{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:18:36Z","timestamp":1773415116043,"version":"3.50.1"},"reference-count":56,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2018,7,3]]},"DOI":"10.1080\/17517575.2017.1404132","type":"journal-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T10:20:54Z","timestamp":1510741254000},"page":"659-673","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":31,"title":["A Study of BYOD adoption from the lens of threat and coping appraisal of its security policy"],"prefix":"10.1080","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0726-8352","authenticated-orcid":false,"given":"Vincent","family":"Cho","sequence":"first","affiliation":[{"name":"Department of Management and Marketing, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6609-0713","authenticated-orcid":false,"given":"W.H.","family":"Ip","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hong Kong"}]}],"member":"301","published-online":{"date-parts":[[2017,11,15]]},"reference":[{"key":"CIT0001","first-page":"191","volume":"35","author":"Aaron F.","year":"2014","journal-title":"Communication of the Association for Information Systems"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"CIT0003","volume-title":"Understanding Attitudes and Predicting Social Behaviour","author":"Ajzen I.","year":"1980"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.2307\/2392596"},{"issue":"11","key":"CIT0005","first-page":"63","volume":"83","author":"Ansaldi H.","year":"2013","journal-title":"The CPA Journal"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0252-y"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.2307\/256569"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2016.1183264"},{"issue":"1","key":"CIT0010","first-page":"35","volume":"32","author":"Bhuian S. N.","year":"1996","journal-title":"Mid-Atlantic Journal of Business"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1987.4307844"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"issue":"1","key":"CIT0014","first-page":"21","volume":"71","author":"Coates S.","year":"2014","journal-title":"Internal Auditor"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.2308\/isys-50704"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2013.792397"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"issue":"11","key":"CIT0018","first-page":"34","volume":"22","author":"Davis T.","year":"2013","journal-title":"Applied Clinical Trials"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1037\/a0014603"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/135943299398302"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1111\/anae.13268"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2014.986217"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2015.1010985"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-9536(03)00345-9"},{"issue":"7","key":"CIT0026","first-page":"12","volume":"61","author":"Holleran J.","year":"2014","journal-title":"Risk Management"},{"key":"CIT0027","volume-title":"Information Security Culture \u2013 A Preliminary Investigation","author":"Information Security Forum","year":"2000"},{"key":"CIT0028","unstructured":"Jansen, W., and T. Grance. 2012.Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology. Gaithersburg, MD: U.S. Department of Commerce, Special Publication, 800\u2013144."},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1002\/(ISSN)1099-1379"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.04.003"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00007-5"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-11-2012-0129"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.11"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1732-0"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.2307\/20650279"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.22215\/timreview771"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1108\/01437730010318174"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1379(1998)19:1+<697::AID-JOB974>3.0.CO;2-I"},{"issue":"2","key":"CIT0040","first-page":"31","volume":"7","author":"Mitrea D.","year":"2014","journal-title":"Bulletin of the Translivania University of Brasov. Economic Sciences"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1177\/014920638601200408"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1379(1998)19:1+<769::AID-JOB968>3.0.CO;2-1"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.19030\/rbis.v17i2.7846"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.86.2.219"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1049\/et.2013.0304"},{"key":"CIT0046","volume-title":"Nonparametric Statistics for the Behavioral Sciences","author":"Siegel S.","year":"1988","edition":"2"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.01.005"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1037\/1076-8998.7.3.242"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1997.tb00651.x"},{"issue":"2","key":"CIT0050","doi-asserted-by":"crossref","first-page":"207","DOI":"10.20867\/thm.20.2.5","volume":"20","author":"Tomislav C.","year":"2014","journal-title":"Tourism and Hospitality Management"},{"key":"CIT0053","volume-title":"Impact of the Crisis on European Working Conditions: Assembling National Trends and Reports","author":"Van Gyes G.","year":"2013"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-0008-6"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(14)70082-0"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645795"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1108\/01437729810216694"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2017.1404132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T10:38:33Z","timestamp":1659868713000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2017.1404132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,15]]},"references-count":56,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2017,11,15]]},"published-print":{"date-parts":[[2018,7,3]]}},"alternative-id":["10.1080\/17517575.2017.1404132"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2017.1404132","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,15]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}