{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T08:39:30Z","timestamp":1726475970928},"reference-count":62,"publisher":"Informa UK Limited","issue":"3","funder":[{"name":"HK Public Policy Research Funding Scheme"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2020,7,2]]},"DOI":"10.1080\/07421222.2020.1790185","type":"journal-article","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T08:16:31Z","timestamp":1605687391000},"page":"668-693","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":11,"title":["Understanding Security Vulnerability Awareness, Firm Incentives, and ICT Development in Pan-Asia"],"prefix":"10.1080","volume":"37","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4950-8481","authenticated-orcid":false,"given":"Yunhui","family":"Zhuang","sequence":"first","affiliation":[{"name":"Department of Information Systems, College of Business, City University of Hong Kong, Kowloon, Hong Kong"}]},{"given":"Yunsik","family":"Choi","sequence":"additional","affiliation":[{"name":"AITRICS, Seoul, Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5899-5299","authenticated-orcid":false,"given":"Shu","family":"He","sequence":"additional","affiliation":[{"name":"School of Business, University of Connecticut, Connecticut, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8961-8357","authenticated-orcid":false,"given":"Alvin Chung Man","family":"Leung","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Business, City University of Hong Kong, Kowloon, Hong Kong"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0657-6898","authenticated-orcid":false,"given":"Gene Moo","family":"Lee","sequence":"additional","affiliation":[{"name":"Sauder School of Business, University of British Columbia, Vancouver, British Columbia, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7371-8991","authenticated-orcid":false,"given":"Andrew","family":"Whinston","sequence":"additional","affiliation":[{"name":"McCombs School of Business, University of Texas at Austin, Austin, Texas, USA"}]}],"member":"301","published-online":{"date-parts":[[2020,11,18]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1111\/0034-6527.00321"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(77)90073-4"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.2307\/1879431"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4j72"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1145\/2629487"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1086\/344122"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010041819361"},{"key":"cit0008","unstructured":"Baker, J. The technology\u2013organization\u2013environment framework. In, Dwivedi, Y.K., Wade, M.R., and Schneberger, S.L. (eds.), Information Systems Theory: Explaining and Predicting Our Digital Society, Vol. 1, New York, NY: Springer New York, 2012, pp. 231\u2013245."},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2009.09.001"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.2307\/248887"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2005.11045844"},{"key":"cit0012","first-page":"24","author":"Bose I.","year":"2007","journal-title":"Communications of the Association for Information Systems 19"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.04.006"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/14192"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1007\/s11142-007-9032-5"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001257"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.1.09"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"cit0019","volume-title":"Economics of malware: Security decisions, incentives and externalities. OECD Science, Technology and Industry Working Papers, Directorate for Science, Technology and Industry, OECD","author":"Eeten M.","year":"2008"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4541-9"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"cit0022","first-page":"1","volume":"19","author":"Gordon L.A.","year":"2003","journal-title":"Computer Security Journal"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.2307\/25750692"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyw011"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1257\/jep.9.2.85"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.2.08"},{"key":"cit0027","volume-title":"Principal Component Analysis","author":"Jolliffe I.T.","year":"2002"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093568"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.3.02"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00073-8"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"cit0032","first-page":"1043","volume":"42","author":"Kwon J.","year":"2018","journal-title":"MIS Quarterly"},{"issue":"2","key":"cit0033","first-page":"iii","volume":"39","author":"Lee J.K.","year":"2015","journal-title":"MIS Quarterly"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00484"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0587"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2010.10.002"},{"issue":"1","key":"cit0038","first-page":"45","volume":"81","author":"Moore T.","year":"2011","journal-title":"Communications & Strategies"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1257\/jep.23.3.3"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1214\/12-AOS1008"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01478.x"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250206"},{"key":"cit0043","volume-title":"Spam and botnet reputation randomized control trials and policy. The 41st Research Conference on Communication, Information and Internet Policy, George Mason University","author":"Quarterman J.S.","year":"2013"},{"key":"cit0044","unstructured":"Rubin, D.B. Basic concepts of statistical inference for causal effects in experiments and observational studies. Cambridge, MA: Harvard University, 2004, pp. 1\u2013140."},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1002\/sec.587"},{"key":"cit0046","volume-title":"Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives","author":"Santanam R.","year":"2010"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1063315"},{"key":"cit0048","doi-asserted-by":"crossref","unstructured":"Shetty, N.; Schwartz, G.; and Walrand, J. Can competitive insurers improve network security? In, Acquisti, A., Smith, S.W., and Sadeghi, A.R. (eds.), Trust and Trustworthy Computing, Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 308\u2013322.","DOI":"10.1007\/978-3-642-13869-0_23"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1002\/sim.4780100110"},{"key":"cit0050","unstructured":"Symantec. Internet security threat report 2016. Mountain View, CA, 2016."},{"key":"cit0051","unstructured":"Symantec. Internet security threat report 2017. Mountain View, CA, 2017."},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.05.005"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1111\/poms.13119"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1002\/nem.753"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0581"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.4.307"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0522"},{"key":"cit0058","volume-title":"Aassal, A.E.; Verma, R.; Moraes, L.F.T.D.; and Das, A. Diverse datasets and a customizable benchmarking framework for phishing. In Proceedings of the Sixth International Workshop on Security and Privacy Analytics","author":"Zeng V.","year":"2020"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-017-0279-7"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0045"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000475"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045797"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2020.1790185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T05:59:06Z","timestamp":1620799146000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2020.1790185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,2]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7,2]]}},"alternative-id":["10.1080\/07421222.2020.1790185"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2020.1790185","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}