{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:54:51Z","timestamp":1758981291878},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10796-017-9807-6","type":"journal-article","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T06:27:30Z","timestamp":1509344850000},"page":"1069-1083","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect"],"prefix":"10.1007","volume":"21","author":[{"given":"Feng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xin (Robert)","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hongyun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei (Wayne)","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"issue":"1","key":"9807_CR1","doi-asserted-by":"crossref","first-page":"74","DOI":"10.5465\/amr.2004.11851715","volume":"29","author":"R Adner","year":"2004","unstructured":"Adner, R., & Levinthal, D. A. (2004). What is not a real option: Considering boundaries for the application of real options to business strategy. Academy of Management Review, 29(1), 74\u201385.","journal-title":"Academy of Management Review"},{"issue":"7","key":"9807_CR2","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.im.2006.08.002","volume":"43","author":"M Agrawal","year":"2006","unstructured":"Agrawal, M., Kishore, R., & Rao, H. R. (2006). Market reactions to e-business outsourcing announcements: An event study. Information Management, 43(7), 861\u2013873.","journal-title":"Information Management"},{"key":"9807_CR3","doi-asserted-by":"crossref","unstructured":"Anderson, E. E. (2010). Firm objectives, IT alignment, and information security. Ibm Journal of Research and Development, 54(3).","DOI":"10.1147\/JRD.2010.2044256"},{"issue":"1","key":"9807_CR4","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1111\/j.1467-6419.1995.tb00109.x","volume":"9","author":"S Armitage","year":"1995","unstructured":"Armitage, S. (1995). Event study methods and evidence on their performance. Journal of Economic Surveys, 9(1), 25\u201352.","journal-title":"Journal of Economic Surveys"},{"issue":"3","key":"9807_CR5","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.jsis.2004.08.002","volume":"13","author":"D Avison","year":"2004","unstructured":"Avison, D., Jones, J., Powell, P., & Wilson, D. (2004). Using and validating the strategic alignment model. The Journal of Strategic Information Systems, 13(3), 223\u2013246.","journal-title":"The Journal of Strategic Information Systems"},{"issue":"4","key":"9807_CR6","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/17.969422","volume":"48","author":"M Benaroch","year":"2001","unstructured":"Benaroch, M. (2001). Option-based management of technology investment risk. IEEE Transactions on Engineering Management, 48(4), 428\u2013444.","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"8","key":"9807_CR7","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1016\/j.im.2003.10.004","volume":"41","author":"F Bergeron","year":"2004","unstructured":"Bergeron, F., Raymond, L., & Rivard, S. (2004). Ideal patterns of strategic alignment and business performance. Information Management, 41(8), 1003\u20131020.","journal-title":"Information Management"},{"key":"9807_CR8","doi-asserted-by":"crossref","unstructured":"Black, F., & Scholes, M. (1973). The pricing of options and corporate liabilities. The journal of political economy, 637-654.","DOI":"10.1086\/260062"},{"issue":"1","key":"9807_CR9","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MSP.2010.51","volume":"8","author":"R Bohme","year":"2010","unstructured":"Bohme, R., & Moore, T. (2010). The iterated weakest link. Security & Privacy, IEEE, 8(1), 53\u201355.","journal-title":"Security & Privacy, IEEE"},{"issue":"4","key":"9807_CR10","doi-asserted-by":"crossref","first-page":"760","DOI":"10.5465\/amr.1993.9402210157","volume":"18","author":"EH Bowman","year":"1993","unstructured":"Bowman, E. H., & Hurry, D. (1993). Strategy through the option lens: An integrated view of resource investments and the incremental-choice process. Academy of Management Review, 18(4), 760\u2013782.","journal-title":"Academy of Management Review"},{"issue":"2","key":"9807_CR11","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1006\/mare.1996.0040","volume":"8","author":"J Busby","year":"1997","unstructured":"Busby, J., & Pitts, C. (1997). Real Options in Practice: An Exploratory Survey of How Finance Officers Deal with Flexibility in Capital Appraisal. Management Accounting Research, 8(2), 169\u2013187.","journal-title":"Management Accounting Research"},{"issue":"3","key":"9807_CR12","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.im.2005.07.002","volume":"43","author":"TA Byrd","year":"2006","unstructured":"Byrd, T. A., Lewis, B. R., & Bryan, R. W. (2006). The leveraging influence of strategic alignment on IT investment: an empirical examination. Information Management, 43(3), 308\u2013321.","journal-title":"Information Management"},{"key":"9807_CR13","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1057\/palgrave.jibs.8490212","volume":"25","author":"JM Campa","year":"1994","unstructured":"Campa, J. M. (1994). Multinational investment under uncertainty in the chemical processing industries. Journal of International Business Studies, 25, 557\u2013578.","journal-title":"Journal of International Business Studies"},{"issue":"1","key":"9807_CR14","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1080\/10864415.2004.11044320","volume":"9","author":"H Cavusoglu","year":"2004","unstructured":"Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004a). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 70\u2013104.","journal-title":"International Journal of Electronic Commerce"},{"issue":"7","key":"9807_CR15","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/1005817.1005828","volume":"47","author":"H Cavusoglu","year":"2004","unstructured":"Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004b). A model for evaluating IT security investments. Communications of the ACM, 47(7), 87\u201392.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9807_CR16","doi-asserted-by":"crossref","first-page":"281","DOI":"10.2753\/MIS0742-1222250211","volume":"25","author":"H Cavusoglu","year":"2008","unstructured":"Cavusoglu, H., Raghunathan, S., & Yue, W. T. (2008). Decision-theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25(2), 281\u2013304.","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"9807_CR17","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.dss.2010.08.017","volume":"50","author":"S Chai","year":"2011","unstructured":"Chai, S., Kim, M., & Rao, H. R. (2011). Firms' information security investment decisions: Stock market evidence of investors' behavior. Decision Support Systems, 50(4), 651\u2013661.","journal-title":"Decision Support Systems"},{"issue":"2","key":"9807_CR18","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/07421222.2002.11045723","volume":"19","author":"D Chatterjee","year":"2002","unstructured":"Chatterjee, D., Pacini, C., & Sambamurthy, V. (2002). The shareholder-wealth and trading-volume effects of information-technology infrastructure investments. Journal of Management Information Systems, 19(2), 7\u201342.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"9807_CR19","doi-asserted-by":"crossref","first-page":"43","DOI":"10.2307\/3250958","volume":"25","author":"D Chatterjee","year":"2001","unstructured":"Chatterjee, D., Richardson, V. J., & Zmud, R. W. (2001). Examining the shareholder wealth effects of announcements of newly created CIO positions. MIS Quarterly, 25(1), 43\u201370.","journal-title":"MIS Quarterly"},{"issue":"6","key":"9807_CR20","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1177\/0149206311429861","volume":"40","author":"A Chintakananda","year":"2014","unstructured":"Chintakananda, A., & McIntyre, D. P. (2014). Market Entry in the Presence of Network Effects A Real Options Perspective. Journal of Management, 40(6), 1535\u20131557.","journal-title":"Journal of Management"},{"issue":"03","key":"9807_CR21","doi-asserted-by":"crossref","first-page":"465","DOI":"10.2307\/2331331","volume":"27","author":"CJ Corrado","year":"1992","unstructured":"Corrado, C. J., & Zivney, T. L. (1992). The specification and power of the sign test in event study hypothesis tests using daily stock returns. Journal of Financial and Quantitative Analysis, 27(03), 465\u2013478.","journal-title":"Journal of Financial and Quantitative Analysis"},{"issue":"4","key":"9807_CR22","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/BF00939016","volume":"2","author":"AR Cowan","year":"1992","unstructured":"Cowan, A. R. (1992). Nonparametric event study tests. Review of Quantitative Finance and Accounting, 2(4), 343\u2013358.","journal-title":"Review of Quantitative Finance and Accounting"},{"issue":"4","key":"9807_CR23","doi-asserted-by":"crossref","first-page":"637","DOI":"10.2307\/30036551","volume":"27","author":"B Dehning","year":"2003","unstructured":"Dehning, B., Richardson, V. J., & Zmud, R. W. (2003). The value relevance of announcements of transformational information technology investments. MIS Quarterly, 27(4), 637\u2013656.","journal-title":"MIS Quarterly"},{"issue":"12","key":"9807_CR24","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1287\/mnsc.35.12.1504","volume":"35","author":"I Dierickx","year":"1989","unstructured":"Dierickx, I., & Cool, K. (1989). Asset stock accumulation and sustainability of compentitive advantage. Management Science, 35(12), 1504\u20131511.","journal-title":"Management Science"},{"key":"9807_CR25","unstructured":"DiRomauldo, A., & Gurbaxani, V. (1998). Strategic intent for IT outsourcing. Center for Research on Information Technology and Organizations."},{"key":"9807_CR26","doi-asserted-by":"crossref","unstructured":"Dixit, A. K., & Pindyck, R. S. (1994). Investment under uncertainty: Princeton University Press.","DOI":"10.1515\/9781400830176"},{"issue":"236","key":"9807_CR27","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1080\/01621459.1946.10501898","volume":"41","author":"WJ Dixon","year":"1946","unstructured":"Dixon, W. J., & Mood, A. M. (1946). The statistical sign test. Journal of the American Statistical Association, 41(236), 557\u2013566.","journal-title":"Journal of the American Statistical Association"},{"issue":"1","key":"9807_CR28","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.cose.2005.09.009","volume":"25","author":"NF Doherty","year":"2006","unstructured":"Doherty, N. F., & Fulford, H. (2006). Aligning the information security policy with the strategic information systems plan. Computers & Security, 25(1), 55\u201363.","journal-title":"Computers & Security"},{"issue":"1","key":"9807_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.4.1.1","volume":"4","author":"BL Dos Santos","year":"1993","unstructured":"Dos Santos, B. L., Peffers, K., & Mauer, D. C. (1993). The impact of information technology investment announcements on the market value of the firm. Information Systems Research, 4(1), 1\u201323.","journal-title":"Information Systems Research"},{"issue":"4","key":"9807_CR30","doi-asserted-by":"crossref","first-page":"103","DOI":"10.2753\/MIS0742-1222290404","volume":"29","author":"A Dulipovici","year":"2013","unstructured":"Dulipovici, A., & Robey, D. (2013). Strategic alignment and misalignment of knowledge management systems: A social representation perspective. Journal of Management Information Systems, 29(4), 103\u2013126.","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"9807_CR31","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1108\/15265940610688964","volume":"7","author":"B Elango","year":"2006","unstructured":"Elango, B. (2006). When does cross-border acquisition of insurance firms lead to value creation? Journal of Risk Finance, 7(4), 402\u2013414.","journal-title":"Journal of Risk Finance"},{"issue":"1","key":"9807_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2525569","volume":"10","author":"EF Fama","year":"1969","unstructured":"Fama, E. F., Fisher, L., Jensen, M. C., & Roll, R. (1969). The adjustment of stock prices to new information. International Economic Review, 10(1), 1\u201321.","journal-title":"International Economic Review"},{"issue":"2","key":"9807_CR33","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1287\/isre.1040.0021","volume":"15","author":"RG Fichman","year":"2004","unstructured":"Fichman, R. G. (2004). Real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15(2), 132\u2013154.","journal-title":"Information Systems Research"},{"issue":"2","key":"9807_CR34","doi-asserted-by":"crossref","first-page":"74","DOI":"10.2307\/41166296","volume":"47","author":"RG Fichman","year":"2005","unstructured":"Fichman, R. G., Keil, M., & Tiwana, A. (2005). Beyond valuation: \"Options thinking\" in IT project management. California Management Review, 47(2), 74.","journal-title":"California Management Review"},{"issue":"3","key":"9807_CR35","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1057\/palgrave.jibs.8400362","volume":"39","author":"JH Fisch","year":"2008","unstructured":"Fisch, J. H. (2008). Investment in new foreign subsidiaries under receding perception of uncertainty. Journal of International Business Studies, 39(3), 370\u2013386.","journal-title":"Journal of International Business Studies"},{"key":"9807_CR36","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.jebo.2004.11.011","volume":"61","author":"TB Folta","year":"2006","unstructured":"Folta, T. B., Johnson, D. R., & O'Brien, J. (2006). Uncertainty, irreversibility, and the likelihood of entry: An empirical assessment of the option to defer. Journal of Economic Behavior & Organization, 61, 432\u2013452.","journal-title":"Journal of Economic Behavior & Organization"},{"key":"9807_CR37","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1002\/smj.209","volume":"23","author":"TB Folta","year":"2002","unstructured":"Folta, T. B., & Miller, K. D. (2002). Real options in equity partnerships. Strategic Management Journal, 23, 77\u201388.","journal-title":"Strategic Management Journal"},{"issue":"2","key":"9807_CR38","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1002\/smj.368","volume":"25","author":"TB Folta","year":"2004","unstructured":"Folta, T. B., & O'Brien, J. P. (2004). Entry in the presence of dueling options. Strategic Management Journal, 25(2), 121\u2013138.","journal-title":"Strategic Management Journal"},{"issue":"2","key":"9807_CR39","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s10796-013-9411-3","volume":"17","author":"X Gao","year":"2015","unstructured":"Gao, X., Zhong, W., & Mei, S. (2015). Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers, 17(2), 423\u2013438.","journal-title":"Information Systems Frontiers"},{"key":"9807_CR40","unstructured":"Gartner (2014). Gartner Says Worldwide Information Security Spending Will Grow Almost 8 Percent in 2014 as Organizations Become More Threat-Aware. (available at http:\/\/www.gartner.com\/newsroom\/id\/2828722 )."},{"issue":"3","key":"9807_CR41","doi-asserted-by":"crossref","first-page":"122","DOI":"10.17705\/1jais.00084","volume":"7","author":"J Gebauer","year":"2006","unstructured":"Gebauer, J., & Schober, F. (2006). Information system flexibility and the cost efficiency of business processes. Journal of the Association for Information Systems, 7(3), 122\u2013146.","journal-title":"Journal of the Association for Information Systems"},{"issue":"7","key":"9807_CR42","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.im.2009.06.005","volume":"46","author":"S Goel","year":"2009","unstructured":"Goel, S., & Shawky, H. A. (2009). Estimating the market impact of security breach announcements on firm values. Information Management, 46(7), 404\u2013410.","journal-title":"Information Management"},{"issue":"9","key":"9807_CR43","doi-asserted-by":"crossref","first-page":"606","DOI":"10.17705\/1jais.00275","volume":"12","author":"J Goldstein","year":"2011","unstructured":"Goldstein, J., Chernobai, A., & Benaroch, M. (2011). An event study analysis of the economic impact of IT operational risk and its subcategories. Journal of the Association for Information Systems, 12(9), 606\u2013631.","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"9807_CR44","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438\u2013457.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"1","key":"9807_CR45","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/1107458.1107465","volume":"49","author":"LA Gordon","year":"2006","unstructured":"Gordon, L. A., & Loeb, M. P. (2006). Budgeting process for information security expenditures. Communications of the ACM, 49(1), 121\u2013125.","journal-title":"Communications of the ACM"},{"key":"9807_CR46","unstructured":"Gordon, L. A., Loeb, M. P., & Lucyshyn, W. (2003). Information security expenditures and real options: A wait-and-see approach. Computer Security Journal, 19(2)."},{"issue":"5","key":"9807_CR47","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1016\/j.jaccpubpol.2015.05.001","volume":"34","author":"LA Gordon","year":"2015","unstructured":"Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Zhou, L. (2015). The impact of information sharing on cybersecurity underinvestment: A real options perspective. Journal of Accounting and Public Policy, 34(5), 509\u2013519.","journal-title":"Journal of Accounting and Public Policy"},{"key":"9807_CR48","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1162\/003355399555981","volume":"114","author":"L Guiso","year":"1999","unstructured":"Guiso, L., & Parigi, G. (1999). Investment and demand uncertainty. Quarterly Journal of Economics, 114, 185\u2013227.","journal-title":"Quarterly Journal of Economics"},{"issue":"1","key":"9807_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/smj.358","volume":"25","author":"R Gunther McGrath","year":"2004","unstructured":"Gunther McGrath, R., & Nerkar, A. (2004). Real options reasoning and a new look at the R&D investment strategies of pharmaceutical firms. Strategic Management Journal, 25(1), 1\u201321.","journal-title":"Strategic Management Journal"},{"issue":"5","key":"9807_CR50","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/s10796-006-9011-6","volume":"8","author":"K Hausken","year":"2006","unstructured":"Hausken, K. (2006). Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338\u2013349.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9807_CR51","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s10796-012-9390-9","volume":"16","author":"K Hausken","year":"2014","unstructured":"Hausken, K. (2014). Returns to information security investment: Endogenizing the expected loss. Information Systems Frontiers, 16(2), 329\u2013336.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9807_CR52","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1147\/sj.382.0472","volume":"32","author":"JC Henderson","year":"1993","unstructured":"Henderson, J. C., & Venkatraman, N. (1993). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 32(1), 4\u201316.","journal-title":"IBM Systems Journal"},{"issue":"3","key":"9807_CR53","doi-asserted-by":"crossref","first-page":"337","DOI":"10.2753\/MIS0742-1222250310","volume":"25","author":"HSB Herath","year":"2008","unstructured":"Herath, H. S. B., & Herath, T. C. (2008). Investments in information security: a real options perspective with bayesian postaudit. Journal of Management Information Systems, 25(3), 337\u2013375.","journal-title":"Journal of Management Information Systems"},{"issue":"5","key":"9807_CR54","doi-asserted-by":"crossref","first-page":"777","DOI":"10.3233\/JCS-2004-12506","volume":"12","author":"CB Iheagwara","year":"2004","unstructured":"Iheagwara, C. B., Andrew, & Singhal, M. (2004). Cost effective management frameworks for intrusion detection systems. Journal of Computer Security, 12(5), 777\u2013798.","journal-title":"Journal of Computer Security"},{"issue":"1","key":"9807_CR55","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1287\/isre.12.1.103.9718","volume":"12","author":"KS Im","year":"2001","unstructured":"Im, K. S., Dow, K. E., & Grover, V. (2001). Research report: a reexamination of IT investment and the market value of the firm\u2014An event study methodology. Information Systems Research, 12(1), 103\u2013117.","journal-title":"Information Systems Research"},{"issue":"1","key":"9807_CR56","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1145\/1435417.1435446","volume":"52","author":"AC Johnston","year":"2009","unstructured":"Johnston, A. C., & Hale, R. (2009). Improved Security through Information Security Governance. Communications of the ACM, 52(1), 126\u2013129.","journal-title":"Communications of the ACM"},{"issue":"1","key":"9807_CR57","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TEM.2004.839962","volume":"52","author":"RJ Kauffman","year":"2005","unstructured":"Kauffman, R. J., & Li, X. (2005). Technology competition and optimal investment timing: a real options perspective. IEEE Transactions on Engineering Management, 52(1), 15\u201329.","journal-title":"IEEE Transactions on Engineering Management"},{"key":"9807_CR58","unstructured":"Keown, A. J., Martin, J. D., Petty, J. W., & Scott, D. F. (2002). Financial management: principles and applications."},{"key":"9807_CR59","first-page":"153","volume":"62","author":"WC Kester","year":"1984","unstructured":"Kester, W. C. (1984). Today's options for tomorrow's growth. Harvard Business Review, 62, 153\u2013160.","journal-title":"Harvard Business Review"},{"key":"9807_CR60","unstructured":"Kim, S., & Lee, H. J. (2005). Cost-benefit analysis of security investments: methodology and case study. In (pp. 1239-1248): ICCSA 2005."},{"issue":"1","key":"9807_CR61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0167-9236(01)00134-8","volume":"33","author":"YJ Kim","year":"2002","unstructured":"Kim, Y. J., & Sanders, G. L. (2002). Strategic actions in information technology investment based on real option theory. Decision Support Systems, 33(1), 1\u201311.","journal-title":"Decision Support Systems"},{"issue":"1","key":"9807_CR62","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1287\/mnsc.37.1.19","volume":"37","author":"B Kogut","year":"1991","unstructured":"Kogut, B. (1991). Joint ventures and the option to expand and acquire. Management Science, 37(1), 19\u201333.","journal-title":"Management Science"},{"issue":"2","key":"9807_CR63","doi-asserted-by":"crossref","first-page":"52","DOI":"10.2307\/41165744","volume":"36","author":"B Kogut","year":"1994","unstructured":"Kogut, B., & Kulatilaka, N. (1994). Options thinking and platform investments - investing in opportunity. California Management Review, 36(2), 52\u201371.","journal-title":"California Management Review"},{"issue":"4","key":"9807_CR64","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1007\/s10845-010-0402-7","volume":"23","author":"HK Kong","year":"2012","unstructured":"Kong, H. K., Kim, T. S., & Kim, J. (2012). An analysis on effects of information security investments: a BSC perspective. Journal of Intelligent Manufacturing, 23(4), 941\u2013953.","journal-title":"Journal of Intelligent Manufacturing"},{"key":"9807_CR65","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1287\/mnsc.44.8.1021","volume":"44","author":"N Kulatilaka","year":"1998","unstructured":"Kulatilaka, N., & Perotti, E. C. (1998). Strategic growth options. Management Science, 44, 1021\u20131031.","journal-title":"Management Science"},{"issue":"2","key":"9807_CR66","doi-asserted-by":"crossref","first-page":"451","DOI":"10.25300\/MISQ\/2014\/38.2.06","volume":"38","author":"J Kwon","year":"2014","unstructured":"Kwon, J., & Johnson, M. E. (2014). Proactive versus reactive security investments in the healthcare sector. MIS Quarterly, 38(2), 451\u2013471.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9807_CR67","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s10796-010-9253-1","volume":"14","author":"M Lee","year":"2012","unstructured":"Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375\u2013393. https:\/\/doi.org\/10.1007\/s10796-010-9253-1 .","journal-title":"Information Systems Frontiers"},{"key":"9807_CR68","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/S0742-3322(07)24008-2","volume":"24","author":"MJ Leiblein","year":"2007","unstructured":"Leiblein, M. J., & Ziedonis, A. A. (2007). Deferral and growth options under sequential innovation. Advances in Strategic Management, 24, 225\u2013245.","journal-title":"Advances in Strategic Management"},{"issue":"3","key":"9807_CR69","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/S0742-3322(07)24006-9","volume":"24","author":"L Lin","year":"2007","unstructured":"Lin, L., & Kulatilaka, N. (2007). Strategic growth options in network industries. Advances in Strategic Management, 24(3), 177\u2013198.","journal-title":"Advances in Strategic Management"},{"issue":"1","key":"9807_CR70","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1111\/j.1540-6261.1992.tb03983.x","volume":"47","author":"CF Loderer","year":"1992","unstructured":"Loderer, C. F., & Mauer, D. C. (1992). Corporate dividends and seasoned equity issues: An empirical investigation. The Journal of Finance, 47(1), 201\u2013225.","journal-title":"The Journal of Finance"},{"key":"9807_CR71","unstructured":"MacKinlay, A. C. (1997). Event studies in economics and finance. Journal of economic literature, 13-39."},{"issue":"1","key":"9807_CR72","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/0304-405X(87)90059-6","volume":"18","author":"S Majd","year":"1987","unstructured":"Majd, S., & Pindyck, R. S. (1987). Time to build, option value, and investment decisions. Journal of Financial Economics, 18(1), 7\u201327.","journal-title":"Journal of Financial Economics"},{"key":"9807_CR73","doi-asserted-by":"crossref","first-page":"707","DOI":"10.2307\/1884175","volume":"101","author":"R McDonald","year":"1986","unstructured":"McDonald, R., & Siegel, D. (1986). The value of waiting to invest. Quarterly Journal of Economics, 101, 707\u2013728.","journal-title":"Quarterly Journal of Economics"},{"key":"9807_CR74","unstructured":"Miaoui, Y., & Boudriga, N. (2017). Enterprise security investment through time when facing different types of vulnerabilities. Information Systems Frontiers, 1-40."},{"issue":"7","key":"9807_CR75","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1002\/smj.244","volume":"23","author":"KD Miller","year":"2002","unstructured":"Miller, K. D., & Folta, T. B. (2002). Option value and entry timing. Strategic Management Journal, 23(7), 655\u2013665.","journal-title":"Strategic Management Journal"},{"issue":"4","key":"9807_CR76","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1086\/294442","volume":"34","author":"MH Miller","year":"1961","unstructured":"Miller, M. H., & Modigliani, F. (1961). Dividend policy, growth, and the valuation of shares. the. Journal of Business, 34(4), 411\u2013433.","journal-title":"Journal of Business"},{"issue":"2","key":"9807_CR77","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/0304-405X(77)90015-0","volume":"5","author":"SC Myers","year":"1977","unstructured":"Myers, S. C. (1977). Determinants of corporate borrowing. Journal of Financial Economics, 5(2), 147\u2013175.","journal-title":"Journal of Financial Economics"},{"key":"9807_CR78","doi-asserted-by":"crossref","unstructured":"Pindyck, R. S. (1986). Irreversible investment, capacity choice, and the value of the firm. National Bureau of Economic Research.","DOI":"10.3386\/w1980"},{"issue":"2","key":"9807_CR79","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1287\/isre.1060.0084","volume":"17","author":"C Ranganathan","year":"2006","unstructured":"Ranganathan, C., & Brown, C. V. (2006). ERP investments and the market value of firms: Toward an understanding of influential ERP project variables. Information Systems Research, 17(2), 145\u2013161.","journal-title":"Information Systems Research"},{"issue":"3","key":"9807_CR80","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1177\/0149206304272184","volume":"31","author":"JJ Reuer","year":"2005","unstructured":"Reuer, J. J., & Tong, T. W. (2005). Real options in international joint ventures. Journal of Management, 31(3), 403\u2013423.","journal-title":"Journal of Management"},{"issue":"3","key":"9807_CR81","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/s10796-013-9451-8","volume":"17","author":"N Roztocki","year":"2015","unstructured":"Roztocki, N., & Weistroffer, H. R. (2015). Investments in enterprise integration technology: An event study. Information Systems Frontiers, 17(3), 659\u2013672.","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"9807_CR82","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1111\/j.1540-5414.2006.00131.x","volume":"37","author":"A Tiwana","year":"2006","unstructured":"Tiwana, A., Keil, M., & Fichman, R. G. (2006). Information systems project continuation in escalation situations: A real options model. Decision Sciences, 37(3), 357\u2013391.","journal-title":"Decision Sciences"},{"issue":"5","key":"9807_CR83","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.5465\/amj.2008.34789680","volume":"51","author":"TW Tong","year":"2008","unstructured":"Tong, T. W., Reuer, J. J., & Peng, M. W. (2008). International joint ventures and the value of growth options. Academy of Management Journal, 51(5), 1014\u20131029.","journal-title":"Academy of Management Journal"},{"key":"9807_CR84","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0148-6195(91)90014-N","volume":"43","author":"L Trigeorgis","year":"1991","unstructured":"Trigeorgis, L. (1991). Anticipated competitive entry and early preemptive investment in deferrable projects. Journal of Economics and Business, 43, 143\u2013156.","journal-title":"Journal of Economics and Business"},{"issue":"1","key":"9807_CR85","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1287\/isre.1070.0143","volume":"19","author":"J Wang","year":"2008","unstructured":"Wang, J., Chaudhury, A., & Rao, H. R. (2008). Research Note\u2014A Value-at-Risk Approach to Information Security Investment. Information Systems Research, 19(1), 106\u2013120.","journal-title":"Information Systems Research"},{"issue":"2","key":"9807_CR86","doi-asserted-by":"crossref","first-page":"497","DOI":"10.25300\/MISQ\/2015\/39.2.10","volume":"39","author":"SP-J Wu","year":"2015","unstructured":"Wu, S. P.-J., Straub, D. W., & Liang, T.-P. (2015). How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers. MIS Quarterly, 39(2), 497\u2013518.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9807_CR87","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1080\/00207540903174858","volume":"48","author":"T Yao","year":"2010","unstructured":"Yao, T., Jiang, B., Young, S. T., & Talluri, S. (2010). Outsourcing timing, contract selection, and negotiation. International Journal of Production Research, 48(2), 305\u2013326.","journal-title":"International Journal of Production Research"},{"issue":"10","key":"9807_CR88","doi-asserted-by":"crossref","first-page":"1618","DOI":"10.1287\/mnsc.1070.0705","volume":"53","author":"AA Ziedonis","year":"2007","unstructured":"Ziedonis, A. A. (2007). Real options in technology licensing. Management Science, 53(10), 1618\u20131633.","journal-title":"Management Science"},{"key":"9807_CR89","doi-asserted-by":"crossref","unstructured":"Zingales, L. (2000). In search of new foundations. National Bureau of Economic Research.","DOI":"10.3386\/w7706"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-017-9807-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9807-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9807-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T19:26:27Z","timestamp":1603221987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-017-9807-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":89,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["9807"],"URL":"https:\/\/doi.org\/10.1007\/s10796-017-9807-6","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"30 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}