{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T01:18:42Z","timestamp":1774315122166,"version":"3.50.1"},"reference-count":35,"publisher":"Informa UK Limited","issue":"4","funder":[{"DOI":"10.13039\/501100012456","name":"National Social Science Foundation of China","doi-asserted-by":"crossref","award":["17CGL019"],"award-info":[{"award-number":["17CGL019"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2021,4,21]]},"DOI":"10.1080\/17517575.2019.1644672","type":"journal-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T10:53:21Z","timestamp":1563533601000},"page":"474-491","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["How does overconfidence affect information security investment and information security performance?"],"prefix":"10.1080","volume":"15","author":[{"given":"Kunxiang","family":"Dong","sequence":"first","affiliation":[{"name":"School of Management Science & Engineering, Shandong University of Finance and Economics, Jinan, China"}]},{"given":"Runhui","family":"Lin","sequence":"additional","affiliation":[{"name":"Business School, NanKai University, TianJin, China"}]},{"given":"Xile","family":"Yin","sequence":"additional","affiliation":[{"name":"Business School, NanKai University, TianJin, China"}]},{"given":"Zongxiao","family":"Xie","sequence":"additional","affiliation":[{"name":"China Financial Certification Authority, Beijing, China"}]}],"member":"301","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcorpfin.2009.01.006"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.68.5.804"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.2009.21359"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2013.1763"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1108\/02635570610653498"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1177\/0273475304273525"},{"key":"cit0008","unstructured":"Computer Security Institute (CSI). 2011. \u201c2010\/2011 Computer Crime and Security Survey (15th Annual)\u201d. Mar. 15. www.GoCSI.com."},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250050306"},{"key":"cit0010","volume-title":"An Introduction to Generalized Linear Models","author":"Dunteman G. H.","year":"2005"},{"key":"cit0011","unstructured":"ENISA. 2016. \u201cENISA Threat Landscape 2015\u201d. Jan 27. https:\/\/www.enisa.europa.eu\/publications\/etl2015."},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.00407"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2012.06.022"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1999.2847"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.pacfin.2004.12.003"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.7.1.83"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.2005.00813.x"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2011.12.001"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.115.2.502"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1007\/s11066-015-9094-7"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20130921"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2012.06.002"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1108\/01443570510613956"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2013.1715"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.04.004"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.7.4.422"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.011"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1177\/1094428107300344"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.03.005"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.2307\/20650284"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1002\/smj.1988"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1080\/00207540701440345"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2006.05.021"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2019.1644672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T06:40:19Z","timestamp":1617345619000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2019.1644672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4,21]]}},"alternative-id":["10.1080\/17517575.2019.1644672"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2019.1644672","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,19]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-03-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}