{"id":"https://openalex.org/W1715414298","doi":"https://doi.org/10.1108/ics-02-2014-0016","title":"Organizational objectives for information security governance: a value focused assessment","display_name":"Organizational objectives for information security governance: a value focused assessment","publication_year":2015,"publication_date":"2015-05-22","ids":{"openalex":"https://openalex.org/W1715414298","doi":"https://doi.org/10.1108/ics-02-2014-0016","mag":"1715414298"},"language":"en","primary_location":{"id":"doi:10.1108/ics-02-2014-0016","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2014-0016","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104078407","display_name":"Sushma Mishra","orcid":null},"institutions":[{"id":"https://openalex.org/I178605575","display_name":"Robert Morris University","ror":"https://ror.org/03r24vd05","country_code":"US","type":"education","lineage":["https://openalex.org/I178605575"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sushma Mishra","raw_affiliation_strings":["Department of Computer information Systems, Robert Morris University, Moon Township, Pennsylvania, USA","(Department of Computer information Systems, Robert Morris University, Moon Township, Pennsylvania, USA)"],"affiliations":[{"raw_affiliation_string":"Department of Computer information Systems, Robert Morris University, Moon Township, Pennsylvania, USA","institution_ids":["https://openalex.org/I178605575"]},{"raw_affiliation_string":"(Department of Computer information Systems, Robert Morris University, Moon Township, Pennsylvania, USA)","institution_ids":["https://openalex.org/I178605575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5104078407"],"corresponding_institution_ids":["https://openalex.org/I178605575"],"apc_list":null,"apc_paid":null,"fwci":3.973,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.93808012,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"23","issue":"2","first_page":"122","last_page":"144"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/grounded-theory","display_name":"Grounded theory","score":0.733646810054779},{"id":"https://openalex.org/keywords/information-governance","display_name":"Information governance","score":0.663573145866394},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.6625973582267761},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4970145523548126},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4949495196342468},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.48814091086387634},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4879459738731384},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.43582695722579956},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4033166766166687},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.37908273935317993},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.2993715703487396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.29672569036483765},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.22049909830093384},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.18164893984794617},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.16702261567115784},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14504650235176086},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.1423945128917694},{"id":"https://openalex.org/keywords/management-information-systems","display_name":"Management information systems","score":0.14107248187065125},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.09930294752120972}],"concepts":[{"id":"https://openalex.org/C156325361","wikidata":"https://www.wikidata.org/wiki/Q1152864","display_name":"Grounded theory","level":3,"score":0.733646810054779},{"id":"https://openalex.org/C189922023","wikidata":"https://www.wikidata.org/wiki/Q17056348","display_name":"Information governance","level":4,"score":0.663573145866394},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.6625973582267761},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4970145523548126},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4949495196342468},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.48814091086387634},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4879459738731384},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.43582695722579956},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4033166766166687},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.37908273935317993},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.2993715703487396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.29672569036483765},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.22049909830093384},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.18164893984794617},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.16702261567115784},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14504650235176086},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.1423945128917694},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.14107248187065125},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.09930294752120972},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-02-2014-0016","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2014-0016","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":63,"referenced_works":["https://openalex.org/W28133055","https://openalex.org/W47747804","https://openalex.org/W760593615","https://openalex.org/W834274199","https://openalex.org/W1511583883","https://openalex.org/W1584564756","https://openalex.org/W1600936130","https://openalex.org/W1963615444","https://openalex.org/W1964464614","https://openalex.org/W1968584218","https://openalex.org/W1971422931","https://openalex.org/W1978807326","https://openalex.org/W1978961276","https://openalex.org/W1988826963","https://openalex.org/W1989861176","https://openalex.org/W1991953824","https://openalex.org/W1993206200","https://openalex.org/W1993328537","https://openalex.org/W1997199359","https://openalex.org/W1997603734","https://openalex.org/W1997901747","https://openalex.org/W2016484055","https://openalex.org/W2027548841","https://openalex.org/W2031922755","https://openalex.org/W2035679603","https://openalex.org/W2038707768","https://openalex.org/W2039323049","https://openalex.org/W2047039064","https://openalex.org/W2053319398","https://openalex.org/W2055606170","https://openalex.org/W2059223910","https://openalex.org/W2061781550","https://openalex.org/W2064323125","https://openalex.org/W2070062084","https://openalex.org/W2070958191","https://openalex.org/W2072500584","https://openalex.org/W2077197861","https://openalex.org/W2089527867","https://openalex.org/W2096821336","https://openalex.org/W2103768768","https://openalex.org/W2119587968","https://openalex.org/W2122413203","https://openalex.org/W2124999700","https://openalex.org/W2129085046","https://openalex.org/W2130424546","https://openalex.org/W2143309592","https://openalex.org/W2148277253","https://openalex.org/W2149739119","https://openalex.org/W2150094159","https://openalex.org/W2156730552","https://openalex.org/W2160154797","https://openalex.org/W2162408126","https://openalex.org/W2165312609","https://openalex.org/W2278109028","https://openalex.org/W2318571320","https://openalex.org/W2330982494","https://openalex.org/W3124558050","https://openalex.org/W4236343326","https://openalex.org/W4237980526","https://openalex.org/W4250128425","https://openalex.org/W6601905391","https://openalex.org/W6608800149","https://openalex.org/W6683201047"],"related_works":["https://openalex.org/W1585855485","https://openalex.org/W3158620907","https://openalex.org/W2219986456","https://openalex.org/W4214629857","https://openalex.org/W1574179703","https://openalex.org/W2516800336","https://openalex.org/W3082241489","https://openalex.org/W3131697785","https://openalex.org/W2149739119","https://openalex.org/W1567258312"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,159,257,315],"The":[2,96,115,145,182,211,296,316],"purpose":[3],"of":[4,37,40,51,103,113,174,194,278,302,309,332,345,361,370,378],"this":[5,83,383],"study":[6,116,132,259,286,297,319],"is":[7,162,217,305,348],"to":[8,54,57,71,190,202,264],"develop":[9,170,265],"theoretically":[10],"grounded":[11,134,163],"and":[12,88,106,140,206,219,228,238,249,254,280,290,342,352,402],"empirically":[13],"derived":[14],"organizational":[15,21,281],"security":[16,22,59,94,107,156,373,412],"governance":[17,23,60,273,413],"(OSG)":[18,24],"objectives.":[19,129,210,267],"Developing":[20],"objectives":[25,75,91,97,146,235,274,293,334,380],"pose":[26],"significant":[27],"challenges":[28],"for":[29,92,151,154,240,294,355],"organizations":[30,65],"considering":[31],"the":[32,131,178,199,234,241,368,379],"ever-increasing":[33],"vulnerability":[34],"from":[35,100],"lack":[36],"or":[38],"misuse":[39],"appropriate":[41],"controls.":[42],"In":[43,62],"recent":[44],"years,":[45],"there":[46],"have":[47,406],"been":[48,408],"several":[49,359],"cases":[50],"colossal":[52],"losses":[53],"businesses":[55],"due":[56],"inadequate":[58],"measure.":[61],"many":[63],"cases,":[64],"do":[66],"not":[67,407],"even":[68],"know":[69],"as":[70,236],"what":[72],"their":[73],"ISG":[74],"might":[76],"be.":[77],"Following":[78],"an":[79,312],"extensive":[80,185],"empirical":[81],"study,":[82],"paper":[84],"proposes":[85,287],"6":[86,288],"fundamental":[87,239,253,289],"17":[89,291],"means":[90,237,292],"designing":[93],"governance.":[95,157,346],"were":[98],"developed":[99,381],"individual":[101,269,279],"values":[102,176,193,200,270,282,308],"information":[104,155],"technology":[105],"executives":[108],"across":[109,121],"a":[110,148,171,203,222,261,299,329,349,371],"wide":[111],"range":[112],"firms.":[114],"comprised":[117],"52":[118],"interview":[119],"respondents":[120],"9":[122],"firms,":[123],"which":[124,225,335,357],"resulted":[125],"in":[126,135,164,214,221,271,307,311,323,382,411],"23":[127],"OSG":[128,266,303,333,362],"Theoretically,":[130],"was":[133],"Catton\u2019s":[136],"(1959)":[137],"value":[138],"theory":[139],"Keeney\u2019s":[141],"(1992)":[142],"value-focused":[143,165,262],"thinking.":[144],"provide":[147],"useful":[149],"basis":[150],"strategic":[152],"planning":[153],"Design/methodology/approach":[158],"This":[160,258,285,347],"research":[161,384],"thinking":[166],"methodology.":[167],"Step":[168,196,215,231],"1:":[169],"comprehensive":[172,300,372],"list":[173,301],"personal":[175],"underlying":[177,192],"problem":[179],"being":[180],"explored.":[181],"researcher":[183],"undertakes":[184],"interviews,":[186],"using":[187],"relevant":[188],"probes,":[189],"elicit":[191],"respondents.":[195],"2:":[197],"change":[198],"enlisted":[201],"common":[204,223],"form":[205],"convert":[207],"them":[208],"into":[209,247,252,363],"data":[212],"collected":[213],"1":[216],"collated":[218],"presented":[220],"form,":[224],"enables":[226],"cross-comparison":[227],"easy":[229],"interpretation.":[230],"3:":[232],"classify":[233],"decision":[242],"context.":[243],"Objectives":[244],"are":[245],"clustered":[246],"groups":[248],"then":[250],"classified":[251,322],"means.":[255],"Findings":[256],"uses":[260],"approach":[263],"Incorporating":[268],"developing":[272],"would":[275],"facilitate":[276],"alignment":[277],"about":[283],"OSG.":[284,295],"provides":[298],"that":[304],"rooted":[306],"stakeholders":[310],"organization.":[313],"Originality/value":[314],"main":[317],"contributions":[318],"can":[320],"be":[321],"two":[324],"categories.":[325],"First,":[326],"it":[327],"represents":[328],"collective":[330],"set":[331],"touch":[336],"upon":[337],"technical,":[338],"formal,":[339],"informal,":[340],"moral":[341],"ethical":[343],"dimensions":[344],"unique,":[350],"synthesized":[351],"cohesive":[353],"framework":[354],"OSG,":[356],"incorporates":[358],"aspects":[360],"one":[364],"platform,":[365],"thus":[366],"allowing":[367],"development":[369,395],"management":[374],"program.":[375],"Second,":[376],"some":[377],"(\u201cestablish":[385],"corporate":[386],"control":[387,394,399],"strategy\u201d,":[388],"\u201cestablish":[389,392],"punitive":[390],"structure\u201d,":[391],"clear":[393],"process\u201d,":[396],"\u201censure":[397],"formal":[398],"assessment":[400],"functionality\u201d":[401],"\u201cmaximize":[403],"group":[404],"cohesiveness\u201d)":[405],"emphasized":[409],"enough":[410],"literature.":[414]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
