{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:55:02Z","timestamp":1771890902728,"version":"3.50.1"},"reference-count":74,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2011,7,19]],"date-time":"2011-07-19T00:00:00Z","timestamp":1311033600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7,19]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This research aims to examine the relationship between information security strategy and organization performance, with organizational capabilities as important factors influencing successful implementation of information security strategy and organization performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Based on existing literature in strategic management and information security, a theoretical model was proposed and validated. A self\u2010administered survey instrument was developed to collect empirical data. Structural equation modeling was used to test hypotheses and to fit the theoretical model.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Evidence suggests that organizational capabilities, encompassing the ability to develop high\u2010quality situational awareness of the current and future threat environment, the ability to possess appropriate means, and the ability to orchestrate the means to respond to information security threats, are positively associated with effective implementation of information security strategy, which in turn positively affects organization performance. However, there is no significant relationship between decision making and information security strategy implementation success.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The study provides a starting point for further research on the role of decision\u2010making in information security.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Findings are expected to yield practical value for business leaders in understanding the viable predisposition of organizational capabilities in the context of information security, thus enabling firms to focus on acquiring the ones indispensable for improving organization performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This study provides the body of knowledge with an empirical analysis of organization's information security capabilities as an aggregation of sense making, decision\u2010making, asset availability, and operations management constructs.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685221111153546","type":"journal-article","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T10:59:19Z","timestamp":1311591559000},"page":"155-176","source":"Crossref","is-referenced-by-count":34,"title":["Impacts of organizational capabilities in information security"],"prefix":"10.1108","volume":"19","author":[{"given":"Jacqueline H.","family":"Hall","sequence":"first","affiliation":[]},{"given":"Shahram","family":"Sarkani","sequence":"additional","affiliation":[]},{"given":"Thomas A.","family":"Mazzuchi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020920053819100_b1","unstructured":"Alberts, D. (2003), Information Age Transformation: Getting to a 21st Century Military, CCRP Publication, Washington, DC."},{"key":"key2022020920053819100_b2","unstructured":"Alberts, D. and Hayes, R.E. (2003), Power to the Edge: Command, Control in the Information Age, CCRP Publication, Washington, DC."},{"key":"key2022020920053819100_b3","doi-asserted-by":"crossref","unstructured":"Alberts, D., Garstka, J.J., Hayes, R.E. and Signori, D.T. (2001), Understanding Information Age Warfare, CCRP Publication, Washington, DC.","DOI":"10.21236\/ADA386374"},{"key":"key2022020920053819100_b4","unstructured":"Allen, J. (2005), Governing for Enterprise Security, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, available at: www.sei.cmu.edu\/reports\/05tn023.pdf (accessed 11 February 2010)."},{"key":"key2022020920053819100_b5","unstructured":"Amaio, T.E. (2009), \u201cExploring and examining the business value of information security: corporate executives' perceptions\u201d, PhD diss., Northcentral University, Prescott, AZ."},{"key":"key2022020920053819100_b6","doi-asserted-by":"crossref","unstructured":"Anderson, E. and Choobineh, J. (2008), \u201cEnterprise information security strategies\u201d, Computers and Security, Vol. 27 Nos 1\u20102, pp. 22\u20109.","DOI":"10.1016\/j.cose.2008.03.002"},{"key":"key2022020920053819100_b7","doi-asserted-by":"crossref","unstructured":"Anderson, J.C. and Gerbing, D.W. (1988), \u201cStructural equation modeling in practice: a review and recommended two\u2010step approach\u201d, Psychological Bulletin, Vol. 103 No. 3, pp. 411\u201023.","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"key2022020920053819100_b8","unstructured":"Ansoff, I. (1965), Corporate Strategy, Penguin Books, New York, NY."},{"key":"key2022020920053819100_b9","doi-asserted-by":"crossref","unstructured":"Barney, J. (1991), \u201cFirm resources and sustained competitive advantage\u201d, Journal of Management, Vol. 17 No. 1, pp. 99\u2010120.","DOI":"10.1177\/014920639101700108"},{"key":"key2022020920053819100_b10","doi-asserted-by":"crossref","unstructured":"Barney, J.B. and Zajac, E.J. (1994), \u201cCompetitive organizational behavior: of competitive advantage\u201d, Strategic Management Journal, Vol. 15, S1, pp. 5\u20109.","DOI":"10.1002\/smj.4250150902"},{"key":"key2022020920053819100_b12","doi-asserted-by":"crossref","unstructured":"Bollen, K.A. (1989), Structural Equations with Latent Variables, Wiley, New York, NY.","DOI":"10.1002\/9781118619179"},{"key":"key2022020920053819100_b13","doi-asserted-by":"crossref","unstructured":"Bourque, L.B. and Fielder, E.P. (2003), How to Conduct Self\u2010Administered and Mail Survey, 2nd ed., Sage Publications, Thousand Oaks, CA.","DOI":"10.4135\/9781412984430"},{"key":"key2022020920053819100_b14","unstructured":"Byrne, B. (2001), Structural Equation Modeling with Amos: Basic Concepts, Applications, and Programming, Lawrence Erlbaum Associates, Mahwah, NJ."},{"key":"key2022020920053819100_b15","unstructured":"Caralli, R.A. (2004), Managing for Enterprise Security, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, available at: www.sei.cmu.edu\/reports\/04tn046.pdf (accessed 11 February 2010)."},{"key":"key2022020920053819100_b16","doi-asserted-by":"crossref","unstructured":"Chang, S.E. and Ho, C.B. (2006), \u201cOrganizational factors to the effectiveness of implementing information security management\u201d, Industrial Management & Data Systems, Vol. 106 No. 3, pp. 345\u201061.","DOI":"10.1108\/02635570610653498"},{"key":"key2022020920053819100_b17","doi-asserted-by":"crossref","unstructured":"Cockburn, I.M., Henderson, R.M. and Stern, S. (2000), \u201cUntangling the origins of competitive advantage\u201d, Strategic Management Journal, Vol. 21 Nos 10\/11, pp. 1123\u201045.","DOI":"10.1002\/1097-0266(200010\/11)21:10\/11<1123::AID-SMJ130>3.0.CO;2-R"},{"key":"key2022020920053819100_b18","doi-asserted-by":"crossref","unstructured":"Collis, D.J. (1994), \u201cHow valuable are organizational capabilities?\u201d, Strategic Management Journal, Vol. 15, pp. 143\u201052.","DOI":"10.1002\/smj.4250150910"},{"key":"key2022020920053819100_b19","unstructured":"Deloitte (2008), \u201cGaining momentum: the 2008 energy & resources global security survey\u201d, available at: www.deloitte.com\/assets\/Dcom\u2010Turkey\/LocalAssets\/Documents\/Turkey\u2010En_ers_ER\u2010SecuritySurvey_220808.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b20","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M. and Martin, J.A. (2000), \u201cDynamic capabilities: what are they?\u201d, Strategic Management Journal, Vol. 21 Nos 10\u201011, pp. 1105\u201021.","DOI":"10.1002\/1097-0266(200010\/11)21:10\/11<1105::AID-SMJ133>3.0.CO;2-E"},{"key":"key2022020920053819100_b21","unstructured":"Ernst & Young (2007), \u201cErnst & Young 2007's global information security survey\u201d, available at: www2.eycom.ch\/publications\/items\/2007_giss\/2007_ey_giss.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b22","unstructured":"Ernst & Young (2008), \u201cErnst & Young 2008's global information security survey\u201d, available at: www.ey.com\/Publication\/vwLUAssets\/GISS_2008\/$FILE\/GISS2008.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b23","doi-asserted-by":"crossref","unstructured":"Ezingeard, J., McFadzean, E. and Birchall, D. (2005), \u201cA model of information assurance benefits\u201d, Information Systems Management, Vol. 22 No. 2, pp. 20\u20109.","DOI":"10.1201\/1078\/45099.22.2.20050301\/87274.3"},{"key":"key2022020920053819100_b24","unstructured":"FFIEC (2006), Information Security Booklet, available at: www.ffiec.gov\/ffiecinfobase\/booklets\/information_security\/information_security.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b25","doi-asserted-by":"crossref","unstructured":"Fornell, C. and Larcker, D.F. (1981), \u201cEvaluating structural equation models with unobservable variables and measurement error\u201d, Journal of Marketing Research, Vol. 18 No. 1, pp. 39\u201050.","DOI":"10.1177\/002224378101800104"},{"key":"key2022020920053819100_b26","unstructured":"Fratto, M. (2009), \u201c2009 strategic security survey\u201d, available at: http:\/\/i.cmpnet.com\/custom\/strategicsecurity\/assets\/InformationWeek_Analytics_2009_Strategic_Security_Survey.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b27","doi-asserted-by":"crossref","unstructured":"Gold, A.H., Malhotra, A. and Segars, A.H. (2001), \u201cKnowledge management: an organizational capabilities perspective\u201d, Journal of Management Information Systems, Vol. 18 No. 1, pp. 185\u2010212.","DOI":"10.1080\/07421222.2001.11045669"},{"key":"key2022020920053819100_b28","doi-asserted-by":"crossref","unstructured":"Grant, R.M. (1991), \u201cThe resource\u2010based theory of competitive advantage: implications for strategy formulation\u201d, California Management Review, Vol. 33 No. 3, pp. 114\u201035.","DOI":"10.2307\/41166664"},{"key":"key2022020920053819100_b29","unstructured":"Hair, J., Tatham, R.L., Anderson, R.E. and Black, W. (2006), Multivariate Data Analysis, 6th ed., Pearson Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022020920053819100_b31","doi-asserted-by":"crossref","unstructured":"Hu, L. and Bentler, P.M. (1999), \u201cCutoff criteria for fit indexes in covariance structure analysis' conventional criteria versus new alternatives\u201d, Structural Equation Modeling, Vol. 6 No. 1, pp. 1\u201055.","DOI":"10.1080\/10705519909540118"},{"key":"key2022020920053819100_b32","doi-asserted-by":"crossref","unstructured":"Huang, C.D. and Hu, Q. (2007), \u201cAchieving IT\u2010business strategic alignment via enterprise\u2010wide implementation of balanced scorecards\u201d, Information Systems Management, Vol. 24 No. 2, pp. 173\u201084.","DOI":"10.1080\/10580530701239314"},{"key":"key2022020920053819100_b33","unstructured":"ISACA (2009), \u201cAn introduction to the business model for information security\u201d, available at: www.isaca.org\/Knowledge\u2010Center\/Research\/ResearchDeliverables\/Pages\/An\u2010Introduction\u2010to\u2010the\u2010Business\u2010Model\u2010for\u2010Information\u2010Security.aspx (accessed 28 October 2010)."},{"key":"key2022020920053819100_b34","doi-asserted-by":"crossref","unstructured":"Kankanhalli, A., Teo, H., Tan, B.C.Y. and Wei, K. (2003), \u201cAn integrative study of information systems security effectiveness\u201d, International Journal of Information Management, Vol. 23 No. 2, pp. 139\u201054.","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"key2022020920053819100_b35","unstructured":"Kaplan, R.S. and Norton, D.P. (2007), \u201cUsing the balanced scorecard as a strategic management system\u201d, Harvard Business Review, Vol. 85 Nos 7\/8, pp. 150\u201061."},{"key":"key2022020920053819100_b36","doi-asserted-by":"crossref","unstructured":"Kelly, D. and Amburgey, T.L. (1991), \u201cOrganizational inertia and momentum\u201d, The Academy of Management Journal, Vol. 34 No. 3, pp. 591\u2010612.","DOI":"10.2307\/256407"},{"key":"key2022020920053819100_b37","unstructured":"Kim, G. (2004), \u201cDoes security set the right goals?\u201d, Security Management, Vol. 48 No. 6, p. 182."},{"key":"key2022020920053819100_b39","unstructured":"Kline, R. (2005), Principles and Practice of Structural Equation Modeling, 2nd ed., Guilford, New York, NY."},{"key":"key2022020920053819100_b40","doi-asserted-by":"crossref","unstructured":"Knapp, K.J., Marshall, T.E., Rainer, R.K. and Ford, F.N. (2006), \u201cInformation security: management's effect on culture and policy\u201d, Information Management & Computer Security, Vol. 14 No. 1, pp. 24\u201036.","DOI":"10.1108\/09685220610648355"},{"key":"key2022020920053819100_b41","doi-asserted-by":"crossref","unstructured":"Kusunoki, K., Nonaka, I. and Nagata, A. (1998), \u201cOrganizational capabilities in product development of Japanese firms: a conceptual framework and empirical findings\u201d, Organization Science, Vol. 9 No. 6, pp. 699\u2010718.","DOI":"10.1287\/orsc.9.6.699"},{"key":"key2022020920053819100_b43","doi-asserted-by":"crossref","unstructured":"McDonald, R.P. and Ho, M.R. (2002), \u201cPrinciples and practice in reporting structural equation analyses\u201d, Psychological Methods, Vol. 7 No. 1, pp. 64\u201082.","DOI":"10.1037\/1082-989X.7.1.64"},{"key":"key2022020920053819100_b44","doi-asserted-by":"crossref","unstructured":"McFadzean, E., Ezingeard, J. and Birchall, D. (2007), \u201cPerception of risk and the strategic impact of existing IT on information security strategy at board level\u201d, Online Information Review, Vol. 31 No. 5, pp. 622\u201060.","DOI":"10.1108\/14684520710832333"},{"key":"key2022020920053819100_b45","unstructured":"NIST (2007), Information Security Guide for Government Executives, available at: http:\/\/csrc.nist.gov\/publications\/nistir\/ir7359\/NISTIR\u20107359.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b46","unstructured":"NIST (2008), Draft NIST Special Publication 800\u201039, Information Security \u2013 Managing Risk from Information Systems: An Organizational Perspective, available at: http:\/\/csrc.nist.gov\/publications\/drafts\/800\u201039\/SP800\u201039\u2010spd\u2010sz.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b47","doi-asserted-by":"crossref","unstructured":"Nyanchama, M. (2005), \u201cEnterprise vulnerability management and its role in information security management\u201d, Information Systems Security, Vol. 14 No. 3, pp. 29\u201056.","DOI":"10.1201\/1086.1065898X\/45390.14.3.20050701\/89149.6"},{"key":"key2022020920053819100_b48","doi-asserted-by":"crossref","unstructured":"Park, S. and Ruighaver, T. (2008), \u201cStrategic approach to information security in organizations\u201d, paper presented at the 2008 International Conference on Information Science and Security, IEEE Computer Society, Seoul, Korea.","DOI":"10.1109\/ICISS.2008.44"},{"key":"key2022020920053819100_b49","unstructured":"Porter, M. (1985), Competitive Advantage: Creating and Sustaining Superior Performance, The Free Press, New York, NY."},{"key":"key2022020920053819100_b50","unstructured":"Prahalad, C. and Hamel, G. (1990), \u201cThe core competence of the corporation\u201d, Harvard Business Review, pp. 79\u201091."},{"key":"key2022020920053819100_b51","unstructured":"PricewaterhouseCoopers (2008), \u201cPWC global state of information security survey 2008 \u2013 improving security: an action plan\u201d, available at: www.pwc.com\/gx\/en\/information\u2010security\u2010survey\/index.jhtml (accessed 28 October 2010)."},{"key":"key2022020920053819100_b52","doi-asserted-by":"crossref","unstructured":"Rangone, A. (1999), \u201cA resource\u2010based approach to strategy analysis in small\u2010medium sized enterprises\u201d, Small Business Economics, Vol. 12, pp. 223\u201048.","DOI":"10.1023\/A:1008046917465"},{"key":"key2022020920053819100_b53","unstructured":"Rathnam, R.G., Johnsen, J. and Wen, H.J. (2004), \u201cAlignment of business strategy and it strategy: a case study of a Fortune 500\u201d, The Journal of Computer Information Systems, Vol. 45 No. 2, pp. 1\u20108."},{"key":"key2022020920053819100_b54","doi-asserted-by":"crossref","unstructured":"Reinard, J. (2006), Communication Research Statistics, Sage, Thousand Oaks, CA.","DOI":"10.4135\/9781412983693"},{"key":"key2022020920053819100_b55","unstructured":"Saugatuck Technology (2008), \u201cEnterprise information management for competitive advantage\u201d, available at: www.synaptica.com\/djcs\/synaptica\/Enterprise%20Information%20Mgmt_DJWhitepaper033108.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b56","doi-asserted-by":"crossref","unstructured":"Schultz, E. (2006), \u201cThe changing winds of information security\u201d, Computers and Security, Vol. 25 No. 5, pp. 315\u20106.","DOI":"10.1016\/j.cose.2006.06.002"},{"key":"key2022020920053819100_b57","doi-asserted-by":"crossref","unstructured":"Schumacker, R.E. and Lomax, R.G. (2004), A Beginner's Guide to Structural Equation Modeling, 2nd ed., Lawrence Erlbaum Associates, Mahwah, NJ.","DOI":"10.4324\/9781410610904"},{"key":"key2022020920053819100_b58","doi-asserted-by":"crossref","unstructured":"Slater, S.F. and Olson, E.M. (2001), \u201cMarketing's contribution to the implementation of business strategy: an empirical analysis\u201d, Strategic Management Journal, Vol. 22 No. 11, pp. 1055\u201067.","DOI":"10.1002\/smj.198"},{"key":"key2022020920053819100_b59","unstructured":"Smallwood, N. and Panowyk, M. (2005), \u201cBuilding capabilities\u201d, Leadership Excellence, Vol. 22 No. 1, p. 17."},{"key":"key2022020920053819100_b60","unstructured":"Stalk, G., Evans, P. and Shuman, L.E. (1992), \u201cCompeting on capabilities: the new rules of corporate strategy\u201d, Harvard Business Review, Vol. 70 No. 2, pp. 54\u201066."},{"key":"key2022020920053819100_b61","doi-asserted-by":"crossref","unstructured":"Straub, D.W. and Effective, I.S. (1990), \u201cSecurity: an empirical study\u201d, Information Systems Research, Vol. 1 No. 3, pp. 255\u201076.","DOI":"10.1287\/isre.1.3.255"},{"key":"key2022020920053819100_b62","unstructured":"Symantec (2009), \u201cSymantec internet security threat report trends for 2008\u201d, available at: http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b\u2010whitepaper_internet_security_threat_report_xiv_04\u20102009.en\u2010us.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b63","doi-asserted-by":"crossref","unstructured":"Tallon, P.P., Kraemer, K.L. and Gurbaxani, V. (2000), \u201cExecutives' perceptions of the business value of information technology: a process\u2010oriented approach\u201d, Journal of Management Information Systems, Vol. 16 No. 4, pp. 145\u201073.","DOI":"10.1080\/07421222.2000.11518269"},{"key":"key2022020920053819100_b64","unstructured":"TechAmerica (2009), \u201cNineteenth annual survey of federal chief information officers\u201d, available at: www.techamerica.org\/techamerica\u2010and\u2010grant\u2010thornton\u2010release\u201019th\u2010annual\u2010survey\u2010of\u2010federal\u2010cios (accessed 28 October 2010)."},{"key":"key2022020920053819100_b65","doi-asserted-by":"crossref","unstructured":"Teece, D.J., Pisano, G. and Shuen, A. (1997), \u201cDynamic capabilities and strategic management\u201d, Strategic Management Journal, Vol. 18 No. 7, pp. 509\u201033.","DOI":"10.1002\/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z"},{"key":"key2022020920053819100_b66","doi-asserted-by":"crossref","unstructured":"Ulrich, D. and Lake, D. (1991), \u201cOrganizational capability: creating competitive advantage\u201d, Academy of Management Executive, Vol. 5 No. 1, pp. 77\u201092.","DOI":"10.5465\/ame.1991.4274728"},{"key":"key2022020920053819100_b67","unstructured":"Ulrich, D. and Smallwood, N. (2004), \u201cCapitalizing on capabilities\u201d, Harvard Business Review, Vol. 82 No. 6, pp. 119\u201027."},{"key":"key2022020920053819100_b68","unstructured":"van Opstal, D. and Council on Competitiveness (2007), \u201cThe resilient economy: integrating competitiveness and security, council on competitiveness\u201d, available at: www.compete.org\/images\/uploads\/File\/PDF\/Files\/Transform_The_Resilient_Economy_FINAL_pdf.pdf (accessed 28 October 2010)."},{"key":"key2022020920053819100_b69","doi-asserted-by":"crossref","unstructured":"von Solms, B. (2006), \u201cInformation security \u2013 the fourth wave\u201d, Computers and Security, Vol. 25 No. 3, pp. 165\u20108.","DOI":"10.1016\/j.cose.2006.03.004"},{"key":"key2022020920053819100_b70","unstructured":"Warner, R. (2008), Applied Statistics: From Bivariate Through Multivariate Techniques, Sage, Los Angeles."},{"key":"key2022020920053819100_b71","doi-asserted-by":"crossref","unstructured":"Werlinger, R., Hawkey, K. and Beznosov, K. (2009), \u201cAn integrated view of human, organizational, and technological challenges of it security management\u201d, Information Management & Computer Security, Vol. 17 No. 1, pp. 4\u201019.","DOI":"10.1108\/09685220910944722"},{"key":"key2022020920053819100_b72","doi-asserted-by":"crossref","unstructured":"Wernerfelt, B. (1984), \u201cA resource\u2010based view of the firm\u201d, Strategic Management Journal, pp. 171\u201080.","DOI":"10.1002\/smj.4250050207"},{"key":"key2022020920053819100_b73","doi-asserted-by":"crossref","unstructured":"Wethyavivorn, P., Charoenngam, C. and Teerajetgul, W. (2009), \u201cStrategic assets driving organizational capabilities of Thai construction firms\u201d, Journal of Construction Engineering and Management, Vol. 135 No. 11, pp. 1222\u201031.","DOI":"10.1061\/(ASCE)CO.1943-7862.0000091"},{"key":"key2022020920053819100_b74","unstructured":"Wood, C.C. (1993), \u201cAchieving competitive advantage with information security\u201d, Managerial Auditing Journal, Vol. 8 No. 2, pp. i\u2010iv."},{"key":"key2022020920053819100_frd1","doi-asserted-by":"crossref","unstructured":"Bennett, J.A. (2000), \u201cFocus on research methods mediator and moderator variables in nursing research: conceptual and statistical differences\u201d, Research in Nursing & Health, No. 23, pp. 415\u201020.","DOI":"10.1002\/1098-240X(200010)23:5<415::AID-NUR8>3.0.CO;2-H"},{"key":"key2022020920053819100_frd2","unstructured":"Hall, J., Sarkani, S. and Mazzuchi, T.A. (2010), \u201cModerating roles of organizational capabilities in information security\u201d, paper presented at the 5th International Conference on i\u2010Warfare & Security (ICIW 2010), Dayton, Ohio, 8\u20109 April."},{"key":"key2022020920053819100_frd3","doi-asserted-by":"crossref","unstructured":"Klein, A. (2007), \u201cBuilding an identity management infrastructure for today and tomorrow\u201d, Information Systems Security, Vol. 16, pp. 74\u20109.","DOI":"10.1080\/10658980701250083"},{"key":"key2022020920053819100_frd4","unstructured":"Lattin, J., Carroll, J.D. and Green, P.E. (2003), Analyzing Multivariate Data, Brooks Cole, Pacific Grove, CA."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685221111153546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221111153546\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221111153546\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:21Z","timestamp":1753402161000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/19\/3\/155-176\/185313"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,19]]},"references-count":74,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,7,19]]}},"alternative-id":["10.1108\/09685221111153546"],"URL":"https:\/\/doi.org\/10.1108\/09685221111153546","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2011,7,19]]}}}