{"id":"https://openalex.org/W2346060715","doi":"https://doi.org/10.1080/08874417.2009.11645326","title":"Strategic, Tactical, &amp; Operational Management Security Model","display_name":"Strategic, Tactical, &amp; Operational Management Security Model","publication_year":2009,"publication_date":"2009-03-01","ids":{"openalex":"https://openalex.org/W2346060715","doi":"https://doi.org/10.1080/08874417.2009.11645326","mag":"2346060715"},"language":"en","primary_location":{"id":"doi:10.1080/08874417.2009.11645326","is_oa":true,"landing_page_url":"https://doi.org/10.1080/08874417.2009.11645326","pdf_url":null,"source":{"id":"https://openalex.org/S83133229","display_name":"Journal of Computer Information Systems","issn_l":"0887-4417","issn":["0887-4417","2380-2057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1080/08874417.2009.11645326","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009541326","display_name":"Garry L. White","orcid":null},"institutions":[{"id":"https://openalex.org/I13511017","display_name":"Texas State University","ror":"https://ror.org/05h9q1g27","country_code":"US","type":"education","lineage":["https://openalex.org/I13511017"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Garry White","raw_affiliation_strings":["Texas State University, San Marcos, TX 78666","Texas State University San Marcos, TX 78666"],"affiliations":[{"raw_affiliation_string":"Texas State University, San Marcos, TX 78666","institution_ids":["https://openalex.org/I13511017"]},{"raw_affiliation_string":"Texas State University San Marcos, TX 78666","institution_ids":["https://openalex.org/I13511017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5009541326"],"corresponding_institution_ids":["https://openalex.org/I13511017"],"apc_list":null,"apc_paid":null,"fwci":1.4806,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.89625265,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"49","issue":"3","first_page":"71","last_page":"75"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.7606831192970276},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6635758876800537},{"id":"https://openalex.org/keywords/certified-information-security-manager","display_name":"Certified Information Security Manager","score":0.5642511248588562},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.530174970626831},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.5265179872512817},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.49436426162719727},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45227062702178955},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.44769445061683655},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4441395401954651},{"id":"https://openalex.org/keywords/itil-security-management","display_name":"ITIL security management","score":0.4322344660758972},{"id":"https://openalex.org/keywords/standard-of-good-practice","display_name":"Standard of Good Practice","score":0.4294036626815796},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4127656817436218},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.38785290718078613},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3556837737560272},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.35496678948402405},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.34869563579559326},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.33441027998924255}],"concepts":[{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.7606831192970276},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6635758876800537},{"id":"https://openalex.org/C180823521","wikidata":"https://www.wikidata.org/wiki/Q1662502","display_name":"Certified Information Security Manager","level":5,"score":0.5642511248588562},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.530174970626831},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.5265179872512817},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.49436426162719727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45227062702178955},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.44769445061683655},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4441395401954651},{"id":"https://openalex.org/C114351632","wikidata":"https://www.wikidata.org/wiki/Q5974820","display_name":"ITIL security management","level":5,"score":0.4322344660758972},{"id":"https://openalex.org/C47309137","wikidata":"https://www.wikidata.org/wiki/Q7598357","display_name":"Standard of Good Practice","level":5,"score":0.4294036626815796},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4127656817436218},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.38785290718078613},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3556837737560272},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.35496678948402405},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.34869563579559326},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33441027998924255},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/08874417.2009.11645326","is_oa":true,"landing_page_url":"https://doi.org/10.1080/08874417.2009.11645326","pdf_url":null,"source":{"id":"https://openalex.org/S83133229","display_name":"Journal of Computer Information Systems","issn_l":"0887-4417","issn":["0887-4417","2380-2057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Information Systems","raw_type":"journal-article"},{"id":"mag:2346060715","is_oa":false,"landing_page_url":"https://www.tandfonline.com/doi/abs/10.1080/08874417.2009.11645326","pdf_url":null,"source":{"id":"https://openalex.org/S83133229","display_name":"Journal of Computer Information Systems","issn_l":"0887-4417","issn":["0887-4417","2380-2057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Journal of Computer Information Systems","raw_type":null}],"best_oa_location":{"id":"doi:10.1080/08874417.2009.11645326","is_oa":true,"landing_page_url":"https://doi.org/10.1080/08874417.2009.11645326","pdf_url":null,"source":{"id":"https://openalex.org/S83133229","display_name":"Journal of Computer Information Systems","issn_l":"0887-4417","issn":["0887-4417","2380-2057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1548151532","https://openalex.org/W1592063330","https://openalex.org/W1719728001","https://openalex.org/W1742813727","https://openalex.org/W1966669815","https://openalex.org/W2001231576","https://openalex.org/W2003136378","https://openalex.org/W2061590172","https://openalex.org/W2075911405","https://openalex.org/W2108063605","https://openalex.org/W2156730552","https://openalex.org/W2163309423","https://openalex.org/W2278252066","https://openalex.org/W2308090734","https://openalex.org/W2337970272","https://openalex.org/W2410763972","https://openalex.org/W2748064818","https://openalex.org/W2797639273","https://openalex.org/W2930365956","https://openalex.org/W2989601738","https://openalex.org/W2990937259","https://openalex.org/W2991209865","https://openalex.org/W2991533186","https://openalex.org/W4401248846"],"related_works":["https://openalex.org/W75668669","https://openalex.org/W3006564997","https://openalex.org/W2974653530","https://openalex.org/W582997655","https://openalex.org/W2942661344","https://openalex.org/W2949283092","https://openalex.org/W2120497937","https://openalex.org/W2803410559","https://openalex.org/W2943384552","https://openalex.org/W1966669815","https://openalex.org/W990271294","https://openalex.org/W2378832022","https://openalex.org/W2980199772","https://openalex.org/W181698552","https://openalex.org/W652627048","https://openalex.org/W2238225629","https://openalex.org/W2605407163","https://openalex.org/W1652804941","https://openalex.org/W1995987698","https://openalex.org/W2961618311"],"abstract_inverted_index":{"Information":[0],"security":[1,17,33,53,61,77],"can":[2],"be":[3],"viewed":[4],"as":[5],"being":[6],"different,":[7],"at":[8],"different":[9,75],"levels":[10],"of":[11,51,73,79],"management.":[12,87],"Strategic":[13],"management":[14,29,44],"involves":[15,30,45],"creating":[16],"policies,":[18],"dealing":[19],"with":[20],"people":[21],"issues,":[22],"and":[23,26,37,47,58,67,84],"evaluating":[24],"threats":[25],"risks.":[27],"Tactical":[28],"how":[31,68],"the":[32,49,71,74],"systems":[34],"are":[35],"developed":[36],"implemented":[38],"to":[39],"meet":[40],"policy":[41],"requirements.":[42],"Operational":[43],"maintaining":[46],"monitoring":[48],"enforcement":[50],"information":[52,60,76],"policies.":[54],"This":[55],"paper":[56],"presents":[57],"explains":[59],"from":[62],"a":[63],"managerial":[64],"level":[65],"perspective":[66],"curriculum":[69],"supports":[70],"model":[72],"needs":[78],"strategic":[80],"(why),":[81],"tactical":[82],"(how),":[83],"operational":[85],"(what)":[86]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-02-13T13:40:29.240086","created_date":"2025-10-10T00:00:00"}
