{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T13:48:58Z","timestamp":1776347338946,"version":"3.51.2"},"reference-count":110,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1080\/07421222.2023.2267319","type":"journal-article","created":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T17:18:03Z","timestamp":1702315083000},"page":"1139-1170","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":24,"title":["Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study"],"prefix":"10.1080","volume":"40","author":[{"given":"Qian","family":"Wang","sequence":"first","affiliation":[{"name":"Faculty of Business Administration, University of Macau, Taipa, Macau, P.R. China"}]},{"given":"Eric W. T.","family":"Ngai","sequence":"additional","affiliation":[{"name":"Department of Management and Marketing, The Hong Kong Polytechnic University, Hong Kong, P.R. China"}]},{"given":"Daniel","family":"Pienta","sequence":"additional","affiliation":[{"name":"Haslam College of Business, University of Tennessee, Knoxville, TN, USA"}]},{"given":"Jason Bennett","family":"Thatcher","sequence":"additional","affiliation":[{"name":"Fox School of Business, Temple University, Philadelphia, PA, USA"}]}],"member":"301","published-online":{"date-parts":[[2023,12,11]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.2307\/258636"},{"key":"e_1_3_5_3_1","doi-asserted-by":"crossref","unstructured":"Akey P.; Lewellen S.; and Liskovich I. Hacking corporate reputations. Rotman School of Management Working Paper 2018. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3143740.","DOI":"10.2139\/ssrn.3143740"},{"key":"e_1_3_5_4_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1100.0621"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.3.1.1"},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/20159603"},{"key":"e_1_3_5_8_1","doi-asserted-by":"crossref","unstructured":"Alexander J.A. Adaptive change in corporate control practices. Academy of Management Journal 34 1 (1991) 162\u2013193.","DOI":"10.2307\/256306"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1937-5956.2012.01361.x"},{"key":"e_1_3_5_10_1","first-page":"683","article-title":"Insuring against privacy claims following a data breach","volume":"122","author":"Baldwin D.J.","year":"2017","unstructured":"Baldwin, D.J.; Buckley, J.P.; and Slaugh, D.R. Insuring against privacy claims following a data breach. Penn State Law Review, 122 (2017), 683.","journal-title":"Penn State Law Review"},{"key":"e_1_3_5_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/3094892"},{"key":"e_1_3_5_12_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.04"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/258917"},{"key":"e_1_3_5_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/249740"},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1211"},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2019.3548"},{"key":"e_1_3_5_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2010.04.004"},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/15117"},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"issue":"4","key":"e_1_3_5_20_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.2020.0939","article-title":"Too good to be true: Firm social performance and the risk of data breach","volume":"31","author":"D\u2019Arcy J.","year":"2020","unstructured":"D\u2019Arcy, J.; Adjerid, I.; Angst, C.M.; and Glavas, A. Too good to be true: Firm social performance and the risk of data breach. Information Systems Research, 31, 4 (2020), 1\u201345.","journal-title":"Information Systems Research"},{"key":"e_1_3_5_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.02.006"},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392469"},{"key":"e_1_3_5_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393080"},{"key":"e_1_3_5_24_1","doi-asserted-by":"publisher","DOI":"10.2307\/2095101"},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/017084069301400303"},{"key":"e_1_3_5_26_1","first-page":"200","article-title":"A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation","author":"Duy P.T.","year":"2018","unstructured":"Duy, P.T.; Hien, D.T.T.; Hien, D.H.; and Pham, V.-H. A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation. In Proceedings of the Ninth International Symposium on Information and Communication Technology, 2018, pp. 200\u2013207.","journal-title":"In Proceedings of the Ninth International Symposium on Information and Communication Technology"},{"key":"e_1_3_5_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/3094828"},{"key":"e_1_3_5_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.79"},{"key":"e_1_3_5_29_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.43.10.1345"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250990"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0021"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2007.02.013"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/258048"},{"key":"e_1_3_5_34_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.1.117.10671"},{"key":"e_1_3_5_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.3134"},{"key":"e_1_3_5_36_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2018.1246"},{"key":"e_1_3_5_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.23"},{"key":"e_1_3_5_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/0001839215601459"},{"key":"e_1_3_5_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/99977.99990"},{"key":"e_1_3_5_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1451962"},{"key":"e_1_3_5_41_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0986"},{"key":"e_1_3_5_42_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51796"},{"key":"e_1_3_5_43_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2017.0746"},{"key":"e_1_3_5_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/1912352"},{"key":"e_1_3_5_45_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51402"},{"key":"e_1_3_5_46_1","doi-asserted-by":"crossref","unstructured":"Hilary G.; Segal B.; and Zhang M.H. Cyber-Risk Disclosure: Who Cares? Georgetown McDonough School of Business Research Paper 2016. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2852519.","DOI":"10.2139\/ssrn.2852519"},{"key":"e_1_3_5_47_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2.1.88"},{"key":"e_1_3_5_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/249629"},{"key":"e_1_3_5_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2015.01.002"},{"key":"e_1_3_5_50_1","doi-asserted-by":"publisher","DOI":"10.1509\/jm.16.0124"},{"key":"e_1_3_5_51_1","unstructured":"Jones T. The Cognyte Cloud Data Breach \u2014 5 Billion Records Leaked. https:\/\/medium.com\/nerd-for-tech\/the-cognyte-cloud-data-breach-5-billion-records-leaked-86a7114cef06. Accessed 2023-Oct-25."},{"key":"e_1_3_5_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2019.05.019"},{"key":"e_1_3_5_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/256460"},{"key":"e_1_3_5_54_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0620"},{"key":"e_1_3_5_55_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0858"},{"key":"e_1_3_5_56_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.5.2.139"},{"key":"e_1_3_5_57_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50339"},{"key":"e_1_3_5_58_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.06"},{"issue":"4","key":"e_1_3_5_59_1","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.25300\/MISQ\/2018\/13580","article-title":"Meaningful Healthcare Security: Does \u201cMeaningful-Use\u201d Attestation Improve Information Security Performance?","volume":"42","author":"Kwon J.","year":"2018","unstructured":"Kwon, J.; and Johnson, M.E. Meaningful Healthcare Security: Does \u201cMeaningful-Use\u201d Attestation Improve Information Security Performance? MIS Quarterly, 42, 4 (2018), 1043\u20131067.","journal-title":"MIS Quarterly"},{"key":"e_1_3_5_60_1","doi-asserted-by":"publisher","DOI":"10.1111\/fire.12160"},{"key":"e_1_3_5_61_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.so.14.080188.001535"},{"key":"e_1_3_5_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2021.1870390"},{"key":"e_1_3_5_63_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2017.2820"},{"issue":"3","key":"e_1_3_5_64_1","first-page":"2021","article-title":"Strategic directions for AI: The role of CIOs and boards of directors","volume":"45","author":"Li J.","year":"1603","unstructured":"Li, J.; Li, M.; Wang, X.; and Thatcher, J.B. Strategic directions for AI: The role of CIOs and boards of directors. MIS Quarterly, 45, 3 (2021), 1603-1644.","journal-title":"MIS Quarterly"},{"key":"e_1_3_5_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2021.104337"},{"key":"e_1_3_5_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1790190"},{"key":"e_1_3_5_67_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036549"},{"key":"e_1_3_5_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2015.06.001"},{"issue":"4","key":"e_1_3_5_69_1","first-page":"1","article-title":"Global connectedness and dynamic green capabilities in MNEs","volume":"53","author":"Maksimov V.","year":"2019","unstructured":"Maksimov, V.; Wang, S.L.; and Yan, S. Global connectedness and dynamic green capabilities in MNEs. Journal of International Business Studies, 53, 4 (2019), 1\u201318.","journal-title":"Journal of International Business Studies"},{"key":"e_1_3_5_70_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2.1.71"},{"key":"e_1_3_5_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.02.007"},{"key":"e_1_3_5_72_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.4.415"},{"key":"e_1_3_5_73_1","doi-asserted-by":"publisher","DOI":"10.2307\/257999"},{"key":"e_1_3_5_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2823-6"},{"key":"e_1_3_5_75_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.09"},{"key":"e_1_3_5_76_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0587"},{"key":"e_1_3_5_77_1","volume-title":"The role of experience in the director labor market: Evidence from cybersecurity events. Working paper","author":"Nordlund J.","year":"2019","unstructured":"Nordlund, J. The role of experience in the director labor market: Evidence from cybersecurity events. Working paper, Louisiana State University, 2019."},{"key":"e_1_3_5_78_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206311432640"},{"key":"e_1_3_5_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751957.2751967"},{"key":"e_1_3_5_80_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393988"},{"key":"e_1_3_5_81_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206311429614"},{"key":"e_1_3_5_82_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0683"},{"key":"e_1_3_5_83_1","doi-asserted-by":"publisher","DOI":"10.1177\/026624269100900302"},{"key":"e_1_3_5_84_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2002.11045713"},{"key":"e_1_3_5_85_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/13626"},{"key":"e_1_3_5_86_1","doi-asserted-by":"publisher","DOI":"10.2308\/TAR-2018-0074"},{"key":"e_1_3_5_87_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927075"},{"key":"e_1_3_5_88_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183631"},{"key":"e_1_3_5_89_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1063315"},{"key":"e_1_3_5_90_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1992.tb00675.x"},{"issue":"10","key":"e_1_3_5_91_1","first-page":"2018","article-title":"An investigation of visibility and flexibility as complements to supply chain analytics: An organizational information processing theory perspective","volume":"27","author":"Srinivasan R.","year":"1849","unstructured":"Srinivasan, R.; and Swink, M. An investigation of visibility and flexibility as complements to supply chain analytics: An organizational information processing theory perspective. Production and Operations Management, 27, 10 (2018), 1849-1867.","journal-title":"Production and Operations Management"},{"key":"e_1_3_5_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2007.04.003"},{"key":"e_1_3_5_93_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.40.9.1069"},{"key":"e_1_3_5_94_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148655"},{"key":"e_1_3_5_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"e_1_3_5_96_1","doi-asserted-by":"crossref","first-page":"B1","DOI":"10.5465\/apbpp.1999.27623073","article-title":"Successful execution of product development projects: The effects of project management formality, autonomy, and resource flexibility","volume":"10510","author":"Tatikonda M. V.","year":"1999","unstructured":"Tatikonda, M. V.; and Rosenthal, S. R. Successful execution of product development projects: The effects of project management formality, autonomy, and resource flexibility. In Academy of Management Proceedings: Academy of Management Briarcliff Manor, NY 10510, 1999, pp. B1\u2013B6.","journal-title":"In Academy of Management Proceedings: Academy of Management Briarcliff Manor, NY"},{"key":"e_1_3_5_97_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.1.151.10669"},{"key":"e_1_3_5_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhealeco.2007.09.009"},{"key":"e_1_3_5_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34982-4_12"},{"key":"e_1_3_5_100_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.03"},{"key":"e_1_3_5_101_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2015.0947"},{"key":"e_1_3_5_102_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.2100"},{"key":"e_1_3_5_103_1","doi-asserted-by":"publisher","DOI":"10.2307\/257550"},{"key":"e_1_3_5_104_1","unstructured":"UCLA. UCLA Health Data Notice. https:\/\/www.uclahealth.org\/data-notice. Accessed 2023-Oct-25"},{"key":"e_1_3_5_105_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650324"},{"key":"e_1_3_5_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.08.002"},{"key":"e_1_3_5_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2011.01.003"},{"key":"e_1_3_5_108_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0269"},{"key":"e_1_3_5_109_1","doi-asserted-by":"publisher","DOI":"10.2307\/41703465"},{"key":"e_1_3_5_110_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0660"},{"key":"e_1_3_5_111_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0226"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2023.2267319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T19:24:55Z","timestamp":1730834695000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2023.2267319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":110,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10,2]]}},"alternative-id":["10.1080\/07421222.2023.2267319"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2023.2267319","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}