{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:54:07Z","timestamp":1770998047130,"version":"3.50.1"},"reference-count":88,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2007,1,2]],"date-time":"2007-01-02T00:00:00Z","timestamp":1167696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,1,2]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The paper seeks to investigate how the information assurance (IA) efforts of organisations should be aligned with their business strategy. From this analysis, a conceptual model of alignment is presented. This framework shows several organisational factors that can influence alignment.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A number of published works on alignment are discussed in order to develop a conceptual model of IA fit. In addition, Venkatraman's six perspectives of alignment are used as a framework to suggest future research in this area.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The paper presents a definition of information assurance and proposes various reasons why IA is a strategic issue and should be aligned with both IT and corporate strategy. From the literature, a conceptual model illustrating the variables that can influence alignment is presented.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>A clear conceptualisation of alignment is needed. Six potential research models and associated research questions are proposed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The paper concludes with a number of management and research implications. In looking at the implications for managers, it is argued that any alignment framework should include adequate metrics for checking the strategic fit on a continuous basis.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper is an initial attempt to fulfil an identified gap in the literature, namely the lack of research undertaken on IA and corporate strategy alignment. It offers practical help for management so that they can improve the fit between IA and business strategy. It also offers several avenues of potential future research using Venkatraman's six perspectives of fit.<\/jats:p><\/jats:sec>","DOI":"10.1108\/17410390710717165","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T08:50:45Z","timestamp":1168851045000},"page":"96-118","source":"Crossref","is-referenced-by-count":14,"title":["Mastering the art of corroboration"],"prefix":"10.1108","volume":"20","author":[{"given":"Jean\u2010No\u00ebl","family":"Ezingeard","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elspeth","family":"McFadzean","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Birchall","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022032020120875600_b1","unstructured":"Armstrong, J., Rhys\u2010Jones, M. and Rathmell, A. (2002), Information Assurance & Corporate Governance: What Every Director Must Know, Information Assurance Advisory Council, Cambridge."},{"key":"key2022032020120875600_b2","unstructured":"Austin, R.D. and Darby, C.A. (2003), \u201cThe myth of secure computing\u201d, Harvard Business Review, Vol. 81 No. 6, pp. 120\u20106."},{"key":"key2022032020120875600_b100","unstructured":"Beal, R.M. (2000), \u201cCompeting effectively: environmental scanning, competitive strategy, and organizational performance in small manufacturing firms\u201d, Journal of Small Business Management, Vol. 38 No. 1, pp. 27\u201047."},{"key":"key2022032020120875600_b3","unstructured":"Bergeron, F. and Raymond, L. (1995), \u201cThe contribution of IT to the bottom line: a contingency perspective of strategic dimensions\u201d, Proceedings of the 16th International Conference on Information Systems, Amsterdam, pp. 167\u201081."},{"key":"key2022032020120875600_b4","doi-asserted-by":"crossref","unstructured":"Bergeron, F., Raymond, L. and Rivard, S. (2001), \u201cFit in strategic information technology management research: an empirical comparison of perspectives\u201d, Omega, Vol. 29 No. 2, pp. 125\u201042.","DOI":"10.1016\/S0305-0483(00)00034-7"},{"key":"key2022032020120875600_b5","doi-asserted-by":"crossref","unstructured":"Bergeron, F., Raymond, L. and Rivard, S. (2004), \u201cIdeal patterns of strategic alignment and business performance\u201d, Information and Management, Vol. 41 No. 8, pp. 1003\u201020.","DOI":"10.1016\/j.im.2003.10.004"},{"key":"key2022032020120875600_b6","unstructured":"Birchall, D., Ezingeard, J.\u2010N. and McFadzean, E.S. (2003), Information Security: Setting the Boardroom Agenda, Grist Ltd, London."},{"key":"key2022032020120875600_b7","unstructured":"Birchall, D., Ezingeard, J.\u2010N., McFadzean, E.S., Howlin, N. and Yoxall, D. (2004), Information Assurance: Strategic Alignment and Competitive Advantage, Grist Ltd, London."},{"key":"key2022032020120875600_b101","unstructured":"Birkinshaw, J. and Gibson, C. (2004), \u201cBuilding ambidexterity into an organization\u201d, Sloan Management Review, Vol. 45 No. 4, pp. 47\u201055."},{"key":"key2022032020120875600_b8","unstructured":"Boyce, J.G. and Jennings, D.W. (2002), Information Assurance: Managing Organizational IT Security Risks, Butterworth\u2010Heinemann, London."},{"key":"key2022032020120875600_b9","doi-asserted-by":"crossref","unstructured":"Burn, J.M. (1996), \u201cIS innovation and organizational alignment \u2013 a professional juggling act\u201d, Journal of Information Technology, Vol. 11 No. 1, pp. 3\u201012.","DOI":"10.1177\/026839629601100101"},{"key":"key2022032020120875600_b10","doi-asserted-by":"crossref","unstructured":"Campbell, K., Gordon, L.A., Loeb, M.P. and Zhou, L. (2003), \u201cThe economic cost of publicly announced information security breaches: empirical evidence from the stock market\u201d, Journal of Computer Security, Vol. 11 No. 3, pp. 431\u201048.","DOI":"10.3233\/JCS-2003-11308"},{"key":"key2022032020120875600_b11","unstructured":"Chan, Y.E. (2002), \u201cWhy haven't we mastered alignment? The importance of the informal organization structure\u201d, MIS Quarterly Executive, Vol. 1 No. 2, pp. 97\u2010112."},{"key":"key2022032020120875600_b12","doi-asserted-by":"crossref","unstructured":"Chan, Y.E., Huff, S.L., Barclay, D.W. and Copeland, D.G. (1997), \u201cBusiness strategic orientation, information systems strategic orientation, and strategic alignment\u201d, Information Systems Research, Vol. 8 No. 2, pp. 125\u201050.","DOI":"10.1287\/isre.8.2.125"},{"key":"key2022032020120875600_b13","unstructured":"Chandler\u2010Wilde, R. and McFadzean, E.S. (2004), \u201cAligning IT with business strategy: a matter of process\u201d, paper presented at ISOneWorld Conference, Las Vegas, NV."},{"key":"key2022032020120875600_b14","unstructured":"Ciborra, C. (2002), The Labyrinths of Information: Challenging the Wisdom of Systems, Oxford University Press, Oxford."},{"key":"key2022032020120875600_b15","unstructured":"Croteau, A.\u2010M., Solomon, L., Raymond, L. and Bergeron, F. (2001), \u201cOrganizational and technological infrastructures alignment\u201d, Proceedings of the Hawaii International Conference on System Sciences, Maui, HI, pp. 1\u201010."},{"key":"key2022032020120875600_b16","doi-asserted-by":"crossref","unstructured":"Culnan, M.J. and Armstrong, P.K. (1999), \u201cInformation privacy concerns, procedural fairness, and impersonal trust: an empirical investigation\u201d, Organization Science, Vol. 10 No. 1, pp. 104\u201015.","DOI":"10.1287\/orsc.10.1.104"},{"key":"key2022032020120875600_b17","unstructured":"Deloitte Touche Tohmatsu (2003), \u201cGlobal security survey\u201d, available at: www.deloitte.com\/gfsi (accessed 16 May 2003)."},{"key":"key2022032020120875600_b19","unstructured":"Department of Trade and Industry (2004), \u201cInformation security breaches survey\u201d, DTI and PriceWaterhouseCoopers, available at: www.pwc.com\/images\/gx\/eng\/about\/svcs\/grms\/2004Technical_Report.pdf (accessed 28 April 2004)."},{"key":"key2022032020120875600_b18","doi-asserted-by":"crossref","unstructured":"Dhillon, G. (2004), \u201cThe challenge of managing information security\u201d, International Journal of Information Management, Vol. 24 No. 1, pp. 3\u20104.","DOI":"10.1016\/j.ijinfomgt.2003.12.002"},{"key":"key2022032020120875600_b20","doi-asserted-by":"crossref","unstructured":"Dutta, A. and McCrohan, K. (2002), \u201cManagement's role in information security in a cyber economy\u201d, California Management Review, Vol. 45 No. 1, pp. 67\u201087.","DOI":"10.2307\/41166154"},{"key":"key2022032020120875600_b21","unstructured":"Earl, M. (1995), \u201cIntegrating IS and the organisation: a framework of organisational fit\u201d, in Earl, M. (Ed.), Information Management: The Organisational Dimension, Oxford University Press, Oxford, pp. 485\u2010502."},{"key":"key2022032020120875600_b22","unstructured":"Ernst & Young (2003), Global Information Security Survey 2003, Ernst & Young LLP."},{"key":"key2022032020120875600_b23","unstructured":"Ettredge, M. and Richardson, V.J. (2002), \u201cAssessing the risk in e\u2010commerce\u201d, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Maui, HI."},{"key":"key2022032020120875600_b24","doi-asserted-by":"crossref","unstructured":"Ettredge, M. and Richardson, V.J. (2003), \u201cInformation transfer among internet firms: the case of hacker attacks\u201d, Journal of Information Systems, Vol. 17 No. 2, pp. 71\u201082.","DOI":"10.2308\/jis.2003.17.2.71"},{"key":"key2022032020120875600_b25","unstructured":"Evans, D.M. and Smith, A.C.T. (2004), \u201cAugmenting the value chain: identifying competitive advantage via the internet\u201d, Journal of Information Technology Theory and Application, Vol. 6 No. 1, pp. 61\u201078."},{"key":"key2022032020120875600_b26","unstructured":"Evans, R. and Danks, A. (1998), \u201cStrategic supply chain management: creating shareholder value by aligning supply chain strategy with business strategy\u201d, in Gattorna, J. (Ed.), Strategic Supply Chain Alignment, Gower, London."},{"key":"key2022032020120875600_b27","unstructured":"Ezingeard, J.\u2010N. and Birchall, D. (2004), \u201cSecuring information: governance issues\u201d, in Crainer, S. and Dearlove, D. (Eds), Financial Times Handbook of Management, Pearson Education, Harlow."},{"key":"key2022032020120875600_b28","unstructured":"Ezingeard, J.\u2010N., Bowen\u2010Schrire, M. and Birchall, D. (2004), \u201cTriggers of change in information security management\u201d, paper presented at ISOneWorld Conference, Las Vegas, NV."},{"key":"key2022032020120875600_b29","unstructured":"Ezingeard, J.\u2010N., McFadzean, E.S. and Birchall, D. (2003), \u201cBoard of directors and information security: a perception grid\u201d, paper presented at British Academy of Management Conference, Harrogate."},{"key":"key2022032020120875600_b30","doi-asserted-by":"crossref","unstructured":"Gietzmann, M.B. and Selby, M.J.P. (1994), \u201cAssessment of innovative software technology: developing an end\u2010user\u2010initiated interface design strategy\u201d, Technology Analysis & Strategic Management, Vol. 6 No. 4, pp. 473\u201083.","DOI":"10.1080\/09537329408524187"},{"key":"key2022032020120875600_b31","doi-asserted-by":"crossref","unstructured":"Gottschalk, P. (2000), \u201cStudies of key issues in IS management around the world\u201d, International Journal of Information Management, Vol. 20 No. 3, pp. 169\u201080.","DOI":"10.1016\/S0268-4012(00)00003-7"},{"key":"key2022032020120875600_b32","unstructured":"Gould, J.L. and Kolb, W.L. (1964), A Dictionary of the Social Sciences, The Free Press, New York, NY."},{"key":"key2022032020120875600_b33","doi-asserted-by":"crossref","unstructured":"Henderson, J.C. and Venkatraman, N. (1993), \u201cStrategic alignment: leveraging information technology for transforming organizations\u201d, IBM Systems Journal, Vol. 32 No. 1, pp. 4\u201016.","DOI":"10.1147\/sj.382.0472"},{"key":"key2022032020120875600_b34","unstructured":"Hodges, J. (2002), \u201cTechnology studied from the board's perspective\u201d, Internal Auditor, Vol. 59 No. 1, pp. 13\u201014."},{"key":"key2022032020120875600_b35","doi-asserted-by":"crossref","unstructured":"Hoffman, J.J., Cullen, J.B., Carter, N.M. and Hofacker, C.F. (1992), \u201cAlternative methods for measuring organizational fit: technology, structure and performance\u201d, Journal of Management, Vol. 18 No. 1, pp. 45\u201057.","DOI":"10.1177\/014920639201800104"},{"key":"key2022032020120875600_b36","doi-asserted-by":"crossref","unstructured":"Hussin, H., King, M. and Cragg, P. (2002), \u201cIT alignment in small firms\u201d, European Journal of Information Systems, Vol. 11 No. 2, pp. 108\u201027.","DOI":"10.1057\/palgrave\/ejis\/3000422"},{"key":"key2022032020120875600_b37","unstructured":"Information Assurance Advisory Council (2003), Engaging the Board: Corporate Governance & Information Assurance, Information Assurance Advisory Council, Cambridge."},{"key":"key2022032020120875600_b38","unstructured":"International Organization for Standardization (1989), ISO 7498\u20102:1989 Information Processing Systems \u2013 Open Systems Interconnection \u2013 Basic Reference Model \u2013 Part 2: Security Architecture, International Organization for Standardization, Geneva."},{"key":"key2022032020120875600_b39","unstructured":"IT Governance Institute (2003), IT Control Objectives for Sarbanes\u2010Oxley, IT Governance Institute, Rolling Meadows, IL."},{"key":"key2022032020120875600_b40","unstructured":"Kaplan, R.S. (2001), \u201cUsing strategic themes to achieve organizational alignment\u201d, Balanced Scorecard Report, Harvard Business School Publishing, Boston, MA."},{"key":"key2022032020120875600_b41","unstructured":"Kaplan, R.S. (2002), \u201cUsing strategic themes to achieve inter\u2010organizational alignment\u201d, Balance Scorecard Report, Harvard Business School Publishing, Boston, MA."},{"key":"key2022032020120875600_b42","unstructured":"Kaplan, R.S. and Norton, D.P. (1996a), The Balanced Scorecard: Translating Strategy into Action, Harvard Business School Press, Boston, MA."},{"key":"key2022032020120875600_b43","unstructured":"Kaplan, R.S. and Norton, D.P. (1996b), \u201cUsing the balanced scorecard as a strategic management system\u201d, Harvard Business Review, Vol. 74 No. 1, pp. 75\u201085."},{"key":"key2022032020120875600_b44","unstructured":"Kaplan, R.S. and Norton, D.P. (2004a), Strategy Maps: Converting Intangible Assets into Tangible Outcomes, Harvard Business School Press, Boston, MA."},{"key":"key2022032020120875600_b45","unstructured":"Kaplan, R.S. and Norton, D.P. (2004b), \u201cMeasuring the strategic readiness of intangible assets\u201d, Harvard Business Review, Vol. 82 No. 2, pp. 52\u201063."},{"key":"key2022032020120875600_b46","doi-asserted-by":"crossref","unstructured":"Keeble, J.J., Topiol, S. and Berkeley, S. (2003), \u201cUsing indicators to measure sustainability performance at a corporate and project level\u201d, Journal of Business Ethics, Vol. 44 Nos 2\/3, pp. 149\u201058.","DOI":"10.1023\/A:1023343614973"},{"key":"key2022032020120875600_b47","unstructured":"Keng, S. (2003), \u201cInterorganizational systems and competitive advantages \u2013 lessons from history\u201d, Journal of Computer Information Systems, Vol. 44 No. 1, pp. 33\u20109."},{"key":"key2022032020120875600_b48","unstructured":"Kotler, P., Armstrong, G., Saunders, J. and Wong, V. (2001), Principles of Marketing, 3rd European edition, Financial Times Prentice\u2010Hall, Harlow."},{"key":"key2022032020120875600_b49","doi-asserted-by":"crossref","unstructured":"Kovacich, G.L. (2001), \u201cThe Corporate Information Assurance Officer (CIAO)\u201d, Computers & Security, Vol. 20 No. 4, pp. 302\u20107.","DOI":"10.1016\/S0167-4048(01)00404-7"},{"key":"key2022032020120875600_b50","doi-asserted-by":"crossref","unstructured":"Koved, L., Nadalin, A., Nagaratnam, N., Pistoia, M. and Shrader, T. (2001), \u201cSecurity challenges for Enterprise Java in an e\u2010business environment\u201d, IBM Systems Journal, Vol. 40 No. 1, pp. 130\u201052.","DOI":"10.1147\/sj.401.0130"},{"key":"key2022032020120875600_b51","doi-asserted-by":"crossref","unstructured":"Lai, V.S. (2001), \u201cIssues of international information systems management: a perspective of affiliates\u201d, Information and Management, Vol. 38 No. 4, pp. 253\u201064.","DOI":"10.1016\/S0378-7206(00)00070-7"},{"key":"key2022032020120875600_b52","doi-asserted-by":"crossref","unstructured":"Landwehr, C.E. (2001), \u201cComputer security\u201d, International Journal of Information Security, Vol. 1 No. 1, pp. 3\u201013.","DOI":"10.1007\/s102070100003"},{"key":"key2022032020120875600_b53","unstructured":"Logan, P.Y. and Logan, S.W. (2003), \u201cBitten by a bug: a case study in malware infection\u201d, Journal of Information Systems Education, Vol. 14 No. 3, pp. 301\u20105."},{"key":"key2022032020120875600_b54","doi-asserted-by":"crossref","unstructured":"Luftman, J. (2003a), \u201cAssessing IT\/business alignment\u201d, Information Systems Management, Vol. 20 No. 4, pp. 9\u201015.","DOI":"10.1201\/1078\/43647.20.4.20030901\/77287.2"},{"key":"key2022032020120875600_b55","doi-asserted-by":"crossref","unstructured":"Luftman, J. (2003b), \u201cAssessing IT\/business alignment\u201d, Information Strategy: The Executive's Journal, Vol. 20 No. 1, pp. 7\u201014.","DOI":"10.1201\/1078\/43647.20.4.20030901\/77287.2"},{"key":"key2022032020120875600_b56","doi-asserted-by":"crossref","unstructured":"Luftman, J. and Brier, T. (1999), \u201cAchieving and sustaining business\u2010IT alignment\u201d, California Management Review, Vol. 42 No. 1, pp. 109\u201022.","DOI":"10.2307\/41166021"},{"key":"key2022032020120875600_b57","unstructured":"McFadzean, E.S., Ezingeard, J.\u2010N. and Birchall, D. (2005), \u201cInformation security from the perspective of senior executives: the development of a balanced scorecard\u201d, Working Paper No. 0503, Henley Management College Working Paper Series, Henley\u2010on\u2010Thames."},{"key":"key2022032020120875600_b84","unstructured":"McFarlan, F.W. (1984), \u201cInformation technology changes the way you compete\u201d, Harvard Business Review, Vol. 62 No. 3, pp. 98\u2010103."},{"key":"key2022032020120875600_b58","doi-asserted-by":"crossref","unstructured":"Miller, D. (1981), \u201cToward a new contingency approach: the search for organizational gestalts\u201d, Journal of Management Studies, Vol. 18 No. 1, pp. 1\u201026.","DOI":"10.1111\/j.1467-6486.1981.tb00088.x"},{"key":"key2022032020120875600_b59","doi-asserted-by":"crossref","unstructured":"Miller, D. (1987), \u201cThe genesis of configuration\u201d, Academy of Management Review, Vol. 12 No. 4, pp. 686\u2010701.","DOI":"10.5465\/amr.1987.4306720"},{"key":"key2022032020120875600_b60","unstructured":"National Association of Corporate Directors (2001), Information Security Oversight: Essential Board Practices, National Association of Corporate Directors, Washington, DC."},{"key":"key2022032020120875600_b61","doi-asserted-by":"crossref","unstructured":"Palmer, J.W. and Markus, M.L. (2000), \u201cThe performance impacts of quick response and strategic alignment in specialty retailing\u201d, Information Systems Research, Vol. 11 No. 3, pp. 241\u201059.","DOI":"10.1287\/isre.11.3.241.12203"},{"key":"key2022032020120875600_b62","unstructured":"Parker, X.L. (2001), \u201cUnderstanding risk\u201d, Internal Auditor, Vol. 58 No. 1, pp. 61\u20105."},{"key":"key2022032020120875600_b63","doi-asserted-by":"crossref","unstructured":"Pervan, G. (1998), \u201cHow chief executive officers in large organizations view the management of their information systems\u201d, Journal of Information Technology, Vol. 13 No. 2, pp. 95\u2010109.","DOI":"10.1177\/026839629801300203"},{"key":"key2022032020120875600_b64","unstructured":"Peters, T.J. and Waterman, R.H. (1982), In Search of Excellence: Lessons from America's Best Run Companies, Harper & Row, New York, NY."},{"key":"key2022032020120875600_b65","doi-asserted-by":"crossref","unstructured":"Reich, B.H. and Benbasat, I. (1996), \u201cMeasuring the linkage between business and information technology objectives\u201d, MIS Quarterly, Vol. 20 No. 1, pp. 55\u201081.","DOI":"10.2307\/249542"},{"key":"key2022032020120875600_b66","doi-asserted-by":"crossref","unstructured":"Reich, B.H. and Benbasat, I. (2000), \u201cFactors that influence the social dimension of alignment between business and information technology objectives\u201d, MIS Quarterly, Vol. 24 No. 1, pp. 81\u2010113.","DOI":"10.2307\/3250980"},{"key":"key2022032020120875600_b68","doi-asserted-by":"crossref","unstructured":"Sabherwal, R. and Chan, Y.E. (2001), \u201cAlignment between business and IS strategies: a study of prospectors, analyzers, and defenders\u201d, Information Systems Research, Vol. 12 No. 1, pp. 11\u201033.","DOI":"10.1287\/isre.12.1.11.9714"},{"key":"key2022032020120875600_b67","doi-asserted-by":"crossref","unstructured":"Sabherwal, R. and Kirs, P. (1994), \u201cThe alignment between organizational critical success factors and information technology capability in academic institutions\u201d, Decision Sciences, Vol. 25 No. 2, pp. 301\u201030.","DOI":"10.1111\/j.1540-5915.1994.tb00805.x"},{"key":"key2022032020120875600_b69","doi-asserted-by":"crossref","unstructured":"Safizadeh, M.H., Ritzman, L.P., Sharma, D. and Wood, C. (1996), \u201cAn empirical analysis of the product\u2010process matrix\u201d, Management Science, Vol. 42 No. 11, pp. 1576\u201091.","DOI":"10.1287\/mnsc.42.11.1576"},{"key":"key2022032020120875600_b70","unstructured":"Sauer, C., Dampney, C.N.G. and Southon, G. (1997), \u201cFit, failure, and the house of horrors: toward a configurational theory of IS project failure\u201d, Eighteenth International Conference on Information Systems, Atlanta, GA, pp. 349\u201066."},{"key":"key2022032020120875600_b102","doi-asserted-by":"crossref","unstructured":"Segars, A.H. and Grover, V. (1998), \u201cStrategic information systems planning success: an investigation of the construct and its measurement\u201d, MIS Quarterly, Vol. 22 No. 2, pp. 139\u201063.","DOI":"10.2307\/249393"},{"key":"key2022032020120875600_b71","unstructured":"Siaw, I. and Yu, A. (2004), \u201cAn analysis of the impact of the internet on competition in the banking industry, using Porter's five forces model\u201d, International Journal of Management, Vol. 21 No. 4, pp. 514\u201023."},{"key":"key2022032020120875600_b103","doi-asserted-by":"crossref","unstructured":"Sledgianowski, D. and Luftman, J. (2005), \u201cIT\u2010business strategic alignment maturity: a case study\u201d, Journal of Cases on Information Technology, Vol. 7 No. 2, pp. 102\u201020.","DOI":"10.4018\/jcit.2005040107"},{"key":"key2022032020120875600_b72","unstructured":"Swartz, N. (2003), \u201cThe cost of Sarbanes\u2010Oxley\u201d, Information Management Journal, Vol. 37 No. 5, p. 8."},{"key":"key2022032020120875600_b73","doi-asserted-by":"crossref","unstructured":"Teo, T.S.H. and King, W.R. (1996), \u201cAssessing the impact of integrating business planning and IS planning\u201d, Information and Management, Vol. 30 No. 6, pp. 309\u201021.","DOI":"10.1016\/S0378-7206(96)01076-2"},{"key":"key2022032020120875600_b74","doi-asserted-by":"crossref","unstructured":"Teo, T.S.H. and Pian, Y. (2003), \u201cA contingency perspective on internet adoption and competitive advantage\u201d, European Journal of Information Systems, Vol. 12 No. 2, pp. 78\u201092.","DOI":"10.1057\/palgrave.ejis.3000448"},{"key":"key2022032020120875600_b75","unstructured":"Treanor, J. (2000), \u201cSecurity fear shuts online bank\u201d, The Guardian, August 1, p. 1."},{"key":"key2022032020120875600_b76","unstructured":"Tweney, D. (1998), \u201cThe consumer battle over online information privacy has just begun\u201d, InfoWorld, Vol. 20 No. 25, p. 66."},{"key":"key2022032020120875600_b77","doi-asserted-by":"crossref","unstructured":"Venkatraman, N. (1989), \u201cThe concept of fit in strategy research: toward verbal and statistical correspondence\u201d, Academy of Management Review, Vol. 14 No. 3, pp. 423\u201044.","DOI":"10.5465\/amr.1989.4279078"},{"key":"key2022032020120875600_b78","doi-asserted-by":"crossref","unstructured":"Venkatraman, N. and Camillus, J.C. (1984), \u201cExploring the concept of \u2018fit\u2019 in strategic management\u201d, Academy of Management Review, Vol. 9 No. 3, pp. 513\u201025.","DOI":"10.5465\/amr.1984.4279696"},{"key":"key2022032020120875600_b79","doi-asserted-by":"crossref","unstructured":"Von Solms, B. (2001), \u201cCorporate governance and information security\u201d, Computers & Security, Vol. 20 No. 3, pp. 215\u20108.","DOI":"10.1016\/S0167-4048(01)00305-4"},{"key":"key2022032020120875600_b80","doi-asserted-by":"crossref","unstructured":"Ward, J.M. (1988), \u201cInformation systems and technology application portfolio management \u2013 an assessment of matrix\u2010based analyses\u201d, Journal of Information Technology, Vol. 3 No. 3, pp. 205\u201015.","DOI":"10.1177\/026839628800300309"},{"key":"key2022032020120875600_b81","doi-asserted-by":"crossref","unstructured":"Whitman, M.E. (2004), \u201cIn defense of the realm: understanding the threats to information security\u201d, International Journal of Information Management, Vol. 24 No. 1, pp. 43\u201057.","DOI":"10.1016\/j.ijinfomgt.2003.12.003"},{"key":"key2022032020120875600_b82","unstructured":"Wolf, D.G. (2003), \u201cStatement by NSA's Director of Information Assurance before the House Select Committee on Homeland Security, US House of Representatives\u201d, available at: www.nsa.gov\/ia\/Wolf_SFR_22_July_2003.pdf (accessed 22 July 2003)."},{"key":"key2022032020120875600_b83","doi-asserted-by":"crossref","unstructured":"Wright, T. (2001), \u201cSecure digital archiving of high\u2010value data\u201d, BT Technology Journal, Vol. 19 No. 3, pp. 60\u20106.","DOI":"10.1023\/A:1011934131004"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/17410390710717165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17410390710717165\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17410390710717165\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:19:07Z","timestamp":1753402747000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/20\/1\/96-118\/207693"}},"subtitle":["A conceptual analysis of information assurance and corporate strategy alignment"],"short-title":[],"issued":{"date-parts":[[2007,1,2]]},"references-count":88,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1,2]]}},"alternative-id":["10.1108\/17410390710717165"],"URL":"https:\/\/doi.org\/10.1108\/17410390710717165","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2007,1,2]]}}}