{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:37:29Z","timestamp":1769751449735,"version":"3.49.0"},"reference-count":123,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2024,7,2]]},"DOI":"10.1080\/07421222.2024.2376385","type":"journal-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:27:44Z","timestamp":1725442064000},"page":"744-778","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Cyber Failures and Information Technology Capability Reputation: Examining Ex Ante and Ex Post Interplay Effects"],"prefix":"10.1080","volume":"41","author":[{"given":"Michel","family":"Benaroch","sequence":"first","affiliation":[{"name":"Department of Accounting and Information Systems, Whitman School of Management, Syracuse University, Syracuse, NY, USA"}]}],"member":"301","published-online":{"date-parts":[[2024,9,4]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3143740"},{"key":"e_1_3_4_3_1","article-title":"Are IT general controls outdated? Data protection and internal control over financial reporting","volume":"6","author":"Albeda J.","year":"2022","unstructured":"Albeda, J. Are IT general controls outdated? Data protection and internal control over financial reporting. ISACA Journals, 6 (2022). https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2022\/volume-6\/are-it-general-controls-outdated","journal-title":"ISACA Journals"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11142-018-9452-4"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35761-9_3"},{"key":"e_1_3_4_6_1","doi-asserted-by":"crossref","unstructured":"Bana S.; Brynjolfsson E.; Jin W.; Steffen S.; and Wang X. Human capital acquisition in response to data breaches 2022. SSRN https:\/\/ssrn.com\/abstract=3806060","DOI":"10.2139\/ssrn.3806060"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.2308\/ISYS-2020-070"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.2308\/accr.00000036"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2021.103546"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.04"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2012.03.001"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2009.04.001"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250983"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227173"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1108\/18347640910967753"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.2308\/accr-52045"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2004.11044320"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2002.11045723"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250958"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50778"},{"issue":"2","key":"e_1_3_4_21_1","first-page":"66","article-title":"Meeting the challenge of disruptive change","volume":"78","author":"Christensen C.M.","year":"2000","unstructured":"Christensen, C.M.; and Overdorf, M. Meeting the challenge of disruptive change. Harvard Business Review, 78, 2 (2000), 66\u201376.","journal-title":"Harvard Business Review"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810908769"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2014.04.005"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2019.01.007"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00411.x"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50418"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036551"},{"key":"e_1_3_4_28_1","unstructured":"Deloitte. Cyber: ITGC in the Spotlight. White paper May 6 2021. [Paywalled]."},{"key":"e_1_3_4_29_1","volume-title":"Compliance by Design: IT Controls that Work","author":"Ee C.","year":"2011","unstructured":"Ee, C. Compliance by Design: IT Controls that Work. Cambridgeshire, U.K.: IT Governance, 2011."},{"issue":"3","key":"e_1_3_4_30_1","first-page":"9","article-title":"Core IS capabilities for exploiting information technology","volume":"39","author":"Feeny D.","year":"1998","unstructured":"Feeny, D.; and Willcocks, L. Core IS capabilities for exploiting information technology. Sloan Management Review, 39, 3 (1998), 9\u201321.","journal-title":"Sloan Management Review"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6520.2007.00163.x"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2021.4264"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2022-0122"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2009.60"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00275"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2014.1041"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750692"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.2308\/ajpt-10355"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1451962"},{"key":"e_1_3_4_40_1","first-page":"386","volume-title":"PACIS 2014 Proceedings","author":"Gwebu K.L.","year":"2014","unstructured":"Gwebu, K.L.; Wang, J.; and Xie, W. Understanding the cost associated with data security breaches. PACIS 2014 Proceedings, 2014, p. 386. http:\/\/aisel.aisnet.org\/pacis2014\/386"},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.2308\/ajpt-10268"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.2308\/accr-51780"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/19312450709336664"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/1912352"},{"key":"e_1_3_4_45_1","first-page":"30","volume-title":"Dynamic Capabilities: Understanding Strategic Change in Organization, Chapter","author":"Helfat C.","year":"2007","unstructured":"Helfat, C.; and Maritan, C. Dynamic capabilities and organizational processes. In C. Helfat, S. Finkelstein, W. Mitchell, M. Peteraf, H. Singh, D. Teece, and S.G. Winter (eds.), Dynamic Capabilities: Understanding Strategic Change in Organization, Chapter: 3. Blackwell Publishing, 2007, pp. 30\u201345."},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51402"},{"key":"e_1_3_4_47_1","article-title":"The 12 biggest data breach fines, penalties, and settlements so far","author":"Hill M.","unstructured":"Hill, M. The 12 biggest data breach fines, penalties, and settlements so far. CSO, (Sep 12, 2022).","journal-title":"CSO"},{"key":"e_1_3_4_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.015"},{"key":"e_1_3_4_49_1","doi-asserted-by":"publisher","DOI":"10.2308\/acch-52113"},{"key":"e_1_3_4_50_1","doi-asserted-by":"publisher","DOI":"10.2308\/TAR-2018-0643"},{"key":"e_1_3_4_51_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.47.1.5"},{"key":"e_1_3_4_52_1","article-title":"COBIT 5","author":"ISACA","year":"2012","unstructured":"ISACA. COBIT 5. Rolling Meadows, 2012.","journal-title":"Rolling Meadows"},{"key":"e_1_3_4_53_1","volume-title":"COBIT 4.1 Framework, IT Governance Institute","author":"ITGI","year":"2007","unstructured":"ITGI. COBIT 4.1 Framework, IT Governance Institute, IL: Rolling Meadows, 2007."},{"key":"e_1_3_4_54_1","doi-asserted-by":"publisher","DOI":"10.1509\/jm.16.0124"},{"key":"e_1_3_4_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2021.113668"},{"key":"e_1_3_4_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2019.05.019"},{"key":"e_1_3_4_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.07.012"},{"key":"e_1_3_4_58_1","doi-asserted-by":"publisher","DOI":"10.2308\/acch-52031"},{"key":"e_1_3_4_59_1","doi-asserted-by":"publisher","DOI":"10.2308\/accr-51927"},{"key":"e_1_3_4_60_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2009.23.2.1"},{"issue":"2","key":"e_1_3_4_61_1","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.25300\/MISQ\/2018\/13580","article-title":"Meaningful healthcare security: Does meaningful-use attestation improve information security performance?","volume":"42","author":"Kwon J.","year":"2018","unstructured":"Kwon J. and Johnson E.M. Meaningful healthcare security: Does meaningful-use attestation improve information security performance?\u201d MIS Quarterly, 42, 2, (2018), 1043\u20131067.","journal-title":"MIS Quarterly"},{"key":"e_1_3_4_62_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2000.14.s-1.21"},{"key":"e_1_3_4_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2016.01.001"},{"key":"e_1_3_4_64_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280302"},{"key":"e_1_3_4_65_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300102"},{"key":"e_1_3_4_66_1","first-page":"1009","volume-title":"USENIX Security Symposium","author":"Liu Yang","unstructured":"Liu, Yang; Sarabi, A.; Zhang, J.; Naghizadeh, P.; Karir, M.; Bailey, M., and Liu, M. Cloudy with a chance of breach: Forecasting cyber security incidents. USENIX Security Symposium, Washington D.C. (August 2015) pp.1009\u20131022."},{"key":"e_1_3_4_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2018.06.002"},{"key":"e_1_3_4_68_1","volume-title":"ICIS 2020 Proceedings","author":"Masuch K.","year":"2020","unstructured":"Masuch, K.; Greve, M., and Trang, S. Please be silent? Examining the impact of data breach response strategies on the stock value. ICIS 2020 Proceedings, (2020) pp. 1\u201317."},{"issue":"3","key":"e_1_3_4_69_1","first-page":"626","article-title":"Event studies in management research: Theoretical and empirical issues","volume":"40","author":"McWilliams A.","year":"1997","unstructured":"McWilliams, A.; and Siegel, D. Event studies in management research: Theoretical and empirical issues. The Academy of Management Journal, 40, 3 (1997), 626\u2013657.","journal-title":"The Academy of Management Journal"},{"key":"e_1_3_4_70_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148636"},{"key":"e_1_3_4_71_1","doi-asserted-by":"publisher","DOI":"10.2308\/accr.2010.85.6.2075"},{"key":"e_1_3_4_72_1","doi-asserted-by":"publisher","DOI":"10.2308\/accr.00000001"},{"key":"e_1_3_4_73_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.958"},{"key":"e_1_3_4_74_1","doi-asserted-by":"publisher","DOI":"10.2308\/accr.00000001"},{"key":"e_1_3_4_75_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.958"},{"key":"e_1_3_4_76_1","article-title":"Global cybersecurity spending predicted to exceed $1 trillion from 2017-2021","volume":"10","author":"Morgan S.","year":"2019","unstructured":"Morgan, S. Global cybersecurity spending predicted to exceed $1 trillion from 2017-2021. CyberCrime Magazine, Jun. 10, 2019. https:\/\/cybersecurityventures.com\/cybersecurity-market-report\/","journal-title":"CyberCrime Magazine, Jun"},{"key":"e_1_3_4_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2009.11646052"},{"key":"e_1_3_4_78_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2010.24.1.43"},{"key":"e_1_3_4_79_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3177292"},{"key":"e_1_3_4_80_1","unstructured":"Palmer B. Institutional investors vs. retail investors: What\u2019s the difference? Updated August 11 2023. https:\/\/www.investopedia.com\/ask\/answers\/06\/institutionalinvestor.asp"},{"key":"e_1_3_4_81_1","doi-asserted-by":"publisher","DOI":"10.3926\/ic.336"},{"key":"e_1_3_4_82_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2018.0698"},{"key":"e_1_3_4_84_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.173"},{"key":"e_1_3_4_85_1","volume-title":"Guide to the Sarbanes-Oxley Act: IT Risks and Controls","author":"Protiviti","year":"2012","unstructured":"Protiviti, Guide to the Sarbanes-Oxley Act: IT Risks and Controls, 2nd Edition, Protiviti, 2012. https:\/\/www.dau.edu\/sites\/default\/files\/Migrated\/CopDocuments\/Protiviti%20SOX%20ITRiskControls.pdf","edition":"2"},{"key":"e_1_3_4_86_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0084"},{"key":"e_1_3_4_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2017.07.002"},{"key":"e_1_3_4_88_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-52379"},{"key":"e_1_3_4_89_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2005.19573108"},{"key":"e_1_3_4_90_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.274"},{"key":"e_1_3_4_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2021.107688"},{"key":"e_1_3_4_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.irfa.2017.01.001"},{"key":"e_1_3_4_93_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/13626"},{"key":"e_1_3_4_94_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.2.105.11780"},{"key":"e_1_3_4_95_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036521"},{"key":"e_1_3_4_96_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1063315"},{"key":"e_1_3_4_97_1","unstructured":"Seshadri D.; Sawale K.; Batterywala J.; and Ramu N. General IT controls (GITC) risk and impact. Deloitte\u2019s Risk Advisory. Deloitte Touche Tohmatsu India LLP November 2018 https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/in\/Documents\/risk\/in-ra-general-it-controls-noexp.pdf. (accessed May 2019)."},{"key":"e_1_3_4_98_1","article-title":"When the machine stops: The impact of information technology failure on firm value","volume":"36","author":"Schweikl S.","year":"2022","unstructured":"Schweikl, S.; Schinnen, M.; and Obermaier, R. When the machine stops: The impact of information technology failure on firm value. ECIS 2022 Research Papers. 36, (2022).","journal-title":"ECIS 2022 Research Papers"},{"key":"e_1_3_4_99_1","doi-asserted-by":"publisher","DOI":"10.1177\/0148558X17748524"},{"key":"e_1_3_4_100_1","volume-title":"Proceedings of the 21st Australasian Conference on Information Systems (ACIS)","author":"Singh H.","unstructured":"Singh, H. Selecting IT control objectives and measuring IT control capital. Proceedings of the 21st Australasian Conference on Information Systems (ACIS), Brisbane, Australia, 89. December 1-3, 2010. https:\/\/aisel.aisnet.org\/acis2010\/89"},{"key":"e_1_3_4_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.12.006"},{"key":"e_1_3_4_102_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_3_4_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2011.06.001"},{"key":"e_1_3_4_104_1","unstructured":"Summerfield B. EU selects CobiT as an auditing standard 2005. http:\/\/www.certmag.com"},{"key":"e_1_3_4_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2016.02.001"},{"key":"e_1_3_4_106_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z"},{"key":"e_1_3_4_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70712"},{"key":"e_1_3_4_108_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260301"},{"key":"e_1_3_4_109_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00494"},{"key":"e_1_3_4_110_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2007.09.001"},{"key":"e_1_3_4_111_1","first-page":"30","article-title":"Implementing COBIT in New South Wales Health","volume":"3","author":"Tyler R.","year":"2000","unstructured":"Tyler, R. Implementing COBIT in New South Wales Health. Information Systems Control Journal, 3 (2000), 30\u201332.","journal-title":"Information Systems Control Journal"},{"key":"e_1_3_4_112_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148626"},{"key":"e_1_3_4_113_1","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2007.21.2.27"},{"key":"e_1_3_4_114_1","first-page":"49","volume-title":"UK Academy for Information Systems Conference Proceedings","author":"Weber B.","year":"2009","unstructured":"Weber, B. The valuation damage from financial systems weaknesses: A study of SOX Section 404 disclosures. UK Academy for Information Systems Conference Proceedings, 49, 2009."},{"key":"e_1_3_4_115_1","volume-title":"IT Governance: How Top Performers Manage IT Decision Rights for Superior Results","author":"Weill P.","year":"2004","unstructured":"Weill, P.; and Ross, J.W. IT Governance: How Top Performers Manage IT Decision Rights for Superior Results. Boston, MA: Harvard Business School Press, 2004."},{"key":"e_1_3_4_116_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6486.00243"},{"key":"e_1_3_4_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101687"},{"key":"e_1_3_4_118_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2012.03.005"},{"key":"e_1_3_4_119_1","volume-title":"KPMG\u2019s 2016 Internal SOX Survey","author":"Woolery P.","year":"2016","unstructured":"Woolery, P.; Burkom, S.; and King, S. KPMG\u2019s 2016 Internal SOX Survey. KPMG LLP, 2016. https:\/\/advisory.kpmg.us\/articles\/2017\/kpmg-2016-internal-sox-survey.html"},{"key":"e_1_3_4_120_1","doi-asserted-by":"publisher","DOI":"10.1108\/MEDAR-04-2018-0325"},{"key":"e_1_3_4_121_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-52480"},{"issue":"5","key":"e_1_3_4_122_1","first-page":"172","article-title":"Internal control weakness and CEO media exposure","volume":"19","author":"Yeh C.","year":"2019","unstructured":"Yeh, C.; Mary, Y.; Hwei, W.C.; and You, P-R. Internal control weakness and CEO media exposure. Journal of Accounting & Finance, 19, 5 (2019), 172\u2013188.","journal-title":"Journal of Accounting & Finance"},{"key":"e_1_3_4_123_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2010.0608"},{"key":"e_1_3_4_124_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00223"},{"key":"e_1_3_4_125_1","article-title":"Information technology security techniques \u2015 Code of practice for information security management","author":"ISO\/IEC 27002","year":"2005","unstructured":"ISO\/IEC 27002. Information technology security techniques \u2015 Code of practice for information security management. International Standard, first edition 2005-06-15, 2005.","journal-title":"International Standard, first edition 2005-06-15"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2024.2376385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T06:07:03Z","timestamp":1727503623000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2024.2376385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,2]]},"references-count":123,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,7,2]]}},"alternative-id":["10.1080\/07421222.2024.2376385"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2024.2376385","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mmis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-09-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}