{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:56:18Z","timestamp":1769748978708,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tem.2021.3127485","type":"journal-article","created":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T20:31:23Z","timestamp":1638563483000},"page":"481-490","source":"Crossref","is-referenced-by-count":12,"title":["Information Systems Sourcing Strategies and Organizational Cybersecurity Breaches"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9882-3341","authenticated-orcid":false,"given":"He","family":"Li","sequence":"first","affiliation":[{"name":"Department of Management, Wilbur O. and Ann Powers College of Business, Clemson University, Clemson, SC, USA"}]},{"given":"Sungjin","family":"Yoo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Business Analytics, LaPenta School of Business, Iona College, New Rochelle, NY, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.14"},{"issue":"2","key":"ref2","article-title":"Managing the vendor set: Achieving best pricing and quality service in IT outsourcing","volume":"8","author":"Poston","year":"2009","journal-title":"MIS Quart. Executive"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.4.06"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1097\/HMR.0b013e3182048e7e"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1097\/HMR.0b013e3182572c7b"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1097\/HMR.0b013e318239f2ff"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1097\/00115514-201005000-00007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.01.060"},{"key":"ref9","article-title":"The risks of sourcing software as a serviceAn empirical analysis of adopters and non-adopters","volume-title":"Proc. Eur. Conf. Inf. Syst.","author":"Benlian"},{"key":"ref10","article-title":"Taxonomy of technological IT outsourcing risks: Support for risk identification and quantification","volume-title":"Proc. Eur. Conf. Inf. Syst.","author":"Ackermann"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.06"},{"issue":"4","key":"ref12","first-page":"1043","article-title":"Meaningful healthcare security: Does Meaningful-Use attestation improve information security performance","volume":"42","author":"Kwon","year":"2018","journal-title":"MIS Quart."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1790190"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0939"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1097\/00115514-200107000-00007"},{"issue":"2","key":"ref17","first-page":"46","article-title":"Best of breed strategieshospital characteristics associated with organizational HIT strategy","volume":"23","author":"Burke","year":"2009","journal-title":"J. Healthcare Inf. Manag."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.9.2.176"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/0963818031000087862"},{"issue":"9","key":"ref21","first-page":"62","article-title":"ERP vs. best-of-breed","volume":"80","author":"Lee","year":"1999","journal-title":"Strategic Finance"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.8.6.624"},{"issue":"4","key":"ref23","first-page":"481","article-title":"Making sense of white-collar crime: Theory and research","volume":"8","author":"Simpson","year":"2010","journal-title":"Ohio State J. Criminal Law"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00134-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00260"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00644"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0858"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.pan.a004868"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/1912755"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0437"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4076(95)01756-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5907.2010.00447.x"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.12.1671.25120"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2307\/1910996"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0299"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0473"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/10339242\/09635693.pdf?arnumber=9635693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T20:15:30Z","timestamp":1709324130000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9635693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/tem.2021.3127485","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}