{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T14:46:11Z","timestamp":1773499571815,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:00Z","timestamp":1740096000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:00Z","timestamp":1740096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Johann Wolfgang Goethe-Universit\u00e4t, Frankfurt am Main"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s12599-025-00933-7","type":"journal-article","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:48:52Z","timestamp":1740142132000},"page":"141-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Damocles Sword of Cyber Attacks"],"prefix":"10.1007","volume":"67","author":[{"given":"Frederik","family":"Hering","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Hinz","sequence":"additional","affiliation":[]},{"given":"Jella","family":"Pfeiffer","sequence":"additional","affiliation":[]},{"given":"Wil","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,21]]},"reference":[{"issue":"2","key":"933_CR1","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1287\/isre.2020.0973","volume":"32","author":"A Abbasi","year":"2021","unstructured":"Abbasi A, Dobolyi D, Vance A, Zahedi FM (2021) The phishing funnel model: a design artifact to predict user susceptibility to phishing websites. Inf Syst Res 32(2):410\u2013436. https:\/\/doi.org\/10.1287\/isre.2020.0973","journal-title":"Inf Syst Res"},{"key":"933_CR2","unstructured":"Allianz Commercial (2025) Allianz risk barometer. https:\/\/commercial.allianz.com\/news-and-insights\/reports\/allianz-risk-barometer.html, accessed 20 Jan 2025"},{"key":"933_CR3","doi-asserted-by":"publisher","unstructured":"Ampel B, Samtani S, Zhu H (2024) Creating proactive cyber threat intelligence with hacker exploit labels: a deep transfer learning approach. MIS Q 48(1):137\u2013166, https:\/\/doi.org\/10.25300\/MISQ\/2023\/17316","DOI":"10.25300\/MISQ\/2023\/17316"},{"key":"933_CR4","doi-asserted-by":"publisher","unstructured":"Angst C, Block E, D\u2019Arcy J, Kelley K (2017) When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Q 41(3):893\u2013916, https:\/\/doi.org\/10.25300\/MISQ\/2017\/41.3.10","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"issue":"4","key":"933_CR5","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s12599-021-00729-5","volume":"64","author":"D Arce","year":"2022","unstructured":"Arce D (2022) Security-induced lock-in in the cloud. Bus Inf Syst Eng 64(4):501\u2013513","journal-title":"Bus Inf Syst Eng"},{"issue":"4","key":"933_CR6","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R Baskerville","year":"1993","unstructured":"Baskerville R (1993) Information systems security design methods: implications for information systems development. ACM Comput Surv (CSUR) 25(4):375\u2013414","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"4","key":"933_CR7","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s12599-018-0528-2","volume":"61","author":"A Baumann","year":"2019","unstructured":"Baumann A, Haupt J, Gebert F, Lessmann S (2019) The price of privacy: an evaluation of the economic value of collecting clickstream data. Bus Inf Syst Eng 61(4):413\u2013431","journal-title":"Bus Inf Syst Eng"},{"issue":"3","key":"933_CR8","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s12599-024-00869-4","volume":"66","author":"B Binzer","year":"2024","unstructured":"Binzer B, Kendziorra J, Witte AK, Winkler TJ (2024) Trust in public and private providers of health apps and usage intentions: a sectoral privacy calculus and control perspective. Bus Inf Syst Eng 66(3):273\u2013297","journal-title":"Bus Inf Syst Eng"},{"key":"933_CR9","first-page":"172","volume":"15","author":"M Bromiley","year":"2016","unstructured":"Bromiley M (2016) Threat intelligence: what it is, and how to use it effectively. SANS Inst InfoSec Reading Room 15:172","journal-title":"SANS Inst InfoSec Reading Room"},{"key":"933_CR10","unstructured":"Cambridge University Press (2024) The Cambridge Dictionary cybersecurity definition. https:\/\/dictionary.cambridge.org\/dictionary\/english\/cybersecurity, accessed 09 Dec 2024"},{"issue":"1","key":"933_CR11","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1287\/isre.2023.1222","volume":"35","author":"J Chan","year":"2024","unstructured":"Chan J, He S, Qiao D, Whinston A (2024) Shedding light on the dark: the impact of legal enforcement on darknet transactions. Inf Syst Res 35(1):145\u2013164. https:\/\/doi.org\/10.1287\/isre.2023.1222","journal-title":"Inf Syst Res"},{"issue":"2","key":"933_CR12","doi-asserted-by":"publisher","first-page":"397","DOI":"10.2307\/23044049","volume":"35","author":"PY Chen","year":"2011","unstructured":"Chen PY, Kataria G, Krishnan R (2011) Correlated failures, diversification, and information security risk management. MIS Q 35(2):397\u2013422. https:\/\/doi.org\/10.2307\/23044049","journal-title":"MIS Q"},{"key":"933_CR13","unstructured":"Clearinghouse PR (2023) PRC Data Breach Chronology. https:\/\/privacyrights.org\/, 01 Dec 2024"},{"key":"933_CR14","doi-asserted-by":"publisher","unstructured":"Cram W, D\u2019Arcy J, Proudfoot J (2019) Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. MIS Q 43(2):525\u2013554, https:\/\/doi.org\/10.25300\/MISQ\/2019\/15117","DOI":"10.25300\/MISQ\/2019\/15117"},{"key":"933_CR15","doi-asserted-by":"publisher","unstructured":"Cram W, Arcy J, Benlian A (2024) Time will tell: The case for an idiographic approach to behavioral cybersecurity research. MIS Q 48(1):95\u2013136, https:\/\/doi.org\/10.25300\/MISQ\/2023\/17707","DOI":"10.25300\/MISQ\/2023\/17707"},{"key":"933_CR16","doi-asserted-by":"publisher","unstructured":"de Nobrega KM, Rutkowski AF, Saunders C (2024) The whole of cyber defense: syncing practice and theory. J Strateg Inf Syst 33(4):101,861, https:\/\/doi.org\/10.1016\/j.jsis.2024.101861","DOI":"10.1016\/j.jsis.2024.101861"},{"key":"933_CR17","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1046\/j.1365-2575.2001.00099.x","volume":"11","author":"G Dhillon","year":"2001","unstructured":"Dhillon G, Backhouse J (2001) Current directions in is security research: towards socioorganizational perspectives. Inf Syst J 11:127\u2013153. https:\/\/doi.org\/10.1046\/j.1365-2575.2001.00099.x","journal-title":"Inf Syst J"},{"key":"933_CR18","doi-asserted-by":"crossref","unstructured":"Dhillon G, Smith K, Dissanayaka I (2021) Information systems security research agenda: exploring the gap between research and practice. J Strateg Inf Syst 30(4):101,693","DOI":"10.1016\/j.jsis.2021.101693"},{"key":"933_CR19","doi-asserted-by":"publisher","unstructured":"Ebrahimi M Jr, JFN, Chen H, (2020) Semi-supervised cyber threat identification in dark net markets: a transductive and deep learning approach. J Manag Inf Syst 37(3):694\u2013722. https:\/\/doi.org\/10.1080\/07421222.2020.1790186","DOI":"10.1080\/07421222.2020.1790186"},{"issue":"6","key":"933_CR20","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1080\/0960085X.2022.2096491","volume":"32","author":"F Ghahramani","year":"2023","unstructured":"Ghahramani F, Yazdanmehr A, Chen D, Wang J (2023) Continuous improvement of information security management: an organisational learning perspective. Europ J Inf Syst 32(6):1011\u20131032. https:\/\/doi.org\/10.1080\/0960085X.2022.2096491","journal-title":"Europ J Inf Syst"},{"issue":"4","key":"933_CR21","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s12599-023-00830-x","volume":"66","author":"J Gl\u00f6ckler","year":"2024","unstructured":"Gl\u00f6ckler J, Sedlmeir J, Frank M, Fridgen G (2024) A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity. Bus Inf Syst Eng 66(4):421\u2013440","journal-title":"Bus Inf Syst Eng"},{"key":"933_CR22","doi-asserted-by":"publisher","unstructured":"Hoehle H, Venkatesh V, Brown S, Tepper B, Kude T (2022) Impact of customer compensation strategies on outcomes and the mediating role of justice perceptions: a longitudinal study of target\u2019s data breach. MIS Q 46(1):299\u2013340, https:\/\/doi.org\/10.25300\/MISQ\/2022\/14740","DOI":"10.25300\/MISQ\/2022\/14740"},{"key":"933_CR23","unstructured":"Holst M (2025) Everybody will be hacked, it\u2019s just a matter of when, not if. Interview Digi.no. https:\/\/riversecurity.eu\/interview-digi-no-everybody-will-be-hacked-its-just-a-matter-of-when-not-if\/, 02 Jan 2025"},{"key":"933_CR24","doi-asserted-by":"crossref","unstructured":"Hui KL, Vance A, Zhdanov D (2016) Securing digital assets. MIS Q Res Curations https:\/\/www.misqresearchcurations.org\/blog\/2017\/5\/10\/securing-digital-assets-1, accessed 09 Dec 2024","DOI":"10.25300\/MISQ\/2019\/curations\/05272016"},{"issue":"3","key":"933_CR25","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1111\/isj.12317","volume":"31","author":"L Jaeger","year":"2021","unstructured":"Jaeger L, Eckhardt A (2021) Eyes wide open: the role of situational information security awareness for security-related behaviour. Inf Syst J 31(3):429\u2013472. https:\/\/doi.org\/10.1111\/isj.12317","journal-title":"Inf Syst J"},{"issue":"2","key":"933_CR26","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1509\/jm.16.0124","volume":"82","author":"R Janakiraman","year":"2018","unstructured":"Janakiraman R, Lim JH, Rishika R (2018) The effect of a data breach announcement on customer behavior: evidence from a multichannel retailer. J Market 82(2):85\u2013105","journal-title":"J Market"},{"issue":"3","key":"933_CR27","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1080\/07421222.2022.2096551","volume":"39","author":"ML Jensen","year":"2022","unstructured":"Jensen ML, Wright RT, Durcikova A, Karumbaiah S (2022) Improving phishing reporting using security gamification. J Manag Inf Syst 39(3):793\u2013823. https:\/\/doi.org\/10.1080\/07421222.2022.2096551","journal-title":"J Manag Inf Syst"},{"issue":"6","key":"933_CR28","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s12599-023-00811-0","volume":"65","author":"Y Jiang","year":"2023","unstructured":"Jiang Y, Jeusfeld MA, Ding J, Sandahl E (2023) Model-based cybersecurity analysis: extending enterprise modeling to critical infrastructure cybersecurity. Bus Inf Syst Eng 65(6):643\u2013676","journal-title":"Bus Inf Syst Eng"},{"key":"933_CR29","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.cose.2016.12.012","volume":"67","author":"F Karlsson","year":"2017","unstructured":"Karlsson F, Hedstr\u00f6m K, Goldkuhl G (2017) Practice-based discourse analysis of information security policies. Comput Secur 67:267\u2013279. https:\/\/doi.org\/10.1016\/j.cose.2016.12.012","journal-title":"Comput Secur"},{"issue":"1","key":"933_CR30","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/0960085X.2022.2088414","volume":"32","author":"J Kotsias","year":"2023","unstructured":"Kotsias J, Ahmad A, Scheepers R (2023) Adopting and integrating cyber-threat intelligence in a commercial organisation. Europ J Inf Syst 32(1):35\u201351. https:\/\/doi.org\/10.1080\/0960085X.2022.2088414","journal-title":"Europ J Inf Syst"},{"key":"933_CR31","doi-asserted-by":"publisher","unstructured":"Kwon J, Johnson M (2014) Proactive versus reactive security investments in the healthcare sector. MIS Q 38(2):451\u2013471, https:\/\/doi.org\/10.25300\/MISQ\/2014\/38.2.06","DOI":"10.25300\/MISQ\/2014\/38.2.06"},{"issue":"4","key":"933_CR32","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.25300\/MISQ\/2022\/15642","volume":"46","author":"W Li","year":"2022","unstructured":"Li W, Chen H (2022) Discovering emerging threats in the hacker community: a nonparametric emerging topic detection framework. MIS Q 46(4):2337\u20132350","journal-title":"MIS Q"},{"issue":"3","key":"933_CR33","doi-asserted-by":"publisher","first-page":"431","DOI":"10.2307\/25750685","volume":"34","author":"M Mahmood","year":"2010","unstructured":"Mahmood M, Siponen M, Straub D, Rao R, Santanam R (2010) Moving toward black hat research in information systems security: an editorial introduction to the special issue. MIS Q 34(3):431\u2013433. https:\/\/doi.org\/10.2307\/25750685","journal-title":"MIS Q"},{"issue":"5","key":"933_CR34","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s12599-019-00613-3","volume":"61","author":"F Mannhardt","year":"2019","unstructured":"Mannhardt F, Koschmider A, Baracaldo N, Weidlich M, Michael J (2019) Privacy-preserving process mining: differential privacy for event logs. Bus Inf Syst Eng 61(5):595\u2013614","journal-title":"Bus Inf Syst Eng"},{"issue":"1","key":"933_CR35","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12599-018-0518-4","volume":"60","author":"R Matulevi\u010dius","year":"2018","unstructured":"Matulevi\u010dius R, Norta A, Samar\u00fctel S (2018) Security requirements elicitation from airline turnaround processes. Bus Inf Syst Eng 60(1):3\u201320","journal-title":"Bus Inf Syst Eng"},{"key":"933_CR36","doi-asserted-by":"publisher","unstructured":"Mehrizi MR, Nicolini D, Rodon J (2021) How do organizations learn from information system incidents? a synthesis of the past, present, and future. MIS Q 46(2), https:\/\/doi.org\/10.25300\/MISQ\/2022\/14305","DOI":"10.25300\/MISQ\/2022\/14305"},{"key":"933_CR37","unstructured":"MISQ (2024) Call for papers: Special issue on AI-IA nexus. https:\/\/misq.umn.edu\/call-for-papers-ai-ia, accessed 12 Dec 2024"},{"key":"933_CR38","unstructured":"MITRE Corporation (2024) Common vulnerabilities and exposures database. https:\/\/www.cve.org\/About\/Metrics, accessed 09 Dec 2024"},{"key":"933_CR39","unstructured":"National Cyber Security Centre (2024) The near-term impact of AI on the cyber threat. https:\/\/www.ncsc.gov.uk\/report\/impact-of-ai-on-cyber-threat, accessed 18 Jan 2025"},{"issue":"6","key":"933_CR40","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s12599-014-0351-3","volume":"6","author":"M Nofer","year":"2014","unstructured":"Nofer M, Hinz O, Muntermann J, Ro\u00dfnagel H (2014) The economic impact of privacy violations and security breaches: a laboratory experiment. Bus Inf Syst Eng 6(6):339\u2013348","journal-title":"Bus Inf Syst Eng"},{"issue":"101","key":"933_CR41","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1016\/j.cose.2019.101608","volume":"88","author":"H Paananen","year":"2020","unstructured":"Paananen H, Lapke M, Siponen M (2020) State of the art in information security policy development. Comput Secur 88(101):608. https:\/\/doi.org\/10.1016\/j.cose.2019.101608","journal-title":"Comput Secur"},{"issue":"3","key":"933_CR42","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1177\/0268396220918594","volume":"35","author":"D Pienta","year":"2020","unstructured":"Pienta D, Thatcher J, Johnston A (2020) Protecting a whale in a sea of phish. J Inf Technol 35(3):214\u2013231. https:\/\/doi.org\/10.1177\/0268396220918594","journal-title":"J Inf Technol"},{"key":"933_CR43","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.irfa.2017.01.001","volume":"49","author":"P Rosati","year":"2017","unstructured":"Rosati P, Cummins M, Deeney P, Gogolin F, Van der Werff L, Lynn T (2017) The effect of data breach announcements beyond the stock price: Empirical evidence on market activity. Int Rev Financ Anal 49:146\u2013154","journal-title":"Int Rev Financ Anal"},{"issue":"1","key":"933_CR44","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1108\/ICS-03-2014-0020","volume":"24","author":"D Schatz","year":"2016","unstructured":"Schatz D, Bashroush R (2016) The impact of repeated data breach events on organisations\u2019 market value. Inf Comput Secur 24(1):73\u201392","journal-title":"Inf Comput Secur"},{"key":"933_CR45","doi-asserted-by":"publisher","unstructured":"Sen R, Heim G, Zhu Q (2022) Artificial intelligence and machine learning in cybersecurity: applications, challenges, and opportunities for mis academics. Commun AIS 51:179\u2013209, https:\/\/doi.org\/10.17705\/1CAIS.05109","DOI":"10.17705\/1CAIS.05109"},{"key":"933_CR46","doi-asserted-by":"publisher","unstructured":"Silalahi S, Yuhana UL, Ahmad T, Studiawan H (2022) A survey on process mining for security. In: 2022 international seminar on application for technology of information and communication (isemantic), pp 1\u20136, https:\/\/doi.org\/10.1109\/iSemantic55962.2022.9920473","DOI":"10.1109\/iSemantic55962.2022.9920473"},{"issue":"2","key":"933_CR47","first-page":"100","volume":"3","author":"T Singh","year":"2023","unstructured":"Singh T, Johnston AC, D\u2019Arcy J, Harms PD (2023) Stress in the cybersecurity profession: A systematic review of related literature and opportunities for future research. Organ Cybersecur J Pract Process People 3(2):100\u2013126","journal-title":"Organ Cybersecur J Pract Process People"},{"issue":"3","key":"933_CR48","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1057\/palgrave.ejis.3000537","volume":"14","author":"MT Siponen","year":"2005","unstructured":"Siponen MT (2005) An analysis of the traditional IS security approaches: implications for research and practice. Europ J Inf Syst 14(3):303\u2013315","journal-title":"Europ J Inf Syst"},{"issue":"1","key":"933_CR49","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1216218.1216224","volume":"38","author":"MT Siponen","year":"2007","unstructured":"Siponen MT, Oinas-Kukkonen H (2007) A review of information security issues and respective research contributions. SIGMIS Database 38(1):60\u201380. https:\/\/doi.org\/10.1145\/1216218.1216224","journal-title":"SIGMIS Database"},{"key":"933_CR50","unstructured":"Statista (2024) Cybercrime expected to skyrocket in coming years. https:\/\/www.statista.com\/chart\/28878\/expected-cost-of-cybercrime-until-2027\/, accessed 09 Dec 2024"},{"issue":"3","key":"933_CR51","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.jsis.2018.12.001","volume":"28","author":"R Syed","year":"2019","unstructured":"Syed R (2019) Enterprise reputation threats on social media: a case of data breach framing. J Strateg Inf Syst 28(3):257\u2013274. https:\/\/doi.org\/10.1016\/j.jsis.2018.12.001","journal-title":"J Strateg Inf Syst"},{"key":"933_CR52","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R Von Solms","year":"2013","unstructured":"Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97\u2013102","journal-title":"Comput Secur"},{"issue":"4","key":"933_CR53","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1080\/07421222.2023.2267319","volume":"40","author":"Q Wang","year":"2023","unstructured":"Wang Q, Ngai EWT, Pienta D, Thatcher JB (2023) Information technology innovativeness and data-breach risk: a longitudinal study. J Manag Inf Syst 40(4):1139\u20131170. https:\/\/doi.org\/10.1080\/07421222.2023.2267319","journal-title":"J Manag Inf Syst"},{"key":"933_CR54","doi-asserted-by":"publisher","unstructured":"Wright R, Johnson S, Kitchens B (2023) Phishing susceptibility in context: a multilevel information processing perspective on deception detection. MIS Q 47(2):803\u2013832, https:\/\/doi.org\/10.25300\/MISQ\/2022\/16625","DOI":"10.25300\/MISQ\/2022\/16625"},{"issue":"3","key":"933_CR55","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1287\/isre.2021.0065","volume":"35","author":"FM Zahedi","year":"2024","unstructured":"Zahedi FM, Chen Y, Zhao H (2024) Ontology-based intelligent interface personalization for protection against phishing attacks. Inf Syst Res 35(3):1463\u20131478. https:\/\/doi.org\/10.1287\/isre.2021.0065","journal-title":"Inf Syst Res"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-025-00933-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-025-00933-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-025-00933-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T09:01:21Z","timestamp":1741856481000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-025-00933-7"}},"subtitle":["A Call for Information Systems Security"],"short-title":[],"issued":{"date-parts":[[2025,2,21]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["933"],"URL":"https:\/\/doi.org\/10.1007\/s12599-025-00933-7","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,21]]},"assertion":[{"value":"21 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}