{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T11:40:50Z","timestamp":1772883650759,"version":"3.50.1"},"reference-count":182,"publisher":"Informa UK Limited","issue":"6","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["European Journal of Information Systems"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1057\/s41303-017-0066-x","type":"journal-article","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:32:00Z","timestamp":1511249520000},"page":"546-563","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":140,"title":["Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda"],"prefix":"10.1080","volume":"26","author":[{"given":"Paul Benjamin","family":"Lowry","sequence":"first","affiliation":[{"name":"Innovation and Information Management, Faculty of Business and Economics, College of BusinessThe University of Hong Kong\rRoom 804, 8\/F, K.K. Leung Building\rPokfulam\rHong Kong"}]},{"given":"Tamara","family":"Dinev","sequence":"additional","affiliation":[{"name":"Department of Information Technology and Operations ManagementFlorida Atlantic University\r777 Glades Rd\r33431\rBoca Raton\rFL\rUSA"}]},{"given":"Robert","family":"Willison","sequence":"additional","affiliation":[{"name":"Newcastle Business SchoolNewcastle University\r5 Barrack Road\rNE1 4SE\rNewcastle upon Tyne\rUK"}]}],"member":"301","published-online":{"date-parts":[[2018,2,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.09.0215"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Algarni A Xu Y and Chan T (2017) An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook. European Journal of Information Systems. https:\/\/doi.org\/10.1057\/s41303-017-0057-y.","DOI":"10.1057\/s41303-017-0057-y"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.2011.59330882"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/1139261"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2015.21"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650295"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Angst CM Block ES D\u2019arcy J and Kelley K (2017) When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Quarterly41(3) (in press).","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-2171.2006.tb00037.x"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0142"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393203"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250208"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.41"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Baskerville R Rowe F and Wolff F-C (2017) Integration of information systems and cybersecurity countermeasures: an exposure to risk perspective. Data Base for Advances in Information Systems (In press(December)).","DOI":"10.1145\/3184444.3184448"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0649"},{"key":"e_1_3_2_2_15_1","volume-title":"On Crimes and Punishments and Other Writings","author":"Beccaria C","year":"2009","unstructured":"BeccariaCOn Crimes and Punishments and Other Writings2009TorontoUniversity of Toronto Press"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1086\/259394"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701402049"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00126"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036527"},{"key":"e_1_3_2_2_21_1","volume-title":"The Principles of Morals and Legislation","author":"Bentham J","year":"1988","unstructured":"BenthamJThe Principles of Morals and Legislation1988Amherst, NYPrometheus Books"},{"issue":"11","key":"e_1_3_2_2_22_1","first-page":"100","article-title":"With big data comes big responsibility","volume":"92","author":"Berinato S","year":"2014","unstructured":"BerinatoSWith big data comes big responsibilityHarvard Business Review20149211100104","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1988.tb00829.x"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_3_2_2_25_1","volume-title":"Environmental Criminology","author":"Brantingham P","year":"1991","unstructured":"BrantinghamPBrantinghamPEnvironmental Criminology19912Prospect Heights, ILWaveland Press","edition":"2"},{"key":"e_1_3_2_2_26_1","volume-title":"Handbook of Research Methods in Social and Personality Psychology","author":"BREWER M","year":"2000","unstructured":"BREWERMREISHJUDDCResearch design and issues of validityHandbook of Research Methods in Social and Personality Psychology2000Cambridge, UKCambridge University Press"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890488"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9608-8"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.018"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0396"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0180"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00339"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001257"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/41703503"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0598"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/23044049"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290305"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0602"},{"key":"e_1_3_2_2_40_1","first-page":"147","volume-title":"Crime and Justice: An Annual Review of Research","author":"Clarke R","year":"1985","unstructured":"ClarkeRCornishDTONRYMMORRISNModelling offender\u2019s decisions: a framework for policy and researchCrime and Justice: An Annual Review of Research1985Chicago, ILUniversity of Chicago Press147185"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0059-9"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50704"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00463"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650322"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840910937508"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.42"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"issue":"5","key":"e_1_3_2_2_51_1","first-page":"37","article-title":"The dark side of customer analytics","volume":"85","author":"Davenport TH","year":"2007","unstructured":"DavenportTHHarrisJGJonesGLLemonKNNortonDMcCallisterMBThe dark side of customer analyticsHarvard Business Review20078553748","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290204"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00289.x"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415130202"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0600"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"e_1_3_2_2_59_1","volume-title":"Crime and Everyday Life: Insight and Implications for Society","author":"Felson M","year":"1994","unstructured":"FelsonMCrime and Everyday Life: Insight and Implications for Society1994Thousand Oaks, CAPine Forge Press"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03510"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2015.1010985"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0395"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2014.09.001"},{"key":"e_1_3_2_2_64_1","volume-title":"Crime, Punishment, and Deterrence","author":"Gibbs JP","year":"1975","unstructured":"GibbsJPCrime, Punishment, and Deterrence1975New York, NYElsevier"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00447"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.3.E0"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.03"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12080"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Haataja K and Toivanen P (2010) Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. IEEE Transactions on Wireless Communications9(1).","DOI":"10.1109\/TWC.2010.01.090935"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/76.1.119"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"crossref","unstructured":"Hager CT and Midkiff SF (2003) An analysis of Bluetooth security vulnerabilities. In Wireless Communications and Networking 2003 (WCNC 2003) pp 1825\u20131831 IEEE.","DOI":"10.1109\/WCNC.2003.1200664"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.2307\/249656"},{"key":"e_1_3_2_2_73_1","unstructured":"Hassan NR and Lowry PB (2015) Seeking middle-range theories in information systems research. In International Conference on Information Systems (ICIS 2015) AIS Fort Worth TX."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"crossref","unstructured":"Heikkila FM (2007) Encryption: security considerations for portable media devices. IEEE Security & Privacy5(4).","DOI":"10.1109\/MSP.2007.80"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0569"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00361.x"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953122.1953142"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.2.08"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148779"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9419-8"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2015.15"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"crossref","unstructured":"Karame G (2016) On the security and scalability of Bitcoin\u2019s blockchain. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security pp 1861\u20131862 ACM.","DOI":"10.1145\/2976749.2976756"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00274"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0064-z"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.17705\/1thci.00081"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12082"},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2009.04.014"},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.11.003"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00446"},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.1.52.10665"},{"key":"e_1_3_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.06"},{"key":"e_1_3_2_2_98_1","unstructured":"Lavin F (2017) Traditional retail might not be dead but It Is In a coffin. Forbes https:\/\/www.forbes.com\/sites\/franklavin\/2017\/04\/17\/traditional-retail-might-not-be-dead-but-it-is-in-a-coffin\/#7096e0c549e8 accessed August 31 2017."},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.2307\/249407"},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12054"},{"key":"e_1_3_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0607"},{"key":"e_1_3_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"e_1_3_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12037"},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0676"},{"key":"e_1_3_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0255"},{"key":"e_1_3_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270406"},{"key":"e_1_3_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2016.06.002"},{"key":"e_1_3_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12043"},{"key":"e_1_3_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1373012"},{"key":"e_1_3_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21705"},{"key":"e_1_3_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12063"},{"key":"e_1_3_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-013-1705-3"},{"key":"e_1_3_2_2_114_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0671"},{"key":"e_1_3_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.015"},{"key":"e_1_3_2_2_116_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701576412"},{"key":"e_1_3_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00213"},{"key":"e_1_3_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.4.08"},{"issue":"1","key":"e_1_3_2_2_119_1","first-page":"26","article-title":"Information technology auditing: a value-added IT governance partnership between IT management and audit","volume":"23","author":"Merhout JW","year":"2008","unstructured":"MerhoutJWHavelkaDInformation technology auditing: a value-added IT governance partnership between IT management and auditCommunications of the Association for Information Systems200823126","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_3_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.06.006"},{"key":"e_1_3_2_2_121_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750707"},{"key":"e_1_3_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0058-x"},{"key":"e_1_3_2_2_123_1","doi-asserted-by":"crossref","unstructured":"Moura J and Serr\u00e3o C (2016) Security and privacy issues of big data. Working paperpreprint.","DOI":"10.4018\/978-1-4666-8505-5.ch002"},{"key":"e_1_3_2_2_124_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.10"},{"key":"e_1_3_2_2_125_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-016-0025-y"},{"key":"e_1_3_2_2_126_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.18"},{"key":"e_1_3_2_2_127_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.2.121.9700"},{"key":"e_1_3_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0056-z"},{"key":"e_1_3_2_2_129_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2010.01.002"},{"key":"e_1_3_2_2_130_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.1.13"},{"key":"e_1_3_2_2_131_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-016-0001-6"},{"key":"e_1_3_2_2_132_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409969"},{"key":"e_1_3_2_2_133_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045759"},{"issue":"1","key":"e_1_3_2_2_134_1","first-page":"24","article-title":"When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse","volume":"7","author":"Posey C","year":"2011","unstructured":"PoseyCBennettRJRobertsTLLowryPBWhen computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuseJournal of Information System Security2011712447","journal-title":"Journal of Information System Security"},{"key":"e_1_3_2_2_135_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.15"},{"key":"e_1_3_2_2_136_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0065-y"},{"key":"e_1_3_2_2_137_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"e_1_3_2_2_138_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.09"},{"key":"e_1_3_2_2_139_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.03.009"},{"key":"e_1_3_2_2_140_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148870"},{"key":"e_1_3_2_2_141_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.2.E0"},{"key":"e_1_3_2_2_142_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0174"},{"key":"e_1_3_2_2_143_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-2171.2006.tb00036.x"},{"key":"e_1_3_2_2_144_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002716205280075"},{"key":"e_1_3_2_2_145_1","volume-title":"The Sciences of the Artificial","author":"Simon HA","year":"1996","unstructured":"SimonHAThe Sciences of the Artificial1996Boston, MAMIT Press"},{"key":"e_1_3_2_2_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2460333"},{"key":"e_1_3_2_2_147_1","doi-asserted-by":"crossref","unstructured":"Siponen M Pahnila S and Mahmood A (2007) Employees\u2019 adherence to information security policies: an empirical study. In New Approaches for Security Privacy and Trust in Complex Environments pp 133\u2013144 Springer Berlin.","DOI":"10.1007\/978-0-387-72367-9_12"},{"key":"e_1_3_2_2_148_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750688"},{"key":"e_1_3_2_2_149_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.12.007"},{"key":"e_1_3_2_2_150_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"e_1_3_2_2_151_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.07.002"},{"key":"e_1_3_2_2_152_1","unstructured":"Song P Xue L Rai A and Zhang C (2017) The ecosystem of software platform: a study of asymmetric cross-side network effects and platform governance. MIS Quarterly (forthcoming)."},{"key":"e_1_3_2_2_153_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750689"},{"key":"e_1_3_2_2_154_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"e_1_3_2_2_155_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"e_1_3_2_2_156_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530802384639"},{"key":"e_1_3_2_2_157_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240406"},{"key":"e_1_3_2_2_158_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2015.20"},{"key":"e_1_3_2_2_159_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_3_2_2_160_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.11.001"},{"key":"e_1_3_2_2_161_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.27"},{"key":"e_1_3_2_2_162_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.61"},{"key":"e_1_3_2_2_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"key":"e_1_3_2_2_164_1","volume-title":"Engaged Scholarship: A Guide for Organizational and Social Research","author":"Ven AH","year":"2007","unstructured":"VenAHEngaged Scholarship: A Guide for Organizational and Social Research2007New YorkOxford University Press"},{"key":"e_1_3_2_2_165_1","doi-asserted-by":"crossref","unstructured":"Vance A Lowry PB and Eggett D (2015) A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface. MIS Quarterly39(2) 345\u2013366.","DOI":"10.25300\/MISQ\/2015\/39.2.04"},{"key":"e_1_3_2_2_166_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2015.22"},{"key":"e_1_3_2_2_167_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530701586136"},{"key":"e_1_3_2_2_168_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00420"},{"key":"e_1_3_2_2_169_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.05"},{"key":"e_1_3_2_2_170_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00442"},{"key":"e_1_3_2_2_171_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0680"},{"key":"e_1_3_2_2_172_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0581"},{"key":"e_1_3_2_2_173_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00424"},{"key":"e_1_3_2_2_174_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.12"},{"key":"e_1_3_2_2_175_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206308330556"},{"key":"e_1_3_2_2_176_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148631"},{"key":"e_1_3_2_2_177_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.01"},{"key":"e_1_3_2_2_178_1","doi-asserted-by":"crossref","unstructured":"Willison R Warkentin M and Johnston AC (2016) Examining employee computer abuse intentions: Insights from justice deterrence and neutralization perspectives. Information Systems Journal. https:\/\/doi.org\/10.1111\/isj.12129.","DOI":"10.1111\/isj.12129"},{"key":"e_1_3_2_2_179_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701788165"},{"key":"e_1_3_2_2_180_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0522"},{"issue":"3","key":"e_1_3_2_2_181_1","first-page":"137","article-title":"The role of push-pull technology in privacy calculus: the case of location-based services","volume":"26","author":"Xu H","year":"2010","unstructured":"XuHTeoHHTanBCYAgarwalRThe role of push-pull technology in privacy calculus: the case of location-based servicesJournal of Management Information Systems2010263137176","journal-title":"Journal of Management Information Systems"},{"key":"e_1_3_2_2_182_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00399"}],"container-title":["European Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/s41303-017-0066-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1057\/s41303-017-0066-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1057\/s41303-017-0066-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/s41303-017-0066-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T15:33:45Z","timestamp":1768923225000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1057\/s41303-017-0066-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":182,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["10.1057\/s41303-017-0066-x"],"URL":"https:\/\/doi.org\/10.1057\/s41303-017-0066-x","relation":{},"ISSN":["0960-085X","1476-9344"],"issn-type":[{"value":"0960-085X","type":"print"},{"value":"1476-9344","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}