":"J. Manag. Inf. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0630","doi-asserted-by":"crossref","first-page":"2337","DOI":"10.25300\/MISQ\/2022\/15642","article-title":"Discovering Emerging Threats in the Hacker Community: A Nonparametric Emerging Topic Detection Framework","volume":"46","author":"Li","year":"2022","journal-title":"MIS Q."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0635","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1177\/02683962231181146","article-title":"Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective","volume":"38","author":"Liang","year":"2023","journal-title":"J. Inf. Technol."},{"key":"10.1016\/j.jsis.2024.101861_b0640","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","article-title":"Avoidance of information technology threats: A theoretical perspective","author":"Liang","year":"2009","journal-title":"MIS Q."},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0645","first-page":"1","article-title":"Understanding security behaviors in personal computer usage: A threat avoidance perspective","volume":"11","author":"Liang","year":"2010","journal-title":"J. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0650","first-page":"30","article-title":"Escaping the computer-forensics certification maze: A survey of professional certifications","volume":"23","author":"Lim","year":"2008","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0655","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1080\/09636412.2020.1722853","article-title":"Demystifying the Quantum Threat: Infrastructure, Institutions, and Intelligence Advantage","volume":"29","author":"Lindsay","year":"2020","journal-title":"Secur. Stud."},{"key":"10.1016\/j.jsis.2024.101861_b0660","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s42354-020-0257-9","article-title":"PlanQK \u2014 Quantum Computing Meets Artificial Intelligence","volume":"4","author":"Linnhoff-Popien","year":"2020","journal-title":"Digit Welt"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0665","first-page":"2","article-title":"Rethinking fs-isac: An it security information sharing network model for the financial services sector","volume":"34","author":"Liu","year":"2014","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0670","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1111\/isj.12063","article-title":"Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust","volume":"25","author":"Lowry","year":"2015","journal-title":"Inf. Syst. J."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0680","first-page":"32","article-title":"ISO 17799:\u201c Best Practices\u201d in Information Security Management?","volume":"15","author":"Ma","year":"2005","journal-title":"Commun. Assoc. Inf. Syst."},{"unstructured":"Madnick, S. 2017. Preparing for the cyberattack that will knock out US power grids. Harvard Business Review 10 Study report by the University of Maryland retrieved from, https:\/\/eng.umd.edu\/news\/story\/study-hackers-attack-every-39-seconds (accessed 6 June 2021).","key":"10.1016\/j.jsis.2024.101861_b0685"},{"year":"2019","author":"Maurushat","series-title":"Ethical Hacking","key":"10.1016\/j.jsis.2024.101861_b0690"},{"year":"1959","author":"McCarthy","series-title":"Artificial intelligence","key":"10.1016\/j.jsis.2024.101861_b0695"},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0700","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1287\/isre.1100.0341","article-title":"When hackers talk: Managing information security under variable attack rates and knowledge dissemination","volume":"22","author":"Mookerjee","year":"2011","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0705","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1080\/0960085X.2020.1771222","article-title":"A multi-level influence model of COVID-19 themed cybercrime","volume":"29","author":"Naidoo","year":"2020","journal-title":"Eur. J. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0710","series-title":"Empirical explorations of the logic theory machine: a case study in heuristic","first-page":"218","author":"Newell","year":"1957"},{"volume":"Vol. 104, No. 9","year":"1972","author":"Newell","key":"10.1016\/j.jsis.2024.101861_b0715"},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0720","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1080\/07421222.2021.1962601","article-title":"Protecting against threats to information security: An attitudinal ambivalence perspective","volume":"38","author":"Ng","year":"2021","journal-title":"J. Manag. Inf. Syst."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0725","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1111\/isj.12318","article-title":"A comparison of features in a crowdsourced phishing warning system","volume":"31","author":"Nguyen","year":"2021","journal-title":"Inf. Syst. J."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0730","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1080\/0960085X.2021.1931494","article-title":"Learning not to take the bait: a longitudinal examination of digital training methods and overlearning on phishing susceptibility","volume":"32","author":"Nguyen","year":"2023","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0735","first-page":"18","article-title":"Multiple case study approach to identify aggravating variables of insider threats in information systems","volume":"35","author":"Nicho","year":"2014","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0740","series-title":"Framework for Improving Critical Infrastructure Cybersecurity","first-page":"41","author":"Nist","year":"2014"},{"issue":"7","key":"10.1016\/j.jsis.2024.101861_b0745","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2021.103507","article-title":"Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures","volume":"58","author":"Ogbanufe","year":"2021","journal-title":"Inf. Manag."},{"author":"Okeke","key":"10.1016\/j.jsis.2024.101861_b0750"},{"key":"10.1016\/j.jsis.2024.101861_b0755","first-page":"397","article-title":"Hacker Definitions in Information Systems Research","volume":"62","author":"Oliver","year":"2022","journal-title":"J. Comput. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0760","article-title":"Integrating Construal-level Theory in Designing Fear Appeals in ISS Research","volume":"45","author":"Orazi","year":"2019","journal-title":"Commun. Assoc. Inf. Syst."},{"unstructured":"Paganini, P. 2022. Anonymous announced that the affiliate group Black Rabbit World has leaked 28 GB of data stolen from the Central Bank of Russia. https:\/\/securityaffairs.co\/ wordpress\/129490\/hacking\/central-bank-of-russia-data-leak-anonymous.html (accessed 3 January 2023).","key":"10.1016\/j.jsis.2024.101861_b0765"},{"issue":"19","key":"10.1016\/j.jsis.2024.101861_b0770","first-page":"57","article-title":"Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm","volume":"60","author":"Paliwal","year":"2012","journal-title":"International Journal of Computer Applications"},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0775","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.im.2014.08.008","article-title":"Synthesizing information systems knowledge: A typology of literature reviews","volume":"52","author":"Par\u00e9","year":"2015","journal-title":"Inf. Manag."},{"year":"2012","author":"Pfleeger","series-title":"Analyzing Computer Security: A Threat\/vulnerability\/ counter-measure Approach","key":"10.1016\/j.jsis.2024.101861_b0785"},{"key":"10.1016\/j.jsis.2024.101861_b0790","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.jisa.2019.03.012","article-title":"Information security burnout: Identification of sources and mitigating factors from security demands and resources","volume":"46","author":"Pham","year":"2019","journal-title":"Journal of Information Security and Applications"},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0795","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1177\/0268396220918594","article-title":"Protecting a whale in a sea of phish","volume":"35","author":"Pienta","year":"2020","journal-title":"J. Inf. Technol."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0800","first-page":"46","article-title":"Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats","volume":"53","author":"Pigola","year":"2023","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0805","first-page":"1","article-title":"A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)","volume":"52","author":"Plachkinova","year":"2023","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"5","key":"10.1016\/j.jsis.2024.101861_b0810","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1016\/j.im.2014.03.009","article-title":"Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders","volume":"51","author":"Posey","year":"2014","journal-title":"Inf. Manag."},{"year":"2013","author":"Prior","series-title":"Risk Factsheet 9","key":"10.1016\/j.jsis.2024.101861_b0815"},{"unstructured":"Protection Group International, Breaking down the cost of a cyberattack, Sept 5, 2023 https:\/\/www.pgitl.com\/insights\/breaking-down-the-cost-of-a-cyber-attack (Accessed May 17, 2024).","key":"10.1016\/j.jsis.2024.101861_b0820"},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0825","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1080\/0960085X.2021.1944823","article-title":"Becoming a blockchain user: understanding consumers\u2019 benefits realisation to use blockchain-based applications","volume":"32","author":"Raddatz","year":"2023","journal-title":"Eur. J. Inf. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0830","first-page":"iii","article-title":"Celebrating 40 years of MIS quarterly: MISQ\u2019s history and future through the lenses of its editors-in-chief","volume":"40","author":"Rai","year":"2016","journal-title":"MIS Q."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0835","doi-asserted-by":"crossref","first-page":"247","DOI":"10.14257\/ijsia.2014.8.1.23","article-title":"A survey of cyber attack detection strategies","volume":"8","author":"Raiyn","year":"2014","journal-title":"International Journal of Security and Its Applications"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0840","first-page":"11","article-title":"Variations in information security cultures across professions: A qualitative study","volume":"33","author":"Ramachandran","year":"2013","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0845","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1287\/isre.1080.0174","article-title":"Choice and chance: A conceptual model of paths to information security compromise","volume":"20","author":"Ransbotham","year":"2009","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0850","first-page":"18","article-title":"Examining exploitability risk of vulnerabilities: a hazard model","volume":"46","author":"Roumani","year":"2020","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0855","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1057\/ejis.2014.7","article-title":"What literature review is not: diversity, boundaries and recommendations","volume":"23","author":"Rowe","year":"2014","journal-title":"Eur. J. Inf. Syst."},{"year":"2018","author":"Rutkowski","series-title":"Emotional and Cognitive Overload","key":"10.1016\/j.jsis.2024.101861_b0860"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0865","first-page":"295","article-title":"On contending with unruly neighbors in the global village: Viewing information systems as both weapon and target","volume":"28","author":"Salisbury","year":"2011","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0870","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1080\/07421222.2017.1394049","article-title":"Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence","volume":"34","author":"Samtani","year":"2017","journal-title":"J. Manag. Inf. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0875","doi-asserted-by":"crossref","first-page":"911","DOI":"10.25300\/MISQ\/2022\/15392","article-title":"Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model","volume":"46","author":"Samtani","year":"2022","journal-title":"MIS Q."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0880","first-page":"8","article-title":"Towards a more representative definition of cyber security","volume":"12","author":"Schatz","year":"2017","journal-title":"J. Digit. Forensic Secur. Law"},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0885","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1080\/07421222.2020.1790187","article-title":"The effectiveness of abstract versus concrete fear appeals in information security","volume":"37","author":"Schuetz","year":"2020","journal-title":"J. Manag. Inf. Syst."},{"year":"2018","author":"Schuld","series-title":"Supervised Learning with Quantum Computers, 17","key":"10.1016\/j.jsis.2024.101861_b0890"},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b0895","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1080\/00107514.2014.964942","article-title":"An introduction to quantum machine learning","volume":"56","author":"Schuld","year":"2015","journal-title":"Contemp. Phys."},{"doi-asserted-by":"crossref","unstructured":"Schulze, M. 2020. Cyber in war: Assessing the strategic, tactical, and operational utility of military cyber operations. 12th International Conference on Cyber Conflict (CyCon), 1300, 183-197.","key":"10.1016\/j.jsis.2024.101861_b0900","DOI":"10.23919\/CyCon49761.2020.9131733"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0905","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1080\/07421222.2019.1705511","article-title":"Impact of cyberattacks by malicious hackers on the competition in software markets","volume":"37","author":"Sen","year":"2020","journal-title":"J. Manag. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0910","article-title":"Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics","volume":"51","author":"Sen","year":"2022","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0920","first-page":"26","article-title":"The Paradox of Choice: Investigating Selection Strategies for Android Malware Datasets Using a Machine-learning Approach","volume":"46","author":"Sharma","year":"2020","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0925","first-page":"3","article-title":"Preventing state-led cyberattacks using the bright internet and internet peace principles","volume":"19","author":"Shin","year":"2018","journal-title":"J. Assoc. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b0930","article-title":"New EAC chairman will continue to focus on election security","author":"Shoorbajee","year":"2018","journal-title":"Cyberscoop."},{"issue":"13","key":"10.1016\/j.jsis.2024.101861_b0935","first-page":"46","article-title":"Critical analysis on advanced persistent threats","volume":"141","author":"Siddiqi","year":"2016","journal-title":"Int. J. Comput. Appl"},{"key":"10.1016\/j.jsis.2024.101861_b0940","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s10796-019-09949-3","article-title":"Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes","volume":"23","author":"Silic","year":"2021","journal-title":"Inf. Syst. Front."},{"unstructured":"Simmons, C., Shiva, S., Dasgupta, D., & Wu, Q. 2014. AVOIDIT: A cyber attack taxonomy. University of Memphis. Proceedings of the 9th Annual Symposium on Information Assurance (ASIA\u201914), Albany, NY, USA.","key":"10.1016\/j.jsis.2024.101861_b0945"},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0950","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1057\/palgrave.ejis.3000537","article-title":"An analysis of the traditional ISS approaches: implications for research and practice","volume":"14","author":"Siponen","year":"2005","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b0955","doi-asserted-by":"crossref","first-page":"379","DOI":"10.34190\/iccws.18.1.960","article-title":"Towards a scientific definition of cyber resilience","volume":"18","author":"Smith","year":"2023","journal-title":"International Conference on Cyber Warfare and Security"},{"key":"10.1016\/j.jsis.2024.101861_b0960","doi-asserted-by":"crossref","first-page":"463","DOI":"10.2307\/25750687","article-title":"Circuits of power: A study of mandated compliance to an ISS\u201c De Jure\u201d standard in a government organization","author":"Smith","year":"2010","journal-title":"MIS Q."},{"author":"Stubley","key":"10.1016\/j.jsis.2024.101861_b0970"},{"issue":"6","key":"10.1016\/j.jsis.2024.101861_b0975","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2020.103334","article-title":"Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system","volume":"57","author":"Syed","year":"2020","journal-title":"Inf. Manag."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b0980","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2022.103751","article-title":"Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective","volume":"60","author":"Tejay","year":"2023","journal-title":"Inf. Manag."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b0985","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1287\/isre.2017.0722","article-title":"Software diversity for improved network security: optimal distribution of software-based shared vulnerabilities","volume":"28","author":"Temizkan","year":"2017","journal-title":"Inf. Syst. Res."},{"key":"10.1016\/j.jsis.2024.101861_b0990","first-page":"6","article-title":"A framework for guiding and evaluating literature reviews","volume":"37","author":"Templier","year":"2015","journal-title":"Commun. Assoc. Inf. Syst."},{"year":"2016","author":"Tertrais","series-title":"Article 5 of the Washington Treaty: Its Origins","key":"10.1016\/j.jsis.2024.101861_b0995"},{"issue":"8","key":"10.1016\/j.jsis.2024.101861_b1000","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2022.103707","article-title":"Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering","volume":"59","author":"Tripathi","year":"2022","journal-title":"Inf. Manag."},{"unstructured":"Tzu, S. 2005. The art of war. Boston: Shambala. (Original work published in 5th century BCE).","key":"10.1016\/j.jsis.2024.101861_b1005"},{"unstructured":"United State Joint Force command, 2008. The Joint Operating Environment: Challenge and Implications for the Future of Joint force (2008). https:\/\/www.jcs.mil\/Portals\/36\/Documents\/Doctrine\/concepts\/joe_2008.pdf?ver=2017-12-30-132024-953(accessed 23 August 2023).","key":"10.1016\/j.jsis.2024.101861_b1010"},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b1020","first-page":"3","article-title":"Can secure behaviors be contagious? A two-stage investigation of the influence of herd behavior on security decisions","volume":"21","author":"Vedadi","year":"2020","journal-title":"J. Assoc. Inf. Syst."},{"issue":"8","key":"10.1016\/j.jsis.2024.101861_b1025","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2021.103526","article-title":"Herd behavior in information security decision-making","volume":"58","author":"Vedadi","year":"2021","journal-title":"Inf. Manag."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b1030","first-page":"20","article-title":"An Extended TOE Framework for Cybersecurity-adoption Decisions","volume":"47","author":"Wallace","year":"2020","journal-title":"Commun. Assoc. Inf. Syst."},{"unstructured":"Walls, A., Perkins, E., & Weiss, J. 2013. Definition: Cybersecurity, 5. Retrieved from Gartner.com website: https:\/\/www.gartner.com\/doc\/2510116\/definition-cybersecurity (accessed 23 August 2023).","key":"10.1016\/j.jsis.2024.101861_b1035"},{"key":"10.1016\/j.jsis.2024.101861_b1040","article-title":"Chilling Effect of the Enforcement of Computer Misuse Act: Evidence from Publicly Accessible Hack Forums","author":"Wang","year":"2023","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b1045","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1287\/isre.1120.0437","article-title":"The association between the disclosure and the realization of information security risk factors","volume":"24","author":"Wang","year":"2013","journal-title":"Inf. Syst. Res."},{"issue":"11","key":"10.1016\/j.jsis.2024.101861_b1050","first-page":"1","article-title":"Overconfidence in phishing email detection","volume":"17","author":"Wang","year":"2016","journal-title":"J. Assoc. Inf. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b1055","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1287\/isre.2016.0680","article-title":"Coping responses in phishing detection: an investigation of antecedents and consequences","volume":"28","author":"Wang","year":"2017","journal-title":"Inf. Syst. Res."},{"issue":"4","key":"10.1016\/j.jsis.2024.101861_b1060","doi-asserted-by":"crossref","DOI":"10.1016\/j.jsis.2022.101743","article-title":"Firm diversity and data breach risk: a longitudinal study","volume":"31","author":"Wang","year":"2022","journal-title":"J. Strateg. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b1065","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1080\/21642583.2019.1566800","article-title":"A survey on the recent development of securing the networked control systems","volume":"7","author":"Wang","year":"2019","journal-title":"Systems Science & Control Engineering"},{"doi-asserted-by":"crossref","unstructured":"Wen, S., N. He, &H. Yan. 2017. Detecting and Predicting APT Based on the Study of Cyber Kill Chain with Hierarchical Knowledge Reasoning. Proceedings of the 2017 VI International Conference on Network, Communication and Computing,115-119.","key":"10.1016\/j.jsis.2024.101861_b1070","DOI":"10.1145\/3171592.3171641"},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b1075","first-page":"17","article-title":"The WOSP model: Balanced information system design and evaluation","volume":"12","author":"Whitworth","year":"2003","journal-title":"Commun. Assoc. Inf. Syst."},{"year":"1948","author":"Wiener","series-title":"Cybernetics or Control and Communication in the Animal and the Machine","key":"10.1016\/j.jsis.2024.101861_b1080"},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b1085","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1111\/isj.12129","article-title":"Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives","volume":"28","author":"Willison","year":"2018","journal-title":"Inf. Syst. J."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b1090","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1080\/07421222.2016.1205934","article-title":"Perverse effects in defense of computer systems: When more is less","volume":"33","author":"Wolff","year":"2016","journal-title":"J. Manag. Inf. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b1095","first-page":"3","article-title":"Navigating the SolarWinds Supply Chain Attack","volume":"56","author":"Wolff","year":"2021","journal-title":"The Procurement Lawyer"},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b1100","first-page":"2","article-title":"Managing information security outsourcing in a dynamic cooperation environment","volume":"22","author":"Wu","year":"2021","journal-title":"J. Assoc. Inf. Syst."},{"key":"10.1016\/j.jsis.2024.101861_b1105","article-title":"The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation","author":"Xu","year":"2023","journal-title":"Inf. Syst. J."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b1110","first-page":"8","article-title":"A comprehensive method to assess work system security risk","volume":"34","author":"Yadav","year":"2014","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b1115","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1057\/jit.2010.4","article-title":"The impact of information security events on the stock value of firms: The effect of contingency factors","volume":"26","author":"Yayla","year":"2011","journal-title":"J. Inf. Technol."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b1120","doi-asserted-by":"crossref","DOI":"10.25300\/MISQ\/2020\/15477","article-title":"Is cybersecurity a team sport? A multilevel examination of workgroup information security effectiveness","volume":"44","author":"Yoo","year":"2020","journal-title":"MIS Q."},{"issue":"2","key":"10.1016\/j.jsis.2024.101861_b1125","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MNET.2016.7437026","article-title":"Privacy and performance trade-off in cyber-physical systems","volume":"30","author":"Zhang","year":"2016","journal-title":"IEEE Netw."},{"key":"10.1016\/j.jsis.2024.101861_b1130","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102288","article-title":"Three decades of deception techniques in active cyber defense-retrospect and outlook","volume":"106","author":"Zhang","year":"2021","journal-title":"Comput. Secur."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b1135","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1177\/02683962231155937","article-title":"Toward a taxonomy of corporate data protection malpractices and their causal mechanisms: A regulatory view","volume":"38","author":"Zhao","year":"2023","journal-title":"J. Inf. Technol."},{"issue":"1","key":"10.1016\/j.jsis.2024.101861_b1140","doi-asserted-by":"crossref","first-page":"123","DOI":"10.2753\/MIS0742-1222300104","article-title":"Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements","volume":"30","author":"Zhao","year":"2013","journal-title":"J. Manag. Inf. Syst."},{"issue":"3","key":"10.1016\/j.jsis.2024.101861_b1145","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1080\/07421222.2020.1790185","article-title":"Understanding security vulnerability awareness, Firm incentives, and ICT development in Pan-Asia","volume":"37","author":"Zhuang","year":"2020","journal-title":"J. Manag. Inf. Syst."}],"container-title":["The Journal of Strategic Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S096386872400043X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S096386872400043X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T11:50:16Z","timestamp":1732103416000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S096386872400043X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":220,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["S096386872400043X"],"URL":"https:\/\/doi.org\/10.1016\/j.jsis.2024.101861","relation":{},"ISSN":["0963-8687"],"issn-type":[{"type":"print","value":"0963-8687"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The whole of cyber defense: Syncing practice and theory","name":"articletitle","label":"Article Title"},{"value":"The Journal of Strategic Information Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jsis.2024.101861","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"101861"}}