{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T07:49:55Z","timestamp":1775202595108,"version":"3.50.1"},"reference-count":58,"publisher":"Informa UK Limited","issue":"11","funder":[{"name":"Natural Science Foundation of Chongqing of China","award":["cstc2020jcyj-msxmX0820"],"award-info":[{"award-number":["cstc2020jcyj-msxmX0820"]}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province of China","doi-asserted-by":"publisher","award":["ZR2020MG024"],"award-info":[{"award-number":["ZR2020MG024"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2022,8,18]]},"DOI":"10.1080\/0144929x.2021.1921029","type":"journal-article","created":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T01:14:42Z","timestamp":1620177282000},"page":"2342-2354","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":19,"title":["Impact of negative emotions on violations of information security policy and possible mitigations"],"prefix":"10.1080","volume":"41","author":[{"given":"Jie","family":"Zhen","sequence":"first","affiliation":[{"name":"School of Management Science and Engineering, Chongqing Technology and Business University, Chongqing, People\u2019s Republic of China"}]},{"given":"Zongxiao","family":"Xie","sequence":"additional","affiliation":[{"name":"China Financial Certification Authority, Beijing, People\u2019s Republic of China"}]},{"given":"Kunxiang","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Management Science and Engineering, Shandong University of Finance and Economics, Jinan, People\u2019s Republic of China"}]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Public Administration, Shandong University of Science and Technology, Qingdao, People\u2019s Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2021,5,3]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"issue":"3","key":"CIT0002","doi-asserted-by":"crossref","first-page":"1082","DOI":"10.1080\/07421222.2017.1394063","volume":"34","author":"Anderson C.","year":"2017","journal-title":"Journal of Management Information Systems"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.83.2.288"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1080\/09544828.2015.1030371"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.2307\/25750701"},{"key":"CIT0006","volume-title":"Exchange and Power in Social Life","author":"Blau P. M.","year":"1964"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0860"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.05.011"},{"issue":"39","key":"CIT0010","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.cose.2013.09.009","volume":"39","author":"Cheng L.","year":"2013","journal-title":"Computers & Security"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1583769"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0059-9"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2013-0057"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12173"},{"issue":"7","key":"CIT0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.im.2019.02.006","volume":"56","author":"D\u2019Arcy J.","year":"2019","journal-title":"Information & Management"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1002\/job.2057"},{"issue":"4","key":"CIT0019","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1002\/job.249","volume":"25","author":"Dyne L.","year":"2004","journal-title":"Journal of Organizational Behavior"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1177\/0149206305279759"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.42"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-09-2013-0068"},{"key":"CIT0023","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.pmcj.2016.06.007","volume":"32","author":"Hoava A.","year":"2016","journal-title":"Pervasive and Mobile Computing"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0569"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.128.5.796"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.2307\/20159587"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.09.003"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1037\/a0021452"},{"key":"CIT0030","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.cose.2016.02.004","volume":"59","author":"Lee C.","year":"2016","journal-title":"Computers & Security"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1539519"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.2307\/25148781"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/14360"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0427"},{"issue":"8","key":"CIT0035","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1080\/09585192.2017.1396549","volume":"31","author":"Malik P.","year":"2017","journal-title":"The International Journal of Human Resource Management"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.020"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1002\/job.4030160204"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1002\/hrdq.21217"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-10-2014-0067"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1002\/job.628"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.7.1.84"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.2307\/258609"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2016.1325"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.87.4.698"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.90.6.1217"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1002\/job.595"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015630930326"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1080\/09585192.2012.744334"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.01.002"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.59"},{"issue":"7","key":"CIT0051","first-page":"296","volume":"48","author":"Son J.","year":"2011","journal-title":"motivation to Follow IS Security Policies. Information & Management"},{"issue":"4","key":"CIT0052","doi-asserted-by":"crossref","first-page":"103212","DOI":"10.1016\/j.im.2019.103212","volume":"57","author":"Vance A.","year":"2019","journal-title":"Information & Management"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1002\/hrm.21758"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.2307\/257021"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0266"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.02.009"},{"issue":"6","key":"CIT0057","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.im.2017.03.005","volume":"56","author":"Zhang X.","year":"2018","journal-title":"Information & Management"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.3846\/jbem.2020.13169"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2021.1921029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T11:22:44Z","timestamp":1665746564000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2021.1921029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":58,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,8,18]]}},"alternative-id":["10.1080\/0144929X.2021.1921029"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2021.1921029","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-11-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}