{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T16:20:10Z","timestamp":1777738810045,"version":"3.51.4"},"reference-count":30,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2020,1,2]]},"DOI":"10.1080\/07421222.2019.1705511","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T06:57:34Z","timestamp":1583132254000},"page":"191-216","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":31,"title":["Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets"],"prefix":"10.1080","volume":"37","author":[{"given":"Ravi","family":"Sen","sequence":"first","affiliation":[{"name":"Texas A&M University, College Station, Texas, USA"}]},{"given":"Ajay","family":"Verma","sequence":"additional","affiliation":[{"name":"Guidance, Navigation & Control Engineer, Lockheed Martin Missiles and Fire Control, Grand Prairie, Texas, USA"}]},{"given":"Gregory R.","family":"Heim","sequence":"additional","affiliation":[{"name":"Texas A&M University, College Station, Texas, USA"}]}],"member":"301","published-online":{"date-parts":[[2020,3,1]]},"reference":[{"issue":"3","key":"CIT0001","first-page":"480","volume":"8","author":"Algarni A.M.","year":"2014","journal-title":"International Journal of Computer, Electrical, Automation, Control and Information Engineering"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0440"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1100.1304"},{"key":"CIT0005","unstructured":"Barnes, R.; and Fulford, G.R. Mathematical Modelling with Case Studies: A Differential Equations Approach using Maple and MATLAB. Boca Raton, FL: CRC Press, 2002, pp. 99\u2013109."},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecosys.2005.01.001"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.42.12.1627"},{"issue":"3","key":"CIT0009","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1109\/TSE.2007.26","volume":"33","author":"Cavusoglu H.","year":"2007","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"CIT0010","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/10864415.2004.11044320","volume":"9","author":"Cavusoglu H.","year":"2004","journal-title":"International Journal of Electronic Commerce"},{"key":"CIT0012","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1287\/mnsc.1060.0549","volume":"52","author":"Economides N.","year":"2006","journal-title":"Management Science"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2008.04.023"},{"issue":"5","key":"CIT0015","first-page":"940","volume":"76","author":"Farrell J.","year":"1986","journal-title":"The American Economic Review"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.2307\/4132311"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.2307\/2109809"},{"key":"CIT0020","volume-title":"Microsoft pays out $100,000 to hacker who exposed Windows security flaws","author":"Gander K.","year":"2013"},{"key":"CIT0021","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s13235-013-0102-y","volume":"4","author":"Garcia A.","year":"2014","journal-title":"Dynamic Games and Applications"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1145\/636772.636774"},{"key":"CIT0024","first-page":"243","volume":"25","author":"Jaisingh J.","journal-title":"Journal of Management Information Systems"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0357"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1257\/jep.8.2.93"},{"key":"CIT0027","doi-asserted-by":"crossref","unstructured":"Kim, B. C.; Chen, P.; and Mukhopadhyay, T. (2010b). The effect of liability and patch release on software security: The monopoly case. Production and Operations Management, 20, 4, 603\u2013617.","DOI":"10.1111\/j.1937-5956.2010.01189.x"},{"issue":"3","key":"CIT0028","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.infoecopol.2008.11.004","volume":"21","author":"Lanzi D.","year":"2009","journal-title":"Information Economics and Policy"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2007.01.003"},{"key":"CIT0030","volume-title":"The gentleman hacker\u2019s 1903 lulz. New Scientist. Issue 2844, December 27","author":"Dot-dash-diss: Marks, P.","year":"2011"},{"issue":"1","key":"CIT0031","first-page":"63","volume":"4","author":"Marshall A.","year":"2007","journal-title":"Review of Economic Research on Copyright Issues"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1162\/154247603322493212"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394049"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240107"},{"key":"CIT0036","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1017\/CBO9780511511523.003","volume-title":"The Law and Economics of Cybersecurity","author":"Swire P.P.","year":"2005"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70712"},{"key":"CIT0039","first-page":"346","volume":"6802","author":"Wright C.S.","year":"2011","journal-title":"vendors and reputation: An analysis of the dilemma in creating secure software. Lecture Notes in Computer Science"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2019.1705511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T06:58:21Z","timestamp":1583132301000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2019.1705511"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,2]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,2]]}},"alternative-id":["10.1080\/07421222.2019.1705511"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2019.1705511","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-03-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}