{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T08:58:42Z","timestamp":1768899522391,"version":"3.49.0"},"reference-count":59,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2021,1,2]]},"DOI":"10.1080\/07421222.2021.1870390","type":"journal-article","created":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T11:44:03Z","timestamp":1617363843000},"page":"222-245","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":49,"title":["The Roles of IT Strategies and Security Investments in Reducing Organizational Security Breaches"],"prefix":"10.1080","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9882-3341","authenticated-orcid":false,"given":"He","family":"Li","sequence":"first","affiliation":[{"name":"Department of Management, Wilbur O. and Ann Powers College of Business, Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9821-3068","authenticated-orcid":false,"given":"Sungjin","family":"Yoo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Business Analytics, LaPenta School of Business, Iona College, New Rochelle, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0003-5599","authenticated-orcid":false,"given":"William J.","family":"Kettinger","sequence":"additional","affiliation":[{"name":"Department of Management, Wilbur O. and Ann Powers College of Business, Clemson University, Clemson, SC, USA"}]}],"member":"301","published-online":{"date-parts":[[2021,4,2]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2017.2750"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0527"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0142"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1086\/259394"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2014.1934"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0180"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250211"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0278"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2014.35"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260308"},{"key":"cit0013","author":"D\u2019Arcy J.","year":"2020","journal-title":"Information Systems Research, Forthcoming"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290204"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00813-6"},{"issue":"2","key":"cit0017","first-page":"141","volume":"15","author":"El Sawy O.A.","year":"2016","journal-title":"MIS Quarterly Executive"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.3.10"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0550"},{"issue":"4","key":"cit0020","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.2307\/41703500","volume":"36","author":"Gupta A.","year":"2012","journal-title":"MIS Quarterly"},{"key":"cit0021","doi-asserted-by":"crossref","unstructured":"Gurbaxani, V. Information Systems Outsourcing Contracts: Theory and Evidence. In Managing in the Information Economy, Uday Apte and Uday Karmarkar (Eds.). Boston: Springer, (2007), 83\u2013115.","DOI":"10.1007\/978-0-387-36892-4_4"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.2307\/249656"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2017.0710"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1002\/smj.886"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290304"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.1.13"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0858"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.pan.a004868"},{"key":"cit0029","unstructured":"Kolbasuk McGee, M. Why hackers are targeting health data. Healthcare Info Security, available at http:\/\/www.healthcareinfosecurity.com\/hackers-are-targeting-health-data-a-7024 (2014)."},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"issue":"4","key":"cit0031","first-page":"1043","volume":"42","author":"Kwon J.","year":"2018","journal-title":"MIS Quarterly"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.06"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300202"},{"issue":"2","key":"cit0034","first-page":"511","volume":"1","author":"Leeson P.T.","year":"2005","journal-title":"Journal of Law, Economics, and Policy"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2015.1012409"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1790190"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.09"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.2307\/41410414"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.2307\/23043496"},{"issue":"3","key":"cit0040","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1287\/isre.2015.0587","volume":"26","author":"Mitra S.","year":"2015","journal-title":"Information Systems Research"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0341"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.4.404.14600"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4076(80)90007-X"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0174"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0572"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1093\/jleo\/ewm010"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.70.2.133"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1063315"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1515\/9781400835584"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2017.0722"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0318"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.2307\/2096399"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/14751"},{"issue":"1","key":"cit0055","doi-asserted-by":"crossref","first-page":"91","DOI":"10.25300\/MISQ\/2015\/39.1.05","volume":"39","author":"Wang J.","year":"2015","journal-title":"MIS Quarterly"},{"key":"cit0056","volume-title":"Econometric Analysis of Cross Section and Panel Data","author":"Wooldridge J.M.","year":"2010"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1177\/147737080556056"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0322"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1790185"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2021.1870390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T11:47:06Z","timestamp":1617364026000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2021.1870390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,2]]}},"alternative-id":["10.1080\/07421222.2021.1870390"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2021.1870390","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-04-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}