{"id":"https://openalex.org/W1557322749","doi":"https://doi.org/10.1108/imcs-05-2013-0035","title":"Impact of information security initiatives on supply chain performance","display_name":"Impact of information security initiatives on supply chain performance","publication_year":2014,"publication_date":"2014-10-30","ids":{"openalex":"https://openalex.org/W1557322749","doi":"https://doi.org/10.1108/imcs-05-2013-0035","mag":"1557322749"},"language":"en","primary_location":{"id":"doi:10.1108/imcs-05-2013-0035","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imcs-05-2013-0035","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013135395","display_name":"Sindhuja PN","orcid":null},"institutions":[{"id":"https://openalex.org/I4210138731","display_name":"ICFAI Foundation for Higher Education","ror":"https://ror.org/04p3pp808","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210138731"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sindhuja PN","raw_affiliation_strings":["Department of IT and Operations, IBS Hyderabad, a Constituent of IFHE, Deemed to be University, Hyderabad, India","(Department of IT and Operations, IBS Hyderabad, a Constituent of IFHE, Deemed to be University, Hyderabad, India)"],"affiliations":[{"raw_affiliation_string":"Department of IT and Operations, IBS Hyderabad, a Constituent of IFHE, Deemed to be University, Hyderabad, India","institution_ids":["https://openalex.org/I4210138731"]},{"raw_affiliation_string":"(Department of IT and Operations, IBS Hyderabad, a Constituent of IFHE, Deemed to be University, Hyderabad, India)","institution_ids":["https://openalex.org/I4210138731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5013135395"],"corresponding_institution_ids":["https://openalex.org/I4210138731"],"apc_list":null,"apc_paid":null,"fwci":3.1556,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.92144035,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"22","issue":"5","first_page":"450","last_page":"473"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.9717000126838684,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.7515616416931152},{"id":"https://openalex.org/keywords/supply-chain-management","display_name":"Supply chain management","score":0.6289553046226501},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5965235829353333},{"id":"https://openalex.org/keywords/supply-chain-risk-management","display_name":"Supply chain risk management","score":0.5224817395210266},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.49906063079833984},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.45508864521980286},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.43922606110572815},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4270504117012024},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4208984971046448},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.410763680934906},{"id":"https://openalex.org/keywords/service-management","display_name":"Service management","score":0.3746577501296997},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3467959761619568},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.24708417057991028},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.17837876081466675},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1728897988796234},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.13113835453987122},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12425115704536438}],"concepts":[{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.7515616416931152},{"id":"https://openalex.org/C44104985","wikidata":"https://www.wikidata.org/wiki/Q492886","display_name":"Supply chain management","level":3,"score":0.6289553046226501},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5965235829353333},{"id":"https://openalex.org/C192639820","wikidata":"https://www.wikidata.org/wiki/Q1114469","display_name":"Supply chain risk management","level":5,"score":0.5224817395210266},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.49906063079833984},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.45508864521980286},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.43922606110572815},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4270504117012024},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4208984971046448},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.410763680934906},{"id":"https://openalex.org/C48840187","wikidata":"https://www.wikidata.org/wiki/Q689042","display_name":"Service management","level":4,"score":0.3746577501296997},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3467959761619568},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.24708417057991028},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.17837876081466675},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1728897988796234},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.13113835453987122},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12425115704536438},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/imcs-05-2013-0035","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imcs-05-2013-0035","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":85,"referenced_works":["https://openalex.org/W190206640","https://openalex.org/W220040812","https://openalex.org/W629611620","https://openalex.org/W751842804","https://openalex.org/W1530267349","https://openalex.org/W1530327125","https://openalex.org/W1531814668","https://openalex.org/W1533396945","https://openalex.org/W1536418809","https://openalex.org/W1558083196","https://openalex.org/W1558148421","https://openalex.org/W1567353878","https://openalex.org/W1579371649","https://openalex.org/W1586330224","https://openalex.org/W1591380056","https://openalex.org/W1602619638","https://openalex.org/W1608426814","https://openalex.org/W1693877936","https://openalex.org/W1704743582","https://openalex.org/W1964165805","https://openalex.org/W1971422931","https://openalex.org/W1972167346","https://openalex.org/W1974888424","https://openalex.org/W1976878590","https://openalex.org/W1978854302","https://openalex.org/W1981337458","https://openalex.org/W1985854708","https://openalex.org/W1987895232","https://openalex.org/W1988315607","https://openalex.org/W1990562690","https://openalex.org/W1993848086","https://openalex.org/W1994146145","https://openalex.org/W1995909523","https://openalex.org/W1997603734","https://openalex.org/W2004950695","https://openalex.org/W2007996913","https://openalex.org/W2012118314","https://openalex.org/W2013587720","https://openalex.org/W2026736862","https://openalex.org/W2030534018","https://openalex.org/W2037069781","https://openalex.org/W2037104605","https://openalex.org/W2046474194","https://openalex.org/W2046778140","https://openalex.org/W2047039064","https://openalex.org/W2049033242","https://openalex.org/W2049571112","https://openalex.org/W2052489129","https://openalex.org/W2053154970","https://openalex.org/W2054994890","https://openalex.org/W2055847123","https://openalex.org/W2063466632","https://openalex.org/W2065579757","https://openalex.org/W2068155429","https://openalex.org/W2070664721","https://openalex.org/W2075986741","https://openalex.org/W2076654702","https://openalex.org/W2077197861","https://openalex.org/W2081657462","https://openalex.org/W2081683552","https://openalex.org/W2087107498","https://openalex.org/W2088489410","https://openalex.org/W2091494072","https://openalex.org/W2093796625","https://openalex.org/W2104035395","https://openalex.org/W2119587968","https://openalex.org/W2121164303","https://openalex.org/W2126826472","https://openalex.org/W2131379682","https://openalex.org/W2156438052","https://openalex.org/W2163473988","https://openalex.org/W2164683131","https://openalex.org/W2167071750","https://openalex.org/W2182469024","https://openalex.org/W2189084635","https://openalex.org/W2294662036","https://openalex.org/W2340621053","https://openalex.org/W2605399176","https://openalex.org/W2992559047","https://openalex.org/W2992579980","https://openalex.org/W3015634246","https://openalex.org/W3152182718","https://openalex.org/W4210782959","https://openalex.org/W4236343326","https://openalex.org/W6622314568"],"related_works":["https://openalex.org/W2373650738","https://openalex.org/W2123950128","https://openalex.org/W1969526114","https://openalex.org/W1988395163","https://openalex.org/W1510996424","https://openalex.org/W4312185910","https://openalex.org/W2902631542","https://openalex.org/W3136985209","https://openalex.org/W4328025638","https://openalex.org/W1489497658"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,46,120,158,211],"The":[2,91],"purpose":[3],"of":[4,15,122,170,183,230,254,260,269],"this":[5,123,224,248],"empirical":[6,258],"research":[7,166,225],"is":[8,226],"to":[9,11,35,78,88,103,108,179,236,251],"attempt":[10],"explore":[12],"the":[13,105,110,162,168,181,252],"effect":[14],"information":[16,29,50,171,187,202,243,262],"security":[17,30,51,56,133,172,188,203,263,274],"initiatives":[18,265],"(ISI)":[19],"on":[20,39,48],"supply":[21,40,54,75,145,153,174,192,207,215,222],"chain":[22,41,55,76,146,154,193,208,216],"performance,":[23],"considering":[24],"various":[25,89],"intra-":[26,137],"and":[27,43,53,64,72,95,107,131,138,200,241,272],"inter-organization":[28],"aspects":[31,134],"that":[32,126,232,246],"are":[33,141,177],"deemed":[34],"have":[36],"an":[37,136,233,257],"influence":[38],"operations":[42],"performance.":[44,155,209],"Design/methodology/approach":[45],"Based":[47],"extant":[49],"management":[52,57,169,264],"literature,":[58],"a":[59,191,267],"conceptual":[60],"model":[61],"was":[62,70],"developed":[63,71],"validated.":[65],"A":[66],"questionnaire":[67],"survey":[68],"instrument":[69],"administered":[73],"among":[74,221],"managers":[77],"collect":[79],"data.":[80],"Data":[81],"were":[82,117],"collected":[83],"from":[84],"197":[85],"organizations":[86],"belonging":[87],"sectors.":[90],"study":[92,124,160,249],"used":[93],"exploratory":[94],"confirmatory":[96],"factor":[97],"analysis":[98,259],"for":[99,164,205,238],"data":[100],"analysis.":[101],"Further,":[102],"test":[104],"hypotheses":[106],"fit":[109],"theoretical":[111],"model,":[112],"structural":[113],"equation":[114],"modeling":[115],"techniques":[116],"used.":[118],"Findings":[119,176],"Results":[121],"indicate":[125],"ISI,":[127],"comprising":[128],"technical,":[129,198,270],"formal":[130,199,271],"informal":[132,201,273],"in":[135,149,167,173,190,228],"inter-organizational":[139],"environment,":[140],"positively":[142,151],"associated":[143],"with":[144,185,256],"operations,":[147],"which,":[148],"turn,":[150],"affects":[152],"Research":[156],"limitations/implications":[157],"This":[159],"provides":[161],"foundation":[163],"future":[165],"chains.":[175],"expected":[178],"provide":[180],"communities":[182],"practice":[184],"better":[186],"decision-making":[189],"context,":[194],"by":[195],"clearly":[196],"formulating":[197],"policies":[204],"improving":[206],"Originality/value":[210],"In":[212,245],"today\u2019s":[213],"global":[214],"environment":[217],"where":[218],"competition":[219],"prevails":[220],"chains,":[223],"relevant":[227],"terms":[229],"capability":[231],"organization":[234],"has":[235],"acquire":[237],"managing":[239],"internal":[240],"external":[242],"security.":[244],"sense,":[247],"contributes":[250],"body":[253],"knowledge":[255],"organizations\u2019":[261],"as":[266],"blend":[268],"aspects.":[275]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
