{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T02:53:41Z","timestamp":1775703221724,"version":"3.50.1"},"reference-count":105,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Organizational Computing and Electronic Commerce"],"published-print":{"date-parts":[[2022,4,3]]},"DOI":"10.1080\/10919392.2022.2068906","type":"journal-article","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T06:50:05Z","timestamp":1651560605000},"page":"153-174","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":19,"title":["An exploratory study of organizational cyber resilience, its precursors and outcomes"],"prefix":"10.1080","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0630-6951","authenticated-orcid":false,"given":"Elinor","family":"Tsen","sequence":"first","affiliation":[{"name":"UQ Business School, University of Queensland, Brisbane, Queensland, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0804-1176","authenticated-orcid":false,"given":"Ryan K L","family":"Ko","sequence":"additional","affiliation":[{"name":"School of Information Technology and Electrical Engineering, Faculty of Engineering, Architecture and Information Technology, University of Queensland, Brisbane, Queensland, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7228-7560","authenticated-orcid":false,"given":"Sergeja","family":"Slapnicar","sequence":"additional","affiliation":[{"name":"UQ Business School, University of Queensland, Brisbane, Queensland, Australia"}]}],"member":"301","published-online":{"date-parts":[[2022,5,2]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.03.010"},{"key":"cit0002","unstructured":"Accenture. 2020. Third annual state of cyber resilence. Accessed August 11, 2020. https:\/\/www.accenture.com\/_acnmedia\/PDF-116\/Accenture-Cybersecurity-Report-2020.pdf."},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1002\/9780470594001"},{"issue":"7","key":"cit0004","first-page":"1696","volume":"9","author":"Ahmad A.","year":"2015","journal-title":"International Journal of Computer and Systems Engineering"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.tjem.2018.08.001"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1007\/s11142-018-9452-4"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1016\/S0361-3682(97)00060-3"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.3390\/a10020039"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1109\/ASCC.2015.7244713"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.12.193"},{"key":"cit0012","unstructured":"Australian Government. 2021. Strengthening Australia\u2019s cyber security regulations and incentives. Accessed 8 October 2021. https:\/\/www.homeaffairs.gov.au\/reports-and-pubs\/files\/strengthening-australia-cyber-security-regulations-discussion-paper.pdf."},{"key":"cit0013","unstructured":"Australian Securities and Investments Commission. 2015. Cyber resilience: Health check. Accessed August 11, 2020. https:\/\/asic.gov.au\/media\/3062900\/rep429-published-19-march-2015-1.pdf."},{"key":"cit0014","first-page":"1","volume-title":"ACIS2017: Australasian Conference on Information Systems","author":"Bagheri S.","year":"2017"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2021.113651"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16486-1_31"},{"key":"cit0017","unstructured":"Bodeau, D., and R. Graubart. 2011. Cyber resiliency engineering framework. MTR110237 PR. USA: The MITRE Corporation."},{"key":"cit0018","unstructured":"Bodeau, D., and R. Graubart. 2016.\u202fUSA: The MITRE Corporation."},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02279-6_6"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/888"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.aos.2008.01.003"},{"key":"cit0022","volume":"121","author":"Calvino F.","year":"2018","journal-title":"Physical Review Letters"},{"key":"cit0023","first-page":"114130R","volume":"11413","author":"Cam H","year":"2020","journal-title":"Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2909909"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534579"},{"key":"cit0026","volume-title":"The dynamics of cr management","author":"Carias J.","year":"2019"},{"key":"cit0027","unstructured":"Carnegie Endowment for International Peace. 2020. Timeline of cyber incidents involving financial institutions. Accessed February 10, 2020. www.carneigeendowment.org."},{"key":"cit0028","unstructured":"Cashell, B., W. D. Jackson, M. Jickling, and B. Webel. 2004. The economic impact of cyber-attacks. Washington, DC: The Library of Congress."},{"key":"cit0029","first-page":"395","volume":"66","author":"Cease C. C","year":"2014","journal-title":"Alabama Law Review"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.4135\/9781071837313"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.03.005"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.2307\/23044049"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1016\/S0361-3682(01)00027-7"},{"issue":"3","key":"cit0034","first-page":"67","volume":"228","author":"Collins J. C","year":"2019","journal-title":"Journal of Accountancy"},{"issue":"1","key":"cit0035","first-page":"794","volume":"5","author":"Collins J. D.","year":"2011","journal-title":"International Journal of Cyber Criminology"},{"key":"cit0036","unstructured":"Committee on payments and markets infrastructures \u2013 Board of the international organisation of securities commission. 2016. Guidance on CR for financial markets infrastructures. Accessed August 11, 2020. https:\/\/www.bis.org\/cpmi\/publ\/d146.pdf"},{"issue":"2","key":"cit0037","first-page":"127","volume":"28","author":"Connelly L","year":"2019","journal-title":"Medsurg Nursing"},{"key":"cit0038","unstructured":"COSO (Committee of the Sponsoring Organizations). 2004. Enterprise risk management. USA: COSO."},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845665"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70024-7"},{"key":"cit0042","unstructured":"Deloitte, 2019a. The future of cyber survey 2019. Accessed August 11, 2020. https:\/\/www2.deloitte.com\/us\/en\/pages\/advisory\/articles\/future-of-cyber-survey.html."},{"key":"cit0043","unstructured":"Deloitte, 2019b. Beneath the surface of a cyberattack. Accessed August 11, 2020. https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/us\/Documents\/risk\/us-risk-beneath-the-surface-of-a-cyber-attack.pdf"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-015-9540-y"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz013"},{"key":"cit0046","unstructured":"EY. 2019. How financial services organisations manage cyber risk. Accessed August 11, 2020. https:\/\/www.ey.com\/en_gl\/consulting\/how-financial-services-organizations-can-manage-cyber-risk"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1108\/09685220310468646"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12729"},{"key":"cit0049","unstructured":"Goel, R., J. Haddow, and A. Kumar. 2018. Managing cybersecurity risk in government: An implementation model. Accessed 20 October 2020. https:\/\/www.businessofgovernment.org\/sites\/default\/files\/Managing%20Cybersecurity%20Risk%20in%20Government-%20An%20Implementation%20Model.pdf"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107877"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00058"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(18)30014-9"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"cit0054","unstructured":"Information is Beautiful. 2020. World\u2019s biggest data breaches. Accessed February 10, 2020. www.informationisbeautiful.net."},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.2172\/1342373"},{"key":"cit0056","unstructured":"Institute of Internal Auditors. 2013. The three lines of defence in effective risk management and control. Accessed October 20, 2020. https:\/\/na.theiia.org\/standards-guidance\/Public%20Documents\/PP%20The%20Three%20Lines%20of%20Defense%20in%20Effective%20Risk%20Management%20and%20Control.pdf"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24188"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2020.1776033"},{"key":"cit0059","doi-asserted-by":"crossref","first-page":"1","DOI":"10.58886\/jfi.v16i2.2263","volume":"16","author":"Johnson M.","year":"2017","journal-title":"Journal of Finance Issues"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2018.1484598"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.2202\/1547-7355.1675"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2019.05.019"},{"key":"cit0063","volume-title":"Tenth Mediterranean Conference on Information Systems","author":"Karyda M.","year":"2016"},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/885"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09977-z"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2009.06.006"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-013-9485-y"},{"key":"cit0068","unstructured":"Lois, J. E. 2015. It can happen to you: Know the anatomy of a cyber intrusion. USA: Navy Cyber Defense Operations Command (NCDOC). NNS151019-05."},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2996175"},{"key":"cit0070","first-page":"79","volume":"51","author":"Lorio P. J","year":"2017","journal-title":"Columbia Journal of Law and Social Problems"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.02.001"},{"issue":"2","key":"cit0072","doi-asserted-by":"crossref","first-page":"103","DOI":"10.69554\/FARC5224","volume":"7","author":"Mallinder J.","year":"2014","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.4135\/9781483395418.n9"},{"key":"cit0074","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/837"},{"key":"cit0075","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-017-9808-5"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.04.004"},{"key":"cit0077","unstructured":"National Cyber Security Center. 2019. Board toolkit. Accessed September 11, 2020. https:\/\/www.ncsc.gov.uk\/collection\/board-toolkit."},{"key":"cit0078","first-page":"27","volume":"13","author":"Ncube C.","year":"2010","journal-title":"Palmetto Business and Economic Review"},{"key":"cit0079","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2775"},{"key":"cit0080","unstructured":"OECD (Organization for Economic Co-operation and Development). 2019. Measuring the digital transformation: A roadmap for the future. Accessed August 11, 2020. https:\/\/www.oecd.org\/publications\/measuring-the-digital-transformation-9789264311992-en.htm"},{"key":"cit0081","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01478.x"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2010.516639"},{"key":"cit0083","unstructured":"Ponemon Institute. 2019. Cost of a data breach report. Accessed August 11, 2020. https:\/\/www.ibm.com\/security\/data-breach"},{"key":"cit0084","unstructured":"Privacy Rights Clearinghouse 2020. Data breaches. Accessed February 10, 2020. www.privacyrights.org"},{"key":"cit0085","unstructured":"PwC. 2020. 23rd annual global CEO survey navigating the rising tide of uncertainty. Accessed August 11, 2020. https:\/\/www.pwc.com\/gx\/en\/ceo-survey\/2020\/reports\/pwc-23rd-global-ceo-survey.pdf"},{"key":"cit0086","unstructured":"R Core Team. 2017.R: A language and environment for statistical computing. https:\/\/www.R-project.org\/"},{"key":"cit0087","unstructured":"The Repository of Industrial Security Incidents. 2015. The repository of industrial security incidents. www.risidata.com"},{"key":"cit0088","doi-asserted-by":"publisher","DOI":"10.1111\/jels.12035"},{"key":"cit0089","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.04.011"},{"key":"cit0090","doi-asserted-by":"crossref","unstructured":"Sedgewick, A. 2014. Framework for improving critical infrastructure cybersecurity, version 1.0. USA: National Institute of Standards and Technology. https:\/\/doi.org\/10.6028\/NIST.CSWP.02122014.","DOI":"10.6028\/NIST.CSWP.02122014"},{"key":"cit0091","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101996"},{"key":"cit0092","volume-title":"Critical infrastructure: Control systems and the terrorist threat","author":"Shea D. A","year":"2004"},{"key":"cit0093","doi-asserted-by":"publisher","DOI":"10.2307\/23042796"},{"key":"cit0094","first-page":"2","volume-title":"9th Annual Symposium on Information Assurance","author":"Simmons C.","year":"2014"},{"key":"cit0095","unstructured":"Smith, G., and V. Bloch. 2018. A global snapshot of data. Accessed August 5, 2021. https:\/\/www.allens.com.au\/insights-news\/insights\/2018\/10\/pulse-a-global-snapshot-of-data-breach-class-actions\/."},{"issue":"3","key":"cit0096","first-page":"191","volume":"16","author":"Tisdale S. M","year":"2015","journal-title":"Issues in Information Systems"},{"key":"cit0097","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67540-4_14"},{"key":"cit0098","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.001"},{"key":"cit0099","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2020.1818521"},{"key":"cit0100","first-page":"16","volume-title":"International Conference on Applied Human Factors and Ergonomics","author":"van der Kleij R.","year":"2019"},{"key":"cit0101","unstructured":"Verizon. 2019. Data Breach Investigations Report. Accessed August 11, 2020. https:\/\/enterprise.verizon.com\/en-au\/resources\/reports\/dbir\/2019\/introduction\/"},{"key":"cit0102","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.012"},{"issue":"2","key":"cit0103","first-page":"21","volume":"59","author":"Weill P.","year":"2018","journal-title":"MIT Sloan Management Review"},{"key":"cit0104","first-page":"2","volume":"2","author":"Westerman G.","year":"2012","journal-title":"MITSloan Management and Capgemini Consulting"},{"key":"cit0105","unstructured":"World Economic Forum. 2012. Partnering for CR. Accessed August 11, 2020. http:\/\/www3.weforum.org\/docs\/WEF_IT_PartneringCyberResilience_Guidelines_2012.pdf."}],"container-title":["Journal of Organizational Computing and Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10919392.2022.2068906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T16:34:08Z","timestamp":1727109248000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10919392.2022.2068906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,3]]},"references-count":105,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4,3]]}},"alternative-id":["10.1080\/10919392.2022.2068906"],"URL":"https:\/\/doi.org\/10.1080\/10919392.2022.2068906","relation":{},"ISSN":["1091-9392","1532-7744"],"issn-type":[{"value":"1091-9392","type":"print"},{"value":"1532-7744","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}