{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:36:59Z","timestamp":1726760219769},"reference-count":147,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T00:00:00Z","timestamp":1424736000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,5]]},"abstract":"Abstract<\/jats:title>Research shows that organisational efforts to protect their information assets from employee security threats do not always reach their full potential and may actually encourage the behaviours they attempt to thwart, such as reactive computer abuse (CA). To better understand this dilemma, we use fairness theory (FT) and reactance theory (RT) to explain why employees may blame organisations for and retaliate against enhanced information security policies (ISPs). We tested our model with 553 working professionals and found support for most of it. Our results show that organisational trust can decrease reactive CA. FT suggests that explanation adequacy (EA) is an important factor that builds trust after an event. Our results also suggest that trust both fully mediates the relationship between EA and CA and partially mediates the relationship between perceived freedom restrictions related to enhanced ISPs and reactive CA. EA also had a strong negative relationship with freedom restrictions. Moreover, organisational security education, training and awareness (SETA) initiatives decreased the perceptions of external control and freedom restrictions and increased EA, and advance notification of changes increased EA. We also included 14 control variables and rival explanations to determine with more confidence what drove reactive CA in our context. Notably, the deterrence theory (DT)\u2010based constructs of sanction severity, certainty and celerity had no significant influence on reactive CA. We provide support for the importance of respectful communication efforts and SETA programmes, coupled with maximising employee rights and promoting trust and fairness to decrease reactive CA. These efforts can protect organisations from falling victim to their own organisational security efforts.<\/jats:p>","DOI":"10.1111\/isj.12063","type":"journal-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T18:34:45Z","timestamp":1424802885000},"page":"193-273","source":"Crossref","is-referenced-by-count":135,"title":["Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust"],"prefix":"10.1111","volume":"25","author":[{"given":"Paul Benjamin","family":"Lowry","sequence":"first","affiliation":[{"name":"College of Business City University of Hong Kong P7718, Academic Building I, 83 Tat Chee Avenue Kowloon Tong Hong Kong, China"}]},{"given":"Clay","family":"Posey","sequence":"additional","affiliation":[{"name":"Information Systems, Statistics and Management Science, Culverhouse College of Commerce The University of Alabama Box\u00a0870226 Tuscaloosa AL 35487 USA"}]},{"given":"Rebecca (Becky) J.","family":"Bennett","sequence":"additional","affiliation":[{"name":"Department of Management, College of Administration and Business Louisiana Tech University 502 W. Texas Avenue, P.O. Box\u00a010318 Ruston LA 71272 USA"}]},{"given":"Tom L.","family":"Roberts","sequence":"additional","affiliation":[{"name":"School of Accountancy and Information Systems, College of Administration and Business Louisiana Tech University P.O. Box\u00a010318, 502 W. Texas Avenue Ruston LA 71272 USA"}]}],"member":"311","published-online":{"date-parts":[[2015,2,24]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/10717919070130011101"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.4.797"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.91.1.221"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0749-5978(02)00037-7"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2011.00391.x"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.006"},{"key":"e_1_2_10_9_1","first-page":"221","volume-title":"Dysfunctional Behavior in Organizations: Violent and Deviant Behavior","author":"Bennett R.J.","year":"1998"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.85.3.349"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.141601"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"e_1_2_10_13_1","volume-title":"A Theory of Psychological Reactance","author":"Brehm J.W.","year":"1966"},{"key":"e_1_2_10_14_1","volume-title":"Psychological Reactance: A Theory of Freedom and Control","author":"Brehm S.S.","year":"1981"},{"key":"e_1_2_10_15_1","unstructured":"Brenner B.(2009)Global state of information security survey 2010.CIOMagazine CSOMagazine and PricewaterhouseCoopers Retrieved date: March 21 2013. URL:http:\/\/nouvelstrategies.com\/E\/Management\u2010Awareness\/Entries\/2010\/4\/1_PWC_Global_State_of_Information_Security_2010.html"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/256835"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393738"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650323"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021611601240"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.31"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290305"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.009"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.3.386"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.3.425"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2007.0572"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.4.909"},{"key":"e_1_2_10_28_1","first-page":"3","article-title":"The effects of security education training and awareness programs and individual characteristics on end user security tool usage","volume":"5","author":"Crossler R.E.","year":"2009","journal-title":"Journal of Information System Security"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00383.x"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_2_10_33_1","first-page":"3","article-title":"Towards a best fit between organizational security countermeasures and information systems misuse behaviors","volume":"3","author":"D'Arcy J.","year":"2007","journal-title":"Journal of Information System Security"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00219.x"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2006.00500.x"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00289.x"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.87.4.611"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1201\/EBK0849382314.ch1"},{"key":"e_1_2_10_40_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781452225777"},{"key":"e_1_2_10_41_1","first-page":"1","volume-title":"Advances in Organizational Justice","author":"Folger R.","year":"2001"},{"key":"e_1_2_10_42_1","first-page":"129","volume-title":"Research in Organizational Behavior","author":"Folger R.","year":"1992"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvbe.2001.1803"},{"key":"e_1_2_10_45_1","first-page":"130","volume-title":"Handbook of Research Methods in Personality Psychology","author":"Fraley R.C.","year":"2007"},{"key":"e_1_2_10_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"e_1_2_10_47_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01605"},{"key":"e_1_2_10_48_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2009.35713319"},{"key":"e_1_2_10_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.2001.tb00227.x"},{"key":"e_1_2_10_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-005-4709-9"},{"key":"e_1_2_10_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.75.5.561"},{"key":"e_1_2_10_52_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1993.1004"},{"key":"e_1_2_10_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.10.003"},{"key":"e_1_2_10_54_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910978112"},{"key":"e_1_2_10_55_1","doi-asserted-by":"crossref","first-page":"521","DOI":"10.17705\/1jais.00342","article-title":"The role of restrictiveness of use in determining ethical and legal awareness of unauthorized file sharing","volume":"14","author":"Hansen J.","year":"2013","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_10_56_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203781159"},{"key":"e_1_2_10_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"e_1_2_10_58_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_2_10_59_1","first-page":"166","article-title":"An application of deterrence theory to software piracy","volume":"12","author":"Higgins G.","year":"2005","journal-title":"Journal of Criminal Justice and Popular Culture"},{"key":"e_1_2_10_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639620490497947"},{"key":"e_1_2_10_61_1","first-page":"2","article-title":"Crime by computer: correlates of software piracy and unauthorized account access","volume":"4","author":"Hollinger R.C.","year":"1993","journal-title":"Security Journal"},{"key":"e_1_2_10_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.12.005"},{"key":"e_1_2_10_63_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.2002.tb00113.x"},{"key":"e_1_2_10_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953122.1953142"},{"key":"e_1_2_10_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2010.00361.x"},{"key":"e_1_2_10_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"e_1_2_10_67_1","doi-asserted-by":"publisher","DOI":"10.2307\/3172761"},{"key":"e_1_2_10_68_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"e_1_2_10_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"e_1_2_10_70_1","volume-title":"Interpersonal Relations: A Theory of Interdependence","author":"Kelley H.H.","year":"1978"},{"key":"e_1_2_10_71_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.87.5.916"},{"key":"e_1_2_10_72_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.87.2.312"},{"key":"e_1_2_10_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"key":"e_1_2_10_74_1","doi-asserted-by":"publisher","DOI":"10.2307\/259288"},{"key":"e_1_2_10_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.12.005"},{"key":"e_1_2_10_76_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.161"},{"key":"e_1_2_10_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0191-3085(02)24006-X"},{"key":"e_1_2_10_78_1","doi-asserted-by":"publisher","DOI":"10.2307\/249574"},{"key":"e_1_2_10_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2014.2312452"},{"key":"e_1_2_10_80_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12043"},{"key":"e_1_2_10_81_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21705"},{"key":"e_1_2_10_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-013-1705-3"},{"key":"e_1_2_10_83_1","unstructured":"Lowry P.B. Teh N. Molyneux B.&Bui S.N.(2010a)Using theories of formal control mandatoriness and reactance to explain working professionals' intent to comply with new IT security policies.The Dewald Roode Workshop on Information Systems Security Research IFIP WG8.11\/WG11.n 2010 pp.278\u2013316. IFIP WG 8.11 \/ 11.13 October 8\u20139 Waltham MA."},{"key":"e_1_2_10_84_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2009.00334.x"},{"key":"e_1_2_10_85_1","doi-asserted-by":"publisher","DOI":"10.2307\/23044045"},{"key":"e_1_2_10_86_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2008.00302.x"},{"key":"e_1_2_10_87_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00419.x"},{"key":"e_1_2_10_88_1","doi-asserted-by":"publisher","DOI":"10.2307\/259295"},{"key":"e_1_2_10_89_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.4.1159"},{"key":"e_1_2_10_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.04.005"},{"key":"e_1_2_10_91_1","doi-asserted-by":"crossref","first-page":"17","DOI":"10.21236\/ADA482452","volume-title":"The \u2018Big Picture\u2019 of Insider IT Sabotage Across U.S. Critical Infrastructures","author":"Moore A.P.","year":"2008"},{"key":"e_1_2_10_92_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.10"},{"key":"e_1_2_10_93_1","volume-title":"Psychometric Theory","author":"Nunnally J.C.","year":"1994"},{"key":"e_1_2_10_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/07418828700089271"},{"key":"e_1_2_10_95_1","doi-asserted-by":"publisher","DOI":"10.2307\/3053879"},{"key":"e_1_2_10_96_1","doi-asserted-by":"publisher","DOI":"10.2307\/3054128"},{"key":"e_1_2_10_97_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045759"},{"key":"e_1_2_10_98_1","unstructured":"Peterson D.(2011)Deltek: Cybersecurity spending should grow. Retrieved date: June 6 2012 URL:http:\/\/www.washingtonpost.com\/business\/capitalbusiness\/deltek\u2010cybersecurity\u2010spending\u2010should\u2010grow\/2011\/12\/05\/gIQApTQtiO_story.html"},{"key":"e_1_2_10_99_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148814"},{"key":"e_1_2_10_100_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-009-0247-1"},{"key":"e_1_2_10_101_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_2_10_102_1","unstructured":"Ponemon Institute(2014)2014 cost of data breach study: global analysis.Ponemon Institute and IBM May 2014 pp.1\u201328. Retrieved date: November 20 2014 URL:http:\/\/www\u2010935.ibm.com\/services\/us\/en\/it\u2010services\/security\u2010services\/cost\u2010of\u2010data\u2010breach\/"},{"key":"e_1_2_10_103_1","doi-asserted-by":"publisher","DOI":"10.1080\/1478601X.2011.561648"},{"key":"e_1_2_10_104_1","first-page":"24","article-title":"When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse","volume":"7","author":"Posey C.","year":"2011","journal-title":"Information System Security"},{"key":"e_1_2_10_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.002"},{"key":"e_1_2_10_106_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.09"},{"key":"e_1_2_10_107_1","unstructured":"PRC(2013)Chronology of data breaches security breaches 2005\u2013present. Retrieved date: November 4 2014 URL:http:\/\/www.privacyrights.org\/data\u2010breach"},{"key":"e_1_2_10_108_1","unstructured":"PWC(2015)The Global State of Information Security Survey 2015.PricewaterhouseCoopers Retrieved date: November 4 2014 URL:http:\/\/www.pwc.com\/gx\/en\/consulting\u2010services\/information\u2010security\u2010survey\/"},{"key":"e_1_2_10_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2009.08.001"},{"key":"e_1_2_10_110_1","unstructured":"Ringle C.M. Wende S.&Will S.(2005)SmartPLS 2.0 (M3) Beta. Retrieved date: September 17 2010 URL:http:\/\/www.smartpls.de"},{"key":"e_1_2_10_111_1","unstructured":"Rivera J.&van derMeulen R.(2014)Gartner says worldwide security market to grow 8.7 percent in 2015.Gartner Retrieved date: November 12 2014 URL:http:\/\/www.gartner.com\/newsroom\/id\/2512215"},{"key":"e_1_2_10_112_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393868"},{"key":"e_1_2_10_113_1","doi-asserted-by":"publisher","DOI":"10.2307\/256693"},{"key":"e_1_2_10_114_1","first-page":"1","volume-title":"Trends in Organizational Behavior","author":"Robinson S.L.","year":"1998"},{"key":"e_1_2_10_115_1","doi-asserted-by":"publisher","DOI":"10.2307\/256963"},{"key":"e_1_2_10_116_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.84.4.514"},{"key":"e_1_2_10_117_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1994.1041"},{"key":"e_1_2_10_118_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.3.444"},{"key":"e_1_2_10_119_1","first-page":"41","article-title":"Impact of negative message framing on security adoption","volume":"51","author":"Shropshire J.","year":"2010","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_2_10_120_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"e_1_2_10_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610289"},{"key":"e_1_2_10_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.35"},{"key":"e_1_2_10_123_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750688"},{"key":"e_1_2_10_124_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.82.3.434"},{"key":"e_1_2_10_125_1","volume-title":"The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets \u2013 Without Compromising Employee Privacy or Trust","author":"Stanton J.M.","year":"2006"},{"key":"e_1_2_10_126_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392337"},{"key":"e_1_2_10_127_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"e_1_2_10_128_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01324"},{"key":"e_1_2_10_129_1","doi-asserted-by":"publisher","DOI":"10.2307\/249307"},{"key":"e_1_2_10_130_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018726707081658"},{"key":"e_1_2_10_131_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2009.35713291"},{"key":"e_1_2_10_132_1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.19030\/rbis.v12i1.4399","article-title":"Cyber\u2010slacking: self\u2010control, prior behavior and the impact of deterrence measures","volume":"12","author":"Ugrin J.C.","year":"2008","journal-title":"Review of Business Information Systems"},{"key":"e_1_2_10_133_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.005"},{"key":"e_1_2_10_134_1","unstructured":"US Dept. of Labor(2009)Other workplace standards: notices for plant closings and mass layoffs.U.S.Department of Labor Retrieved date: February 12 2013 URL:http:\/\/www.dol.gov\/compliance\/guide\/layoffs.htm"},{"key":"e_1_2_10_135_1","unstructured":"van derMeulen R.(2009)Security software and services spending will outpace other IT spending areas in 2010.Gartner Retrieved date: March 21 2013 URL:http:\/\/www.gartner.com\/newsroom\/id\/1167612"},{"key":"e_1_2_10_136_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1379(200002)21:1<3::AID-JOB47>3.0.CO;2-6"},{"key":"e_1_2_10_137_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290410"},{"key":"e_1_2_10_138_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2012010102"},{"key":"e_1_2_10_139_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010710022834"},{"key":"e_1_2_10_140_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.6.1063"},{"key":"e_1_2_10_141_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.92.4.548"},{"key":"e_1_2_10_142_1","doi-asserted-by":"publisher","DOI":"10.2307\/259292"},{"key":"e_1_2_10_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859675"},{"key":"e_1_2_10_144_1","volume-title":"Principles of Information Security","author":"Whitman M.E.","year":"2009"},{"key":"e_1_2_10_145_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.01"},{"key":"e_1_2_10_146_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910993999"},{"key":"e_1_2_10_147_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0266"},{"key":"e_1_2_10_148_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230404"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12063","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T06:56:52Z","timestamp":1694501812000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12063"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,24]]},"references-count":147,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["10.1111\/isj.12063"],"URL":"https:\/\/doi.org\/10.1111\/isj.12063","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,24]]}}}