{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T04:44:02Z","timestamp":1773722642570,"version":"3.50.1"},"reference-count":34,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2016,4,2]]},"DOI":"10.1080\/07421222.2016.1205934","type":"journal-article","created":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T13:52:41Z","timestamp":1475675561000},"page":"597-620","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":18,"title":["Perverse Effects in Defense of Computer Systems: When More Is Less"],"prefix":"10.1080","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5139-5554","authenticated-orcid":false,"given":"Josephine","family":"Wolff","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001260"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"CIT0003","volume-title":"Deception: A Healthy Part of Any Defense-in-depth Strategy.","author":"Anderson P.","year":"2001"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905853"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.1001257"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290305"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0071-9"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1991.11517921"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2008.05.001"},{"key":"CIT0011","volume-title":"Re: P.L. 113-6, the Consolidated and Further Continuing Appropriations Act for Fiscal Year 2013","author":"CompTIA","year":"2013"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.2307\/258557"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1266287"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"CIT0017","volume-title":"DoxPara Research Blog","author":"Kaminsky D.","year":"2011"},{"key":"CIT0018","first-page":"1","volume-title":"Observations on the effects of defense in depth on adversary behavior in cyber warfare","author":"Kewley D.","year":"2001"},{"key":"CIT0020","volume-title":"The Art of Computer Programming: Sorting and Searching","volume":"3","author":"Knuth D.E.","year":"1998"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250210"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.2307\/248698"},{"key":"CIT0024","volume-title":"Microsoft Security TechCenter Blog","author":"Lindsay G.","year":"2012"},{"key":"CIT0025","first-page":"52","volume-title":"DARPA OPX information assurance: technologies and lessons learned","author":"Lowry J.","year":"2003"},{"key":"CIT0026","volume-title":"Security tip (ST06-009): Coordinating virus and spyware defense","author":"McDowell M.","year":"2013"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.2307\/2084615"},{"key":"CIT0028","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"Mitnick K.","year":"2002"},{"key":"CIT0029","volume-title":"Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations, Revision 4","author":"National Institute of Standards and Technology (NIST)","year":"2013"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.3.3.398"},{"key":"CIT0031","volume-title":"Fighting Computer Crime: A New Framework for Protecting Information","author":"Parker D.B.","year":"1998"},{"key":"CIT0032","volume-title":"Consensus audit guidelines, version 4.1: Twenty critical security controls for effective cyber defense","author":"SANS Institute","year":"2013"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290410"},{"key":"CIT0036","volume-title":"2013 Data Breach Investigations Report","author":"Verizon"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.2"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270111"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518226"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2016.1205934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T12:36:33Z","timestamp":1501158993000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2016.1205934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,2]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2016,10,5]]},"published-print":{"date-parts":[[2016,4,2]]}},"alternative-id":["10.1080\/07421222.2016.1205934"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2016.1205934","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}