{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T14:56:47Z","timestamp":1777647407009,"version":"3.51.4"},"reference-count":171,"publisher":"Emerald","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,11]]},"abstract":"<jats:sec>\n                    <jats:title>Purpose<\/jats:title>\n                    <jats:p>The present study aims to identify and investigate the antecedents of enhanced level of cyber-security at the organisational level from both the technical and the human resource perspective using human\u2013organisation\u2013technology (HOT) theory.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Design\/methodology\/approach<\/jats:title>\n                    <jats:p>The study has been conducted on 151 professionals who have expertise in dealing with cyber-security in organisations in sectors such as retail, education, healthcare, etc. in India. The analysis of the data is carried out using partial least squares based structural equation modelling technique (PLS-SEM).<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Findings<\/jats:title>\n                    <jats:p>The results from the study suggest that \u201clegal consequences\u201d and \u201ctechnical measures\u201d adopted for securing cyber-security in organisations are the most important antecedents for enhanced cyber-security levels in the organisations. The other significant antecedents for enhanced cyber-security in organisations include \u201crole of senior management\u201d and \u201cproactive information security\u201d.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Research limitations\/implications<\/jats:title>\n                    <jats:p>This empirical study has significant implications for organisations as they can take pre-emptive measures by focussing on important antecedents and work towards enhancing the level of cyber-security.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Originality\/value<\/jats:title>\n                    <jats:p>The originality of this research is combining both technical and human resource perspective in identifying the determinants of enhanced level of cyber-security in the organisations.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1108\/jeim-06-2020-0240","type":"journal-article","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T12:19:29Z","timestamp":1602591569000},"page":"1597-1629","source":"Crossref","is-referenced-by-count":37,"title":["Antecedents for enhanced level of cyber-security in organisations"],"prefix":"10.1108","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0609-3530","authenticated-orcid":true,"given":"Saurabh","family":"Kumar","sequence":"first","affiliation":[{"name":"Indian Institute of Management Indore , ,","place":["Indore, India"]}]},{"given":"Baidyanath","family":"Biswas","sequence":"additional","affiliation":[{"name":"International Management Institute - Kolkata , ,","place":["Kolkata, India"]}]},{"given":"Manjot Singh","family":"Bhatia","sequence":"additional","affiliation":[{"name":"O. P. Jindal Global University Jindal Global Business School, , ,","place":["Sonipat, India"]}]},{"given":"Manoj","family":"Dora","sequence":"additional","affiliation":[{"name":"Brunel University Brunel Business School, , ,","place":["London, UK"]}]}],"member":"140","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"key":"2026021807074531700_ref001","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.cose.2014.11.006","article-title":"A survey of information security incident handling in the cloud","volume":"49","author":"Ab Rahman","year":"2015","journal-title":"Computers and Security"},{"issue":"3","key":"2026021807074531700_ref002","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.ijmedinf.2014.12.004","article-title":"Organizational decision to adopt hospital information system: an empirical investigation in the case of Malaysian public hospitals","volume":"84","author":"Ahmadi","year":"2015","journal-title":"International Journal of Medical Informatics"},{"key":"2026021807074531700_ref003","doi-asserted-by":"crossref","first-page":"287","DOI":"10.21552\/EDPL\/2016\/3\/4","article-title":"How the GDPR will change the world","volume":"2","author":"Albrecht","year":"2016","journal-title":"European Data Protection Law Review"},{"issue":"1","key":"2026021807074531700_ref004","doi-asserted-by":"publisher","first-page":"i","DOI":"10.1037\/h0093360","article-title":"Trait-names: a psycho-lexical study","volume":"47","author":"Allport","year":"1936","journal-title":"Psychological Monographs"},{"key":"2026021807074531700_ref005","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.3004610","article-title":"Organizational architecture, resilience and cyber-attacks","author":"Appiah","year":"2020","journal-title":"IEEE Transactions on Engineering Management"},{"key":"2026021807074531700_ref006","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","article-title":"Security awareness of computer users: a phishing threat avoidance perspective","volume":"38","author":"Arachchilage","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"2026021807074531700_ref007","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/0963-8687(92)90036-V","article-title":"Aligning information systems with business strategy","volume":"1","author":"Baets","year":"1992","journal-title":"The Journal of Strategic Information Systems"},{"key":"2026021807074531700_ref008","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.cose.2016.02.007","article-title":"Information system security commitment: a study of external influences on senior management","volume":"59","author":"Barton","year":"2016","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref009","volume-title":"{USENIX} Summit on Gaming, Games, and Gamification in Security Education (3GSE 15)","author":"Bashir","year":"2015"},{"key":"2026021807074531700_ref010","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.cose.2016.10.007","article-title":"Profiling cybersecurity competition participants: self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool","volume":"65","author":"Bashir","year":"2017","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref011","first-page":"15","article-title":"Information systems security strategy","author":"Baskerville","year":"2008","journal-title":"Information Security-Policy, Processes, and Practices"},{"issue":"3","key":"2026021807074531700_ref012","first-page":"1","article-title":"Organizational alignment is key to big data success","volume":"54","author":"Bean","year":"2013","journal-title":"MIT Sloan Management Review"},{"issue":"2","key":"2026021807074531700_ref013","doi-asserted-by":"crossref","first-page":"471","DOI":"10.25300\/MISQ\/2013\/37:2.3","article-title":"Digital business strategy: toward a next generation of insights","volume":"37","author":"Bharadwaj","year":"2013","journal-title":"MIS Quarterly"},{"issue":"2","key":"2026021807074531700_ref014","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1108\/JEIM-05-2017-0069","article-title":"G-RAM framework for software risk assessment and mitigation strategies in organisations","volume":"31","author":"Biswas","year":"2018","journal-title":"Journal of Enterprise Information Management"},{"key":"2026021807074531700_ref015","volume-title":"Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives","author":"Biswas","year":"2018"},{"key":"2026021807074531700_ref016","first-page":"1752","article-title":"Leadership in action: how top hackers behave - a big-data approach with text-mining and sentiment analysis","author":"Biswas","year":"2018"},{"issue":"2","key":"2026021807074531700_ref017","doi-asserted-by":"crossref","first-page":"163","DOI":"10.69554\/UERV9928","article-title":"How is cyber threat evolving and what do organisations need to consider?","volume":"7","author":"Borrett","year":"2014","journal-title":"Journal of Business Continuity and Emergency Planning"},{"issue":"2","key":"2026021807074531700_ref018","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1057\/ejis.2009.8","article-title":"If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security","volume":"18","author":"Boss","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"2026021807074531700_ref019","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.cose.2010.11.003","article-title":"Legally \u201creasonable\u201d security requirements: a 10-year FTC retrospective","volume":"30","author":"Breaux","year":"2011","journal-title":"Computers and Security"},{"issue":"2","key":"2026021807074531700_ref020","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1111\/j.1467-6494.1992.tb00974.x","article-title":"Assessing the five-factor model of personality description","volume":"60","author":"Briggs","year":"1992","journal-title":"Journal of Personality"},{"issue":"2","key":"2026021807074531700_ref021","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.obhdp.2005.03.002","article-title":"Ethical leadership: a social learning perspective for construct development and testing","volume":"97","author":"Brown","year":"2005","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"2026021807074531700_ref603","author":"Brynes","year":"2005"},{"issue":"3","key":"2026021807074531700_ref022","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","author":"Bulgurcu","year":"2010","journal-title":"MIS Quarterly"},{"key":"2026021807074531700_ref023","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.cose.2018.01.015","article-title":"Cybersecurity education: evolution of the discipline and analysis of master programs","volume":"75","author":"Cabaj","year":"2018","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref024","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2909909","article-title":"Ambidextrous cybersecurity: the seven pillars (7Ps) of cyber resilience","author":"Carayannis","year":"2019","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"1","key":"2026021807074531700_ref025","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1080\/10864415.2004.11044320","article-title":"The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers","volume":"9","author":"Cavusoglu","year":"2004","journal-title":"International Journal of Electronic Commerce"},{"issue":"4","key":"2026021807074531700_ref026","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1108\/09685220610690817","article-title":"On security preparations against possible IS threats across industries","volume":"14","author":"Chang","year":"2006","journal-title":"Information Management and Computer Security"},{"issue":"2","key":"2026021807074531700_ref027","doi-asserted-by":"crossref","first-page":"397","DOI":"10.2307\/23044049","article-title":"Correlated failures, diversification, and information security risk management","volume":"35","author":"Chen","year":"2011","journal-title":"MIS Quarterly"},{"issue":"9","key":"2026021807074531700_ref028","doi-asserted-by":"crossref","first-page":"1739","DOI":"10.1109\/TPDS.2012.74","article-title":"Fidelity-aware utilization control for cyber-physical surveillance systems","volume":"23","author":"Chen","year":"2012","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"6","key":"2026021807074531700_ref029","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.tre.2010.12.008","article-title":"Inter-organisational relationships and knowledge sharing in green supply chains\u2014moderating by relational benefits and Guanxi","volume":"47","author":"Cheng","year":"2011","journal-title":"Transportation Research Part E: Logistics and Transportation Review"},{"issue":"2","key":"2026021807074531700_ref030","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","volume":"295","author":"Chin","year":"1998","journal-title":"Modern methods for Business Research"},{"issue":"7","key":"2026021807074531700_ref031","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.im.2011.07.003","article-title":"How does leadership affect information systems success? The role of transformational leadership","volume":"48","author":"Cho","year":"2011","journal-title":"Information and Management"},{"issue":"8","key":"2026021807074531700_ref032","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.cose.2011.08.004","article-title":"The cyber threat landscape: challenges and future research directions","volume":"30","author":"Choo","year":"2011","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref033","volume-title":"IT Governance Institute. Control Objectives for Information and Related Technology (COBIT 4.0)","author":"COBIT, C.","year":"2005"},{"issue":"6","key":"2026021807074531700_ref034","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1057\/s41303-017-0059-9","article-title":"Organisational information security policies: a review and research framework","volume":"26","author":"Cram","year":"2017","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"2026021807074531700_ref035","doi-asserted-by":"crossref","first-page":"241","DOI":"10.2753\/MIS0742-1222260308","article-title":"Risks and benefits of signaling information system characteristics to strategic attackers","volume":"26","author":"Cremonini","year":"2009","journal-title":"Journal of Management Information Systems"},{"key":"2026021807074531700_ref036","first-page":"124","article-title":"September)The effect of computer self-efficacy on security training effectiveness","author":"Crossler","year":"2006"},{"key":"2026021807074531700_ref037","first-page":"1","article-title":"Evaluating and improving cybersecurity capabilities of the energy critical infrastructure","author":"Curtis","year":"2015"},{"issue":"1","key":"2026021807074531700_ref038","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach","volume":"20","author":"D'Arcy","year":"2009","journal-title":"Information Systems Research"},{"issue":"1","key":"2026021807074531700_ref039","doi-asserted-by":"crossref","first-page":"129","DOI":"10.2308\/isys-10339","article-title":"Research on IT governance, risk, and value: challenges and opportunities","volume":"27","author":"Debreceny","year":"2013","journal-title":"Journal of Information Systems"},{"issue":"7","key":"2026021807074531700_ref040","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/341852.341877","article-title":"Information system security management in the new millennium [technical opinion]","volume":"43","author":"Dhillon","year":"2000","journal-title":"Communications of the ACM"},{"key":"2026021807074531700_ref041","doi-asserted-by":"crossref","first-page":"62","DOI":"10.4018\/978-1-59140-911-3.ch005","volume-title":"Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues","author":"Dhillon","year":"2006"},{"issue":"3","key":"2026021807074531700_ref042","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","article-title":"Value-focused assessment of information system security in organizations","volume":"16","author":"Dhillon","year":"2006","journal-title":"Information Systems Journal"},{"issue":"1","key":"2026021807074531700_ref043","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.cose.2005.09.009","article-title":"Aligning the information security policy with the strategic information systems plan","volume":"25","author":"Doherty","year":"2006","journal-title":"Computers and Security"},{"issue":"1","key":"2026021807074531700_ref044","doi-asserted-by":"crossref","first-page":"17","DOI":"10.2307\/249271","article-title":"Avenues for top management involvement in successful MIS development","volume":"9","author":"Doll","year":"1985","journal-title":"MIS Quarterly"},{"issue":"2","key":"2026021807074531700_ref045","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.tifs.2013.03.002","article-title":"Operational performance and critical success factors of lean manufacturing in European food processing SMEs","volume":"31","author":"Dora","year":"2013","journal-title":"Trends in Food Science and Technology"},{"key":"2026021807074531700_ref046","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/09537287.2015.1050477","article-title":"Determinants and barriers to lean implementation in food-processing SMEs\u2013a multiple case analysis","volume":"27.1","author":"Dora","year":"2016","journal-title":"Production Planning and Control"},{"issue":"4","key":"2026021807074531700_ref047","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.giq.2009.04.004","article-title":"Information security landscape and maturity level: case study of Malaysian Public Service (MPS) organisations","volume":"26","author":"Dzazali","year":"2009","journal-title":"Government Information Quarterly"},{"issue":"1","key":"2026021807074531700_ref048","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1257\/jep.10.1.43","article-title":"Crime, punishment, and the market for offenses","volume":"10","author":"Ehrlich","year":"1996","journal-title":"Journal of Economic Perspectives"},{"issue":"5","key":"2026021807074531700_ref049","doi-asserted-by":"crossref","first-page":"1318","DOI":"10.1108\/ITP-05-2018-0252","article-title":"Cybersecurity economics\u2013balancing operational security spending","volume":"32","author":"Ekelund","year":"2019","journal-title":"Information Technology and People"},{"key":"2026021807074531700_ref169","unstructured":"Emm, D. and Unuchek, R. (2017), \u201cKaspersky security Bulletin: review of the Year 2017\u201d, available at:\u00a0https:\/\/securelist.com\/ksb-review-of-the-year-2017\/83338\/."},{"key":"2026021807074531700_ref501","article-title":"The directive on security of network and information systems (NIS Directive)","author":"ENISA","year":"2015"},{"key":"2026021807074531700_ref050","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.dss.2016.02.012","article-title":"Decision support approaches for cyber security investment","volume":"86","author":"Fielder","year":"2016","journal-title":"Decision Support Systems"},{"key":"2026021807074531700_ref051","volume-title":"Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions","author":"Fischer","year":"2013"},{"issue":"1","key":"2026021807074531700_ref052","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"Fornell","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"2026021807074531700_ref053","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2014.06.008","article-title":"Cyber situational awareness\u2013a systematic review of the literature","volume":"46","author":"Franke","year":"2014","journal-title":"Computers and Security"},{"issue":"2","key":"2026021807074531700_ref054","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/isre.1050.0053","article-title":"The economic incentives for sharing security information","volume":"16","author":"Gal-Or","year":"2005","journal-title":"Information Systems Research"},{"issue":"4","key":"2026021807074531700_ref055","first-page":"6","article-title":"Top management and computer profits","author":"Garrity","year":"1963","journal-title":"Harvard Business Review"},{"issue":"6","key":"2026021807074531700_ref056","first-page":"735","article-title":"Analysis of operating system diversity for intrusion tolerance","volume":"44","author":"Garcia","year":"2014","journal-title":"Software: Practice and Experience"},{"key":"2026021807074531700_ref057","unstructured":"General Data Protection Regulation (GDPR)\n           (2018), available at:\u00a0https:\/\/gdpr-info.eu\/."},{"key":"2026021807074531700_ref058","first-page":"1075","article-title":"Searching places Unknown: law enforcement jurisdiction on the dark web","volume":"69","author":"Ghappour","year":"2017","journal-title":"Stanford Law Review"},{"issue":"1","key":"2026021807074531700_ref059","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1037\/1040-3590.4.1.26","article-title":"The development of markers for the Big-Five factor structure","volume":"4","author":"Goldberg","year":"1992","journal-title":"Psychological Assessment"},{"key":"2026021807074531700_ref060","first-page":"95","volume-title":"Management Accounting in the New Economy","author":"Gordon","year":"2003"},{"issue":"3","key":"2026021807074531700_ref061","article-title":"CSI\/FBI computer crime and security survey","volume":"21","author":"Gordon","year":"2005","journal-title":"Computer Security Journal"},{"key":"2026021807074531700_ref062","article-title":"Information security awareness: its antecedents and mediating effects on security compliant behavior","author":"Haeussinger","year":"2013"},{"key":"2026021807074531700_ref063","volume-title":"Multivariate Data Analysis","author":"Hair","year":"2006"},{"issue":"2","key":"2026021807074531700_ref064","doi-asserted-by":"crossref","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","article-title":"PLS-SEM: Indeed a silver bullet","volume":"19","author":"Hair","year":"2011","journal-title":"Journal of Marketing Theory and Practice"},{"key":"2026021807074531700_ref065","volume-title":"Modem Factor Analysis","author":"Harman","year":"1967"},{"key":"2026021807074531700_ref066","first-page":"817","article-title":"The law of cyber-attack","author":"Hathaway","year":"2012","journal-title":"California Law Review"},{"issue":"6","key":"2026021807074531700_ref067","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1016\/j.jaccpubpol.2007.10.001","article-title":"Information sharing among firms and cyber-attacks","volume":"26","author":"Hausken","year":"2007","journal-title":"Journal of Accounting and Public Policy"},{"issue":"1","key":"2026021807074531700_ref068","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/IMDS-09-2015-0382","article-title":"Using PLS path modeling in new technology research: updated guidelines","volume":"116","author":"Henseler","year":"2016","journal-title":"Industrial Management and Data Systems"},{"issue":"2","key":"2026021807074531700_ref069","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","article-title":"Encouraging information security behaviors in organisations: role of penalties, pressures and perceived effectiveness","volume":"47","author":"Herath","year":"2009","journal-title":"Decision Support Systems"},{"issue":"6","key":"2026021807074531700_ref070","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/S1353-4858(02)06011-7","article-title":"What makes an effective information security policy?","volume":"2002","author":"H\u00f6Ne","year":"2002","journal-title":"Network Security"},{"key":"2026021807074531700_ref071","first-page":"379","article-title":"Information security governance: investigating diversity in critical infrastructure organizations","author":"Holgate","year":"2012"},{"key":"2026021807074531700_ref072","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.jocs.2016.01.002","article-title":"Malware propagation modeling considering software diversity and immunization","volume":"13","author":"Hosseini","year":"2016","journal-title":"Journal of Computational Science"},{"issue":"4","key":"2026021807074531700_ref073","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1037\/1082-989X.3.4.424","article-title":"Fit indices in covariance structure modeling: Sensitivity to underparameterized model misspecification","volume":"3","author":"Hu","year":"1998","journal-title":"Psychological Methods"},{"issue":"4","key":"2026021807074531700_ref074","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1111\/j.1540-5915.2012.00361.x","article-title":"Managing employee compliance with information security policies: the critical role of top management and organisational culture","volume":"43","author":"Hu","year":"2012","journal-title":"Decision Sciences"},{"issue":"2","key":"2026021807074531700_ref075","doi-asserted-by":"crossref","first-page":"497","DOI":"10.25300\/MISQ\/2017\/41.2.08","article-title":"Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks","volume":"41","author":"Hui","year":"2017","journal-title":"MIS Quarterly"},{"key":"2026021807074531700_ref076","volume-title":"Managing the Software Process","author":"Humphrey","year":"1989"},{"issue":"3","key":"2026021807074531700_ref077","doi-asserted-by":"crossref","first-page":"635","DOI":"10.2307\/256741","article-title":"The impact of human resource management practices on turnover, productivity, and corporate financial performance","volume":"38","author":"Huselid","year":"1995","journal-title":"Academy of Management Journal"},{"key":"2026021807074531700_ref078","unstructured":"IBM Security Framework and Risk Assessment\n           (2007), available at:\u00a0https:\/\/www.ibm.com\/security\/services\/security-framework-and-risk-assessment."},{"key":"2026021807074531700_ref079","volume-title":"The RiskIT Framework: RiskIT Based on COBIT","author":"ISACA","year":"2009"},{"key":"2026021807074531700_ref080","unstructured":"ISO\/IEC 27001:2005\n          , available at:\u00a0https:\/\/www.iso.org\/standard\/42103.html."},{"key":"2026021807074531700_ref081","volume-title":"IT Control Objectives for Sarbanes-Oxley: The Role of IT in the Design and Implementation of Internal Control over Financial Reporting","author":"IT Governance Institute","year":"2006"},{"key":"2026021807074531700_ref082","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7564","volume-title":"Directions in Security Metrics Research, NISTIR 7564","author":"Jansen","year":"2009"},{"issue":"2","key":"2026021807074531700_ref083","doi-asserted-by":"crossref","first-page":"205","DOI":"10.2307\/249382","article-title":"Executive involvement and participation in the management of information technology","volume":"15","author":"Jarvenpaa","year":"1991","journal-title":"MIS Quarterly"},{"issue":"3","key":"2026021807074531700_ref084","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1037\/a0021872","article-title":"Fostering good citizenship through ethical leadership: Exploring the moderating role of gender and organisational politics","volume":"96","author":"Kacmar","year":"2011","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"2026021807074531700_ref085","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0268-4012(02)00105-6","article-title":"An integrative study of information systems security effectiveness","volume":"23","author":"Kankanhalli","year":"2003","journal-title":"International Journal of Information Management"},{"issue":"2","key":"2026021807074531700_ref086","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.dss.2007.02.002","article-title":"Organizational culture and leadership in ERP implementation","volume":"45","author":"Ke","year":"2008","journal-title":"Decision Support Systems"},{"key":"2026021807074531700_ref087","article-title":"The last line of defense: motivating employees to follow corporate security guidelines","author":"Kirsch","year":"2007"},{"issue":"7","key":"2026021807074531700_ref088","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1016\/j.cose.2009.07.001","article-title":"Information security policy: an organisational level process model","volume":"28","author":"Knapp","year":"2009","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref089","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.ijcip.2015.02.002","article-title":"A survey of cyber security management in industrial control systems","volume":"9","author":"Knowles","year":"2015","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"2026021807074531700_ref090","first-page":"53","article-title":"Exploring the relationship between architecture coupling and software vulnerabilities","author":"Lagerstr\u00f6m","year":"2017"},{"issue":"2","key":"2026021807074531700_ref091","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MSP.2015.23","article-title":"Automatic software diversity","volume":"13","author":"Larsen","year":"2015","journal-title":"IEEE Security and Privacy"},{"key":"2026021807074531700_ref092","first-page":"1","article-title":"Can maturity models support cyber security?","author":"Le","year":"2016"},{"issue":"2","key":"2026021807074531700_ref093","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1108\/09685220210424104","article-title":"A holistic model of computer abuse within organizations","volume":"10","author":"Lee","year":"2002","journal-title":"Information Management and Computer Security"},{"issue":"1","key":"2026021807074531700_ref094","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.dss.2011.05.007","article-title":"Knowledge sharing and investment decisions in information security","volume":"52","author":"Liu","year":"2011","journal-title":"Decision Support Systems"},{"issue":"5","key":"2026021807074531700_ref095","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1111\/isj.12043","article-title":"Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies","volume":"25","author":"Lowry","year":"2015","journal-title":"Information Systems Journal"},{"issue":"4","key":"2026021807074531700_ref096","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1016\/S0272-6963(98)00021-7","article-title":"An assessment of survey research in POM: from constructs to theory","volume":"16","author":"Malhotra","year":"1998","journal-title":"Journal of Operations Management"},{"key":"2026021807074531700_ref097","doi-asserted-by":"crossref","first-page":"3179","DOI":"10.1136\/bmj.j3179","article-title":"Cybersecurity and healthcare: how safe are we?","volume":"358","author":"Martin","year":"2017","journal-title":"BMJ"},{"issue":"1","key":"2026021807074531700_ref098","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s10551-011-0794-0","article-title":"Examining the link between ethical leadership and employee misconduct: the mediating role of ethical climate","volume":"95","author":"Mayer","year":"2010","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"2026021807074531700_ref099","first-page":"1","article-title":"Exploring the role of individual employee characteristics and personality on employee compliance with cybersecurity policies","volume":"5","author":"McBride","year":"2012","journal-title":"RTI International-Institute for Homeland Security Solutions"},{"key":"2026021807074531700_ref100","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.chb.2016.11.065","article-title":"Individual differences and information security awareness","volume":"69","author":"McCormac","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2026021807074531700_ref101","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1177\/014616729101700217","article-title":"Adding Liebe und Arbeit: the full five-factor model and well-being","volume":"17","author":"McCrae","year":"1991","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"3","key":"2026021807074531700_ref102","first-page":"3","article-title":"Anchoring information security governance research: Sociological groundings and future directions","volume":"2","author":"McFadzean","year":"2006","journal-title":"Journal of Information System Security"},{"issue":"2","key":"2026021807074531700_ref103","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1080\/10580530.2011.562127","article-title":"Information assurance and corporate strategy: a Delphi study of choices, challenges, and developments for the future","volume":"28","author":"McFadzean","year":"2011","journal-title":"Information Systems Management"},{"key":"2026021807074531700_ref104","article-title":"International diffusion of the information security management system standard ISO\/IEC 27001: exploring the role of culture","author":"Mirtsch"},{"key":"2026021807074531700_ref105","first-page":"27","article-title":"Information systems security governance research: a behavioral perspective","author":"Mishra","year":"2006"},{"issue":"7","key":"2026021807074531700_ref106","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1016\/S0167-4048(03)00705-3","article-title":"Applying information security governance","volume":"22","author":"Moulton","year":"2003","journal-title":"Computers and Security"},{"issue":"2","key":"2026021807074531700_ref107","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/s10551-008-9839-4","article-title":"Critical role of leadership on ethical climate and salesperson behaviors","volume":"86","author":"Mulki","year":"2009","journal-title":"Journal of Business Ethics"},{"issue":"3","key":"2026021807074531700_ref108","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1108\/02635571211210059","article-title":"Security risks in service offshoring and outsourcing","volume":"112","author":"Nassimbeni","year":"2012","journal-title":"Industrial Management and Data Systems"},{"key":"2026021807074531700_ref109","doi-asserted-by":"crossref","first-page":"181","DOI":"10.6028\/NIST.SP.800-181","volume-title":"National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework","author":"Newhouse","year":"2017"},{"key":"2026021807074531700_ref110","volume-title":"Security and Privacy Controls for Federal Information Systems and Organizations","author":"Nist","year":"2013"},{"key":"2026021807074531700_ref502","author":"NIST","year":"2014","journal-title":"The National Institute of Standards and Technology Handbook 44 - 2014 Edition"},{"key":"2026021807074531700_ref111","first-page":"1","article-title":"Cyber onboarding is \u2018broken\u2019","author":"Onwubiko","year":"2019"},{"issue":"4","key":"2026021807074531700_ref112","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/08874417.2015.11645782","article-title":"Personality traits and information privacy concern on social media platforms","volume":"55","author":"Osatuyi","year":"2015","journal-title":"The Journal of Computer Information Systems"},{"key":"2026021807074531700_ref113","first-page":"156b","article-title":"Employees' behavior towards IS security policy compliance","author":"Pahnila","year":"2007"},{"issue":"2","key":"2026021807074531700_ref114","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1201\/1086\/43314.10.2.20010506\/31399.4","article-title":"Information security policy framework: best practices for security policy in the e-commerce age","volume":"10","author":"Palmer","year":"2001","journal-title":"Information Systems Security"},{"issue":"5","key":"2026021807074531700_ref115","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1108\/ITP-06-2018-0261","article-title":"Organizational practices as antecedents of the information security management performance","volume":"32","author":"P\u00e9rez-Gonz\u00e1lez","year":"2019","journal-title":"Information Technology and People"},{"issue":"2","key":"2026021807074531700_ref116","doi-asserted-by":"crossref","first-page":"125","DOI":"10.2753\/MIS0742-1222250206","article-title":"The deterrent and displacement effects of information security enforcement: international evidence","volume":"25","author":"Png","year":"2008","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"2026021807074531700_ref117","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1177\/014920638601200408","article-title":"Self-reports in organisational research: Problems and prospects","volume":"12","author":"Podsakoff","year":"1986","journal-title":"Journal of Management"},{"issue":"4","key":"2026021807074531700_ref118","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","article-title":"Improving employees' compliance through information systems security training: an action research study","volume":"34","author":"Puhakainen","year":"2010","journal-title":"MIS Quarterly"},{"issue":"5","key":"2026021807074531700_ref119","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1108\/ITP-03-2018-0119","article-title":"The effect of cybercrime on open innovation policies in technology firms","volume":"32","author":"Ratten","year":"2019","journal-title":"Information Technology and People"},{"issue":"4","key":"2026021807074531700_ref120","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.ijresmar.2009.08.001","article-title":"An empirical comparison of the efficacy of covariance-based and variance-based SEM","volume":"26","author":"Reinartz","year":"2009","journal-title":"International Journal of Research in Marketing"},{"key":"2026021807074531700_ref602","volume-title":"Generating Business Value From Information Technology. Center for Information Systems Research (CISR)","author":"Ross","year":"2009"},{"issue":"12","key":"2026021807074531700_ref121","first-page":"90","article-title":"You may not need big data after all","volume":"91","author":"Ross","year":"2013","journal-title":"Harvard Business Review"},{"key":"2026021807074531700_ref122","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.cose.2015.03.003","article-title":"Time series modeling of vulnerabilities","volume":"51","author":"Roumani","year":"2015","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref123","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.cose.2016.10.009","article-title":"Introducing cybernomics: a unifying economic framework for measuring cyber risk","volume":"65","author":"Ruan","year":"2017","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref124","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.chb.2015.12.037","article-title":"An information security knowledge sharing model in organizations","volume":"57","author":"Safa","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"2026021807074531700_ref125","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1080\/07421222.2017.1394049","article-title":"Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence","volume":"34","author":"Samtani","year":"2017","journal-title":"Journal of Management Information Systems"},{"key":"2026021807074531700_ref126","article-title":"Information security strategy: in search of a role","author":"Seeholzer","year":"2012"},{"key":"2026021807074531700_ref127","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.chb.2018.12.035","article-title":"The effect of message framing on security behavior in online services: focusing on the shift of time orientation via psychological ownership","volume":"93","author":"Seo","year":"2019","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"2026021807074531700_ref128","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s10551-014-2144-5","article-title":"Top management ethical leadership and firm performance: mediating role of ethical and procedural justice climate","volume":"129","author":"Shin","year":"2015","journal-title":"Journal of Business Ethics"},{"key":"2026021807074531700_ref129","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.cose.2015.01.002","article-title":"Personality, attitudes, and intentions: predicting initial adoption of information security behavior","volume":"49","author":"Shropshire","year":"2015","journal-title":"Computers and Security"},{"issue":"1","key":"2026021807074531700_ref130","first-page":"32","article-title":"A ransomware case for use in the classroom","volume":"43","author":"Sipior","year":"2018","journal-title":"Communications of the Association for Information Systems"},{"issue":"2","key":"2026021807074531700_ref131","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","article-title":"Employees' adherence to information security policies: an exploratory field study","volume":"51","author":"Siponen","year":"2014","journal-title":"Information and Management"},{"key":"2026021807074531700_ref132","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.cose.2016.04.003","article-title":"A problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharing","volume":"60","author":"Skopik","year":"2016","journal-title":"Computers and Security"},{"issue":"3","key":"2026021807074531700_ref133","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TEM.2018.2798408","article-title":"Cyber risk analysis for a smart grid: how smart is smart enough? a multiarmed bandit approach to cyber security investment","volume":"65","author":"Smith","year":"2018","journal-title":"IEEE Transactions on Engineering Management"},{"key":"2026021807074531700_ref134","first-page":"1264","article-title":"Reconstructing electronic surveillance law","volume":"72","author":"Solove","year":"2003","journal-title":"The George Washington Law Review"},{"key":"2026021807074531700_ref135","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.ijpe.2017.07.024","article-title":"Uncertainty and supply chain risk: the moderating role of supply chain flexibility in risk mitigation","volume":"193","author":"Sreedevi","year":"2017","journal-title":"International Journal of Production Economics"},{"issue":"4","key":"2026021807074531700_ref136","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MSP.2015.71","article-title":"Improving cybersecurity incident response team effectiveness using teams-based research","volume":"13","author":"Steinke","year":"2015","journal-title":"IEEE Security and Privacy"},{"key":"2026021807074531700_ref137","first-page":"239","article-title":"Curbing the market for cyber weapons","volume":"32","author":"Stockton","year":"2013","journal-title":"The Yale Law and Policy Review"},{"issue":"4","key":"2026021807074531700_ref138","doi-asserted-by":"crossref","first-page":"441","DOI":"10.2307\/249551","article-title":"Coping with systems risk: security planning models for management decision making","volume":"22","author":"Straub","year":"1998","journal-title":"MIS Quarterly"},{"key":"2026021807074531700_ref139","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1016\/j.future.2019.05.058","article-title":"Robust secure communication protocol for smart healthcare system with FPGA implementation","volume":"100","author":"Sureshkumar","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"2026021807074531700_ref140","first-page":"564","article-title":"Social Engineering and organisational Dependencies in phishing attacks","author":"Taib","year":"2019"},{"key":"2026021807074531700_ref141","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.cose.2015.02.001","article-title":"Selecting a trusted cloud service provider for your SaaS program","volume":"50","author":"Tang","year":"2015","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref503","article-title":"The top 10 worst ransomware attacks of 2017, so far","author":"Techrepublic","year":"2017"},{"issue":"4","key":"2026021807074531700_ref142","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1287\/isre.2017.0722","article-title":"Software diversity for improved network security: optimal distribution of software-based shared vulnerabilities","volume":"28","author":"Temizkan","year":"2017","journal-title":"Information Systems Research"},{"issue":"6","key":"2026021807074531700_ref143","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.5465\/amj.2005.19573114","article-title":"Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings","volume":"48","author":"Tyler","year":"2005","journal-title":"Academy of Management Journal"},{"key":"2026021807074531700_ref144","unstructured":"United States Computer Emergency Readiness Team (US-CERT)\n           (2019), \u201cNational cyber awareness system alerts\u201d, available at:\u00a0https:\/\/us-cert.cisa.gov\/ncas\/alerts."},{"issue":"8","key":"2026021807074531700_ref601","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/0167-4048(94)90049-3","article-title":"The management of computer security profiles using a rule-oriented approach","volume":"13","author":"Von Solms","year":"1994","journal-title":"Computers and Security"},{"issue":"3","key":"2026021807074531700_ref145","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S0167-4048(03)00311-0","article-title":"A model for deriving information security control attribute profiles","volume":"22","author":"Van der Haar","year":"2003","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref146","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.chb.2017.10.007","article-title":"Security and privacy in online social networking: risk perceptions and precautionary behavior","volume":"78","author":"Van Schaik","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"2026021807074531700_ref147","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1080\/10580530701586136","article-title":"An information security governance framework","volume":"24","author":"Veiga","year":"2007","journal-title":"Information Systems Management"},{"issue":"4","key":"2026021807074531700_ref148","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/S0167-4048(03)00406-1","article-title":"A taxonomy for information security technologies","volume":"22","author":"Venter","year":"2003","journal-title":"Computers and Security"},{"issue":"6","key":"2026021807074531700_ref149","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/j.cose.2005.07.003","article-title":"Information Security Governance\u2013compliance management vs operational management","volume":"24","author":"Von Solms","year":"2005","journal-title":"Computers and Security"},{"issue":"5","key":"2026021807074531700_ref150","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.cose.2004.05.002","article-title":"The 10 deadly sins of information security management","volume":"23","author":"Von Solms","year":"2004","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref151","doi-asserted-by":"crossref","first-page":"16","DOI":"10.4018\/978-1-59140-911-3.ch002","volume-title":"Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues","author":"Warkentin","year":"2006"},{"key":"2026021807074531700_ref152","first-page":"16","volume-title":"In Enterprise Information Assurance and System Security: Managerial and Technical Issues","author":"Warkentin","year":"2006"},{"key":"2026021807074531700_ref153","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2014.04.005","article-title":"A situation awareness model for information security risk management","volume":"44","author":"Webb","year":"2014","journal-title":"Computers and Security"},{"key":"2026021807074531700_ref154","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41932-9_10","volume-title":"Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing","author":"Wee","year":"2016"},{"issue":"1","key":"2026021807074531700_ref155","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1108\/09685220910944722","article-title":"An integrated view of human, organizational, and technological challenges of IT security management","volume":"17","author":"Werlinger","year":"2009","journal-title":"Information Management and Computer Security"},{"key":"2026021807074531700_ref156","article-title":"The community cyber security maturity model","author":"White"},{"key":"2026021807074531700_ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2994981","article-title":"Antecedents of cybersecurity implementation: a study of the cyber-preparedness of UK social enterprises","author":"White","year":"2020","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"8","key":"2026021807074531700_ref158","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/859670.859675","article-title":"Enemy at the gate: threats to information security","volume":"46","author":"Whitman","year":"2003","journal-title":"Communications of the ACM"},{"key":"2026021807074531700_ref159","doi-asserted-by":"crossref","first-page":"9","DOI":"10.4018\/978-1-878289-78-0.ch002","volume-title":"Information Security Management: Global Challenges in the New Millennium","author":"Whitman","year":"2001"},{"key":"2026021807074531700_ref160","doi-asserted-by":"crossref","first-page":"545","DOI":"10.2307\/3053466","article-title":"Perceptual research on general deterrence: a critical review","author":"Williams","year":"1986","journal-title":"Law and Society Review"},{"key":"2026021807074531700_ref161","article-title":"Critical role of ethical leadership on information security climate and employee ISP violation behavior","volume-title":"Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy (WISP)","author":"Xue","year":"2018"},{"key":"2026021807074531700_ref162","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.ijpe.2017.11.016","article-title":"Socially responsible governance mechanisms for manufacturing firms in apparel supply chains","volume":"196","author":"Yadlapalli","year":"2018","journal-title":"International Journal of Production Economics"},{"issue":"6","key":"2026021807074531700_ref163","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.ijmedinf.2007.08.011","article-title":"An evaluation framework for Health Information Systems: human, organization and technology-fit factors (HOT-fit)","volume":"77","author":"Yusof","year":"2008","journal-title":"International Journal of Medical Informatics"},{"issue":"9","key":"2026021807074531700_ref164","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1108\/IMDS-06-2015-0263","article-title":"On the drivers and performance outcomes of green practices adoption: an empirical study in China","volume":"116","author":"Zhang","year":"2016","journal-title":"Industrial Management and Data Systems"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-06-2020-0240\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/jeim\/article-pdf\/34\/6\/1597\/11158022\/jeim-06-2020-0240en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/jeim\/article-pdf\/34\/6\/1597\/11158022\/jeim-06-2020-0240en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T12:08:15Z","timestamp":1771416495000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/jeim\/article\/34\/6\/1597\/218117\/Antecedents-for-enhanced-level-of-cyber-security"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,14]]},"references-count":171,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11,11]]}},"URL":"https:\/\/doi.org\/10.1108\/jeim-06-2020-0240","relation":{},"ISSN":["1741-0398","1758-7409"],"issn-type":[{"value":"1741-0398","type":"print"},{"value":"1758-7409","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,14]]}}}