{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T17:54:28Z","timestamp":1724954068208},"reference-count":102,"publisher":"World Scientific Pub Co Pte Lt","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2016,1]]},"abstract":"<jats:p> \u201cNobody ever got fired for buying IBM,\u201d was a widely used clich\u00e9 in the 1970s in the corporate IT (information technology) world. Since then, the traditional process of purchasing software has dramatically changed, challenged by the advent of open source software (OSS). Since its inception in the 1980s, OSS has matured, grown, and become one of the important driving forces of the enterprise ecosystem. However, it has also brought important IT security risks that are impacting the OSS IT adoption decision-making process. The recent Heartbleed bug demonstrated the grandeur of the issue. While much of the noise relates to the amplification of perceived risks by the popular mass media coverage, the effect is that many enterprises, mainly for risk reasons, have still chosen not to adopt OSS. We investigated \u201chow do information security related characteristics of OSS affect the risk perception and adoption decision of OSS\u201d by conducting an online survey of 188 IT decision-makers. The proposed Open Source Risk Adoption Model offers novel insights on the importance of the perceived risk antecedents. Our research brings new theoretical contributions, such as understanding the perceived IT security risk (PISR) relationship with adoption intention (AI) in the OSS context, for researchers and important insights for IT information professionals. We have found that IT security risk has a significant role in OSS adoption intention. Our results offer possible future research directions and extend existing theoretical understanding of OSS adoption. <\/jats:p>","DOI":"10.1142\/s0219622015500364","type":"journal-article","created":{"date-parts":[[2015,11,5]],"date-time":"2015-11-05T06:05:22Z","timestamp":1446703522000},"page":"151-185","source":"Crossref","is-referenced-by-count":17,"title":["The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption"],"prefix":"10.1142","volume":"15","author":[{"given":"Mario","family":"Silic","sequence":"first","affiliation":[{"name":"University of St. Gallen\/ZSEM Mueller - Friedberg - Str. 8, 9000 St. Gallen, Switzerland"}]},{"given":"Andrea","family":"Back","sequence":"additional","affiliation":[{"name":"University of St. Gallen, Mueller - Friedberg - Str. 8, 9000 St. Gallen, Switzerland"}]}],"member":"219","published-online":{"date-parts":[[2016,2,18]]},"reference":[{"key":"S0219622015500364BIB001","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941516"},{"key":"S0219622015500364BIB002","first-page":"171","volume-title":"Open Sources: Voices from the Open Source Revolution","author":"Perens B.","year":"1999"},{"key":"S0219622015500364BIB006","doi-asserted-by":"publisher","DOI":"10.1016\/S0007-6813(03)00071-5"},{"key":"S0219622015500364BIB010","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262017251.001.0001"},{"key":"S0219622015500364BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.73"},{"key":"S0219622015500364BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72486-7_33"},{"key":"S0219622015500364BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1259216"},{"key":"S0219622015500364BIB022","doi-asserted-by":"publisher","DOI":"10.1080\/15391523.2007.10782491"},{"key":"S0219622015500364BIB028","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.01.011"},{"key":"S0219622015500364BIB029","doi-asserted-by":"publisher","DOI":"10.1080\/01972240903423345"},{"key":"S0219622015500364BIB030","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.05.008"},{"key":"S0219622015500364BIB031","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2012.687305"},{"key":"S0219622015500364BIB035","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.93"},{"key":"S0219622015500364BIB036","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.02.001"},{"key":"S0219622015500364BIB037","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"S0219622015500364BIB038","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622009003715"},{"key":"S0219622015500364BIB039","doi-asserted-by":"publisher","DOI":"10.24846\/v21i2y201201"},{"key":"S0219622015500364BIB040","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.137"},{"key":"S0219622015500364BIB041","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.002"},{"key":"S0219622015500364BIB045","doi-asserted-by":"publisher","DOI":"10.1524\/9783486592542"},{"key":"S0219622015500364BIB046","doi-asserted-by":"publisher","DOI":"10.1111\/rmir.12016"},{"key":"S0219622015500364BIB047","volume-title":"Risk Management and Insurance","author":"Harrington S. E.","year":"1999"},{"key":"S0219622015500364BIB048","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220405"},{"key":"S0219622015500364BIB049","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01442.x"},{"key":"S0219622015500364BIB050","first-page":"82","author":"Cunningham S. M.","year":"1967","journal-title":"Risk Taking and Information Handling in Consumer Behavior"},{"key":"S0219622015500364BIB051","doi-asserted-by":"publisher","DOI":"10.2307\/3149824"},{"key":"S0219622015500364BIB052","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1993.tb01077.x"},{"key":"S0219622015500364BIB053","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.001"},{"key":"S0219622015500364BIB054","doi-asserted-by":"publisher","DOI":"10.1207\/s15324834basp0904_2"},{"key":"S0219622015500364BIB056","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00111-3"},{"key":"S0219622015500364BIB057","volume-title":"How Information Gives you Competitive Advantage","author":"Porter M. E.","year":"1985"},{"key":"S0219622015500364BIB060","doi-asserted-by":"publisher","DOI":"10.2307\/25750689"},{"key":"S0219622015500364BIB061","volume-title":"The Risk Management Process: Business Strategy and Tactics","volume":"103","author":"Culp C. L.","year":"2002"},{"key":"S0219622015500364BIB062","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.08.009"},{"key":"S0219622015500364BIB063","volume-title":"Management of Information Security","author":"Whitman M.","year":"2013"},{"key":"S0219622015500364BIB064","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1995.tb00308.x"},{"key":"S0219622015500364BIB065","doi-asserted-by":"publisher","DOI":"10.2307\/976358"},{"key":"S0219622015500364BIB066","volume-title":"Computer and Information Security Handbook: Newnes","author":"Vacca J. R.","year":"2012"},{"issue":"11","key":"S0219622015500364BIB067","first-page":"5","volume":"19","author":"McGhee D. D.","year":"2007","journal-title":"Intellectual Property & Technology Law Journal"},{"key":"S0219622015500364BIB068","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72486-7_7"},{"key":"S0219622015500364BIB069","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2002.00118.x"},{"key":"S0219622015500364BIB071","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20020208"},{"key":"S0219622015500364BIB073","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2007.72"},{"key":"S0219622015500364BIB076","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176994"},{"key":"S0219622015500364BIB077","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2010.535853"},{"key":"S0219622015500364BIB078","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666457"},{"key":"S0219622015500364BIB079","first-page":"105","author":"Fichman R. G.","year":"2000","journal-title":"Framing the Domains of IT Management: Projecting the Future Through the Past"},{"key":"S0219622015500364BIB082","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2010.00357.x"},{"key":"S0219622015500364BIB083","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.03.002"},{"key":"S0219622015500364BIB084","doi-asserted-by":"publisher","DOI":"10.1177\/0146167292181001"},{"key":"S0219622015500364BIB085","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.07.007"},{"key":"S0219622015500364BIB087","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.60"},{"key":"S0219622015500364BIB088","volume-title":"Manuscript","author":"Varian H. R.","year":"2003"},{"key":"S0219622015500364BIB089","doi-asserted-by":"publisher","DOI":"10.1108\/14636690610664633"},{"key":"S0219622015500364BIB091","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.05.006"},{"key":"S0219622015500364BIB092","first-page":"561","volume":"27","author":"Srivastava S. C.","year":"2010","journal-title":"Communications of the Association for Information Systems"},{"key":"S0219622015500364BIB093","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00211.x"},{"issue":"2","key":"S0219622015500364BIB094","volume":"7","author":"Gewald H.","year":"2006","journal-title":"Journal of Electronic Commerce Research"},{"key":"S0219622015500364BIB095","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"S0219622015500364BIB096","doi-asserted-by":"publisher","DOI":"10.1086\/208613"},{"key":"S0219622015500364BIB097","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"S0219622015500364BIB099","volume-title":"Fundamentals of Computer Security Technology","author":"Amoroso E. G.","year":"1994"},{"key":"S0219622015500364BIB101","doi-asserted-by":"publisher","DOI":"10.1108\/10662249710159809"},{"key":"S0219622015500364BIB102","doi-asserted-by":"publisher","DOI":"10.1080\/10580539708907029"},{"key":"S0219622015500364BIB103","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(98)80012-6"},{"key":"S0219622015500364BIB104","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1990.4309111"},{"key":"S0219622015500364BIB105","unstructured":"O. E. Williamson,  Markets and hierarchies  (New York, 1975)  pp. 26\u201330."},{"key":"S0219622015500364BIB106","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.4.909"},{"key":"S0219622015500364BIB108","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.003"},{"key":"S0219622015500364BIB109","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9230-x"},{"key":"S0219622015500364BIB111","doi-asserted-by":"publisher","DOI":"10.1016\/S0048-7333(03)00051-9"},{"key":"S0219622015500364BIB112","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2005.00183.x"},{"key":"S0219622015500364BIB113","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220305"},{"issue":"2","key":"S0219622015500364BIB114","first-page":"45","volume":"5","author":"Jarvenpaa S. L.","year":"1999","journal-title":"Journal of Computer-Mediated Communication"},{"key":"S0219622015500364BIB115","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299175"},{"key":"S0219622015500364BIB116","doi-asserted-by":"publisher","DOI":"10.1287\/isre.8.2.171"},{"key":"S0219622015500364BIB117","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.3.304.9708"},{"key":"S0219622015500364BIB120","doi-asserted-by":"publisher","DOI":"10.1177\/002224378402100305"},{"key":"S0219622015500364BIB121","doi-asserted-by":"publisher","DOI":"10.1145\/228503.228509"},{"key":"S0219622015500364BIB122","doi-asserted-by":"publisher","DOI":"10.1016\/0268-4012(95)00071-2"},{"key":"S0219622015500364BIB123","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-4359(99)80005-0"},{"key":"S0219622015500364BIB124","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.003"},{"key":"S0219622015500364BIB127","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0103"},{"key":"S0219622015500364BIB129","doi-asserted-by":"publisher","DOI":"10.1002\/smj.249"},{"issue":"2","key":"S0219622015500364BIB130","first-page":"295","volume":"295","author":"Chin W. W.","year":"1998","journal-title":"Modern Methods for Business Research"},{"key":"S0219622015500364BIB131","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"S0219622015500364BIB132","volume":"193","author":"Rold\u00e1n J. L.","year":"2012","journal-title":"Research Methodologies, Innovations and Philosophies in Software Systems Engineering and Information Systems"},{"key":"S0219622015500364BIB133","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679190202"},{"key":"S0219622015500364BIB134","volume-title":"WarpPLS 4.0 User Manual","author":"Kock N.","year":"2010"},{"key":"S0219622015500364BIB135","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"S0219622015500364BIB136","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/61.1.101"},{"key":"S0219622015500364BIB137","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","author":"Stone M.","year":"1974","journal-title":"Journal of the Royal Statistical Society. Series B (Methodological)"},{"key":"S0219622015500364BIB138","volume-title":"Multivariate Data Analysis","author":"Hair J. F.","year":"2009"},{"key":"S0219622015500364BIB139","volume-title":"Principles and Practice of Structural Equation Modeling","author":"Kline R. B.","year":"2011"},{"key":"S0219622015500364BIB140","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.30.1.73"},{"key":"S0219622015500364BIB141","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"S0219622015500364BIB142","doi-asserted-by":"publisher","DOI":"10.1177\/014920638601200408"},{"key":"S0219622015500364BIB143","doi-asserted-by":"publisher","DOI":"10.2307\/25148781"},{"key":"S0219622015500364BIB144","doi-asserted-by":"publisher","DOI":"10.1016\/S0149-2063(03)00084-9"},{"key":"S0219622015500364BIB146","doi-asserted-by":"publisher","DOI":"10.1109\/3468.852434"},{"key":"S0219622015500364BIB147","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"S0219622015500364BIB149","first-page":"12","author":"Riley M.","year":"2014","journal-title":"Bloomberg News"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622015500364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T15:57:57Z","timestamp":1565193477000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622015500364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":102,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2016,2,18]]},"published-print":{"date-parts":[[2016,1]]}},"alternative-id":["10.1142\/S0219622015500364"],"URL":"https:\/\/doi.org\/10.1142\/s0219622015500364","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}