{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:11:51Z","timestamp":1773796311051,"version":"3.50.1"},"reference-count":30,"publisher":"Informa UK Limited","issue":"5","license":[{"start":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T00:00:00Z","timestamp":1516233600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of the Operational Research Society"],"published-print":{"date-parts":[[2018,5,4]]},"DOI":"10.1057\/s41274-017-0263-y","type":"journal-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T14:08:47Z","timestamp":1498745327000},"page":"747-761","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":22,"title":["Comparison of information security decisions under different security and business environments"],"prefix":"10.1080","volume":"69","author":[{"given":"Yong","family":"Wu","sequence":"first","affiliation":[{"name":"School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China"},{"name":"City University of Hong Kong, Hong Kong, China"}]},{"given":"Gengzhong","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China"}]},{"given":"Richard Y. K.","family":"Fung","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, China"}]}],"member":"301","published-online":{"date-parts":[[2018,1,18]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1126\/science.1130992"},{"key":"CIT0002","unstructured":"Arthur, C. (2011). Sony suffers second data breach with theft of 25 m more user details. Retrieved from https:\/\/www.theguardian.com\/technology\/blog\/2011\/may\/03\/sony-data-breach-online-entertainment"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-010-0066-1"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250211"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-015-1925-2"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2015.1125044"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9411-3"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2013.133"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2003.09.001"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-006-9011-6"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2007.10.001"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1504\/IJDSRM.2010.037485"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1504\/IJBCRM.2011.044408"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1504\/IJDSRM.2012.046614"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-012-9390-9"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2008.04.002"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4266(02)00387-4"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.2307\/2555403"},{"key":"CIT0021","unstructured":"Krebs, B. (2014). Email attack on vendor set up breach at target. Retrieved from http:\/\/krebsonsecurity.com\/2014\/02\/email-attack-on-vendor-set-up-breach-at-target"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0447"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0607"},{"key":"CIT0025","unstructured":"McGrath, M. (2014). Target profit falls 46% on credit card breach and the hits could keep on coming. Retrieved from http:\/\/www.forbes.com\/sites\/maggiemcgrath\/2014\/02\/26\/target-profit-falls-46-on-credit-card-breach-and-says-the-hits-could-keep-on-coming"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.2307\/3003442"},{"key":"CIT0027","unstructured":"Ponemon, L. (2015). Cost of data breach study: Global analysis. Retrieved from http:\/\/www.ponemon.org\/blog\/2015-cost-of-data-breach-global"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.70.2.133"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2004.12.003"},{"key":"CIT0030","unstructured":"Vijayan, J. (2008). Changes to PCI standard not expected to up ante on protecting payment card data, computerworld. Retrieved August 20, from http:\/\/www.computerworld.com\/s\/article\/9113104"}],"container-title":["Journal of the Operational Research Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/s41274-017-0263-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1057\/s41274-017-0263-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1057\/s41274-017-0263-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/s41274-017-0263-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,16]],"date-time":"2020-08-16T14:00:53Z","timestamp":1597586453000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1057\/s41274-017-0263-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,18]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5,4]]}},"alternative-id":["10.1057\/s41274-017-0263-y"],"URL":"https:\/\/doi.org\/10.1057\/s41274-017-0263-y","relation":{},"ISSN":["0160-5682","1476-9360"],"issn-type":[{"value":"0160-5682","type":"print"},{"value":"1476-9360","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjor20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjor20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2016-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-05-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}