{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:47:05Z","timestamp":1759938425401,"version":"3.40.5"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,2,27]],"date-time":"2015-02-27T00:00:00Z","timestamp":1424995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10799-015-0217-5","type":"journal-article","created":{"date-parts":[[2015,2,26]],"date-time":"2015-02-26T06:59:03Z","timestamp":1424933943000},"page":"173-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Relationships between need-pull\/technology-push and information security management and the moderating role of regulatory pressure"],"prefix":"10.1007","volume":"16","author":[{"given":"Sanghyun","family":"Kim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Geuna","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aaron M.","family":"French","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,2,27]]},"reference":[{"issue":"3","key":"217_CR1","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"DL Anderson","year":"2010","unstructured":"Anderson DL, Agarwal R (2010) Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q 34(3):613\u2013643","journal-title":"MIS Q"},{"key":"217_CR2","unstructured":"Appari A, Johnson ME (2009) HIPAA compliance: an institutional theory perspective. In: AMCIS 2009 proceedings"},{"issue":"2","key":"217_CR3","first-page":"55","volume":"2","author":"DA Babatunde","year":"2012","unstructured":"Babatunde DA, Selamat MH (2012) Investigating information security management and its influencing factors in the Nigerian banking industry: a conceptual model. Int J Soc Sci Econ Art 2(2):55\u201359","journal-title":"Int J Soc Sci Econ Art"},{"issue":"1","key":"217_CR4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MSP.2007.11","volume":"5","author":"WH Baker","year":"2007","unstructured":"Baker WH, Wallace L (2007) Is information security under control? IEEE Secur Priv 5(1):36\u201344","journal-title":"IEEE Secur Priv"},{"issue":"4","key":"217_CR5","doi-asserted-by":"crossref","first-page":"585","DOI":"10.2307\/25148656","volume":"28","author":"A Barua","year":"2004","unstructured":"Barua A, Konana P, Whinston AB, Yin F (2004) An empirical investigation of net-enabled business value: an exploratory investigation. MIS Q 28(4):585\u2013620","journal-title":"MIS Q"},{"issue":"4","key":"217_CR6","doi-asserted-by":"crossref","first-page":"673","DOI":"10.2307\/25148659","volume":"28","author":"G Bassellier","year":"2004","unstructured":"Bassellier G, Benbasat I (2004) Business competence of information technology professionals: conceptual development and influence on IT\u2013business partnerships. MIS Q 28(4):673\u2013694","journal-title":"MIS Q"},{"key":"217_CR7","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1037\/0033-2909.107.2.238","volume":"107","author":"PM Bentler","year":"1990","unstructured":"Bentler PM (1990) Comparative fit indexes in structural models. Psychol Bull 107:238\u2013246","journal-title":"Psychol Bull"},{"issue":"6","key":"217_CR8","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1287\/orsc.1040.0069","volume":"15","author":"DP Brandon","year":"2004","unstructured":"Brandon DP, Hollingshead AB (2004) Transactive memory systems in organizations: matching tasks, expertise, and people. Organ Sci 15(6):633\u2013644","journal-title":"Organ Sci"},{"key":"217_CR9","unstructured":"Brown CV, Sambamurthy V (2001) Coordination theory in the context of the IT function: linking the logic of governance and coordination mechanisms. University of Maryland Working Paper"},{"key":"217_CR10","first-page":"136","volume-title":"Testing structural equation models","author":"MW Browne","year":"1993","unstructured":"Browne MW, Cudeck R (1993) Alternative ways of assessing model fit. In: Bollen KA, Long JS (eds) Testing structural equation models. Sage, Newbury Park, pp 136\u2013162"},{"issue":"3","key":"217_CR11","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q 34(3):523\u2013548","journal-title":"MIS Q"},{"key":"217_CR12","first-page":"65","volume-title":"Social measurement: current issues","author":"EG Carmines","year":"1981","unstructured":"Carmines EG, McIver JP (1981) Analyzing models with unobserved variables. In: Bohrnstedt GW, Borgatta EF (eds) Social measurement: current issues. Sage, Beverly Hills, pp 65\u2013115"},{"issue":"3","key":"217_CR13","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1108\/02635570610653498","volume":"106","author":"SE Chang","year":"2006","unstructured":"Chang SE, Ho CB (2006) Organizational factors to the effectiveness of implementing information security management. Ind Manag Data Syst 106(3):345\u2013361","journal-title":"Ind Manag Data Syst"},{"issue":"2","key":"217_CR14","doi-asserted-by":"crossref","first-page":"65","DOI":"10.2307\/4132321","volume":"26","author":"D Chatterjee","year":"2002","unstructured":"Chatterjee D, Grewal R, Sambamurthy V (2002) Shaping up for e-commerce: institutional enablers of the organizational assimilation of web technologies. MIS Q 26(2):65\u201389","journal-title":"MIS Q"},{"issue":"1","key":"217_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/249740","volume":"21","author":"PYK Chau","year":"1997","unstructured":"Chau PYK, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1):1\u201324","journal-title":"MIS Q"},{"issue":"5","key":"217_CR16","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0378-7206(99)00050-6","volume":"37","author":"PYK Chau","year":"2000","unstructured":"Chau PYK, Tam KY (2000) Organizational adoption of open systems: a \u2018technology-push, need-pull\u2019 perspective. Inf Manag 37(5):229\u2013239","journal-title":"Inf Manag"},{"issue":"1","key":"217_CR17","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1504\/IJTM.1994.025565","volume":"9","author":"SR Chidamber","year":"1994","unstructured":"Chidamber SR, Kon HB (1994) A research retrospective of innovation inception and success: the technology-push, demand-pull question. Int J Technol Manag 9(1):94\u2013112","journal-title":"Int J Technol Manag"},{"key":"217_CR18","first-page":"295","volume-title":"Modern methods for business research","author":"W Chin","year":"1998","unstructured":"Chin W (1998) The partial least squares approach for structural equation modeling. In: Marcoulides GA (ed) Modern methods for business research. Lawrence Erlbaum, Hillsdale, pp 295\u2013336"},{"issue":"1","key":"217_CR19","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1037\/0033-2909.112.1.155","volume":"112","author":"J Cohen","year":"1992","unstructured":"Cohen J (1992) A power primer. Psychol Bull 112(1):155\u2013159","journal-title":"Psychol Bull"},{"issue":"2","key":"217_CR20","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1287\/mnsc.36.2.123","volume":"36","author":"R Cooper","year":"1990","unstructured":"Cooper R, Zmud R (1990) Information technology implementation research: a technological diffusion approach. Manag Sci 36(2):123\u2013139","journal-title":"Manag Sci"},{"issue":"1","key":"217_CR21","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy J, Hovav A, Galletta D (2009) User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf Syst Res 20(1):79\u201398","journal-title":"Inf Syst Res"},{"issue":"7","key":"217_CR22","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/341852.341877","volume":"43","author":"G Dhillon","year":"2000","unstructured":"Dhillon G, Backhouse J (2000) Information system security management in the new millennium. Commun ACM 43(7):125\u2013128","journal-title":"Commun ACM"},{"issue":"2","key":"217_CR23","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/2095101","volume":"48","author":"PJ DiMaggio","year":"1983","unstructured":"DiMaggio PJ, Powell WW (1983) The iron cage revisited: institutional isomorphism and collective rationality in organizational fields. Am Sociol Rev 48(2):147\u2013160","journal-title":"Am Sociol Rev"},{"issue":"1","key":"217_CR24","first-page":"73","volume":"26","author":"CR Dodge","year":"2007","unstructured":"Dodge CR, Carver C, Ferguson JA (2007) Phishing for user security awareness. Comput Sci 26(1):73\u201380","journal-title":"Comput Sci"},{"issue":"2","key":"217_CR25","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1287\/isre.1040.0021","volume":"15","author":"RG Fichman","year":"2004","unstructured":"Fichman RG (2004) Real options and IT platform adoption: implications for theory and practice. Inf Syst Res 15(2):132\u2013154","journal-title":"Inf Syst Res"},{"issue":"4","key":"217_CR26","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1111\/j.1468-2958.2000.tb00771.x","volume":"26","author":"AJ Flanagin","year":"2000","unstructured":"Flanagin AJ (2000) Social pressures on organizational website adoption. Hum Commun Res 26(4):618\u2013646","journal-title":"Hum Commun Res"},{"issue":"1","key":"217_CR27","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell C, Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18(1):39\u201350","journal-title":"J Mark Res"},{"issue":"4","key":"217_CR28","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/S1361-3723(08)70064-2","volume":"2008","author":"S Furnell","year":"2008","unstructured":"Furnell S (2008) End-user security culture: a lesson that will never be learnt? Comput Fraud Secur 2008(4):6\u20139","journal-title":"Comput Fraud Secur"},{"issue":"5\/6","key":"217_CR29","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1108\/09576050210447037","volume":"15","author":"SM Furnell","year":"2002","unstructured":"Furnell SM, Gennatou M, Dowland PS (2002) A prototype tool for information security awareness and training. Logist Inf Manag 15(5\/6):352\u2013357","journal-title":"Logist Inf Manag"},{"key":"217_CR30","first-page":"1","volume-title":"Agile information systems","author":"R Galliers","year":"2007","unstructured":"Galliers R (2007) Strategizing for agility: confronting information systems inflexibility in dynamic environments. In: DeSouza K (ed) Agile information systems. Butterworth-Heinemann, Elsevier Inc, Burlington, pp 1\u201315"},{"issue":"4","key":"217_CR31","doi-asserted-by":"crossref","first-page":"185","DOI":"10.2753\/MIS0742-1222230409","volume":"23","author":"V Grover","year":"2007","unstructured":"Grover V, Saeed KA (2007) The impact of product, market, and relationship characteristics on interorganizational system integration in manufacturer\u2013supplier dyads. J Manag Inf Syst 23(4):185\u2013216","journal-title":"J Manag Inf Syst"},{"issue":"1","key":"217_CR32","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/07421222.1993.11517994","volume":"10","author":"V Grover","year":"1993","unstructured":"Grover V, Goslar MD (1993) The initiation, adoption, and implementation of telecommunications technologies in US organizations. J Manag Inf Syst 10(1):141\u2013163","journal-title":"J Manag Inf Syst"},{"issue":"2","key":"217_CR33","doi-asserted-by":"crossref","first-page":"203","DOI":"10.2753\/MIS0742-1222280208","volume":"28","author":"KH Guo","year":"2011","unstructured":"Guo KH, Yuan Y, Archer NP, Connelly CE (2011) Understanding nomnalicious security violations in the workplace: a composite behavior model. J Manag Inf Syst 28(2):203\u2013236","journal-title":"J Manag Inf Syst"},{"issue":"2","key":"217_CR34","first-page":"105","volume":"8","author":"IG Han","year":"1998","unstructured":"Han IG, Sun HK (1998) A case study on the information security management system for major Korean business groups. Asia Pac J Inf Syst 8(2):105\u2013119","journal-title":"Asia Pac J Inf Syst"},{"issue":"3","key":"217_CR35","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1080\/10864415.2005.11044334","volume":"9","author":"CR Ho","year":"2005","unstructured":"Ho CR, Chi YP, Tai YM (2005) A structural approach to measuring uncertainty in supply chains. Int J Electron Commer 9(3):91\u2013114","journal-title":"Int J Electron Commer"},{"issue":"1","key":"217_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.1110.0352","volume":"23","author":"C Hsu","year":"2012","unstructured":"Hsu C, Lee JN, Straub DW (2012) Institutional influences on information systems security innovations. Inf Syst Res 23(1):1\u201322","journal-title":"Inf Syst Res"},{"issue":"2","key":"217_CR37","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.jsis.2007.05.004","volume":"16","author":"Q Hu","year":"2007","unstructured":"Hu Q, Hart P, Cooke D (2007) The role of external and internal influences on information systems security\u2014a neo-institutional perspective. J Strateg Inf Syst 16(2):153\u2013172","journal-title":"J Strateg Inf Syst"},{"issue":"5","key":"217_CR38","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1287\/mnsc.30.5.586","volume":"30","author":"B Ives","year":"1984","unstructured":"Ives B, Olson MH (1984) User involvement and MIS success: a review of research. Manag Sci 30(5):586\u2013603","journal-title":"Manag Sci"},{"issue":"1","key":"217_CR39","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1111\/j.1365-2575.2011.00369.x","volume":"22","author":"WJ Jung","year":"2012","unstructured":"Jung WJ, Shin Y, Lee SYT (2012) The behavioral attitude of financial firms\u2019 employees on the customer information security in Korea. Asia Pac J Inf Syst 22(1):53\u201377","journal-title":"Asia Pac J Inf Syst"},{"issue":"7","key":"217_CR40","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1016\/j.im.2003.08.018","volume":"41","author":"GS Kearns","year":"2004","unstructured":"Kearns GS, Lederer AL (2004) The impact of industry contextual factors on IT focus and the use of IT for competitive advantage. Inf Manag 41(7):899\u2013919","journal-title":"Inf Manag"},{"issue":"2","key":"217_CR41","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1201\/1078\/45099.22.2.20050301\/87273.2","volume":"22","author":"S Keller","year":"2005","unstructured":"Keller S, Powell A, Horstmann B, Predmore C, Crawford M (2005) Information security threats and practices in small business. Inf Syst Manag 22(2):7\u201319","journal-title":"Inf Syst Manag"},{"issue":"2","key":"217_CR42","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/TEM.2006.872251","volume":"53","author":"M Khalifa","year":"2006","unstructured":"Khalifa M, Davison RM (2006) SME adoption of IT: the case of electronic trading systems. IEEE Trans Eng Manag 53(2):275\u2013284","journal-title":"IEEE Trans Eng Manag"},{"issue":"4","key":"217_CR43","first-page":"181","volume":"9","author":"HS Kim","year":"1999","unstructured":"Kim HS (1999) A study on the quantification of information security level. Asia Pac J Inf Syst 9(4):181\u2013201","journal-title":"Asia Pac J Inf Syst"},{"issue":"2","key":"217_CR44","first-page":"65","volume":"15","author":"JK Kim","year":"2005","unstructured":"Kim JK, Lee DH (2005) A research on information security risk-based antecedents influencing electronic commerce user\u2019s trust. Asia Pac J Inf Syst 15(2):65\u201396","journal-title":"Asia Pac J Inf Syst"},{"issue":"5","key":"217_CR45","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.ijinfomgt.2010.02.008","volume":"30","author":"S Kim","year":"2010","unstructured":"Kim S, Garrison G (2010) Understanding users\u2019 behaviors regarding supply chain technology: determinants impacting the adoption and implementation of RFID technology in South Korea. Int J Inf Manag 30(5):388\u2013398","journal-title":"Int J Inf Manag"},{"issue":"1","key":"217_CR46","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.jbusres.2006.05.011","volume":"61","author":"EJ Ko","year":"2008","unstructured":"Ko EJ, Kim SH, Kim MS, Woo JY (2008) Organizational characteristics and the CRM adoption process. J Bus Res 61(1):65\u201374","journal-title":"J Bus Res"},{"issue":"4","key":"217_CR47","first-page":"129","volume":"23","author":"JM Koo","year":"2013","unstructured":"Koo JM, Park JS, Park JH (2013) Study about the impact of information security systems on corporate performance: based on IT relatedness theory. Asia Pac J Inf Syst 23(4):129\u2013149","journal-title":"Asia Pac J Inf Syst"},{"issue":"8","key":"217_CR48","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/S0378-7206(01)00073-8","volume":"38","author":"KKY Kuan","year":"2001","unstructured":"Kuan KKY, Chau PYK (2001) A perception-based model for EDI adoption in small businesses using a technology\u2013organization\u2013environment framework. Inf Manag 38(8):507\u2013521","journal-title":"Inf Manag"},{"issue":"6","key":"217_CR49","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1057\/palgrave.ejis.3000716","volume":"16","author":"CP Lee","year":"2007","unstructured":"Lee CP, Shim JP (2007) An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry. Eur J Inf Syst 16(6):712\u2013724","journal-title":"Eur J Inf Syst"},{"issue":"2","key":"217_CR50","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.im.2008.01.002","volume":"45","author":"Y Lee","year":"2008","unstructured":"Lee Y, Kozar KA (2008) An empirical investigation of anti-spyware software adoption: a multitheoretical perspective. Inf Manag 45(2):109\u2013119","journal-title":"Inf Manag"},{"issue":"2","key":"217_CR51","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1057\/ejis.2009.11","volume":"18","author":"Y Lee","year":"2009","unstructured":"Lee Y, Larsen KR (2009) Threat of coping appraisal: determinants of SMB executives\u2019 decision to adopt anti-malware software. Eur J Inf Syst 18(2):177\u2013187","journal-title":"Eur J Inf Syst"},{"issue":"4","key":"217_CR52","doi-asserted-by":"crossref","first-page":"657","DOI":"10.2307\/30036552","volume":"27","author":"W Lewis","year":"2003","unstructured":"Lewis W, Agarwal R, Sambamurthy V (2003) Sources of influence on beliefs about information technology use: an empirical study of knowledge workers. MIS Q 27(4):657\u2013678","journal-title":"MIS Q"},{"issue":"4","key":"217_CR53","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1016\/j.dss.2009.12.005","volume":"48","author":"H Li","year":"2010","unstructured":"Li H, Zhang J, Sarathy R (2010) Understanding compliance with internet use policy from the perspective of rational choice theory. Decis Support Syst 48(4):635\u2013645","journal-title":"Decis Support Syst"},{"issue":"1","key":"217_CR54","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","volume":"31","author":"H Liang","year":"2007","unstructured":"Liang H, Saraf N, Hu Q, Xue Y (2007) Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management. MIS Q 31(1):59\u201387","journal-title":"MIS Q"},{"issue":"4","key":"217_CR55","doi-asserted-by":"crossref","first-page":"931","DOI":"10.2307\/41409967","volume":"35","author":"Y Lu","year":"2011","unstructured":"Lu Y, Ramamurthy K (2011) Understanding the link between information technology capability and organizational agility: an empirical examination. MIS Q 35(4):931\u2013954","journal-title":"MIS Q"},{"key":"217_CR56","unstructured":"Ma Q, Ratnasingam P (2008) Factors affecting the objectives of information security management. In: International conference on information resources management 2008 proceedings"},{"issue":"11\u201312","key":"217_CR57","first-page":"514","volume":"5","author":"ML Markus","year":"2004","unstructured":"Markus ML, Mao JY (2004) Participation in development and implementation\u2014updating an old, tired concept for today\u2019s IS contexts. J Assoc Inf Syst 5(11\u201312):514\u2013544","journal-title":"J Assoc Inf Syst"},{"issue":"2","key":"217_CR58","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/0048-7333(79)90019-2","volume":"8","author":"D Mowery","year":"1979","unstructured":"Mowery D, Rosenberg N (1979) The influence of market demand upon innovation: a critical review of some recent empirical studies. Res Pol 8(2):102\u2013153","journal-title":"Res Pol"},{"issue":"2","key":"217_CR59","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/17.6006","volume":"35","author":"H Munro","year":"1988","unstructured":"Munro H, Noori H (1988) Measuring commitment to new manufacturing technology: integrating technological push and marketing pull concepts. IEEE Trans Eng Manag 35(2):63\u201370","journal-title":"IEEE Trans Eng Manag"},{"key":"217_CR60","volume-title":"Psychometric theory","author":"JC Nunnally","year":"1978","unstructured":"Nunnally JC (1978) Psychometric theory. McGraw Hill, New York"},{"issue":"3","key":"217_CR61","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1111\/j.1540-5915.1995.tb01431.x","volume":"26","author":"G Premkumar","year":"1995","unstructured":"Premkumar G, Ramamurthy K (1995) The role of interorganizational and organizational factors on the decision mode for adoption of interorganizational systems. Decis Sci 26(3):303\u2013336","journal-title":"Decis Sci"},{"issue":"2","key":"217_CR62","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1080\/07421222.1996.11518129","volume":"13","author":"A Rai","year":"1996","unstructured":"Rai A, Patnayakuni R (1996) A structural model for CASE adoption behavior. J Manag Inf Syst 13(2):205\u2013234","journal-title":"J Manag Inf Syst"},{"key":"217_CR63","doi-asserted-by":"crossref","unstructured":"Richardson R (2011) 2010\/2011 CSI computer crime and security survey. Computer Security Institute, New york","DOI":"10.1016\/S1361-3723(11)70062-8"},{"issue":"2","key":"217_CR64","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1177\/1094428106294693","volume":"10","author":"SG Rogelberg","year":"2007","unstructured":"Rogelberg SG, Stanton JM (2007) Introduction: understanding and dealing with organizational survey nonresponses. Organ Res Methods 10(2):195\u2013209","journal-title":"Organ Res Methods"},{"key":"217_CR65","volume-title":"Diffusion of innovations","author":"EM Rogers","year":"2003","unstructured":"Rogers EM (2003) Diffusion of innovations, 5th edn. The Free Press, New York","edition":"5"},{"key":"217_CR66","volume-title":"Technology and change","author":"DA Schon","year":"1967","unstructured":"Schon DA (1967) Technology and change. Delacorte Press, New York"},{"issue":"2","key":"217_CR67","doi-asserted-by":"crossref","first-page":"219","DOI":"10.2307\/25148789","volume":"31","author":"R Sharma","year":"2007","unstructured":"Sharma R, Yetton P (2007) The contingent effects of training, technical complexity, and task interdependence on successful information systems implementation. MIS Q 31(2):219\u2013238","journal-title":"MIS Q"},{"issue":"2","key":"217_CR68","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jsis.2005.08.004","volume":"15","author":"HP Shih","year":"2006","unstructured":"Shih HP (2006) Technology-push and communication-pull forces driving message-based coordination performance. J Strateg Inf Syst 15(2):105\u2013123","journal-title":"J Strateg Inf Syst"},{"issue":"2","key":"217_CR69","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/503345.503348","volume":"31","author":"MT Siponen","year":"2001","unstructured":"Siponen MT (2001) Five dimensions of information security awareness. Comput Soc 31(2):24\u201329","journal-title":"Comput Soc"},{"issue":"1","key":"217_CR70","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1080\/07421222.2003.11045839","volume":"22","author":"JY Son","year":"2005","unstructured":"Son JY, Narasimhan S, Riggins F (2005) Effects of relational factors and channel climate on EDI usage in the customer\u2013supplier relationship. J Manag Inf Syst 22(1):321\u2013353","journal-title":"J Manag Inf Syst"},{"issue":"3","key":"217_CR71","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25750689","volume":"34","author":"JL Spears","year":"2010","unstructured":"Spears JL, Barki H (2010) User participation in information systems security risk management. MIS Q 34(3):503\u2013522","journal-title":"MIS Q"},{"issue":"2","key":"217_CR72","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/07421222.2002.11045727","volume":"19","author":"G Templeton","year":"2002","unstructured":"Templeton G, Lewis B, Snyder C (2002) Development of a measure for the organizational learning construct. J Manag Inf Syst 19(2):175\u2013218","journal-title":"J Manag Inf Syst"},{"issue":"1","key":"217_CR73","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/30036518","volume":"27","author":"HH Teo","year":"2003","unstructured":"Teo HH, Wei KK, Benbasat I (2003) Predicting intention to adopt interorganizational linkages: an institutional perspective. MIS Q 27(1):19\u201349","journal-title":"MIS Q"},{"issue":"1","key":"217_CR74","doi-asserted-by":"crossref","first-page":"17","DOI":"10.2307\/3250957","volume":"25","author":"BH Wixom","year":"2001","unstructured":"Wixom BH, Watson HJ (2001) An empirical investigation of the factors affecting data warehousing success. MIS Q 25(1):17\u201341","journal-title":"MIS Q"},{"issue":"1","key":"217_CR75","doi-asserted-by":"crossref","first-page":"67","DOI":"10.2307\/25148829","volume":"32","author":"Y Xue","year":"2008","unstructured":"Xue Y, Liang H, Boulton WR (2008) Information technology governance in information technology investment decision processes: the impact of investment characteristics, external environment, and internal context. MIS Q 32(1):67\u201396","journal-title":"MIS Q"},{"issue":"4","key":"217_CR76","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.ijinfomgt.2010.10.006","volume":"31","author":"EY Yildirim","year":"2011","unstructured":"Yildirim EY, Akalp G, Aytac S, Bayram N (2011) Factors influencing information security management in small-and medium-sized enterprises: a case study from Turkey. Int J Inf Manag 31(4):360\u2013365","journal-title":"Int J Inf Manag"},{"issue":"11","key":"217_CR77","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1287\/mnsc.43.11.1493","volume":"43","author":"A Zaheer","year":"1997","unstructured":"Zaheer A, Zaheer S (1997) Catching the wave: alertness, responsiveness, and market influence in global electronic networks. Manag Sci 43(11):1493\u20131509","journal-title":"Manag Sci"},{"issue":"10","key":"217_CR78","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1287\/mnsc.1050.0487","volume":"52","author":"K Zhu","year":"2006","unstructured":"Zhu K, Kraemer KL, Xu S (2006) The process of innovation assimilation by firms in different countries: a technology diffusion perspective on e-business. Manag Sci 52(10):1557\u20131576","journal-title":"Manag Sci"},{"issue":"6","key":"217_CR79","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1057\/palgrave.ejis.3000650","volume":"15","author":"K Zhu","year":"2006","unstructured":"Zhu K, Dong S, Xu SX, Kraemer KL (2006) Innovation diffusion in global contexts: determinants of post-adoption digital transformation of European companies. Eur J Inf Syst 15(6):601\u2013616","journal-title":"Eur J Inf Syst"},{"issue":"6","key":"217_CR80","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1287\/mnsc.30.6.727","volume":"30","author":"RW Zmud","year":"1984","unstructured":"Zmud RW (1984) An examination of \u2018push-pull\u2019 theory applied to process innovation in knowledge work. Manag Sci 30(6):727\u2013738","journal-title":"Manag Sci"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0217-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-015-0217-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-015-0217-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T01:53:54Z","timestamp":1747706034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-015-0217-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,27]]},"references-count":80,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["217"],"URL":"https:\/\/doi.org\/10.1007\/s10799-015-0217-5","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"type":"print","value":"1385-951X"},{"type":"electronic","value":"1573-7667"}],"subject":[],"published":{"date-parts":[[2015,2,27]]}}}