{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:55:02Z","timestamp":1776830102859,"version":"3.51.2"},"reference-count":81,"publisher":"Informa UK Limited","issue":"5","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71421001,71431002,71731003"],"award-info":[{"award-number":["71421001,71431002,71731003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,5,4]]},"DOI":"10.1080\/0144929x.2018.1539520","type":"journal-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T12:31:19Z","timestamp":1540470679000},"page":"454-468","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":35,"title":["Understanding commitment and apathy in is security extra-role behavior from a person-organization fit perspective"],"prefix":"10.1080","volume":"38","author":[{"given":"Hao","family":"Chen","sequence":"first","affiliation":[{"name":"School of Business, Qingdao University, Qingdao City, Shandong Province, China"},{"name":"Faculty of Management and Economics, Dalian University of Technology, Dalian City, Liaoning Province, China"}]},{"given":"Wenli","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Management and Economics, Dalian University of Technology, Dalian City, Liaoning Province, China"}]}],"member":"301","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.007"},{"issue":"1","key":"CIT0003","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1177\/0256090920130103","volume":"38","author":"Biswas S.","year":"2013","journal-title":"The Journal for Decision Makers"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"CIT0007","first-page":"4098","volume-title":"The 43rd Hawaii international conference on systems sciences","author":"Bulgurcu B.","year":"2010"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.87.5.875"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-013-1799-7"},{"key":"CIT0010","first-page":"442","volume-title":"The 6th international conference on management of innovation & technology (ICMIT 2012)","author":"Chang A.\u00a0J.\u00a0T.","year":"2012"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1989.4279063"},{"key":"CIT0012","volume-title":"The 45th annual meeting of the western decision sciences institute","author":"Chen Y.","year":"2016"},{"key":"CIT0013","volume-title":"Proceedings of the 18th Pacific Asia conference on information systems","author":"Chen H.","year":"2014"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645767"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.009"},{"key":"CIT0016","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988","edition":"2"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1080\/13594320344000246"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50704"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2006.00500.x"},{"issue":"1","key":"CIT0022","doi-asserted-by":"crossref","first-page":"108","DOI":"10.2307\/256902","volume":"41","author":"Dyne L. V.","year":"1998","journal-title":"Academy of Management Journal"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1108\/PR-07-2013-0118"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.08.001"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"CIT0026","unstructured":"Hair Jr, J. F., G.\u00a0T.\u00a0M. Hult, C. M. Ringle, and M. Sarstedt. 2014. California, USA."},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679190202"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2011.06.001"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00504-7"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.12.005"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0569"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.10.001"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"CIT0036","volume-title":"Computer Security Handbook","author":"Kabay M. E.","year":"2002"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00274"},{"key":"CIT0038","volume-title":"The Social Psychology of Organization","author":"Katz D.","year":"1978"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2012.02572.x"},{"key":"CIT0040","volume-title":"Principles and Practice of Structural Equation Modeling","author":"Kline R. B.","year":"2011","edition":"3"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1996.tb01790.x"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.004"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"issue":"1","key":"CIT0045","first-page":"43","volume":"79","author":"Leung A.","year":"2007","journal-title":"Journal of Business Ethics"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.09.002"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12037"},{"key":"CIT0048","volume-title":"The 23rd Americas conference on information systems","author":"Li Y.","year":"2017"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.2307\/25148781"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2014.2312452"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12043"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12063"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1016\/S0883-9026(03)00011-9"},{"issue":"3","key":"CIT0056","first-page":"351","volume":"24","author":"Mowday R.","year":"1998","journal-title":"Journal of Management"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1016\/0001-8791(87)90043-1"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.91.4.946"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2012.05.005"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.2307\/256404"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.004"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"key":"CIT0064","first-page":"3432","volume-title":"The 47th Hawaii international conference on system sciences (HICSS): IEEE","author":"SanNicolas-Rocca T.","year":"2014"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1002\/smj.385"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1108\/00483480410528832"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.10.006"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.07.002"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1108\/09685229510792988"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"CIT0072","volume-title":"4th international conference on wireless communications, networking and mobile computing","author":"Sun J.","year":"2008"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219191"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1108\/JMP-12-2012-0404"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.04"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1108\/00483480810839969"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1108\/02683940710726447"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.09.009"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910993980"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1086\/651257"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2018.1539520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T10:51:08Z","timestamp":1693997468000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2018.1539520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":81,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5,4]]}},"alternative-id":["10.1080\/0144929X.2018.1539520"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2018.1539520","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-04-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}