{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:52Z","timestamp":1750220992689,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T00:00:00Z","timestamp":1560297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,12]]},"DOI":"10.1145\/3322385.3322421","type":"proceedings-article","created":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T12:09:40Z","timestamp":1560427780000},"page":"118-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Effects of Information Security Legitimacy on Data Breach Consequences"],"prefix":"10.1145","author":[{"given":"Faheem Ahmed","family":"Shaikh","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Damien","family":"Joseph","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"KPMG CIO Survey 2018 Retrieved January 22 2019 from https:\/\/assets.kpmg\/content\/dam\/kpmg\/xx\/pdf\/2018\/06\/harvey-nash-kpmg-cio-survey-2018.pdf.  KPMG CIO Survey 2018 Retrieved January 22 2019 from https:\/\/assets.kpmg\/content\/dam\/kpmg\/xx\/pdf\/2018\/06\/harvey-nash-kpmg-cio-survey-2018.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"IBM IBM Study: Hidden Costs of Data Breaches Increase Expenses for Businesses 2018 Retrieved 22 January 2019 from https:\/\/newsroom.ibm.com\/2018-07--11-IBM-Study-Hidden-Costs-of-Data-Breaches-Increase-Expenses-for-Businesses.  IBM IBM Study: Hidden Costs of Data Breaches Increase Expenses for Businesses 2018 Retrieved 22 January 2019 from https:\/\/newsroom.ibm.com\/2018-07--11-IBM-Study-Hidden-Costs-of-Data-Breaches-Increase-Expenses-for-Businesses."},{"volume-title":"ICIS 2006 Proceedings","year":"2006","author":"Acquisti A.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"4","article-title":"Security prices, risk, and maximal gains from diversification","volume":"20","author":"Lintner J","year":"1965","journal-title":"The Journal of Finance"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Goyal A. and Santa-Clara P. Idiosyncratic risk matters! The Journal of Finance 58 3 (2003) 975--1007.  Goyal A. and Santa-Clara P. Idiosyncratic risk matters! The Journal of Finance 58 3 (2003) 975--1007.","DOI":"10.1111\/1540-6261.00555"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.2307\/256274","article-title":"The role of risk in explaining differences in profitability","volume":"30","author":"Aaker D. A.","year":"1987","journal-title":"Academy of Management Journal"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2006.03.003"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1492-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.73.6.198"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/876661.876669"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2004.11044320"},{"key":"e_1_3_2_1_12_1","unstructured":"Ishiguro M. Tanaka H. Matsuura K. and Murase I. The effect of information security incidents on corporate values in the Japanese stock market. WESII (2006).  Ishiguro M. Tanaka H. Matsuura K. and Murase I. The effect of information security incidents on corporate values in the Japanese stock market. WESII (2006)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080331"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2006.07.005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017327.2017334"},{"volume-title":"Stanford University Press","year":"2003","author":"Pfeffer J.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1086\/226550"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393494"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Rao H. The power of public competition: Promoting cognitive legitimacy through certification contests. The Entrepreneurship Dynamic (2001) 262--285.  Rao H. The power of public competition: Promoting cognitive legitimacy through certification contests. The Entrepreneurship Dynamic (2001) 262--285.","DOI":"10.1515\/9781503618527-012"},{"key":"e_1_3_2_1_20_1","first-page":"53","article-title":"The new economics of information security","volume":"982","author":"Gordon L. A.","year":"2004","journal-title":"Information Week"},{"volume-title":"City","year":"2009","author":"Clearinghouse P. R.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02288695"},{"key":"e_1_3_2_1_23_1","unstructured":"Capgemini Information Security Benchmarking 2017 Retrieved from https:\/\/www.capgemini.com\/consulting-de\/wp-content\/uploads\/sites\/32\/2017\/11\/information-security-benchmark-2017.pdf.  Capgemini Information Security Benchmarking 2017 Retrieved from https:\/\/www.capgemini.com\/consulting-de\/wp-content\/uploads\/sites\/32\/2017\/11\/information-security-benchmark-2017.pdf."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211267675"}],"event":{"name":"SIGMIS-CPR '19: 2019 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Nashville TN USA","acronym":"SIGMIS-CPR '19"},"container-title":["Proceedings of the 2019 on Computers and People Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322385.3322421","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322385.3322421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:27Z","timestamp":1750206327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322385.3322421"}},"subtitle":["Moderating Effect of Impression Management"],"short-title":[],"issued":{"date-parts":[[2019,6,12]]},"references-count":24,"alternative-id":["10.1145\/3322385.3322421","10.1145\/3322385"],"URL":"https:\/\/doi.org\/10.1145\/3322385.3322421","relation":{},"subject":[],"published":{"date-parts":[[2019,6,12]]},"assertion":[{"value":"2019-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}