{"id":"https://openalex.org/W3034316877","doi":"https://doi.org/10.1108/ics-02-2020-0020","title":"The impact of information security management practices on organisational agility","display_name":"The impact of information security management practices on organisational agility","publication_year":2020,"publication_date":"2020-06-12","ids":{"openalex":"https://openalex.org/W3034316877","doi":"https://doi.org/10.1108/ics-02-2020-0020","mag":"3034316877"},"language":"en","primary_location":{"id":"doi:10.1108/ics-02-2020-0020","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2020-0020","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006084397","display_name":"Muhamad Khairulnizam Zaini","orcid":"https://orcid.org/0000-0001-6054-5756"},"institutions":[{"id":"https://openalex.org/I82724352","display_name":"Universiti Teknologi MARA","ror":"https://ror.org/05n8tts92","country_code":"MY","type":"education","lineage":["https://openalex.org/I82724352"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Muhamad Khairulnizam Zaini","raw_affiliation_strings":["Faculty of Information Management, Universiti Teknologi MARA, Shah Alam, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Information Management, Universiti Teknologi MARA, Shah Alam, Malaysia","institution_ids":["https://openalex.org/I82724352"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037409779","display_name":"Mohamad Noorman Masrek","orcid":"https://orcid.org/0000-0002-2730-5555"},"institutions":[{"id":"https://openalex.org/I82724352","display_name":"Universiti Teknologi MARA","ror":"https://ror.org/05n8tts92","country_code":"MY","type":"education","lineage":["https://openalex.org/I82724352"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohamad Noorman Masrek","raw_affiliation_strings":["Faculty of Information Management, Universiti Teknologi MARA, Shah Alam, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Information Management, Universiti Teknologi MARA, Shah Alam, Malaysia","institution_ids":["https://openalex.org/I82724352"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081425103","display_name":"Mad Khir Johari Abdullah Sani","orcid":"https://orcid.org/0000-0001-5968-5532"},"institutions":[{"id":"https://openalex.org/I82724352","display_name":"Universiti Teknologi MARA","ror":"https://ror.org/05n8tts92","country_code":"MY","type":"education","lineage":["https://openalex.org/I82724352"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mad Khir Johari Abdullah Sani","raw_affiliation_strings":["Faculty of Information Management, Universiti Teknologi MARA, Shah Alam, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Information Management, Universiti Teknologi MARA, Shah Alam, Malaysia","institution_ids":["https://openalex.org/I82724352"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006084397"],"corresponding_institution_ids":["https://openalex.org/I82724352"],"apc_list":null,"apc_paid":null,"fwci":3.3409,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.93521328,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"28","issue":"5","first_page":"681","last_page":"700"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11912","display_name":"Outsourcing and Supply Chain Management","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.6919000148773193},{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.6568064093589783},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.5588668584823608},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.5474151372909546},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5325597524642944},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4355012774467468},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.42366036772727966},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.4153668284416199},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.37710127234458923},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3085165023803711},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2481130063533783},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08444657921791077}],"concepts":[{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.6919000148773193},{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.6568064093589783},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.5588668584823608},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.5474151372909546},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5325597524642944},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4355012774467468},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.42366036772727966},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.4153668284416199},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.37710127234458923},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3085165023803711},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2481130063533783},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08444657921791077},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-02-2020-0020","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2020-0020","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W40842196","https://openalex.org/W125190211","https://openalex.org/W815057058","https://openalex.org/W1491359283","https://openalex.org/W1491477619","https://openalex.org/W1519000507","https://openalex.org/W1524466235","https://openalex.org/W1539483634","https://openalex.org/W1736209534","https://openalex.org/W1869081555","https://openalex.org/W1978795070","https://openalex.org/W1987258130","https://openalex.org/W1988050849","https://openalex.org/W1992820628","https://openalex.org/W2002655623","https://openalex.org/W2006253146","https://openalex.org/W2009823402","https://openalex.org/W2024488177","https://openalex.org/W2026428831","https://openalex.org/W2039295206","https://openalex.org/W2045298561","https://openalex.org/W2049159124","https://openalex.org/W2054994890","https://openalex.org/W2073990443","https://openalex.org/W2075986741","https://openalex.org/W2093796625","https://openalex.org/W2099222119","https://openalex.org/W2104532935","https://openalex.org/W2107621973","https://openalex.org/W2113778324","https://openalex.org/W2116955358","https://openalex.org/W2117499307","https://openalex.org/W2120261121","https://openalex.org/W2123709218","https://openalex.org/W2140956556","https://openalex.org/W2147270415","https://openalex.org/W2154250673","https://openalex.org/W2155516490","https://openalex.org/W2169201634","https://openalex.org/W2170551713","https://openalex.org/W2181366280","https://openalex.org/W2181606570","https://openalex.org/W2274083676","https://openalex.org/W2380016060","https://openalex.org/W2483540831","https://openalex.org/W2492331474","https://openalex.org/W2511909672","https://openalex.org/W2556995820","https://openalex.org/W2565253383","https://openalex.org/W2763405097","https://openalex.org/W2767728885","https://openalex.org/W2783243734","https://openalex.org/W2892670700","https://openalex.org/W2908054631","https://openalex.org/W2947514108","https://openalex.org/W2956765895","https://openalex.org/W2968874655","https://openalex.org/W3017727058","https://openalex.org/W3122877168","https://openalex.org/W3123722757","https://openalex.org/W4235678817","https://openalex.org/W6737701906"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W2072812638","https://openalex.org/W3126095231","https://openalex.org/W2352855287","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W2382526412","https://openalex.org/W4200071106","https://openalex.org/W1484755706"],"abstract_inverted_index":{"Purpose":[0],"This":[1,38,134,223],"study":[2,39,91,118,135,160,205,224,244],"aims":[3],"to":[4,8,73,78,100,171,215,249,274],"determine":[5],"the":[6,16,21,57,75,109,138,163,183,192,199,209,216,227,250,265,279],"extent":[7],"which":[9],"information":[10,184,219],"security":[11,220],"management":[12],"(ISM)":[13],"practices":[14,102,148,177,235,258],"impact":[15],"organisational":[17,150,262],"agility":[18,95,151,165,180,263],"by":[19,208],"examining":[20],"relationship":[22],"between":[23,230],"both":[24],"concepts.":[25],"Design/methodology/approach":[26],"A":[27],"quantitative":[28],"method":[29],"research":[30,228,252],"design":[31],"has":[32,119,136,225],"been":[33],"used":[34,72,157],"in":[35,84,103,158,189,203,242,246,264,268],"this":[36,85,90,117,159,204,243],"study.":[37,86],"was":[40,71,206],"conducted":[41],"throughout":[42],"Malaysia":[43,269],"with":[44],"a":[45,141],"total":[46],"of":[47,108,112,175,194,218,233,256],"250":[48],"valid":[49],"questionnaires":[50],"obtained":[51],"from":[52,56,89],"managers":[53],"and":[54,77,128,144,149,178,236,272],"executives":[55],"Multimedia":[58],"Super":[59],"Corridor":[60],"(MSC)-status":[61],"companies.":[62,105],"Structural":[63],"equation":[64],"modelling":[65],"(SEM)":[66],"using":[67],"partial":[68],"least":[69],"square":[70],"analyse":[74],"data":[76],"test":[79],"all":[80],"nine":[81,113],"hypotheses":[82,114],"developed":[83,115],"Findings":[87,88],"indicate":[92],"that":[93,167,259],"operational":[94],"(OA)":[96],"is":[97,270],"significantly":[98,214],"related":[99],"ISM":[101,147,176,234],"MSC-status":[104],"The":[106,153,238,254],"validation":[107],"structural":[110],"model":[111,239],"for":[116,140,196,278],"demonstrated":[120],"satisfactory":[121],"results,":[122],"exhibited":[123],"six":[124],"significant":[125],"direct":[126],"relationships":[127],"three":[129],"insignificant":[130],"relationships.":[131],"Research":[132],"limitations/implications":[133],"addressed":[137],"needs":[139],"comprehensive,":[142],"coherent":[143],"empirically":[145],"tested":[146],"framework.":[152],"current":[154],"theoretical":[155],"framework":[156,201],"emphasised":[161],"on":[162],"ISM\u2013organisational":[164],"dimensions":[166],"are":[168],"predominantly":[169],"important":[170],"ascertain":[172],"high":[173],"level":[174,181],"perceived":[179],"among":[182],"technology":[185],"(IT)":[186],"business":[187],"companies":[188],"Malaysia.":[190],"With":[191],"application":[193],"SEM":[195],"powerful":[197],"analysis,":[198],"empirical-based":[200],"established":[202],"validated":[207],"empirical":[210],"findings,":[211],"thus":[212],"contributing":[213],"field":[217],"(InfoSec).":[221],"Originality/value":[222],"filled":[226],"gap":[229],"different":[231],"constructs":[232],"OA.":[237],"put":[240],"forth":[241],"contributes":[245,273],"several":[247],"ways":[248],"InfoSec":[251,257],"community.":[253],"recognition":[255],"could":[260],"facilitate":[261],"IT":[266],"industry":[267],"vital":[271],"more":[275],"value":[276],"creation":[277],"organisations.":[280]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
