{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:17:27Z","timestamp":1756462647046,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031322983"},{"type":"electronic","value":"9783031322990"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-32299-0_10","type":"book-chapter","created":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T09:03:00Z","timestamp":1683536580000},"page":"108-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Impact of Data Breach on IT Investment: Moderating Role of Buyer-Supplier Relationship"],"prefix":"10.1007","author":[{"given":"Meirong","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Miao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Shenyang","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,7]]},"reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.jsis.2018.12.001","volume":"28","author":"R Syed","year":"2019","unstructured":"Syed, R.: Firm reputation threats on social media: a case of data breach framing. J. Strateg. Inf. Syst. 28(3), 257\u2013274 (2019)","journal-title":"J. Strateg. Inf. Syst."},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"61","DOI":"10.25300\/MISQ\/2015\/39.1.04","volume":"39","author":"TO Salge","year":"2015","unstructured":"Salge, T.O., Kohli, R., Barrett, M.: Investing in information systems: on the behavioral and institutional search mechanisms underpinning hospitals\u2019 is investment decisions. MIS Q. 39(1), 61\u201390 (2015)","journal-title":"MIS Q."},{"issue":"5","key":"10_CR3","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.5465\/amj.2016.1010","volume":"61","author":"W Shi","year":"2018","unstructured":"Shi, W., Connelly, B.L., Cirik, K.: Short seller influence on firm growth: a threat rigidity perspective. Acad. Manag. J. 61(5), 1892\u20131919 (2018)","journal-title":"Acad. Manag. J."},{"issue":"2","key":"10_CR4","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.jfineco.2016.09.009","volume":"123","author":"L Cen","year":"2017","unstructured":"Cen, L., Maydew, E.L., Zhang, L., Zuo, L.: Customer\u2013supplier relationships and corporate tax avoidance. J. Financ. Econ. 123(2), 377\u2013394 (2017)","journal-title":"J. Financ. Econ."},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1111\/fire.12160","volume":"53","author":"C Lending","year":"2018","unstructured":"Lending, C., Minnick, K., Schorno, P.J.: Corporate governance, social responsibility, and data breaches. Financ. Rev. 53(2), 413\u2013455 (2018)","journal-title":"Financ. Rev."},{"issue":"2","key":"10_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1509\/jm.16.0124","volume":"82","author":"R Janakiraman","year":"2018","unstructured":"Janakiraman, R., Lim, J.H., Rishika, R.: The effect of a data breach announcement on customer behavior: evidence from a multichannel retailer. J. Mark. 82(2), 85\u2013105 (2018)","journal-title":"J. Mark."},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"137","DOI":"10.2308\/accr-51869","volume":"93","author":"L Cen","year":"2018","unstructured":"Cen, L., Chen, F., Hou, Y., Richardson, G.D.: Strategic disclosures of litigation loss contingencies when customer-supplier relationships are at risk. Account. Rev. 93(2), 137\u2013159 (2018)","journal-title":"Account. Rev."},{"issue":"3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"687","DOI":"10.5465\/amj.2007.25529755","volume":"50","author":"JY Kim","year":"2007","unstructured":"Kim, J.Y., Miner, A.S.: Vicarious learning from the failures and near-failures of others: evidence from the US commercial banking industry. Acad. Manag. J. 50(3), 687\u2013714 (2007)","journal-title":"Acad. Manag. J."},{"issue":"1","key":"10_CR9","doi-asserted-by":"publisher","first-page":"252","DOI":"10.5465\/annals.2016.0049","volume":"12","author":"KB Dahlin","year":"2018","unstructured":"Dahlin, K.B., Chuang, Y.T., Roulet, T.J.: Opportunity, motivation, and ability to learn from failures and errors: review, synthesis, and ways to move forward. Acad. Manag. Ann. 12(1), 252\u2013277 (2018)","journal-title":"Acad. Manag. Ann."},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"729","DOI":"10.25300\/MISQ\/2017\/41.3.04","volume":"41","author":"M Benaroch","year":"2017","unstructured":"Benaroch, M., Chernobai, A.: Operational IT failures, IT value-destruction, and board-level IT governance changes. MIS Q. 41(3), 729\u2013762 (2017)","journal-title":"MIS Q."},{"issue":"1","key":"10_CR11","doi-asserted-by":"publisher","first-page":"48","DOI":"10.5465\/ame.1993.9409142058","volume":"7","author":"CM Pearson","year":"1993","unstructured":"Pearson, C.M., Mitroff, I.I.: From crisis prone to crisis prepared: a framework for crisis management. Acad. Manag. Perspect. 7(1), 48\u201359 (1993)","journal-title":"Acad. Manag. Perspect."},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.5465\/amj.2018.0272","volume":"63","author":"FS Bentley","year":"2020","unstructured":"Bentley, F.S., Kehoe, R.R.: Give them some slack\u2014they\u2019re trying to change! The benefits of excess cash, excess employees, and increased human capital in the strategic change context. Acad. Manag. J. 63(1), 181\u2013204 (2020)","journal-title":"Acad. Manag. J."},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1093\/rof\/rfv014","volume":"20","author":"L Cen","year":"2015","unstructured":"Cen, L., Dasgupta, S., Elkamhi, R., Pungaliya, R.S.: Reputation and loan contract terms: the role of principal customers. Rev. Finance 20(2), 501\u2013533 (2015)","journal-title":"Rev. Finance"},{"issue":"2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1016\/j.jfineco.2020.01.003","volume":"142","author":"R Dai","year":"2020","unstructured":"Dai, R., Liang, H., Ng, L.: Socially responsible corporate customers. J. Financ. Econ. 142(2), 598\u2013626 (2020)","journal-title":"J. Financ. Econ."},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.25300\/MISQ\/2017\/41.4.15","volume":"41","author":"K Kim","year":"2017","unstructured":"Kim, K., Mithas, S., Kimbrough, M.: Information technology investments and firm risk across industries: evidence from the bond market. MIS Q. 41(4), 1347\u20131367 (2017)","journal-title":"MIS Q."},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1287\/mnsc.2019.3548","volume":"67","author":"ZJ Cheng","year":"2021","unstructured":"Cheng, Z.J., Rai, A., Tian, F., Xu, S.X.: Social learning in information technology investment: the role of board interlocks. Manag. Sci. 67(1), 547\u2013576 (2021)","journal-title":"Manag. Sci."},{"issue":"4","key":"10_CR17","doi-asserted-by":"publisher","first-page":"957","DOI":"10.2308\/accr.2008.83.4.957","volume":"83","author":"KW Kobelsky","year":"2008","unstructured":"Kobelsky, K.W., Richardson, V.J., Smith, R.E., Zmud, R.W.: Determinants and consequences of firm information technology budgets. Account. Rev. 83(4), 957\u2013995 (2008)","journal-title":"Account. Rev."},{"issue":"3","key":"10_CR18","doi-asserted-by":"publisher","first-page":"570","DOI":"10.2307\/256460","volume":"31","author":"BW Keats","year":"1988","unstructured":"Keats, B.W., Hitt, M.A.: A causal model of linkages among environmental dimensions, macro organizational characteristics, and performance. Acad. Manag. J. 31(3), 570\u2013598 (1988)","journal-title":"Acad. Manag. J."}],"container-title":["Lecture Notes in Business Information Processing","E-Business. Digital Empowerment for an Intelligent Future"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-32299-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:33:09Z","timestamp":1710329589000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-32299-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031322983","9783031322990"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-32299-0_10","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WHICEB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan International Conference on E-business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"whiceb2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/whiceb.cug.edu.cn\/en\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"350","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}