{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T21:39:20Z","timestamp":1765143560469,"version":"3.41.2"},"reference-count":95,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,5,10]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This study\/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users\u2019 attitude towards those security issues? What is the impact of users\u2019 attitude towards security issues on perceived security of ES mobility?<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The study results have identified the following security issues: users\u2019 attitude towards mobile device security issues; users\u2019 attitude towards wireless network security issues; users\u2019 attitude towards cloud computing security issues; users\u2019 attitude towards application-level security issues; users\u2019 attitude towards data (access) level security issues; and users\u2019 attitude towards enterprise-level security issues.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Social implications<\/jats:title>\n<jats:p>Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This is an empirical study conducted from the users\u2019 perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-05-2020-0069","type":"journal-article","created":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T08:09:40Z","timestamp":1616832580000},"page":"159-186","source":"Crossref","is-referenced-by-count":11,"title":["Users\u2019 attitude on perceived security of enterprise systems mobility: an empirical study"],"prefix":"10.1108","volume":"29","author":[{"given":"Ramaraj","family":"Palanisamy","sequence":"first","affiliation":[]},{"given":"Yang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,3,29]]},"reference":[{"issue":"3","key":"key2021050810170083800_ref001","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s12351-017-0343-4","article-title":"A framework for deployment of mobile business intelligence within small and medium enterprises in developing countries","volume":"18","year":"2018","journal-title":"Operational Research"},{"year":"2012","key":"key2021050810170083800_ref002","article-title":"Mobility disruption: a CIO perspective"},{"key":"key2021050810170083800_ref003","first-page":"214","article-title":"A review and a classifications of mobile cloud computing security issues","volume-title":"Proceedings of 11th International Conference on Cyber Warfare and Security","year":"2016"},{"issue":"2","key":"key2021050810170083800_ref004","first-page":"152","article-title":"Web 2.0 technologies and social networking security fears in enterprises","volume":"3","year":"2012","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"3","key":"key2021050810170083800_ref005","first-page":"75","article-title":"Consumer attitude towards mobile advertising","volume":"2","year":"2010","journal-title":"Interdisciplinary Journal of Contemporary Research in Business"},{"issue":"20","key":"key2021050810170083800_ref006","first-page":"45","article-title":"AppShield repels hack attacks-speeds e-business applications to market while keeping web servers safe","volume":"22","year":"2006","journal-title":"Info World"},{"issue":"3","key":"key2021050810170083800_ref007","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSP.2010.202","article-title":"Secure software installation on smartphones","volume":"9","year":"2011","journal-title":"IEEE Security and Privacy Magazine"},{"volume-title":"Designing Information Systems Security","year":"1988","key":"key2021050810170083800_ref008"},{"issue":"1","key":"key2021050810170083800_ref009","first-page":"1","article-title":"Enterprise mobility: researching a new paradigm","volume":"7","year":"2008","journal-title":"Journal of Information Knowledge Systems Management"},{"key":"key2021050810170083800_ref010","doi-asserted-by":"crossref","first-page":"57","DOI":"10.4018\/978-1-60960-851-4.ch004","article-title":"Cyber security and privacy in the age of social networks","volume-title":"Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies","year":"2012"},{"year":"2012","key":"key2021050810170083800_ref011","article-title":"Android apps put pressure on apple"},{"year":"2012","key":"key2021050810170083800_ref012","article-title":"Improving security and mobility for personally owned devices"},{"issue":"5","key":"key2021050810170083800_ref013","first-page":"629","article-title":"Making use is more than a matter of task analysis","volume":"14","year":"2002","journal-title":"Interacting with Computers"},{"issue":"1","key":"key2021050810170083800_ref014","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1287\/isre.1050.0041","article-title":"The value for intrusion-detection systems in information technology security architecture","volume":"16","year":"2005","journal-title":"Information Systems Research"},{"key":"key2021050810170083800_ref015","first-page":"1","article-title":"Identifying smartphone malware using data mining technology","volume-title":"Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)","year":"2011"},{"first-page":"102","volume-title":"A Corporate Security Strategy in an Enterprise 2.0 Model","year":"2012","key":"key2021050810170083800_ref016"},{"key":"key2021050810170083800_ref017","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.cose.2012.09.010","article-title":"Future directions for behavioral information security research","volume":"32","year":"2013","journal-title":"Computers and Security"},{"volume-title":"Analytics at Work: smarter Decisions, Better Results","year":"2010","key":"key2021050810170083800_ref018"},{"issue":"1","key":"key2021050810170083800_ref019","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.dss.2012.05.048","article-title":"Leveraging the capabilities of service-oriented decision support systems: putting analytics and big data in cloud","volume":"55","year":"2013","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2021050810170083800_ref020","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-016-0068-6","article-title":"MDA: message digest-based authentication for mobile cloud computing","volume":"5","year":"2016","journal-title":"Journal of Cloud Computing"},{"year":"1995","key":"key2021050810170083800_ref021","article-title":"Interpreting the management of information systems security"},{"issue":"1","key":"key2021050810170083800_ref022","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.cose.2005.09.009","article-title":"Aligning the information security policy with the strategic information systems plan","volume":"25","year":"2006","journal-title":"Computers and Security"},{"article-title":"Android permissions: user attention, comprehension, and behavior","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS)","year":"2012","key":"key2021050810170083800_ref023"},{"volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","year":"1975","key":"key2021050810170083800_ref024"},{"issue":"9","key":"key2021050810170083800_ref025","first-page":"401","article-title":"Google android: an updated security review","volume":"9","year":"2012","journal-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering"},{"article-title":"CIOs\u2019 next-generation mobile strategy checklist","year":"2012","author":"Gartner","key":"key2021050810170083800_ref026"},{"article-title":"Bring your own device: new opportunities, new challenges","year":"2012","author":"Gartner","key":"key2021050810170083800_ref027"},{"article-title":"Enterprise mobility and its impact on IT","year":"2012","author":"Gartner","key":"key2021050810170083800_ref028"},{"issue":"4","key":"key2021050810170083800_ref029","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1057\/ejis.2014.2","article-title":"The role of GPS-enabled information in transforming operational decision making: an exploratory study","volume":"23","year":"2014","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2021050810170083800_ref030","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1108\/imcs-03-2013-0019","article-title":"Mobile device security considerations for small- and medium-sized enterprise business mobility","volume":"22","year":"2014","journal-title":"Information Management and Computer Security"},{"issue":"1","key":"key2021050810170083800_ref031","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/249610","article-title":"Measuring user participation, user involvement, and user attitude","volume":"18","year":"1994","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2021050810170083800_ref032","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1108\/IMCS-12-2012-0068","article-title":"A survey of security risks of mobile social media through blog mining and an extensive literature search","volume":"21","year":"2013","journal-title":"Information Management and Computer Security"},{"key":"key2021050810170083800_ref033","first-page":"760","article-title":"Scriptless attacks: stealing the pie without touching the sill","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS\u201912","year":"2012"},{"year":"2013","key":"key2021050810170083800_ref034","article-title":"Exposing your personal information: there\u2019s an app [\u2026]"},{"article-title":"Identity fraud rose 13 % in 2011","year":"2012","author":"Javelin Strategy and Research","key":"key2021050810170083800_ref035"},{"issue":"2","key":"key2021050810170083800_ref036","first-page":"259","article-title":"Using the repertory grid and laddering technique to determine the user\u2019s evaluative model of search engines","volume":"60","year":"2007","journal-title":"Journal of Documentation"},{"issue":"8","key":"key2021050810170083800_ref037","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1016\/S0378-7206(01)00071-4","article-title":"Security threats to internet: a Korean multi-industry investigation","volume":"38","year":"2001","journal-title":"Information and Management"},{"issue":"3","key":"key2021050810170083800_ref038","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10462-011-9228-8","article-title":"A survey of security issue in multi-agent systems","volume":"37","year":"2012","journal-title":"Artificial Intelligence Review"},{"article-title":"Find and call: leak and spam","year":"2013","author":"Kaspersky","key":"key2021050810170083800_ref039"},{"edition":"Ph.D. Part 1 ed","volume-title":"Is Implementing ERP like Pouring Concrete into a Company? Impact of Enterprise Systems on Organizational Agility","year":"2012","key":"key2021050810170083800_ref040"},{"issue":"1","key":"key2021050810170083800_ref041","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.elerap.2009.04.014","article-title":"An empirical study of customers\u2019 perceptions of security and trust in e-payment systems","volume":"9","year":"2010","journal-title":"Electronic Commerce Research and Applications"},{"year":"2012","key":"key2021050810170083800_ref042","article-title":"Managing mobility in the enterprise"},{"issue":"3","key":"key2021050810170083800_ref043","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1504\/IJTGM.2014.064908","article-title":"Impact of un-ethical IT behaviors to cloudy businesses","volume":"7","year":"2014","journal-title":"International Journal of Trade and Global Markets"},{"issue":"4","key":"key2021050810170083800_ref044","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1108\/JMH-02-2014-0018","article-title":"A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing","volume":"20","year":"2014","journal-title":"Journal of Management History"},{"article-title":"A review and a classifications of mobile cloud computing security issues","volume-title":"International Conference on Cyber Warfare and Security","year":"2016","key":"key2021050810170083800_ref045"},{"issue":"11\/12","key":"key2021050810170083800_ref046","first-page":"780","article-title":"An end user evaluation of query formulation and results review tools in three medical meta-search engines","volume":"76","year":"2007","journal-title":"International Journal of Medical Informatics"},{"issue":"3","key":"key2021050810170083800_ref047","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.istr.2007.05.001","article-title":"The security challenges for mobile ubiquitous services","volume":"12","year":"2007","journal-title":"Information Security Technical Report"},{"volume-title":"The Security Challenges for Mobile Ubiquitous Services","year":"2007","key":"key2021050810170083800_ref048"},{"issue":"6","key":"key2021050810170083800_ref049","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1016\/S0747-5632(03)00009-8","article-title":"An investigation of user attitudes toward search engines as an information retrieval tool","volume":"19","year":"2003","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2021050810170083800_ref050","first-page":"291","article-title":"Significant risks relating to mobile technology","volume":"9","year":"2016","journal-title":"Journal of Economic and Financial Sciences | JEF |"},{"article-title":"2011 Mobile threat report","year":"2011","author":"Lookout","key":"key2021050810170083800_ref051"},{"issue":"2","key":"key2021050810170083800_ref052","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1108\/IntR-11-2014-0294","article-title":"An intelligent tracking system based on internet of things for the cold chain","volume":"26","year":"2016","journal-title":"Internet Research"},{"article-title":"McAfee labs 2018 threats predictions","volume-title":"Mission College Boulevard","year":"2017","key":"key2021050810170083800_ref053"},{"article-title":"McAfee labs 2014 threats predictions","year":"2014","author":"McAfee","key":"key2021050810170083800_ref054"},{"article-title":"The digital tipping point: McKinsey global survey results","year":"2014","author":"McKinsey","key":"key2021050810170083800_ref055"},{"issue":"2","key":"key2021050810170083800_ref056","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1177\/002224298905300204","article-title":"An empirical examination of the structural antecedents of attitude toward the ad in an advertising pretest context","volume":"53","year":"1989","journal-title":"Journal of Marketing"},{"issue":"1","key":"key2021050810170083800_ref057","first-page":"5","article-title":"Security review: the past year","volume":"13","year":"2013","journal-title":"Computer Fraud and Security"},{"issue":"6","key":"key2021050810170083800_ref058","first-page":"97","article-title":"Mobile devices and corporate data security","volume":"1","year":"2012","journal-title":"International Journal of Education and Information Technologies"},{"issue":"8","key":"key2021050810170083800_ref059","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1016\/j.cose.2011.07.003","article-title":"Cybercrime: understanding and addressing the concerns of stakeholders","volume":"30","year":"2011","journal-title":"Computers and Security"},{"volume-title":"Find and Call: leak and Spam","year":"2012","key":"key2021050810170083800_ref060"},{"issue":"18","key":"key2021050810170083800_ref061","doi-asserted-by":"crossref","first-page":"5502","DOI":"10.1080\/00207543.2014.916824","article-title":"Value-added path of service-oriented manufacturing based on structural equation model: the case of electric car rental for instance","volume":"52","year":"2014","journal-title":"International Journal of Production Research"},{"issue":"5","key":"key2021050810170083800_ref062","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1057\/ejis.2014.21","article-title":"When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena","volume":"23","year":"2014","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2021050810170083800_ref063","doi-asserted-by":"crossref","first-page":"107","DOI":"10.2307\/248832","article-title":"Measuring the effectiveness of computer-based information systems in the financial services sector","volume":"11","year":"1987","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2021050810170083800_ref064","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MITP.2012.93","article-title":"BYOD: security and privacy considerations","volume":"14","year":"2012","journal-title":"IT Professional"},{"issue":"2","key":"key2021050810170083800_ref065","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/s11227-012-0831-5","article-title":"A survey on security issues and solutions at different layers of cloud computing","volume":"63","year":"2013","journal-title":"The Journal of Supercomputing"},{"issue":"4","key":"key2021050810170083800_ref066","first-page":"21","article-title":"Enterprise systems network: securID solutions, the authentication to global security systems","volume":"19","year":"2010","journal-title":"Journal of International Technology and Information Management"},{"key":"key2021050810170083800_ref067","first-page":"89","article-title":"Users\u2019 attitude on perceived security of enterprise systems mobility: a conceptual model","volume-title":"Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI \u2013 2019)","year":"2020"},{"volume-title":"Fighting Computer Crime: A New Framework for Protecting Information","year":"1998","key":"key2021050810170083800_ref068"},{"key":"key2021050810170083800_ref069","first-page":"139","article-title":"A study on the interrelations between the security-related antecedents of customers\u2019 online trust","volume-title":"Proceedings of the sixth International Conference Global Security, Safety, and Sustainability","year":"2010"},{"issue":"1","key":"key2021050810170083800_ref070","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S0378-7206(99)00028-2","article-title":"Management tradeoffs in anti-virus strategies","volume":"37","year":"2000","journal-title":"Information and Management"},{"issue":"2","key":"key2021050810170083800_ref071","first-page":"128","article-title":"Efficiency of corporate security systems in managing information threats: an overview of the current situation","volume":"16","year":"2016","journal-title":"Varstvoslovje"},{"issue":"1","key":"key2021050810170083800_ref072","first-page":"1179","article-title":"Perceived mobile information security and adoption of mobile payment services in China","volume":"9","year":"2017","journal-title":"International Journal of Mobile Human Computer Interaction"},{"issue":"4","key":"key2021050810170083800_ref073","doi-asserted-by":"crossref","first-page":"5742","DOI":"10.3390\/s140405742","article-title":"Context-aware personal navigation using embedded sensor fusion in smartphones","volume":"14","year":"2014","journal-title":"Sensors"},{"issue":"1","key":"key2021050810170083800_ref074","first-page":"291","article-title":"Significant risks relating to mobile technology","volume":"9","year":"2016","journal-title":"Journal of Economic and Financial Sciences"},{"year":"2005","key":"key2021050810170083800_ref075","article-title":"Five steps to an effective strategic plan"},{"issue":"1","key":"key2021050810170083800_ref076","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.ijinfomgt.2013.10.001","article-title":"The determinants of individuals\u2019 perceived e-security: evidence from Malaysia","volume":"34","year":"2014","journal-title":"International Journal of Information Management"},{"volume-title":"Introduction to Information Security in Mobile Computing.","year":"2003","key":"key2021050810170083800_ref077"},{"volume-title":"Think Smart Mobility. Enterprise Mobility: Why and What You Need to Know","year":"2009","author":"Smart Mobility","key":"key2021050810170083800_ref078"},{"article-title":"Security threat report 2012","year":"2012","author":"Sophos","key":"key2021050810170083800_ref079"},{"volume-title":"Enterprise Mobility: Tiny Technology with Global Impact on Work","year":"2011","key":"key2021050810170083800_ref080"},{"issue":"2","key":"key2021050810170083800_ref081","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1287\/isre.6.2.144","article-title":"Understanding information technology usage: a test of competing models","volume":"6","year":"1995","journal-title":"Information Systems Research"},{"article-title":"Consumerization of IT: final report on risk mitigation strategies and good practices","year":"2012","author":"The ENISA","key":"key2021050810170083800_ref082"},{"issue":"1","key":"key2021050810170083800_ref083","first-page":"46","article-title":"The enterprise mobile business intelligence framework","volume":"23","year":"2018","journal-title":"Business Intelligence Journal"},{"issue":"3","key":"key2021050810170083800_ref084","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MITP.2010.45","article-title":"The enterprise mobile applications development framework","volume":"12","year":"2010","journal-title":"IT Professional"},{"issue":"3","key":"key2021050810170083800_ref085","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1016\/j.im.2015.09.005","article-title":"Mobile environments and innovation co-creation processes and ecosystems","volume":"53","year":"2016","journal-title":"Information and Management"},{"key":"key2021050810170083800_ref086","first-page":"1084","article-title":"Cloud computing and cloud security challenges","volume-title":"International Symposium on Information Technology in Medicine and Education","year":"2012"},{"issue":"5","key":"key2021050810170083800_ref087","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1016\/j.im.2006.03.003","article-title":"Sharing and access right delegation for confidential documents: a practical solution","volume":"43","year":"2006","journal-title":"Information and Management"},{"issue":"5","key":"key2021050810170083800_ref088","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1287\/orsc.1120.0771","article-title":"Organizing for innovation in the digitized world","volume":"23","year":"2012","journal-title":"Organization Science"},{"issue":"4","key":"key2021050810170083800_ref089","doi-asserted-by":"crossref","first-page":"121","DOI":"10.2753\/JEC1086-4415160405","article-title":"A new open door: the smartphone\u2019s impact on work-to-life conflict, stress, and resistance","volume":"16","year":"2012","journal-title":"International Journal of Electronic Commerce"},{"key":"key2021050810170083800_ref090","first-page":"315","article-title":"\u2018Attitudes: a new look at an old concept\u2019","volume-title":"The Social Psychology of Knowledge","year":"1988"},{"issue":"3","key":"key2021050810170083800_ref091","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1177\/002224298805200302","article-title":"Consumer perceptions of price, quality and value: a means-end model and synthesis of evidence","volume":"52","year":"1988","journal-title":"Journal of Marketing"},{"year":"2011","key":"key2021050810170083800_ref092","article-title":"Social media: a hacker\u2019s secret weapon for accessing your network"},{"issue":"2","key":"key2021050810170083800_ref093","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1080\/08874417.2016.1183977","article-title":"Business analytics-based enterprise information systems","volume":"57","year":"2017","journal-title":"Journal of Computer Information Systems"},{"article-title":"Hey, you, get off of my market: detecting malicious apps in official and alternative android markets","volume-title":"Proceedings of the19th Annual Network and Distributed System Security Symposium","year":"2012","key":"key2021050810170083800_ref094"},{"issue":"3","key":"key2021050810170083800_ref095","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","article-title":"Addressing cloud computing security issues","volume":"28","year":"2012","journal-title":"Future Generation Computer Systems"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-05-2020-0069\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-05-2020-0069\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:55Z","timestamp":1753406575000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/1\/159-186\/103748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,29]]},"references-count":95,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,3,29]]},"published-print":{"date-parts":[[2021,5,10]]}},"alternative-id":["10.1108\/ICS-05-2020-0069"],"URL":"https:\/\/doi.org\/10.1108\/ics-05-2020-0069","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2021,3,29]]}}}