{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T12:10:58Z","timestamp":1745583058966},"reference-count":38,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of the Operational Research Society"],"published-print":{"date-parts":[[2024,6,2]]},"DOI":"10.1080\/01605682.2023.2233550","type":"journal-article","created":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T14:09:21Z","timestamp":1689343761000},"page":"1092-1110","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Information security outsourcing in a resource-sharing environment: The impacts of attack modes"],"prefix":"10.1080","volume":"75","author":[{"given":"Xing","family":"Gao","sequence":"first","affiliation":[{"name":"Southeast University, Nanjing City, Jiangsu Province, China"}]},{"given":"Siyu","family":"Gong","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing City, Jiangsu Province, China"}]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing City, Jiangsu Province, China"}]},{"given":"Yanfang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University of Finance &amp; Economics, Nanjing City, Jiangsu Province, China"}]}],"member":"301","published-online":{"date-parts":[[2023,7,14]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-010-0066-1"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(03)04010-7"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250211"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2013.1763"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21667"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260308"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2016.10.002"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103215"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117894"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-015-1925-2"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.orl.2013.05.002"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9411-3"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/10242694.2022.2161739"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2015"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2022.113912"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.4301\/S1807-17752015000200004"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2010"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2012.06.022"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2008.04.002"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2018.0806"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.2478\/orga"},{"key":"e_1_3_4_25_1","unstructured":"Kavanagh K. M. & Pescatore J. (2009). Magic quadrant for MSSPs North America. Gartner RAS Core Research Note G00166138."},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0447"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01410.x"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/mde.3310"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2016.09.018"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260205"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41274-016-0134-y"},{"key":"e_1_3_4_33_1","volume-title":"Will outsourcing IT security lead to a higher social level of security","author":"Rowe B. R.","year":"2007","unstructured":"Rowe, B. R. (2007). Will outsourcing IT security lead to a higher social level of security. Workshop on the Economics of Information Security."},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1287\/deca.2019.0406"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.03.033"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2017.05.018"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00157"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1287\/deca.2021.0442"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-020-10009-4"}],"container-title":["Journal of the Operational Research Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01605682.2023.2233550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T12:53:33Z","timestamp":1715777613000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01605682.2023.2233550"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,14]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6,2]]}},"alternative-id":["10.1080\/01605682.2023.2233550"],"URL":"https:\/\/doi.org\/10.1080\/01605682.2023.2233550","relation":{},"ISSN":["0160-5682","1476-9360"],"issn-type":[{"value":"0160-5682","type":"print"},{"value":"1476-9360","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjor20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjor20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-08-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}