{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:44:40Z","timestamp":1742964280085,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319072920"},{"type":"electronic","value":"9783319072937"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07293-7_3","type":"book-chapter","created":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T05:31:11Z","timestamp":1401687071000},"page":"25-36","source":"Crossref","is-referenced-by-count":1,"title":["The Impact of Business-IT Alignment on Information Security Process"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"El Mekawy","sequence":"first","affiliation":[]},{"given":"Bilal","family":"AlSabbagh","sequence":"additional","affiliation":[]},{"given":"Stewart","family":"Kowalski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","volume-title":"Risk","author":"J. Adams","year":"1995","unstructured":"Adams, J.: Risk. Taylor & Francis, London (1995)"},{"key":"3_CR2","first-page":"84","volume-title":"Proceedings of the Information Security Curriculum Development Conference","author":"W.A. Al-Hamdani","year":"2009","unstructured":"Al-Hamdani, W.A.: Non risk assessment information security assurance model. In: Proceedings of the Information Security Curriculum Development Conference, pp. 84\u201390. ACM, Kennesaw (2009)"},{"key":"3_CR3","unstructured":"AlSabbagh, B., Kowalski, S.: Developing Social Metrics for Security \u2013 Modeling the Security Culture of IT Workers Individuals (Case Study). In: Proceedings of the 5th International Conference on Communications, Computers and Applications (2012)"},{"key":"3_CR4","unstructured":"Amer, S.H., Hamilton, J.A.: Understanding security architecture. In: Proceedings of the Spring Simulation Multi-conference, Society for Computer Simulation, Canada (2008)"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.jsis.2004.08.002","volume":"13","author":"D. Avison","year":"2004","unstructured":"Avison, D., Jones, J., Powell, P., Wilson, D.: Using and Validating the Strategic Alignment Model. Journal of Strategic Information Systems\u00a013, 223\u2013246 (2004)","journal-title":"Journal of Strategic Information Systems"},{"key":"3_CR6","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-15257-3_4","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"R. Barabanov","year":"2010","unstructured":"Barabanov, R., Kowalski, S.: Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol.\u00a0330, pp. 31\u201342. Springer, Heidelberg (2010)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Beautement, A., Sasse, M.A., Wonham, M.: The compliance budget: managing security behaviour in organisations. In: NSPW 2008, pp. 47\u201358 (2008)","DOI":"10.1145\/1595676.1595684"},{"issue":"4","key":"3_CR8","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1057\/palgrave.jit.2000080","volume":"21","author":"H. Benbya","year":"2006","unstructured":"Benbya, H., McKelvey, B.: Using Coevolutionary and Complexity Theories to Improve IS Alignment: A multi-level approach. Journal of Information Tech.\u00a021(4), 284\u2013298 (2006)","journal-title":"Journal of Information Tech."},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1287\/isre.8.2.125","volume":"8","author":"Y.E. Chan","year":"1997","unstructured":"Chan, Y.E., Huff, S.L., Barclay, D.W., Copeland, D.G.: Business Strategic Orientation, IS Strategic Orientation, and Strategic Alignment. ISR\u00a08(2), 125\u2013150 (1997)","journal-title":"ISR"},{"key":"3_CR10","first-page":"97","volume":"1","author":"Y.E. Chan","year":"2002","unstructured":"Chan, Y.E.: Why haven\u2019t we mastered alignment? The Importance of the informal organization structure. MIS Quarterly\u00a01, 97\u2013112 (2002)","journal-title":"MIS Quarterly"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Chan, Y.E., Reich, B.H.: IT alignment: what have we learned? Journal of Information Technology\u00a022(4), 297\u2013315 (2007b) (advance online publication)","DOI":"10.1057\/palgrave.jit.2000109"},{"issue":"4","key":"3_CR12","first-page":"21","volume":"18","author":"N.F. Doherty","year":"2005","unstructured":"Doherty, N.F., Fulford, H.: Do information security policies reduce the incidence of security breaches: an exploratory analysis. IRM Journal\u00a018(4), 21\u201338 (2005)","journal-title":"IRM Journal"},{"key":"3_CR13","unstructured":"El-Mekawy, M., Perjons, E., Rusu, L.:\u00a0A Framework to Support Practitioners in Evaluating Business-IT Alignment Models. AIS Electronic Library (2013)"},{"issue":"4","key":"3_CR14","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The Economics of Information Security Investment. ACM Transactions on Information and Systems Security\u00a05(4), 438\u2013457 (2002)","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"3_CR15","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: CSI\/FBI Computer Crime and Security Survey. Computer Security Institute (2005)"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1147\/sj.382.0472","volume":"32","author":"J. Henderson","year":"1993","unstructured":"Henderson, J., Venkatraman, N.: Strategic alignment: leveraging information technology for transforming organizations. IBM Systems Journal\u00a032(1), 472\u2013484 (1993)","journal-title":"IBM Systems Journal"},{"key":"3_CR17","unstructured":"Herath, H.S.B., Herath, T.C.: Cyber-Insurance: Copula Pricing Framework and Implications for Risk Management. In: Proceedings of the Sixth Workshop on the Economics of Information Security, Carnegie Mellon University, June 7-8 (2007)"},{"key":"3_CR18","unstructured":"Huang, C.D., Hu, Q., Behara, R.S.: Investment in information security by a risk-averse firm. In: Proceedings of the 2005 Softwars Conference, Las Vegas, Nevada (2005)"},{"key":"3_CR19","unstructured":"Huang, C.D., Hu, Q., Behara, R.S.: Economics of Information Security Investment in the Case of Simultaneous Attacks. In: Proceedings of the Fifth Workshop on the Economics of Information Security, Cambridge University, pp. 26\u201328 (2006)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Johnson, M.E., Goetz, E.: Embedding Information Security into the Organisation. IEEE Security & Privacy 16 \u2013 24 (2007)","DOI":"10.1109\/MSP.2007.59"},{"issue":"4","key":"3_CR21","first-page":"265","volume":"9","author":"G.S. Kearns","year":"2000","unstructured":"Kearns, G.S., Lederer, A.L.: The Effect of Strategic Alignment on the use of IS-Based Resources for Competitive Advantage. Journal of Strategic IS\u00a09(4), 265\u2013293 (2000)","journal-title":"Journal of Strategic IS"},{"key":"3_CR22","unstructured":"Kowalski, S.: The SBC Model: Modeling the System for Consensus. In: Proceedings of the 7th IFIP TC11 Conference on Information Security, Brighton, UK (1991)"},{"key":"3_CR23","unstructured":"Kowalski, S., Boden, M.: Value Based Risk Analysis: The Key to Successful Commercial Security Target for the Telecom Industry. In: 2nd Annual International Common Criteria CC Conference, Ottawa (2002)"},{"key":"3_CR24","unstructured":"Kowalski, S., Edwards, N.: A security and trust framework for a Wireless World: A Cross Issue Approach, Wireless World Research Forum no. 12, Toronto, Canada (2004)"},{"key":"3_CR25","unstructured":"Kumar, V., Telang, R., Mukhopahhyay, T.: Optimally securing interconnected information systems and assets. In: 6th Workshop on the Economics of IS, CM University (2007)"},{"key":"3_CR26","unstructured":"Lacity, M.C., Willcocks, L., Feeny, D.: IT outsourcing: maximise flexibility and control. Harvard Business (1995)"},{"issue":"4","key":"3_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083205","volume":"30","author":"S.W. Lee","year":"2005","unstructured":"Lee, S.W., Gandhi, R.A., Ahn, G.J.: Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. SIGSOFT Softw. Eng. Notes\u00a030(4), 1\u20137 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"issue":"11","key":"3_CR28","first-page":"230","volume":"31","author":"J. Leonard","year":"2012","unstructured":"Leonard, J., Seddon, P.: A Meta-model of Alignment. Communications of the Association for Information Systems\u00a031(11), 230\u2013259 (2012)","journal-title":"Communications of the Association for Information Systems"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Luftman, J.: Assessing Business-IT Alignment Maturity. Communications of the Association for Information Systems 4, Article 14 (2000)","DOI":"10.17705\/1CAIS.00414"},{"key":"3_CR30","volume-title":"Managing IT Resources","author":"J.N. Luftman","year":"2004","unstructured":"Luftman, J.N.: Managing IT Resources. Prentice Hall, Upper Saddle (2004)"},{"issue":"1","key":"3_CR31","first-page":"49","volume":"9","author":"J. Luftman","year":"2010","unstructured":"Luftman, J., Ben-Zvi, T.: Key Issues for IT Executives: Difficult Economy\u2019s Impact on IT. MIS Quarterly Executive\u00a09(1), 49\u201359 (2010)","journal-title":"MIS Quarterly Executive"},{"key":"3_CR32","unstructured":"Oltedal, S., Moen, B., Klempe, H., Rundmo, T.: Explaining Risk Perception. An evaluation of cultural theory. Norwegian University of Science and Technology (2004)"},{"key":"3_CR33","unstructured":"Ogut, H., Menon, N., Raghunathan, S.: Cyber Insurance and IT security investment: Impact of interdependent risk. In: Workshop on the Economics of Information Security, WEIS 2005, Kennedy School of Government, Harvard University, Cambridge, Mass. (2005)"},{"issue":"1","key":"3_CR34","doi-asserted-by":"publisher","first-page":"81","DOI":"10.2307\/3250980","volume":"24","author":"B.H. Reich","year":"2000","unstructured":"Reich, B.H., Benbasat, I.: Factors That Influence The Social Dimension of Alignment Between Business And IT Objectives. MIS Quarterly\u00a024(1), 81\u2013113 (2000)","journal-title":"MIS Quarterly"},{"issue":"1","key":"3_CR35","first-page":"11","volume":"12","author":"R. Sabherwal","year":"2001","unstructured":"Sabherwal, R., Chan, Y.E.: Alignment Between Business and IS Strategies: A Study of Prospectors, Analyzers, and Defenders. IS Research\u00a012(1), 11\u201333 (2001)","journal-title":"IS Research"},{"key":"3_CR36","unstructured":"Saleh, M.: Information Security Maturity Model. Journal of IJCSS\u00a05(3) (2011)"},{"issue":"1","key":"3_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJASS.2007.013813","volume":"1","author":"M. Schwaninger","year":"2007","unstructured":"Schwaninger, M.: From dualism to complementarity: a systemic concept for the research process. International Journal of Applied Systemic Studies\u00a01(1), 3\u201314 (2007)","journal-title":"International Journal of Applied Systemic Studies"},{"issue":"10","key":"3_CR38","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1108\/EUM0000000006521","volume":"39","author":"T. Smaczny","year":"2001","unstructured":"Smaczny, T.: Is an alignment between business and information technology the appropriate paradigm to manage IT in today\u2019s organisations? Management Decision\u00a039(10), 797\u2013802 (2001)","journal-title":"Management Decision"},{"issue":"4","key":"3_CR39","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1080\/10580530903245705","volume":"26","author":"M. Tarafdar","year":"2009","unstructured":"Tarafdar, M., Qrunfleh, S.: IT-Business Alignment: A Two-Level Analysis. Information Systems Management\u00a026(4), 338\u2013349 (2009)","journal-title":"Information Systems Management"},{"key":"3_CR40","unstructured":"Whitman, M.E., Mattord, H.J.: Principles of Information Security. Thomson Course Tech. (2003)"},{"issue":"2","key":"3_CR41","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1080\/07421222.1999.11518249","volume":"16","author":"J.T.M. Zee Van Der","year":"1999","unstructured":"Van Der Zee, J.T.M., De Jong, B.: Alignment is Not Enough: Integrating business and information technology management with the balanced business scoreboard. Journal of Management Information Systems\u00a016(2), 137\u2013156 (1999)","journal-title":"Journal of Management Information Systems"},{"issue":"5","key":"3_CR42","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2004.05.002","volume":"23","author":"B. Solms von","year":"2004","unstructured":"von Solms, B., von Solms, R.: The ten deadly sins of information security management. Computers & Security\u00a023(5), 371\u2013376 (2004)","journal-title":"Computers & Security"},{"key":"3_CR43","unstructured":"Yee, K.P.: User Interaction Design for Secure Systems. In: Faith Cranor, L., Garfinkel, S. (eds.) Security and Usability: Designing Secure Systems that People Can Use, pp. 13\u201330. O\u2019Reilly Books (2005)"}],"container-title":["Lecture Notes in Computer Science","HCI in Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07293-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:22:05Z","timestamp":1582413725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07293-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319072920","9783319072937"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07293-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}