<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Defining a Research Method for Engineering a Business Information Security Artefact</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuri Bobbert</string-name>
          <email>yuri.bobbert@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Antwerp, Antwerp, Belgium Radboud University</institution>
          ,
          <addr-line>Nijmegen</addr-line>
          ,
          <country country="NL">Netherlands</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper proposes research methods for designing and engineering a Business Information Security (BIS) artefact. Defining research methods to establish artefact functions (e.g. dash-boarding, risk register) that reflect the parameters of control for Board of Directors, is the main motivation for this research paper. The ultimate goal is to engineer this BIS artefact and thereby solve the problem of a low level of BIS maturity. We propose a research method that can be used to establish an experimental dashboard with initial parameters of control, based on a Design Science Research (DSR) approach. Group Support System (GSS) research can assist organisations applying the artefact into the organisations with the accompanying collaboration and decision making (fit to purpose) processes.</p>
      </abstract>
      <kwd-group>
        <kwd>Business Information Security</kwd>
        <kwd>Design Science Research</kwd>
        <kwd>Group Support Systems</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Information Security is a strategic issue for business leaders and several institutions and
communities have launched numerous initiatives to encourage business leaders to ensure good
stewardship in this area [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The associated compliance obligations and the increase in
security breaches have made many business leaders aware of its impact on the business
continuity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], civil and legal liabilities [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] reputation [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], employability and financial position
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Within this multidisciplinary context of Information Security we therefore use the
term “Business Information Security” [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Most of the contributions by practitioner’s bodies
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [9] [10] are prescriptive in nature [
        <xref ref-type="bibr" rid="ref9">11</xref>
        ]. Little academic research has been done on
determining the BIS parameters which boards can use to improve their BIS maturity. This
paper focusses on examining the “parameters of control”, that can function as requirements,
via multiple qualitative research methods proposed by Johannesson and Perjons’ Design
Science Research (DSR) Framework [
        <xref ref-type="bibr" rid="ref10">12</xref>
        ]. DSR aims to solve real problems by creating
knowledge and understanding of a design problem and the solutions are acquired by
establishing and applying artefacts. In this research we therefore refer to an artefact that
contributes in solving the Business Information Security problems at hand. We formulated the
following research question: Which research methods contribute to defining the requirements
for the parameters of a Business Information Security artefact?
Design science strategy focuses on solving real-life problems. According to Hevner et al. [
        <xref ref-type="bibr" rid="ref11">13</xref>
        ]
it involves generating knowledge and building artefacts to solve defined business problems.
Business requirements are aligned with technical artefact requirements via an iterative process
referred to as the “design cycle” [
        <xref ref-type="bibr" rid="ref12">14</xref>
        ]. This cycle involves designing, testing and evaluating
the artefact [
        <xref ref-type="bibr" rid="ref13">15</xref>
        ]. It includes an academic rigour cycle and a practical relevance cycle [
        <xref ref-type="bibr" rid="ref14">16</xref>
        ]. A
continuous process of iterations, which are initially framed in the experimental phase,
establishes the artefact [
        <xref ref-type="bibr" rid="ref10">12</xref>
        ]. In the table below we summarize the most important qualitative
interpretivist methods to gain, capture and transfer knowledge items to be used in the artefact
design process, according to the DSR approach of Johannesson and Perjons [
        <xref ref-type="bibr" rid="ref10">12</xref>
        ].
      </p>
      <sec id="sec-1-1">
        <title>1.Literature</title>
        <p>research</p>
      </sec>
      <sec id="sec-1-2">
        <title>2.Delphi</title>
        <p>research</p>
      </sec>
      <sec id="sec-1-3">
        <title>3.Case</title>
        <p>Study
Research
(CSR)</p>
      </sec>
      <sec id="sec-1-4">
        <title>4.Group</title>
        <p>Support
System
research
(GSS)</p>
        <sec id="sec-1-4-1">
          <title>Contribution to designing and engineering a</title>
        </sec>
        <sec id="sec-1-4-2">
          <title>Security artefact</title>
        </sec>
        <sec id="sec-1-4-3">
          <title>Business Information</title>
          <p>Explicating and defining the problem in a systematic, structured way.
Objectivity removes the element of Fear Uncertainty and Doubt (FUD).
Unbiased, structured point of departure for the design cycle. Requires a certain
level of expertise in the topic.</p>
          <p>Anonymous inventory and selection of views and standpoints (preferably
based upon literature data). Rigorous examination process for scrutinizing the
problem via, for example, expert opinions. Collecting global views on criteria
requirements with the use of technology. Knowledge sharing. Enables double
loop learning via multiple iterations. Automated. No geographical limitations.
Limited in group interaction and discussion.</p>
          <p>Deeper qualitative insight into BIS parameters and requirements within a
certain industry/country. Used for confirmatory and exploratory studies related
to validating requirements. Detailed insight into the effectiveness of
requirements (i.e. critical success factors). Validating and evidencing the
artefact requirements. Supports retroperspectives. The personal approach
encourages the target group (Boards of Directors) to engage in BIS. CSR is a
time intensive and consuming.</p>
          <p>
            Enables to create, share and capture knowledge as well as design items.
Stimulates design thinking and stakeholder collaboration due to the “group
element”. Ability to collect, assess and select product requirements in a very
short timeframe. Supports the regulative process [
            <xref ref-type="bibr" rid="ref11">13</xref>
            ] of testing and validating
requirements. Processing large data sets. Double Loop learning. Bridging
knowing-doing gaps. Stimulating group dialogues (i.e. among Boards of
Directors and Management teams). Makes it possible to establish group
consensus. Supports the decision-making process. Threat of the “law of the
decibel”. Requires professional group moderation skills [
            <xref ref-type="bibr" rid="ref12">14</xref>
            ].
          </p>
          <p>
            The proposed definition of a “research method to design and engineer a BIS artefact” starts
with the initial phase of rigours literature research (1) to explicate the problem and followed
by Delphi Research (2) to predefine views and standpoints and further explicate the problem
via multiple views and iterations. After that Case Study Research (3) can provide in depth
knowledge data on certain influences to BIS such as context, regulations, technology or
culture. The gathered data during Delphi and CSR is then used in GSS to fuel the design and
decision making process. GSS can be applied to determine the requirements among
stakeholders and to prepare or guide the stakeholder –user- group to discuss the
implementation (fit to purpose). This DSR methodology based on a structured process [
            <xref ref-type="bibr" rid="ref13">15</xref>
            ],
[
            <xref ref-type="bibr" rid="ref14">16</xref>
            ], [
            <xref ref-type="bibr" rid="ref15">17</xref>
            ], [
            <xref ref-type="bibr" rid="ref16">18</xref>
            ], [
            <xref ref-type="bibr" rid="ref11">13</xref>
            ], [
            <xref ref-type="bibr" rid="ref17">19</xref>
            ], [
            <xref ref-type="bibr" rid="ref10">12</xref>
            ] in order to improve the Maturity of Business Information
Security is coined and published as the “MBIS method” in several publications [
            <xref ref-type="bibr" rid="ref18">20</xref>
            ], [
            <xref ref-type="bibr" rid="ref19">21</xref>
            ],
[
            <xref ref-type="bibr" rid="ref20">22</xref>
            ], [
            <xref ref-type="bibr" rid="ref21">23</xref>
            ], [
            <xref ref-type="bibr" rid="ref22">24</xref>
            ].
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Conclusion</title>
      <p>
        In this paper we make two propositions: a) refers to the product and data view and b) focuses
on implementing the artefact and facilitating meetings. The first proposition (a) was involved
in the previous mentioned MBIS research publications according to the MBIS method [
        <xref ref-type="bibr" rid="ref18">20</xref>
        ],
[
        <xref ref-type="bibr" rid="ref21">23</xref>
        ], [
        <xref ref-type="bibr" rid="ref20">22</xref>
        ]. The second proposition (b) was researched and tested in collaboration with
Antwerp Management School among twenty five Chief Information Officers (CIO) and Chief
Information Security Officers (CISO), who validated the implementation of the predefined
artefact requirements [
        <xref ref-type="bibr" rid="ref23">25</xref>
        ]. The use of GSS in facilitating implementation and
decisionmaking (fit to purpose) related to BIS has also been researched and published [
        <xref ref-type="bibr" rid="ref19">21</xref>
        ] [
        <xref ref-type="bibr" rid="ref22">24</xref>
        ]. The
artefact is used by academics and practitioners and assists Board of Directors (BoD) into
gaining more control. For example via a dashboard that provides scores of the current versus
the desired state of BIS maturity. Conclusive we can state that by making use of the multiple
methods that are proposed in the paper contribute in the design and engineering of the BIS
artefact as well as the implementation into organisations.
[9] ISF, Corporate Governance Requirements for Information Risk Management, UK:
      </p>
      <p>Information Security Forum.
[10] ITGI, Information risks; Whose Business are They, United States : IT Governance Institute,
2005.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>WEF</surname>
          </string-name>
          ,
          <article-title>"Partnering for Cyber Resilience; Risk and Responsibility in a Hyperconnected World - Principles and</article-title>
          <string-name>
            <surname>Guidelines</surname>
          </string-name>
          ," World Economic Forum,,
          <string-name>
            <surname>Davos</surname>
          </string-name>
          , Swiss,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Cashell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Jackson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jickling</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Webel</surname>
          </string-name>
          ,
          <article-title>"The Economic Impact of CyberAttacks,"</article-title>
          <source>Congressional Research Service, The Library of Congress, United States</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Fox-IT</surname>
          </string-name>
          , “
          <article-title>DigiNotar Certificate Authority breach, “Operation Black Tulip”,” FOX IT in assignment of the Ministry of the Interior and Kingdom Relations</article-title>
          , Den Haag,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Walsh</surname>
          </string-name>
          , V. Mitchell,
          <string-name>
            <given-names>P.</given-names>
            <surname>Jackson</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Beatty</surname>
          </string-name>
          , “
          <article-title>Examining the Antecedents and Consequences of Corporate Reputation: A Customers perspective</article-title>
          ,”
          <source>Britisch Journal of management; Blackwell Publishing LtD</source>
          , UK,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ishiguro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Tanaka</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>Matsuura and I. Murase, "The Effect of Information Security Incidents on Corporate Values in the Japanese Stock Market,"</article-title>
          <source>Institute of Industrial Science</source>
          , The University of Tokyo, Tokyo, Japan,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Cavusoglu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mishra</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Raghunathan</surname>
          </string-name>
          , “
          <article-title>The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers</article-title>
          ,,” International Journal of E-Commerce, Dallas, Texas United States,
          <fpage>2</fpage>
          -
          <lpage>2002</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Solms</surname>
          </string-name>
          ,
          <article-title>"From Information Security to Business Security,"</article-title>
          <source>Computer &amp; Security</source>
          , Elsevier, South Africa,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>[8] ISACA, COBIT5 for Information Security</article-title>
          , United States: ISACA ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E.</given-names>
            <surname>Koning</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Bikker</surname>
          </string-name>
          , “
          <article-title>Using Standards to Create Effect in the Boardroom,”</article-title>
          <source>ISACA Journal, no. 2</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Johannesson</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Perjons</surname>
          </string-name>
          , An introduction to Design Science, Stockholm University: Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Wieringa</surname>
          </string-name>
          , Design Science Methodology:
          <article-title>For Information System</article-title>
          and
          <string-name>
            <given-names>Software</given-names>
            <surname>Engineering</surname>
          </string-name>
          , Berlin: Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [14]
          <string-name>
            <surname>G. M. J. Kolfschoten</surname>
            and
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Proper</surname>
          </string-name>
          , “De fata morgana van Group Support Systemen,” Informatie, vol.
          <volume>4</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>14</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Winter</surname>
          </string-name>
          , “Design Science Research in Europe,”
          <source>European Journal of Information Systems</source>
          , vol.
          <volume>17</volume>
          , pp.
          <fpage>470</fpage>
          -
          <lpage>474</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dietz</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Hoogervorst</surname>
          </string-name>
          ., “The discipline of Enterprise Engineering,”
          <source>International Journal of Organizational Design and Engineering</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>86</fpage>
          -
          <lpage>114</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Albani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Raber</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Winter</surname>
          </string-name>
          , “
          <article-title>A Conceptual Framework for Analysing Enterprise Engineering Methodologies,” Enterprise Modelling and Information Systems Architectures</article-title>
          , vol.
          <volume>11</volume>
          , no.
          <issue>1</issue>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V. J.</given-names>
            <surname>Aken</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Nagel</surname>
          </string-name>
          , “
          <article-title>Organising and managing the fuzzy front end of new product development</article-title>
          ,” in ECIS working paper series; Vol.
          <volume>200412</volume>
          ,
          <string-name>
            <surname>Eindhoven</surname>
          </string-name>
          : Technische Universiteit Eindhoven,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hevner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>March</surname>
          </string-name>
          , Park and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ram</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Design Science Research in Information Systems," Management Information Systems Quarterly</source>
          , vol.
          <volume>28</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>105</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bobbert</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mulder</surname>
          </string-name>
          ,
          <article-title>"A Research Journey into Maturing the Business Information Security of Mid Market Organizations,"</article-title>
          <source>International Journal on IT/Business Alignment and Governance</source>
          ,
          <volume>1</volume>
          (
          <issue>4</issue>
          ),
          <fpage>18</fpage>
          -
          <lpage>39</lpage>
          , October-December
          <year>2010</year>
          ,
          <string-name>
            <given-names>United</given-names>
            <surname>States</surname>
          </string-name>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bobbert</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mulder</surname>
          </string-name>
          , “
          <article-title>Boardroom dynamics: Group Support for the Board's Involvement in a Smart Security,”</article-title>
          <source>ISACA Journal , no. 5</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bobbert</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mulder</surname>
          </string-name>
          , “
          <article-title>Governance Practices and Critical Succes Factors suitable for Business Information Security</article-title>
          ,” in International Conference on Computational Intelligence and
          <string-name>
            <given-names>Communication</given-names>
            <surname>Networks</surname>
          </string-name>
          , India,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bobbert</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mulder</surname>
          </string-name>
          ,
          <article-title>"Group Support Systems Research in the Field of Business Information Security; a Practitioners View,"</article-title>
          <source>in 46th Hawaii International Conference on System Science</source>
          ,
          <string-name>
            <surname>Hawaii</surname>
            <given-names>US</given-names>
          </string-name>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bobbert</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Mulder</surname>
          </string-name>
          , “
          <article-title>Vergaderen om te besluiten: Het gebruik van Group Support Systemen in informatiebeveiliging,” Platform voor Informatiebeveiliging</article-title>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>4</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>G.</given-names>
            <surname>Mari</surname>
          </string-name>
          , “Cyber Security; Facts or Fiction,” Antwerp Management School,
          <volume>14</volume>
          <fpage>11</fpage>
          2016. [Online]. Available: http://blog.antwerpmanagementschool.be/.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>F.</given-names>
            <surname>Peters</surname>
          </string-name>
          ,
          <article-title>Reputatie onder druk; Het managen van reputaties in een veranderende samenleving</article-title>
          ,
          <source>Den Haag: SDU Uitgevers</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>J.</given-names>
            <surname>Allen</surname>
          </string-name>
          , “
          <article-title>Governing for Enterprise Security (GES) Implementation Guide</article-title>
          ,” Carnegie Mellon University, Software Engineering Institute, CERT , US,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>B.</given-names>
            <surname>Lebek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Uffen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Neumann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Hohler</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Breitner</surname>
          </string-name>
          , “
          <article-title>Information security awareness and behavior: a theory-based literature review</article-title>
          ,
          <source>” Management Research Review</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>37</issue>
          , pp.
          <fpage>1049</fpage>
          -
          <lpage>1092</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>M.</given-names>
            <surname>Workman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Bommer</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Straub</surname>
          </string-name>
          ,
          <article-title>"Security lapses and the omission of information security measures: A threat control model and empirical test," Computers in Human Behavior</article-title>
          , vol.
          <volume>24</volume>
          , no.
          <issue>6</issue>
          , p.
          <fpage>2799</fpage>
          -
          <lpage>2816</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V. J.</given-names>
            <surname>Aken</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Nagel</surname>
          </string-name>
          , “
          <article-title>Organising and managing the fuzzy front end of new product development</article-title>
          ,” in ECIS working paper series; Vol.
          <volume>200412</volume>
          , Eindhoven
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>