{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:24:53Z","timestamp":1774797893006,"version":"3.50.1"},"reference-count":99,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2020,7,2]]},"DOI":"10.1080\/07421222.2020.1790190","type":"journal-article","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T08:16:31Z","timestamp":1605687391000},"page":"758-787","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":73,"title":["Centralized IT Decision Making and Cybersecurity Breaches: Evidence from U.S. Higher Education Institutions"],"prefix":"10.1080","volume":"37","author":[{"given":"Che-Wei","family":"Liu","sequence":"first","affiliation":[{"name":"Kelley School of Business, Indiana University, Bloomington, USA"}]},{"given":"Peng","family":"Huang","sequence":"additional","affiliation":[{"name":"Robert H. Smith School of Business, University of Maryland, College Park"}]},{"suffix":"Jr.","given":"Henry C.","family":"Lucas","sequence":"additional","affiliation":[{"name":"Robert H. Smith School of Business, University of Maryland, College Park"}]}],"member":"301","published-online":{"date-parts":[[2020,11,18]]},"reference":[{"issue":"4","key":"cit0001","first-page":"17","volume":"2","author":"Adebayo A.O.","year":"2012","journal-title":"Journal of Information Engineering and Applications"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.05.017"},{"issue":"12","key":"cit0003","doi-asserted-by":"crossref","DOI":"10.1287\/mnsc.43.12.1609","volume":"43","author":"Anand K.S.","year":"1609","journal-title":"Management Science"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4j72"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0226"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0142"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1100.1304"},{"key":"cit0009","volume-title":"Econometric Analysis of Panel Data","author":"Baltagi B.","year":"2008"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1990.11517888"},{"key":"cit0011","volume-title":"Target CEO fired - Can you be fired if your company is hacked?","author":"Basu E.","year":"2014"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1177\/1536867X0800700402"},{"key":"cit0013","volume-title":"Inequality and Heterogeneity: A Primitive Theory of Social Structure","author":"Blau P.M.","year":"1977"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.2307\/25148796"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2012.3"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1287\/isre.8.1.69"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.9.2.176"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"cit0019","volume-title":"Information Technology Security: Governance, Strategy, and Practice in Higher Education","author":"Caruso J.B."},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1070.0794"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0041"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/44432.21.3.20040601\/82480.11"},{"key":"cit0023","first-page":"2","volume":"4","author":"Chong J.L.","year":"2012","journal-title":"Pacific Asia Journal of the Association for Information Systems"},{"issue":"1","key":"cit0024","first-page":"794","volume":"5","author":"Collins J.D.","year":"2011","journal-title":"International Journal of Cyber Criminology"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1994.11518021"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1995.11518080"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-1123.2012.00458.x"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/80.1.27"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.03"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2003.09.001"},{"key":"cit0033","volume-title":"Econometric analysis","author":"Greene W.H.","year":"2003"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1451962"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1145\/336460.336472"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1002\/sim.1047"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1093\/jleo\/7.special_issue.24"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1002\/9780470258019"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1120.1618"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.16"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2018.0806"},{"key":"cit0042","volume-title":"Follow the data: Analyzing breaches by industry","author":"Huq N.","year":"2015"},{"key":"cit0043","unstructured":"Jensen, M.C.; and Meckling, W.H. Specific and general knowledge and organizational structure. In L. Werin and H. Wijkander (eds.), Contract Economics. Oxford: Blackwell, 1992, pp. 251\u2013274."},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1002\/9781119011040"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435446"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.24"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.pan.a004868"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1145\/289.290"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.001"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1016\/j.intman.2005.09.009"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300202"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.06"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2009.06.002"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1177\/014662168801200205"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0607"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.995564"},{"key":"cit0058","volume-title":"Corporate Planning: An Executive Viewpoint","author":"Lorange P.","year":"1980"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.2307\/249523"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1090.1014"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1002\/pam.20590"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00705-3"},{"key":"cit0063","volume-title":"Information Technology Budgets: Which Industry Spends the Most?","author":"Nash K.S.","year":"2007"},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.44.10.1321"},{"issue":"10","key":"cit0065","first-page":"96","volume":"83","author":"Nolan R.","year":"2005","journal-title":"Harvard Business Review"},{"issue":"1","key":"cit0066","first-page":"20","volume":"86","author":"Patton M.","year":"2015","journal-title":"Community College Journal"},{"key":"cit0067","volume-title":"Does a centralized approach help or hurt DOD cybersecurity?","author":"Pomerleau M."},{"issue":"10","key":"cit0068","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2007.01.044","volume":"80","author":"Pulkkinen M.","year":"1607","journal-title":"Journal of Systems and Software"},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0174"},{"key":"cit0070","doi-asserted-by":"publisher","DOI":"10.2307\/41410405"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1990.11517869"},{"issue":"2","key":"cit0072","first-page":"12","volume":"59","author":"Rothrock R.A.","year":"2018","journal-title":"MIT Sloan Management Review"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.2307\/249754"},{"key":"cit0074","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1063315"},{"key":"cit0075","first-page":"445","volume":"19","author":"Shackelford S.J.","year":"2016","journal-title":"Chapman Law Review"},{"key":"cit0076","author":"Sidel R.","year":"2015","journal-title":"The Wall Street Journal"},{"key":"cit0077","volume-title":"National Center for Education Statistics","author":"Snyder T.D.","year":"2016"},{"key":"cit0078","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290104"},{"key":"cit0079","doi-asserted-by":"publisher","DOI":"10.2307\/2171753"},{"key":"cit0080","doi-asserted-by":"publisher","DOI":"10.7243\/2053-7662-4-2"},{"key":"cit0081","volume-title":"Testing for weak instruments in linear IV regression. In D.W.K. Andrews and J.H. Stock (eds.), Ch. 5 Identification and Inference for Econometric Models: Essays in Honor of Thomas J. Rothenberg.","author":"Stock J.H.","year":"2005"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"cit0083","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240308"},{"key":"cit0084","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300306"},{"key":"cit0085","doi-asserted-by":"publisher","DOI":"10.1287\/isre.7.2.248"},{"key":"cit0086","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270203"},{"key":"cit0087","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0591"},{"key":"cit0088","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0206"},{"key":"cit0089","unstructured":"U.S. Bureau of Labor Statistics. Employment status of the civilian noninstitutional population, 1947 to date 2017. https:\/\/www.bls.gov\/cps\/cpsaat01.pdf (accessed March 17, 2018)."},{"key":"cit0090","doi-asserted-by":"crossref","unstructured":"Warkentin, M.; and Johnston, A.C. IT security governance and centralized security controls. In M. Warkentin and R. Vaughn (eds.), Enterprise Information Assurance and System Security: Managerial and Technical Issues, Idea Group Publishing, Hershey, PA, 2006, pp. 16\u201324.","DOI":"10.4018\/978-1-59140-911-3.ch002"},{"issue":"2","key":"cit0091","first-page":"26","volume":"46","author":"Weill P.","year":"2005","journal-title":"MIT Sloan Management Review"},{"key":"cit0092","volume-title":"and Ross, J.W. IT Governance: How Top Performers Manage IT Decision Rights for Superior Results","author":"Weill P."},{"issue":"1","key":"cit0093","first-page":"57","volume":"44","author":"Weill P.","year":"2002","journal-title":"MIT Sloan Management Review"},{"key":"cit0094","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2010.24.2.107"},{"key":"cit0095","volume-title":"Econometric Analysis of Cross Section and Panel Data","author":"Wooldridge J.M.","year":"2002"},{"key":"cit0096","unstructured":"World Bank. World Bank GDP 1960-2016 2018. https:\/\/data.worldbank.org\/indicator\/NY.GDP.MKTP.CD (accessed March 17, 2018)."},{"key":"cit0097","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.10"},{"key":"cit0098","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0269"},{"key":"cit0099","unstructured":"Yerby, J.; and Floyd, K. Faculty and staff information security awareness and behaviors. Journal of The Colloquium for Information System Security Education, 6, 1 (2018), pp. 23\u201323."}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2020.1790190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T06:00:49Z","timestamp":1620799249000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2020.1790190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,2]]},"references-count":99,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7,2]]}},"alternative-id":["10.1080\/07421222.2020.1790190"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2020.1790190","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}