{"id":"https://openalex.org/W2026428831","doi":"https://doi.org/10.1108/09685221111153546","title":"Impacts of organizational capabilities in information security","display_name":"Impacts of organizational capabilities in information security","publication_year":2011,"publication_date":"2011-07-19","ids":{"openalex":"https://openalex.org/W2026428831","doi":"https://doi.org/10.1108/09685221111153546","mag":"2026428831"},"language":"en","primary_location":{"id":"doi:10.1108/09685221111153546","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685221111153546","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070065182","display_name":"Jacqueline Huynh Hall","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jacqueline H. Hall","raw_affiliation_strings":["Department of Engineering Management and Systems Engineering, The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Management and Systems Engineering, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109336689","display_name":"Shahram Sarkani","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shahram Sarkani","raw_affiliation_strings":["Department of Engineering Management and Systems Engineering, The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Management and Systems Engineering, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050432319","display_name":"Thomas A. Mazzuchi","orcid":"https://orcid.org/0000-0002-4584-4018"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas A. Mazzuchi","raw_affiliation_strings":["Department of Engineering Management and Systems Engineering, The George Washington University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Management and Systems Engineering, The George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070065182"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":8.1284,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.9704492,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":"3","first_page":"155","last_page":"176"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.6516374349594116},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.6339439749717712},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.591809868812561},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.577441394329071},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.44910523295402527},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4350621998310089},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.4126732349395752},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.37059369683265686},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.35278645157814026},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.26070475578308105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20336031913757324},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.1449964940547943}],"concepts":[{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.6516374349594116},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.6339439749717712},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.591809868812561},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.577441394329071},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.44910523295402527},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4350621998310089},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.4126732349395752},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.37059369683265686},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.35278645157814026},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.26070475578308105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20336031913757324},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.1449964940547943},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685221111153546","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685221111153546","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":69,"referenced_works":["https://openalex.org/W179216469","https://openalex.org/W199493278","https://openalex.org/W654534730","https://openalex.org/W1488344794","https://openalex.org/W1490831285","https://openalex.org/W1509258085","https://openalex.org/W1557562404","https://openalex.org/W1558046248","https://openalex.org/W1566172004","https://openalex.org/W1567388932","https://openalex.org/W1594282464","https://openalex.org/W1665332082","https://openalex.org/W1831066781","https://openalex.org/W1915854659","https://openalex.org/W1978399955","https://openalex.org/W1987258130","https://openalex.org/W1988269019","https://openalex.org/W1988315607","https://openalex.org/W1996726897","https://openalex.org/W2014088749","https://openalex.org/W2015230046","https://openalex.org/W2022278403","https://openalex.org/W2032696994","https://openalex.org/W2036149274","https://openalex.org/W2037069781","https://openalex.org/W2047590919","https://openalex.org/W2055847123","https://openalex.org/W2059334100","https://openalex.org/W2061977616","https://openalex.org/W2062118944","https://openalex.org/W2063466632","https://openalex.org/W2070177836","https://openalex.org/W2071666535","https://openalex.org/W2072047708","https://openalex.org/W2076418638","https://openalex.org/W2078808777","https://openalex.org/W2088949480","https://openalex.org/W2089402107","https://openalex.org/W2095659828","https://openalex.org/W2097402444","https://openalex.org/W2122413203","https://openalex.org/W2122912498","https://openalex.org/W2123709218","https://openalex.org/W2124358688","https://openalex.org/W2124689625","https://openalex.org/W2134368355","https://openalex.org/W2138250396","https://openalex.org/W2140956556","https://openalex.org/W2141693999","https://openalex.org/W2156730552","https://openalex.org/W2168026416","https://openalex.org/W2170569929","https://openalex.org/W2232814000","https://openalex.org/W2295656366","https://openalex.org/W2414810123","https://openalex.org/W2607657495","https://openalex.org/W2811464350","https://openalex.org/W2894916462","https://openalex.org/W2900927010","https://openalex.org/W3015634246","https://openalex.org/W3124536214","https://openalex.org/W3149395617","https://openalex.org/W4235678817","https://openalex.org/W4285719527","https://openalex.org/W4292023223","https://openalex.org/W4298091299","https://openalex.org/W4301352023","https://openalex.org/W6608081501","https://openalex.org/W6634024652"],"related_works":["https://openalex.org/W2508914475","https://openalex.org/W2144394323","https://openalex.org/W2120971814","https://openalex.org/W2777401565","https://openalex.org/W3159280571","https://openalex.org/W1925296708","https://openalex.org/W2187749057","https://openalex.org/W3195871191","https://openalex.org/W64390563","https://openalex.org/W2297182430"],"abstract_inverted_index":{"Purpose":[0],"This":[1,205],"research":[2,155],"aims":[3],"to":[4,55,64,68,82,96,103,107,109,169,193],"examine":[5],"the":[6,70,80,88,94,101,105,157,178,185,197,208],"relationship":[7,135],"between":[8,136],"information":[9,25,40,110,120,140,162,188,218],"security":[10,26,111,121,141,219],"strategy":[11,27,142],"and":[12,28,39,47,67,90,100,139,230],"organization":[13,29,128,202],"performance,":[14],"with":[15,116,212],"organizational":[16,77,182],"capabilities":[17,183,220],"as":[18,221],"important":[19],"factors":[20],"influencing":[21],"successful":[22],"implementation":[23,118,143],"of":[24,87,119,159,181,187,210,216,224],"performance.":[30,129,203],"Design/methodology/approach":[31],"Based":[32],"on":[33,156,195],"existing":[34],"literature":[35],"in":[36,124,161,176,184],"strategic":[37],"management":[38,232],"security,":[41,189],"a":[42,150],"theoretical":[43,71],"model":[44],"was":[45,53,62],"proposed":[46],"validated.":[48],"A":[49],"self\u2010administered":[50],"survey":[51],"instrument":[52],"developed":[54],"collect":[56],"empirical":[57,214],"data.":[58],"Structural":[59],"equation":[60],"modeling":[61],"used":[63],"test":[65],"hypotheses":[66],"fit":[69],"model.":[72],"Findings":[73,166],"Evidence":[74],"suggests":[75],"that":[76],"capabilities,":[78],"encompassing":[79],"ability":[81,95,102],"develop":[83],"high\u2010quality":[84],"situational":[85],"awareness":[86],"current":[89],"future":[91],"threat":[92],"environment,":[93],"possess":[97],"appropriate":[98],"means,":[99],"orchestrate":[104],"means":[106],"respond":[108],"threats,":[112],"are":[113,167],"positively":[114,126],"associated":[115],"effective":[117],"strategy,":[122],"which":[123],"turn":[125],"affects":[127],"However,":[130],"there":[131],"is":[132],"no":[133],"significant":[134],"decision":[137],"making":[138],"success.":[144],"Research":[145],"limitations/implications":[146],"The":[147],"study":[148,206],"provides":[149,207],"starting":[151],"point":[152],"for":[153,173,200],"further":[154],"role":[158],"decision\u2010making":[160],"security.":[163],"Practical":[164],"implications":[165],"expected":[168],"yield":[170],"practical":[171],"value":[172],"business":[174],"leaders":[175],"understanding":[177],"viable":[179],"predisposition":[180],"context":[186],"thus":[190],"enabling":[191],"firms":[192],"focus":[194],"acquiring":[196],"ones":[198],"indispensable":[199],"improving":[201],"Originality/value":[204],"body":[209],"knowledge":[211],"an":[213,222],"analysis":[215],"organization's":[217],"aggregation":[223],"sense":[225],"making,":[226],"decision\u2010making,":[227],"asset":[228],"availability,":[229],"operations":[231],"constructs.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
