{"id":"https://openalex.org/W2058012887","doi":"https://doi.org/10.1287/isre.1080.0174","title":"Choice and Chance: A Conceptual Model of Paths to Information Security Compromise","display_name":"Choice and Chance: A Conceptual Model of Paths to Information Security Compromise","publication_year":2008,"publication_date":"2008-06-21","ids":{"openalex":"https://openalex.org/W2058012887","doi":"https://doi.org/10.1287/isre.1080.0174","mag":"2058012887"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1287/isre.1080.0174","pdf_url":null,"source":{"id":"https://openalex.org/S202812398","display_name":"Information Systems Research","issn_l":"1047-7047","issn":["1047-7047","1526-5536"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310315699","host_organization_name":"Institute for Operations Research and the Management Sciences","host_organization_lineage":["https://openalex.org/P4310315699"],"host_organization_lineage_names":["Institute for Operations Research and the Management Sciences"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091832599","display_name":"Sam Ransbotham","orcid":"https://orcid.org/0000-0001-5305-035X"},"institutions":[{"id":"https://openalex.org/I103531236","display_name":"Boston College","ror":"https://ror.org/02n2fzt79","country_code":"US","type":"funder","lineage":["https://openalex.org/I103531236"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sam Ransbotham","raw_affiliation_strings":["Carroll School of Management, Boston College, Chestnut Hill, Massachusetts 02467"],"affiliations":[{"raw_affiliation_string":"Carroll School of Management, Boston College, Chestnut Hill, Massachusetts 02467","institution_ids":["https://openalex.org/I103531236"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101787344","display_name":"Sabyasachi Mitra","orcid":"https://orcid.org/0000-0003-4120-1274"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"funder","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sabyasachi Mitra","raw_affiliation_strings":["College of Management, Georgia Institute of Technology, Atlanta, Georgia 30308"],"affiliations":[{"raw_affiliation_string":"College of Management, Georgia Institute of Technology, Atlanta, Georgia 30308","institution_ids":["https://openalex.org/I130701444"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":35.518,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":237,"citation_normalized_percentile":{"value":0.999966,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"20","issue":"1","first_page":"121","last_page":"139"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9904,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.9778995},{"id":"https://openalex.org/keywords/conceptual-model","display_name":"Conceptual model","score":0.55127555},{"id":"https://openalex.org/keywords/data-security","display_name":"Data Security","score":0.41115406}],"concepts":[{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.9778995},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.63517207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5756514},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.56465137},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.55127555},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45812213},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4368658},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.42504486},{"id":"https://openalex.org/C31173074","wikidata":"https://www.wikidata.org/wiki/Q2632514","display_name":"Attractiveness","level":2,"score":0.41152954},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.41115406},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33290404},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32593465},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11911777},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.119028},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08150828},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1287/isre.1080.0174","pdf_url":null,"source":{"id":"https://openalex.org/S202812398","display_name":"Information Systems Research","issn_l":"1047-7047","issn":["1047-7047","1526-5536"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310315699","host_organization_name":"Institute for Operations Research and the Management Sciences","host_organization_lineage":["https://openalex.org/P4310315699"],"host_organization_lineage_names":["Institute for Operations Research and the Management Sciences"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":73,"referenced_works":["https://openalex.org/W102412348","https://openalex.org/W1501321335","https://openalex.org/W1509585873","https://openalex.org/W1538043169","https://openalex.org/W1566168400","https://openalex.org/W1570388338","https://openalex.org/W1580996832","https://openalex.org/W1584514021","https://openalex.org/W1603962791","https://openalex.org/W1607675442","https://openalex.org/W1666032117","https://openalex.org/W17195039","https://openalex.org/W1890867917","https://openalex.org/W1971368595","https://openalex.org/W1971440513","https://openalex.org/W1976876708","https://openalex.org/W1977994226","https://openalex.org/W1980132394","https://openalex.org/W1984936207","https://openalex.org/W1997603734","https://openalex.org/W2008515441","https://openalex.org/W2038784320","https://openalex.org/W2044744663","https://openalex.org/W2045371085","https://openalex.org/W2056075452","https://openalex.org/W2059172612","https://openalex.org/W2072047708","https://openalex.org/W2075810856","https://openalex.org/W2088047416","https://openalex.org/W2096830520","https://openalex.org/W2115149820","https://openalex.org/W2117405938","https://openalex.org/W2119350371","https://openalex.org/W2119587968","https://openalex.org/W2125092413","https://openalex.org/W2126782589","https://openalex.org/W2129085046","https://openalex.org/W2130067743","https://openalex.org/W2141580761","https://openalex.org/W2145722235","https://openalex.org/W2146691185","https://openalex.org/W2154002706","https://openalex.org/W2154520446","https://openalex.org/W2156430158","https://openalex.org/W2161830378","https://openalex.org/W2163277533","https://openalex.org/W2164950969","https://openalex.org/W2171113940","https://openalex.org/W2189821821","https://openalex.org/W2265720734","https://openalex.org/W2278252066","https://openalex.org/W2329395632","https://openalex.org/W2341243253","https://openalex.org/W2475766772","https://openalex.org/W2491365176","https://openalex.org/W2791061415","https://openalex.org/W2795690649","https://openalex.org/W2796209030","https://openalex.org/W3021373317","https://openalex.org/W3122448917","https://openalex.org/W3124543438","https://openalex.org/W3140033334","https://openalex.org/W3186404406","https://openalex.org/W3215835730","https://openalex.org/W4213318625","https://openalex.org/W4249855545","https://openalex.org/W4251120818","https://openalex.org/W4253543067","https://openalex.org/W4285719527","https://openalex.org/W4292811746","https://openalex.org/W4301308134","https://openalex.org/W54258564","https://openalex.org/W74666179"],"related_works":["https://openalex.org/W4240977217","https://openalex.org/W4214750239","https://openalex.org/W3036524962","https://openalex.org/W2801622120","https://openalex.org/W2767454858","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W2279908259","https://openalex.org/W2164141394","https://openalex.org/W1967649051"],"abstract_inverted_index":{"No":[0],"longer":[1],"the":[2,30,36,39,52,60,64,68,71,74,96,100,104,107,110,118],"exclusive":[3],"domain":[4],"of":[5,29,38,49,62,67,73,84,99,106],"technology":[6],"experts,":[7],"information":[8,31,77,115,119],"security":[9,32,78,116],"is":[10],"now":[11],"a":[12,16,27],"management":[13],"issue.":[14],"Through":[15],"grounded":[17],"approach":[18],"using":[19,81],"interviews,":[20],"observations,":[21],"and":[22,46,56,58,70],"secondary":[23],"data,":[24],"we":[25,91],"advance":[26],"model":[28,108],"compromise":[33,50],"process":[34],"from":[35,87],"perspective":[37],"attacked":[40],"organization.":[41],"We":[42,102],"distinguish":[43],"between":[44],"deliberate":[45],"opportunistic":[47],"paths":[48],"through":[51],"Internet,":[53],"labeled":[54],"choice":[55],"chance,":[57],"include":[59],"role":[61],"countermeasures,":[63],"Internet":[65],"presence":[66],"firm,":[69],"attractiveness":[72],"firm":[75],"for":[76,95,109],"compromise.":[79],"Further,":[80],"one":[82],"year":[83],"alert":[85],"data":[86],"intrusion":[88],"detection":[89],"devices,":[90],"find":[92],"empirical":[93],"support":[94],"key":[97],"contributions":[98],"model.":[101],"discuss":[103],"implications":[105],"emerging":[111],"research":[112],"stream":[113],"on":[114],"in":[117],"systems":[120],"literature.":[121]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2058012887","counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":19},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":20},{"year":2017,"cited_by_count":25},{"year":2016,"cited_by_count":14},{"year":2015,"cited_by_count":12},{"year":2014,"cited_by_count":16},{"year":2013,"cited_by_count":15},{"year":2012,"cited_by_count":21}],"updated_date":"2025-04-06T15:39:59.699142","created_date":"2016-06-24"}