{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T11:47:57Z","timestamp":1698320877912},"reference-count":77,"publisher":"American Accounting Association","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,1]]},"abstract":"ABSTRACT<\/jats:title>\n The 2008 financial crisis highlighted the significant, vertical pay disparity between chief executive officers (CEOs) and all other employees. Following equity theory, prior research finds negative associations between vertical pay disparity and job satisfaction and performance (i.e., more errors). We build on this research to investigate if vertical pay disparity between the CEO and employees\/other executives is a previously unidentified determinant of data security breaches (DSBs). Results suggest that firms with large, vertical pay disparities are more likely to be breached, are associated with more DSBs, and are more likely to be associated with internal DSBs. We also find some evidence of remediation through narrowing the pay disparity between CEOs and employees\/other executives after the DSB. Our findings contribute to the growing accounting information systems (AIS) cybersecurity literature, extend equity theory to a new context, and should be of interest to AIS governance researchers and stakeholders.<\/jats:p>","DOI":"10.2308\/isys-2021-040","type":"journal-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T18:03:23Z","timestamp":1689962603000},"page":"11-32","source":"Crossref","is-referenced-by-count":0,"title":["Firm-Level Pay Disparity and Breach Risk"],"prefix":"10.2308","volume":"37","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1338-0981","authenticated-orcid":false,"given":"Chris Zhijian","family":"He","sequence":"first","affiliation":[{"name":"Marquette University"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8571-9775","authenticated-orcid":false,"given":"Tianpei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Nebraska at Kearney"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5080-2496","authenticated-orcid":false,"given":"Robert","family":"Pinsker","sequence":"additional","affiliation":[{"name":"Florida Atlantic University"}]}],"member":"1112","published-online":{"date-parts":[[2023,10,25]]},"reference":[{"issue":"1","key":"2023102515554072800_B1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1080\/07421222.1989.11517847","article-title":"A study of staff turnover, acquisition, and assimilation and their impact on software development cost and schedule","volume":"6","author":"Abdel-Hamid,","year":"1989","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"2023102515554072800_B2","doi-asserted-by":"crossref","first-page":"52S","DOI":"10.1177\/001979399004300304","article-title":"Does performance-based managerial compensation affect corporate performance?","volume":"43","author":"Abowd,","year":"1990","journal-title":"Industrial and Labor Relations Review"},{"key":"2023102515554072800_B3","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/S0065-2601(08)60108-2","article-title":"Inequity in social exchange","volume":"2","author":"Adams,","year":"1965","journal-title":"Advances in Experimental Social Psychology"},{"issue":"3","key":"2023102515554072800_B4","first-page":"259","article-title":"An analytical survey on network security enhancement services","volume":"9","author":"Ahirwar,","year":"2011","journal-title":"International Journal of Computer Science and Information Security"},{"issue":"2","key":"2023102515554072800_B5","doi-asserted-by":"crossref","first-page":"255","DOI":"10.2307\/2937787","article-title":"The fair wage-effort hypothesis and unemployment","volume":"105","author":"Akerlof,","year":"1990","journal-title":"The Quarterly Journal of Economics"},{"key":"2023102515554072800_B6","unstructured":"American Institute of Certified Public Accountants. 2022. SOC for cybersecurity. https:\/\/us.aicpa.org\/interestareas\/frc\/assuranceadvisoryservices\/aicpacybersecurityinitiative"},{"issue":"3","key":"2023102515554072800_B7","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1007\/s11142-018-9452-4","article-title":"Do firms underreport information on cyber-attacks? Evidence from capital markets","volume":"23","author":"Amir,","year":"2018","journal-title":"Review of Accounting Studies"},{"key":"2023102515554072800_B8","first-page":"1557","article-title":"Explaining pay without performance: The tournament alternative","volume":"54","author":"Anabtawi,","year":"2005","journal-title":"Emory Law Journal"},{"issue":"3","key":"2023102515554072800_B9","doi-asserted-by":"crossref","first-page":"893","DOI":"10.25300\/MISQ\/2017\/41.3.10","article-title":"When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches","volume":"41","author":"Angst,","year":"2017","journal-title":"MIS Quarterly"},{"issue":"2","key":"2023102515554072800_B10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2308\/TAR-2019-1033","article-title":"The role of peer events in corporate governance: Evidence from data breaches","volume":"97","author":"Ashraf,","year":"2022","journal-title":"The Accounting Review"},{"key":"2023102515554072800_B11","unstructured":"Aytes,\n K.\n , S.Byers, and M.Santhanakrishnan. 2006. The economic impact of information security breaches: Firm value and intra-industry effects. Americas Conference on Information Systems Proceedings, Acapulco, Mexico, August 3\u20136."},{"issue":"3","key":"2023102515554072800_B12","doi-asserted-by":"crossref","first-page":"309","DOI":"10.2308\/isys-52532","article-title":"The impact of information security breach incidents on CIO turnover","volume":"33","author":"Banker,","year":"2019","journal-title":"Journal of Information Systems"},{"key":"2023102515554072800_B13","volume-title":"Pay Without Performance: The Unfulfilled Promise of Executive Compensation","author":"Bebchuk,","year":"2004"},{"issue":"3","key":"2023102515554072800_B14","doi-asserted-by":"crossref","first-page":"729","DOI":"10.25300\/MISQ\/2017\/41.3.04","article-title":"Operational IT failures, IT value-destruction, and board-level IT governance changes","volume":"41","author":"Benaroch,","year":"2017","journal-title":"MIS Quarterly"},{"issue":"1","key":"2023102515554072800_B15","doi-asserted-by":"crossref","first-page":"25","DOI":"10.2307\/256872","article-title":"The performance effects of pay dispersion on individuals and organizations","volume":"42","author":"Bloom,","year":"1999","journal-title":"Academy of Management Journal"},{"issue":"1","key":"2023102515554072800_B16","doi-asserted-by":"crossref","first-page":"33","DOI":"10.2307\/3069283","article-title":"The relationships among organizational context, pay dispersion, and managerial turnover","volume":"45","author":"Bloom,","year":"2002","journal-title":"Academy of Management Journal"},{"issue":"1","key":"2023102515554072800_B17","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1002\/job.454","article-title":"Old faces, new places: Equity theory in cross-cultural contexts","volume":"29","author":"Bolino,","year":"2008","journal-title":"Journal of Organizational Behavior"},{"issue":"1","key":"2023102515554072800_B18","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.jbusvent.2014.07.006","article-title":"How should we divide the pie? Equity distribution and its impact on entrepreneurial teams","volume":"30","author":"Breugst,","year":"2015","journal-title":"Journal of Business Venturing"},{"issue":"2","key":"2023102515554072800_B19","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1017\/S0022109017000163","article-title":"CEO tournaments: A cross-country analysis of causes, cultural influences, and consequences","volume":"52","author":"Burns,","year":"2017","journal-title":"Journal of Financial and Quantitative Analysis"},{"key":"2023102515554072800_B20","doi-asserted-by":"crossref","unstructured":"Castellano,\n N. G.\n , C.Felden, and R. E.Pinsker. 2021. Shadow IT behavior of financial executives in Germany and Italy as an antecedent to internal data security breaches. Presented at the American Accounting Association Accounting Information Systems Virtual Midyear Meeting, February 4\u20136.","DOI":"10.24251\/HICSS.2022.765"},{"issue":"2","key":"2023102515554072800_B21","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1108\/RAF-10-2018-0207","article-title":"CEO-employee pay gap and firm R&D efficiency","volume":"19","author":"Chan,","year":"2020","journal-title":"Review of Accounting and Finance"},{"issue":"3","key":"2023102515554072800_B22","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1017\/S0022109013000306","article-title":"Executive pay disparity and the cost of equity capital","volume":"48","author":"Chen,","year":"2013","journal-title":"Journal of Financial and Quantitative Analysis"},{"key":"2023102515554072800_B23","article-title":"Do high CEO pay ratios destroy firm value?","author":"Cheng,","year":"2017"},{"issue":"4","key":"2023102515554072800_B24","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1177\/0149206313503015","article-title":"Minding the gap: Antecedents and consequences of top management-to-worker pay dispersion","volume":"42","author":"Connelly,","year":"2016","journal-title":"Journal of Management"},{"issue":"2","key":"2023102515554072800_B25","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1093\/rfs\/hhq113","article-title":"Shareholder activism and CEO pay","volume":"24","author":"Ertimur,","year":"2011","journal-title":"Review of Financial Studies"},{"issue":"1","key":"2023102515554072800_B26","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1093\/rof\/rfn011","article-title":"Shareholder rights, boards, and CEO compensation","volume":"13","author":"Fahlenbrach,","year":"2009","journal-title":"Review of Finance"},{"issue":"8","key":"2023102515554072800_B27","doi-asserted-by":"crossref","first-page":"3258","DOI":"10.1016\/j.jbankfin.2013.03.003","article-title":"The determinants and effects of CEO-employee pay disparity","volume":"37","author":"Faleye,","year":"2013","journal-title":"Journal of Banking & Finance"},{"key":"2023102515554072800_B28","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.accinf.2018.11.001","article-title":"Does CIO risk appetite matter? Evidence from information security breach incidents","volume":"32","author":"Feng,","year":"2019","journal-title":"International Journal of Accounting Information Systems"},{"issue":"2\u20133","key":"2023102515554072800_B29","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.jacceco.2009.09.004","article-title":"Internal control and management guidance","volume":"48","author":"Feng,","year":"2009","journal-title":"Journal of Accounting and Economics"},{"issue":"10","key":"2023102515554072800_B30","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1002\/smj.848","article-title":"Sharing the wealth: Social comparisons and pay dispersion in the CEO's top team","volume":"31","author":"Fredrickson,","year":"2010","journal-title":"Strategic Management Journal"},{"issue":"1","key":"2023102515554072800_B31","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1111\/j.1540-6296.2010.01178.x","article-title":"The effect of data breaches on shareholder wealth","volume":"13","author":"Gatzlaff,","year":"2010","journal-title":"Risk Management and Insurance Review"},{"issue":"5\u20136","key":"2023102515554072800_B32","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1111\/jbfa.12426","article-title":"How does the executive pay gap influence audit fees? The roles of R&D investment and institutional ownership","volume":"47","author":"Ge,","year":"2020","journal-title":"Journal of Business Finance & Accounting"},{"key":"2023102515554072800_B33","unstructured":"Ghosh,\n I.\n \n \n 2019. Visualizing the massive cost of cybercrime. https:\/\/www.weforum.org\/agenda\/2019\/11\/cost-cybercrime-cybersecurity\/"},{"key":"2023102515554072800_B34","unstructured":"Goodman,\n S.\n \n \n 2020. Human error to blame for 9 in 10 UK cyber data breaches in 2019. https:\/\/www.cybsafe.com\/press-releases\/human-error-to-blame-for-9-in-10-uk-cyber-data-breaches-in-2019\/"},{"key":"2023102515554072800_B35","author":"Green,","year":"2019"},{"key":"2023102515554072800_B36","article-title":"Activist shareholders and executive compensation","author":"Haggerty,","year":"2017","journal-title":"Ethical Boardroom"},{"issue":"1","key":"2023102515554072800_B37","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1093\/pan\/mpr025","article-title":"Entropy balancing for causal effects: A multivariate reweighting method to produce balanced samples in observational studies","volume":"20","author":"Hainmueller,","year":"2012","journal-title":"Political Analysis"},{"issue":"2","key":"2023102515554072800_B39","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1287\/isre.2020.0986","article-title":"The impact of executives' IT expertise on reported data security breaches","volume":"32","author":"Haislip,","year":"2021","journal-title":"Information Systems Research"},{"key":"2023102515554072800_B38","unstructured":"Haislip,\n J.\n , K.Kolev, R.Pinsker, and T.Steffen. 2019. The economic cost of cybersecurity breaches: A broad-based analysis. Presented at the Workshop on the Economics of Information Security, Boston, MA, June 3\u20134."},{"issue":"2","key":"2023102515554072800_B40","doi-asserted-by":"crossref","first-page":"187","DOI":"10.2308\/isys-18-053","article-title":"The impact of reported cybersecurity breaches on firm innovation","volume":"34","author":"He,","year":"2020","journal-title":"Journal of Information Systems"},{"issue":"3","key":"2023102515554072800_B41","doi-asserted-by":"crossref","first-page":"79","DOI":"10.2308\/isys-51402","article-title":"The relationship between board-level technology committees and reported security breaches","volume":"30","author":"Higgs,","year":"2016","journal-title":"Journal of Information Systems"},{"key":"2023102515554072800_B42","volume-title":"Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance","author":"Hsu,","year":"2014"},{"key":"2023102515554072800_B43","volume-title":"COBIT 5 for Information Security","author":"ISACA","year":"2012"},{"issue":"3","key":"2023102515554072800_B44","doi-asserted-by":"crossref","first-page":"1479","DOI":"10.1111\/j.1540-6261.2009.01470.x","article-title":"Rank-order tournaments and incentive alignment: The effect on firm performance","volume":"64","author":"Kale,","year":"2009","journal-title":"The Journal of Finance"},{"key":"2023102515554072800_B45","doi-asserted-by":"crossref","DOI":"10.3386\/w24409","article-title":"What is the impact of successful cyberattacks on target firms?","author":"Kamiya,","year":"2018"},{"issue":"2","key":"2023102515554072800_B46","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.jfineco.2011.09.005","article-title":"Tournament incentives, firm risk, and corporate policies","volume":"103","author":"Kini,","year":"2012","journal-title":"Journal of Financial Economics"},{"issue":"1","key":"2023102515554072800_B47","doi-asserted-by":"crossref","first-page":"219","DOI":"10.2308\/isys-50339","article-title":"The association between top management involvement and compensation and information security breaches","volume":"27","author":"Kwon,","year":"2013","journal-title":"Journal of Information Systems"},{"issue":"5","key":"2023102515554072800_B48","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1086\/261010","article-title":"Rank-order tournaments as optimum labor contracts","volume":"89","author":"Lazear,","year":"1981","journal-title":"Journal of Political Economy"},{"issue":"1","key":"2023102515554072800_B49","doi-asserted-by":"crossref","first-page":"151","DOI":"10.2308\/ajpt-52593","article-title":"Are external auditors concerned about cyber incidents? Evidence from audit fees","volume":"39","author":"Li,","year":"2020","journal-title":"Auditing: A Journal of Practice & Theory"},{"key":"2023102515554072800_B50","unstructured":"Maurer,\n R.\n \n \n 2015. Human error cited as top cause of data breaches. https:\/\/www.shrm.org\/resourcesandtools\/hr-topics\/risk-management\/pages\/human-error-top-cause-data-breaches.aspx"},{"key":"2023102515554072800_B51","unstructured":"Mishel,\n L.\n , and J.Kandra. 2020. CEO compensation surged 14% in 2019 to $21.3 million.https:\/\/www.epi.org\/publication\/ceo-compensation-surged-14-in-2019-to-21-3-million-ceos-now-earn-320-times-as-much-as-a-typical-worker"},{"key":"2023102515554072800_B52","unstructured":"Netwrix. 2020. Cyber threats report. https:\/\/www.netwrix.com\/2020_cyber_threats_report.html"},{"issue":"3","key":"2023102515554072800_B53","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.joep.2009.03.009","article-title":"Risk-taking tournaments: Theory and experimental evidence","volume":"31","author":"Nieken,","year":"2010","journal-title":"Journal of Economic Psychology"},{"issue":"3","key":"2023102515554072800_B54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/joeuc.2013070101","article-title":"End user computing: The dark matter (and dark energy) of corporate IT","volume":"25","author":"Panko,","year":"2013","journal-title":"Journal of Organizational and End User Computing"},{"issue":"1","key":"2023102515554072800_B55","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jaccpubpol.2016.11.002","article-title":"Pay disparities within top management teams and earning management","volume":"36","author":"Park,","year":"2017","journal-title":"Journal of Accounting and Public Policy"},{"key":"2023102515554072800_B56","volume-title":"The Choice of Wage Comparisons","author":"Patchen,","year":"1961"},{"issue":"4","key":"2023102515554072800_B57","doi-asserted-by":"crossref","first-page":"599","DOI":"10.2307\/258592","article-title":"Barriers to the advance of organizational science: Paradigm development as a dependent variable","volume":"18","author":"Pfeffer,","year":"1993","journal-title":"The Academy of Management Review"},{"issue":"3","key":"2023102515554072800_B59","doi-asserted-by":"crossref","first-page":"227","DOI":"10.2308\/isys-52379","article-title":"Much ado about nothing: The (lack of) economic impact of data privacy breaches","volume":"33","author":"Richardson,","year":"2019","journal-title":"Journal of Information Systems"},{"key":"2023102515554072800_B58","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.accinf.2018.09.005","article-title":"Determinants and consequences of chief information officer equity incentives","volume":"31","author":"Richardson,","year":"2018","journal-title":"International Journal of Accounting Information Systems"},{"issue":"1","key":"2023102515554072800_B60","doi-asserted-by":"crossref","first-page":"343","DOI":"10.2308\/accr-52440","article-title":"Rethinking measurement of pay disparity and its relation to firm performance","volume":"95","author":"Rouen,","year":"2020","journal-title":"The Accounting Review"},{"issue":"4","key":"2023102515554072800_B61","doi-asserted-by":"crossref","first-page":"103638","DOI":"10.1016\/j.im.2022.103638","article-title":"Antecedents and consequences of data breaches: A systematic review","volume":"59","author":"Schlackl,","year":"2022","journal-title":"Information & Management"},{"key":"2023102515554072800_B62","unstructured":"Securities and Exchange Commission (SEC). 2011. CF disclosure guidance: Topic No. 2, cybersecurity. Division of Corporation Finance (October 13). Washington, DC: SEC. https:\/\/www.sec.gov\/divisions\/corpfin\/guidance\/cfguidance-topic2.htm"},{"key":"2023102515554072800_B63","unstructured":"Securities and Exchange Commission (SEC). 2018. Commission Statement and Guidance on Public Company Cybersecurity Disclosures. Release Nos. 33-10459, 34-82746. Washington, DC: SEC. https:\/\/www.sec.gov\/rules\/interp\/2018\/33-10459.pdf"},{"issue":"2","key":"2023102515554072800_B64","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1080\/07421222.2015.1063315","article-title":"Estimating the contextual risk of data breach: An empirical approach","volume":"32","author":"Sen,","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"2023102515554072800_B65","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1002\/smj.235","article-title":"Pay dispersion and workforce performance: Moderating effects of incentives and interdependence","volume":"23","author":"Shaw,","year":"2002","journal-title":"Strategic Management Journal"},{"issue":"4","key":"2023102515554072800_B66","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1093\/rof\/rfw064","article-title":"Tournament incentives and firm innovation","volume":"22","author":"Shen,","year":"2018","journal-title":"Review of Finance"},{"issue":"7","key":"2023102515554072800_B67","doi-asserted-by":"crossref","first-page":"1354","DOI":"10.1002\/smj.2400","article-title":"Buying bad behavior: Tournament incentives and securities class action lawsuits","volume":"37","author":"Shi,","year":"2016","journal-title":"Strategic Management Journal"},{"issue":"4","key":"2023102515554072800_B68","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1093\/sf\/sou004","article-title":"Explaining pay disparities between top executives and nonexecutive employees: A relative bargaining power approach","volume":"92","author":"Shin,","year":"2014","journal-title":"Social Forces"},{"issue":"1","key":"2023102515554072800_B69","doi-asserted-by":"crossref","first-page":"213","DOI":"10.2308\/accr-51449","article-title":"Propensity score matching in accounting research","volume":"92","author":"Shipman,","year":"2017","journal-title":"The Accounting Review"},{"issue":"8","key":"2023102515554072800_B70","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1177\/001872679905200805","article-title":"The effects of pay systems on blue-collar employees' emotional distress: The mediating effects of objective and subjective work monotony","volume":"52","author":"Shirom,","year":"1999","journal-title":"Human Relations"},{"issue":"3","key":"2023102515554072800_B71","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1287\/orsc.1050.0128","article-title":"Pay disparities within top management groups: Evidence of harmful effects on performance of high-technology firms","volume":"16","author":"Siegel,","year":"2005","journal-title":"Organization Science"},{"key":"2023102515554072800_B72","unstructured":"Spadafora,\n A.\n \n \n 2019. 90 percent of data breaches are caused by human error. https:\/\/www.techradar.com\/news\/90-percent-of-data-breaches-are-caused-by-human-error"},{"key":"2023102515554072800_B73","unstructured":"ThreatConnect. 2022. Cybersecurity under stress. https:\/\/threatconnect.com\/wp-content\/uploads\/ThreatConnect-Cyber-Survey-Report-1.pdf"},{"key":"2023102515554072800_B74","article-title":"Regulation remains top risk for 2015","author":"Tysiac,","year":"2015","journal-title":"Journal of Accountancy"},{"issue":"3","key":"2023102515554072800_B75","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1108\/eb028832","article-title":"Relationship between CEO compensation and firm performance: Empirical evidence of labor market norms","volume":"3","author":"Veliyath,","year":"1995","journal-title":"The International Journal of Organizational Analysis"},{"issue":"1","key":"2023102515554072800_B76","doi-asserted-by":"crossref","first-page":"155","DOI":"10.2308\/ISYS-19-033","article-title":"An integrative review and analysis of cybersecurity research: Current state and future directions","volume":"35","author":"Walton,","year":"2021","journal-title":"Journal of Information Systems"},{"issue":"1","key":"2023102515554072800_B77","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.ecolecon.2009.08.001","article-title":"Optimal design of pro-conservation incentives","volume":"69","author":"Zabel,","year":"2009","journal-title":"Ecological Economics"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/37\/3\/11\/100830\/i0888-7985-37-3-11.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/37\/3\/11\/100830\/i0888-7985-37-3-11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T15:56:43Z","timestamp":1698249403000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/37\/3\/11\/11334\/Firm-Level-Pay-Disparity-and-Breach-Risk"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,1]]},"references-count":77,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,10,25]]},"published-print":{"date-parts":[[2023,10,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-2021-040","relation":{},"ISSN":["0888-7985","1558-7959"],"issn-type":[{"value":"0888-7985","type":"print"},{"value":"1558-7959","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,1]]}}}