{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T02:24:39Z","timestamp":1775183079180,"version":"3.50.1"},"reference-count":108,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2016,11,14]],"date-time":"2016-11-14T00:00:00Z","timestamp":1479081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2016,11,14]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to survey existing inter-organisational information security research to scrutinise the kind of knowledge that is currently available and the way in which this knowledge has been brought about.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The results are based on a literature review of inter-organisational information security research published between 1990 and 2014.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The authors conclude that existing research has focused on a limited set of research topics. A majority of the research has focused management issues, while employees\u2019\/non-staffs\u2019 actual information security work in inter-organisational settings is an understudied area. In addition, the majority of the studies have used a subjective\/argumentative method, and few studies combine theoretical work and empirical data.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>The findings suggest that future research should address a broader set of research topics, focusing especially on employees\/non-staff and their use of processes and technology in inter-organisational settings, as well as on cultural aspects, which are lacking currently; focus more on theory generation or theory testing to increase the maturity of this sub-field; and use a broader set of research methods.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>The authors conclude that existing research is to a large extent descriptive, philosophical or theoretical. Thus, it is difficult for practitioners to adopt existing research results, such as governance frameworks, which have not been empirically validated.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>Few systematic reviews have assessed the maturity of existing inter-organisational information security research. Findings of authors on research topics, maturity and research methods extend beyond the existing knowledge base, which allow for a critical discussion about existing research in this sub-field of information security.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ics-11-2016-091","type":"journal-article","created":{"date-parts":[[2016,11,18]],"date-time":"2016-11-18T13:13:52Z","timestamp":1479474832000},"page":"418-451","source":"Crossref","is-referenced-by-count":17,"title":["Inter-organisational information security: a systematic literature review"],"prefix":"10.1108","volume":"24","author":[{"given":"Fredrik","family":"Karlsson","sequence":"first","affiliation":[]},{"given":"Ella","family":"Kolkowska","sequence":"additional","affiliation":[]},{"given":"Frans","family":"Prenkert","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020121120550131200_ref001","first-page":"462","article-title":"Information security behaviour: factors and research directions","year":"2011"},{"key":"key2020121120550131200_ref002","doi-asserted-by":"crossref","first-page":"35","DOI":"10.4018\/jisscm.2009070103","article-title":"A stochastic model for improving information security in supply chain systems","volume":"2","year":"2009","journal-title":"International Journal of Information Systems and Supply Chain Management"},{"key":"key2020121120550131200_ref003","article-title":"Supply chain an important part of information security, say experts","year":"2015","journal-title":"ComputerWeekly.com"},{"key":"key2020121120550131200_ref004","doi-asserted-by":"crossref","first-page":"413","DOI":"10.2307\/25148767","article-title":"Circuits of power in creating de jur standards: shaping an international information systems security standard","volume":"30","year":"2006","journal-title":"MIS Quarterly"},{"key":"key2020121120550131200_ref005","article-title":"Information security practices followed in the indian software services industry: an exploratory study","volume-title":"Second Worldwide Cybersecurity Summit (WCS 2011), IEEE","year":"2011"},{"key":"key2020121120550131200_ref006","first-page":"456","article-title":"Information security investment strategies in supply chain firms: interplay between breach propagation, shared information assets and chain topology","year":"2005"},{"key":"key2020121120550131200_ref007","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s10799-010-0066-1","article-title":"Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest","volume":"11","year":"2010","journal-title":"Information Technology and Management"},{"key":"key2020121120550131200_ref008","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.technovation.2014.01.005","article-title":"Cyber supply chain security practices DNA \u2013 filling in the puzzle using a diverse set of disciplines","volume":"34","year":"2014","journal-title":"Technovation"},{"issue":"4","key":"key2020121120550131200_ref009","article-title":"Information systems security design methods: implications for information systems development","volume":"25","year":"1993","journal-title":"ACM Computing Surveys"},{"key":"key2020121120550131200_ref010","first-page":"79","article-title":"Securing small business - the role of information technology policy","year":"2005"},{"key":"key2020121120550131200_ref011","first-page":"270","article-title":"Extended-enterprise information security: a risk propagation framework for information supply chains","year":"2007"},{"key":"key2020121120550131200_ref012","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1080\/10580530.2010.514212","article-title":"Information security risks in enabling e-government: the impact of IT vendors","volume":"28","year":"2011","journal-title":"Information Systems Management"},{"key":"key2020121120550131200_ref013","volume-title":"Multimethod Research: A Synthesis of Styles","year":"1989"},{"key":"key2020121120550131200_ref014","volume-title":"Sociological Paradigms and Organisational Analysis: Elements of the Sociology of Corporate Life","year":"1979"},{"issue":"5","key":"key2020121120550131200_ref015","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1108\/03684921011043260","article-title":"A hybrid Delphi-Bayesian method to establish business data integrity policy \u2013 A benchmark data center case study","volume":"39","year":"2010","journal-title":"Kybernetes"},{"issue":"4","key":"key2020121120550131200_ref016","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1016\/j.rcim.2006.04.005","article-title":"Secure resource sharing on cross-organization collaboration using a novel trust method","volume":"23","year":"2007","journal-title":"Robotics and Computer-Integrated Manufacturing"},{"issue":"4","key":"key2020121120550131200_ref017","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1016\/j.ijinfomgt.2010.09.004","article-title":"Inter-organizational relationships and information sharing in supply chains","volume":"31","year":"2011","journal-title":"International Journal of Information Management"},{"key":"key2020121120550131200_ref018","first-page":"116","article-title":"Information security risk assessment model of IT outsourcing managed service","year":"2012"},{"issue":"4","key":"key2020121120550131200_ref019","first-page":"107","article-title":"The evolution of empirical research in IS.: a study in IS maturity","volume":"24","year":"1993","journal-title":"Information & Management"},{"key":"key2020121120550131200_ref020","article-title":"Security architecture in a collaborative de-perimeterised environment: factors of success","volume-title":"ISSE Securing Electronic Business Processes","year":"2011"},{"key":"key2020121120550131200_ref021","first-page":"125","article-title":"Middleware support for non-repudiable transactional information sharing between enterprises","year":"2003"},{"key":"key2020121120550131200_ref022","volume-title":"Research Design: Qualitative, Quantitative, and Mixed Methods Approaches","year":"2003"},{"key":"key2020121120550131200_ref023","article-title":"An agent-based security framework for cooperative business networks","volume-title":"20th International Business Information Management Association Conference","year":"2013"},{"key":"key2020121120550131200_ref024","first-page":"4","article-title":"We cannot blindly reap the benefits of a globalized ICT supply chain!","year":"2013","journal-title":"Crosstalk"},{"key":"key2020121120550131200_ref025","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s12063-009-0018-2","article-title":"Managing supply chain risk and disruption from IT security incidents","volume":"2","year":"2009","journal-title":"Operations Management Research"},{"key":"key2020121120550131200_ref026","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1504\/IJEMR.2010.032871","article-title":"Assessing the information technology security risk in medical supply chains","volume":"3","year":"2010","journal-title":"International Journal of Electronic Marketing and Retailing"},{"key":"key2020121120550131200_ref027","first-page":"117","article-title":"\u00a3Passwords\u00a3","volume":"80","year":"1992","journal-title":"American Scientist"},{"key":"key2020121120550131200_ref028","first-page":"8","article-title":"Is outscourced data secure?","year":"2010","journal-title":"The CPA Journal"},{"key":"key2020121120550131200_ref029","volume-title":"Principles of Information Systems Security: Text and Cases","year":"2007"},{"issue":"2","key":"key2020121120550131200_ref030","article-title":"Current directions in IS security research: towards socio-organisational perspectives","volume":"11","year":"2001","journal-title":"Information Systems Journal"},{"issue":"4","key":"key2020121120550131200_ref031","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1016\/j.future.2006.09.009","article-title":"Dynamic security perimeters for inter-enterprise service integration","volume":"23","year":"2007","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"key2020121120550131200_ref032","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1108\/14637150810916026","article-title":"Multi-level information system security in outsourcing domain","volume":"14","year":"2008","journal-title":"Business Process Management Journal"},{"key":"key2020121120550131200_ref034","first-page":"243","article-title":"The impact of security and scalability of cloud service on supply chain performance","volume":"12","year":"2011","journal-title":"Journal of Electronic Commerce Research"},{"issue":"6","key":"key2020121120550131200_ref035","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1057\/ejis.2008.57","article-title":"Profile of IS research published in the European Journal of Information Systems","volume":"17","year":"2008","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2020121120550131200_ref036","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1108\/09685220610648346","article-title":"Intelligent authentication, authorization, and administration (I3A)","volume":"14","year":"2006","journal-title":"Information Management & Computer Security"},{"issue":"1","key":"key2020121120550131200_ref037","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/j.dss.2012.05.049","article-title":"Secure federation of semantic information services","volume":"55","year":"2013","journal-title":"Decision Support Systems"},{"key":"key2020121120550131200_ref038","article-title":"The lawyer, the supplier and the consultant on outsourcing security","volume-title":"ComputerWeekly.com","year":"2013"},{"issue":"4","key":"key2020121120550131200_ref039","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MIC.2011.51","article-title":"Sharing with care \u2013 an information accountability perspective","volume":"15","year":"2011","journal-title":"IEEE Internet Computing"},{"key":"key2020121120550131200_ref040","volume-title":"Information Systems Research: Issues, Methods and Practical Guidelines","year":"1992"},{"key":"key2020121120550131200_ref041","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/isre.1050.0053","article-title":"The economic incentives for sharing security information","volume":"16","year":"2005","journal-title":"Information Systems Research"},{"key":"key2020121120550131200_ref042","article-title":"A 22 year review of strategic alliance research in the leading management journals","year":"2016","journal-title":"International Business Review"},{"issue":"4","key":"key2020121120550131200_ref043","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/1097198X.2007.10856452","article-title":"Identify and mitigate the risks of global IT outsourcing","volume":"10","year":"2007","journal-title":"Journal of Global Information Technology Management"},{"issue":"5","key":"key2020121120550131200_ref044","doi-asserted-by":"crossref","first-page":"312","DOI":"10.17705\/1jais.00129","article-title":"The anatomy of a design theory","volume":"8","year":"2007","journal-title":"Journal of the Association of Information Systems"},{"issue":"4","key":"key2020121120550131200_ref045","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s10207-006-0010-x","article-title":"A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments","volume":"6","year":"2007","journal-title":"International Journal of Information Security"},{"key":"key2020121120550131200_ref046","first-page":"178","article-title":"\u201cState of the art in e-Gov research \u2013 a survey","year":"2001"},{"key":"key2020121120550131200_ref047","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1177\/0894439302238971","article-title":"Emerging electronic infrastructures \u2013 exploring democratic components","volume":"21","year":"2003","journal-title":"Social Science Computer Review"},{"key":"key2020121120550131200_ref048","first-page":"1","article-title":"e-Gov research quality improvements since 2003: more rigor, but research (perhaps) redefined","year":"2006"},{"issue":"12","key":"key2020121120550131200_ref049","doi-asserted-by":"crossref","first-page":"1712","DOI":"10.1016\/j.infsof.2009.05.004","article-title":"The practical application of a process for eliciting and designing security in web service systems","volume":"51","year":"2009","journal-title":"Information and Software Technology"},{"key":"key2020121120550131200_ref050","first-page":"73","article-title":"Trusted block as a service: towards sensitive applications on the cloud","year":"2011"},{"issue":"1","key":"key2020121120550131200_ref051","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","article-title":"Design science in information systems research","volume":"28","year":"2004","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2020121120550131200_ref052","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MITP.2008.90","article-title":"Managing risk propagation in extended enterprise networks","volume":"10","year":"2008","journal-title":"IT Professional"},{"key":"key2020121120550131200_ref053","article-title":"ISO\/IEC 27010:2012, information technology \u2013 security techniques \u2013 information security management for inter-sector and inter-organizational communications","author":"ISO 27010","year":"2012"},{"issue":"5","key":"key2020121120550131200_ref054","first-page":"97","article-title":"Information risk of inadvertent disclosure: an analysis of file-sharing risk in the financial supply chain","volume":"25","year":"2008","journal-title":"Journal of Management Information Systems"},{"key":"key2020121120550131200_ref055","first-page":"299","article-title":"Security and control in the cloud","volume":"19","year":"2010","journal-title":"Information Security Journal: A Global Perspective"},{"key":"key2020121120550131200_ref056","article-title":"Inter-organisational information sharing \u2013 between a rock and a hard place","year":"2015","journal-title":"HAISA 2015"},{"key":"key2020121120550131200_ref057","first-page":"1","article-title":"Efficient enforcement of dynamic cryptographic access control policies for outsourced data","year":"2011"},{"key":"key2020121120550131200_ref058","doi-asserted-by":"crossref","unstructured":"Kearney, P. (2005), \u201cMessage level security for web services\u201d, Information Security Technical Report, Vol. 10 No. 1, pp. 41-50.","DOI":"10.1016\/j.istr.2004.11.003"},{"issue":"1","key":"key2020121120550131200_ref059","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.ijinfomgt.2003.12.001","article-title":"Information security considerations in IS\/IT outsourcing projects:a descriptive case study of two sectors","volume":"24","year":"2004","journal-title":"International Journal of Information Management"},{"key":"key2020121120550131200_ref060","first-page":"1610","article-title":"Information security risk management: an empirical study on the importance and practices in ICT outsourcing","year":"2010"},{"key":"key2020121120550131200_ref061","first-page":"194","article-title":"Information security risk factors: critical threats and vulnerabilities in ICT outsourcing","year":"2010"},{"key":"key2020121120550131200_ref062","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MSP.2006.167","article-title":"Systemic security management","volume":"4","year":"2006","journal-title":"IEEE Secuirty & Privacy"},{"issue":"1","key":"key2020121120550131200_ref063","first-page":"41","article-title":"The organizational context of user-centered software designs","volume":"1","year":"1977","journal-title":"MIS Quarterly"},{"key":"key2020121120550131200_ref064","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/S0167-4048(00)88615-0","article-title":"Achieving interoperability in a multiple-security-policies environment","volume":"19","year":"2000","journal-title":"Computers & Security"},{"key":"key2020121120550131200_ref065","article-title":"Information security issues in global supply chain","year":"2008"},{"key":"key2020121120550131200_ref066","first-page":"438","article-title":"Engineering policies for secure interorganizational information flow","year":"2011"},{"key":"key2020121120550131200_ref067","first-page":"814","article-title":"SCM security solution based on SSL protocol","year":"2006"},{"key":"key2020121120550131200_ref068","article-title":"Employees\u2019 information security awareness and behavior: a literature review","year":"2013"},{"issue":"4","key":"key2020121120550131200_ref069","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.jbusres.2011.12.001","article-title":"Do partners in international strategic alliances share resources, costs, and risks?","volume":"66","year":"2013","journal-title":"Journal of Business Research"},{"key":"key2020121120550131200_ref070","doi-asserted-by":"crossref","first-page":"73","DOI":"10.3233\/HSM-2008-27107","article-title":"Toward a secure supply chain: a system\u2019s perspective","volume":"27","year":"2008","journal-title":"Human Systems Management"},{"key":"key2020121120550131200_ref071","first-page":"234","article-title":"Protecting RFID communications in supply chains","volume-title":"2nd ACM symposium on Information, Computer and Communications Security (ASIACCS \u201807)","year":"2007"},{"key":"key2020121120550131200_ref072","article-title":"Next big thing in big data: the security of the ICT supply chain","year":"2013"},{"key":"key2020121120550131200_ref074","first-page":"6","article-title":"INFOSEC in a basket, 2004-2013","year":"2014"},{"key":"key2020121120550131200_ref073","first-page":"94","article-title":"Interoperable internet scale security framework for RFID networks","year":"2008"},{"issue":"3","key":"key2020121120550131200_ref075","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1046\/j.1365-2575.2003.00143.x","article-title":"The paucity of multimethod research: a review of the information systems literature","volume":"13","year":"2003","journal-title":"Information Systems Journal"},{"key":"key2020121120550131200_ref076","first-page":"771","article-title":"\u201cIntegrating web services and intelligent agents in supply chain for securing sensitive messages","year":"2008"},{"issue":"3","key":"key2020121120550131200_ref077","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1108\/02635571211210059","article-title":"Security risks in service offshoring and outsourcing","volume":"112","year":"2012","journal-title":"Industrial Management & Data Systems"},{"issue":"1","key":"key2020121120550131200_ref078","first-page":"24","article-title":"Research methodologies in MIS: an update","volume":"14","year":"2004","journal-title":"Communications of the Association for Information Systems"},{"issue":"12","key":"key2020121120550131200_ref079","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(05)70183-4","article-title":"Transferring business and support functions: the information security risks of outsourcing and off-shoring","volume":"2004","year":"2004","journal-title":"Computer Fraud & Security"},{"key":"key2020121120550131200_ref080","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.12785\/amis\/080365","article-title":"OB4LAC: an organization-based access control model for e-government system","volume":"8","year":"2014","journal-title":"Applied Mathematics & Information Sciences"},{"key":"key2020121120550131200_ref081","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/S1361-3723(05)70276-1","article-title":"Outsourced or outsmarted?","volume":"2005","year":"2005","journal-title":"Computer Fraud & Security"},{"key":"key2020121120550131200_ref082","unstructured":"Pricewaterhousecoopers (2010), Information Security Breaches Survey 2010 \u2013 Technical Report, PriceWaterhouseCoopers."},{"issue":"2","key":"key2020121120550131200_ref083","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s10551-009-0353-0","article-title":"Stakeholder perceptions of offshoring and outsourcing: the role of embedded issues","volume":"95","year":"2010","journal-title":"Journal of Business Ethics"},{"key":"key2020121120550131200_ref084","first-page":"2","article-title":"Secure information sharing enabled by trusted computing and PEI models","volume-title":"2006 ACM Symposium on Information, Computer and Communications Security","year":"2006"},{"key":"key2020121120550131200_ref085","first-page":"349","article-title":"A secure RBAC mobile agent access control model for Healthcare Institutions","volume-title":"2013 IEEE 26th International Symposium on Computer-Based Medical Systems (CBMS)","year":"2013"},{"key":"key2020121120550131200_ref086","first-page":"280","year":"2008), \u201c : \u201d"},{"key":"key2020121120550131200_ref087","volume-title":"Investigating the Social World: The Process and Practice of Research","year":"2001"},{"key":"key2020121120550131200_ref088","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1504\/IJEB.2005.006908","article-title":"Integrated e-enterprise security design and implementation: a case study of e-service in supply chain management","volume":"3","year":"2005","journal-title":"International Journal of Electronic Business"},{"key":"key2020121120550131200_ref089","first-page":"53","article-title":"Security modeling on the supply chain networks","volume":"5","year":"2007","journal-title":"Systems, Cybernetics and Informatics"},{"issue":"1","key":"key2020121120550131200_ref090","first-page":"103","article-title":"Information security and mutual trust as determining factors for information technology outsourcing success","volume":"6","year":"2012","journal-title":"African Journal of Business Management"},{"key":"key2020121120550131200_ref091","article-title":"AVE-based collaboration and information transmission security","volume-title":"The Sixth Wuhan International Conference on E-Business","year":"2007"},{"issue":"4","key":"key2020121120550131200_ref092","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.infoandorg.2004.11.001","article-title":"Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods","volume":"15","year":"2005","journal-title":"Information and Organization"},{"issue":"3","key":"key2020121120550131200_ref093","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1057\/palgrave.ejis.3000537","article-title":"An analysis of the traditional IS security approaches: implications for research and practice","volume":"14","year":"2005","journal-title":"European Journal of Information Systems"},{"key":"key2020121120550131200_ref094","first-page":"1551","article-title":"A critical assessment of IS security research between 1990-2004","year":"2007"},{"key":"key2020121120550131200_ref095","doi-asserted-by":"crossref","first-page":"2595","DOI":"10.1080\/00207540601020544","article-title":"A critical balance: collaboration and security in the IT-enabled supply chain","volume":"45","year":"2007","journal-title":"International Journal of Production Research"},{"key":"key2020121120550131200_ref096","first-page":"667","article-title":"A governance framework for mitigating risks and uncertainty in collaborative business processes","year":"2012"},{"key":"key2020121120550131200_ref097","first-page":"41","article-title":"Security management in cross-organizational settings: a design science approach","year":"2012"},{"key":"key2020121120550131200_ref098","article-title":"Practical approaches to supply chain continuity: new challenges and timeless principles","volume-title":"Handbook for Supply Chain Management: Case Studies, Effective Practices and Emerging Trends","year":"2012"},{"issue":"2","key":"key2020121120550131200_ref099","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/S0361-3682(00)00018-0","article-title":"Interdependencies, trust and information in relationships, alliances and networks","volume":"26","year":"2001","journal-title":"Accounting, Organizations and Society"},{"issue":"3","key":"key2020121120550131200_ref100","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1111\/j.1540-5915.2012.00354.x","article-title":"Does security impact e-procurement performance? Testing a model of direct and moderated effects","volume":"43","year":"2012","journal-title":"Decision Sciences Journal"},{"key":"key2020121120550131200_ref101","first-page":"355","article-title":"Exploring information security issues in public sector inter-organizational collaboration","year":"2011"},{"key":"key2020121120550131200_ref102","article-title":"The security risk of the supply chain","year":"2012","journal-title":"SC Magazine"},{"issue":"1","key":"key2020121120550131200_ref103","doi-asserted-by":"crossref","first-page":"117","DOI":"10.3846\/20294913.2012.661196","article-title":"A sustainable information security framework for e-Government \u2013 case of Tanzania","volume":"18","year":"2012","journal-title":"Technological and Economic Development of Economy"},{"key":"key2020121120550131200_ref104","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/15536548.2010.10855892","article-title":"Information technology offshore outsourcing security risks and safeguards","volume":"6","year":"2010","journal-title":"Journal of Information Privacy & Security"},{"key":"key2020121120550131200_ref105","article-title":"A method for information protection in collaborative assembly design","year":"2005"},{"key":"key2020121120550131200_ref106","doi-asserted-by":"crossref","first-page":"2348","DOI":"10.4028\/www.scientific.net\/AMM.336-338.2348","article-title":"A review of information flow control in composite services","volume":"336\/338","year":"2013","journal-title":"Applied Mechanics and Materials"},{"issue":"1","key":"key2020121120550131200_ref107","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.dss.2009.05.014","article-title":"Towards controlling virus propagation in information systems with point-to-group information sharing","volume":"48","year":"2009","journal-title":"Decision Support Systems"},{"key":"key2020121120550131200_ref108","first-page":"433","article-title":"Information relevance management model \u2013 a new strategy in information security management in the outsourcing industry","year":"2006"},{"key":"key2020121120550131200_ref109","first-page":"1195","article-title":"An improved approach to security and privacy of RFID application system","year":"2005"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ICS-11-2016-091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-11-2016-091\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-11-2016-091\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:18Z","timestamp":1753406598000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/24\/5\/418-451\/112987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,14]]},"references-count":108,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,11,14]]}},"alternative-id":["10.1108\/ICS-11-2016-091"],"URL":"https:\/\/doi.org\/10.1108\/ics-11-2016-091","relation":{},"ISSN":["2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2016,11,14]]}}}