{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:30:40Z","timestamp":1759091440731,"version":"3.41.2"},"reference-count":79,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2014,11,10]],"date-time":"2014-11-10T00:00:00Z","timestamp":1415577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11,10]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 The purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and inter-organization information security aspects that are deemed to have an influence on supply chain operations and performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data. Data were collected from 197 organizations belonging to various sectors. The study used exploratory and confirmatory factor analysis for data analysis. Further, to test the hypotheses and to fit the theoretical model, structural equation modeling techniques were used.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 Results of this study indicate that ISI, comprising technical, formal and informal security aspects in an intra- and inter-organizational environment, are positively associated with supply chain operations, which, in turn, positively affects supply chain performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>\u2013 This study provides the foundation for future research in the management of information security in supply chains. Findings are expected to provide the communities of practice with better information security decision-making in a supply chain context, by clearly formulating technical, formal and informal information security policies for improving supply chain performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 In today\u2019s global supply chain environment where competition prevails among supply chains, this research is relevant in terms of capability that an organization has to acquire for managing internal and external information security. In that sense, this study contributes to the body of knowledge with an empirical analysis of organizations\u2019 information security management initiatives as a blend of technical, formal and informal security aspects.<\/jats:p><\/jats:sec>","DOI":"10.1108\/imcs-05-2013-0035","type":"journal-article","created":{"date-parts":[[2014,10,30]],"date-time":"2014-10-30T09:09:22Z","timestamp":1414660162000},"page":"450-473","source":"Crossref","is-referenced-by-count":19,"title":["Impact of information security initiatives on supply chain performance"],"prefix":"10.1108","volume":"22","author":[{"given":"Sindhuja","family":"PN","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122722461961600_b1","unstructured":"Asai, T.T. and Perez, J.L.C. (2012), \u201cHuman-related problems in information security faced by Japanese, British and American overseas companies because of cultural differences\u201d, China-USA Business Review , Vol. 11 No. 1, pp. 86-101."},{"key":"key2020122722461961600_b2","doi-asserted-by":"crossref","unstructured":"Ashenden, D. (2008), \u201cInformation security management: a human challenge\u201d, Information Security Technical Report , Vol. 13 No. 4, pp. 195-201.","DOI":"10.1016\/j.istr.2008.10.006"},{"key":"key2020122722461961600_b4","doi-asserted-by":"crossref","unstructured":"Brotby, W.K. (2009), Information Security Management Metrics , CRC Press, Boca Raton, FL.","DOI":"10.1201\/9781420052862"},{"key":"key2020122722461961600_b5","unstructured":"BS 7799-2 (1999), Information Security Management Part 2: Specification for Information Security Management Systems , British Standards Institute, London."},{"key":"key2020122722461961600_b6","doi-asserted-by":"crossref","unstructured":"Bulgurcu, B. , Cavusoglu, H. and Benbasat, I. (2010), \u201cInformation security policy compliance: an empirical study of rationality-based beliefs and information security awareness\u201d, MIS Quarterly , Vol. 34 No. 3, pp. 523-548.","DOI":"10.2307\/25750690"},{"key":"key2020122722461961600_b7","doi-asserted-by":"crossref","unstructured":"Chang, S.E. and Ho, C.B. (2006), \u201cOrganizational factors to the effectiveness of implementing information security management\u201d, Industrial Management and Data Security , Vol. 106 No. 3, pp. 345-361.","DOI":"10.1108\/02635570610653498"},{"key":"key2020122722461961600_b8","doi-asserted-by":"crossref","unstructured":"Chang, S.E. and Lin, C. (2007), \u201cExploring organizational culture for information security management\u201d, Industrial Management and Data Systems , Vol. 107 No. 3, pp. 438-458.","DOI":"10.1108\/02635570710734316"},{"key":"key2020122722461961600_b9","doi-asserted-by":"crossref","unstructured":"Chen, C.C. , Medlin, B.D. and Shaw, R.S. (2008), \u201cA cross-cultural investigation of situational information security awareness programs\u201d, Information Management and Computer Security , Vol. 16 No. 4, pp. 360-376.","DOI":"10.1108\/09685220810908787"},{"key":"key2020122722461961600_b10","doi-asserted-by":"crossref","unstructured":"Cohen, J. (1960), \u201cA coefficient of agreement for nominal scales\u201d, Educational and Psychological Measurement , Vol. 20 No. 1, pp. 37-46.","DOI":"10.1177\/001316446002000104"},{"key":"key2020122722461961600_b14","unstructured":"Dhillon, G. (2007), Principles of Information Systems Security: Text and Cases , John Wiley and Sons, New York, NY."},{"key":"key2020122722461961600_b17","doi-asserted-by":"crossref","unstructured":"Dlamini, M.T. , Eloff, J.H.P. and Eloff, M.M. (2009), \u201cInformation security: the moving target\u201d, Computers and Security , Vol. 28 Nos 3\/4, pp. 189-198.","DOI":"10.1016\/j.cose.2008.11.007"},{"key":"key2020122722461961600_b18","doi-asserted-by":"crossref","unstructured":"Doll, W.J. , Raghunathan, T. , Lim, S.J. and Gupta, Y.P. (1995), \u201cA confirmatory factor analysis of the user information satisfaction instrument\u201d, Information Systems Research , Vol. 6 No. 2, pp. 177-188.","DOI":"10.1287\/isre.6.2.177"},{"key":"key2020122722461961600_b19","doi-asserted-by":"crossref","unstructured":"Drazin, R. and Van de Ven, A.H. (1985), \u201cAlternative forms of fit in contingency theory\u201d, Administrative Science Quarterly , Vol. 30 No. 4, pp. 514-539.","DOI":"10.2307\/2392695"},{"key":"key2020122722461961600_b20","unstructured":"Ernst and Young Survey (2008), Global Information Security Survey 2008 , Ernst and Young LLP, London."},{"key":"key2020122722461961600_b22","doi-asserted-by":"crossref","unstructured":"Finne, T. (1996), \u201cThe information security chain in a company\u201d, Computers and Security , Vol. 15 No. 4, pp. 297-316.","DOI":"10.1016\/0167-4048(96)88941-3"},{"key":"key2020122722461961600_b23","doi-asserted-by":"crossref","unstructured":"Fulford, H. and Doherty, N.F. (2003), \u201cThe application of information security policies in large UK-based organizations: an exploratory investigation\u201d, Information Management and Computer Security , Vol. 11 No. 3, pp. 106-114.","DOI":"10.1108\/09685220310480381"},{"key":"key2020122722461961600_b26","unstructured":"Gunasekaran, A. , Patel, C. and McGaughey, R.E. (2001), \u201cA framework for supply chain performance measurement\u201d, International Journal of Production Economics , Vol. 87 No. 3, pp-333-347."},{"key":"key2020122722461961600_b27","doi-asserted-by":"crossref","unstructured":"Guo, K.H. , Yuan, Y. , Archer, N.P. and Connelly, C.E. (2011), \u201cUnderstanding nonmalicious security violations in the workplace: a composite behavior model\u201d, Journal of Management Information Systems , Vol. 28 No. 2, pp. 203-236.","DOI":"10.2753\/MIS0742-1222280208"},{"key":"key2020122722461961600_b28","unstructured":"Gupta, M. , Chaturvedi, A.R. , Metha, S. and Valeri, L. (2001), \u201cThe experimental analysis of information security management issues for online financial services\u201d, ICIS 2000, Brisbane, pp. 667-675."},{"key":"key2020122722461961600_b29","doi-asserted-by":"crossref","unstructured":"Hagen, J.M. , Albrechtsen, E. and Hovden, J. (2008), \u201cImplementation and effectiveness of organizational information security measures\u201d, Information Management and Computer Security , Vol. 16 No. 4, pp. 377-397.","DOI":"10.1108\/09685220810908796"},{"key":"key2020122722461961600_b30","unstructured":"Hair, J.F. and Anderson, R.E. (1995), Multivariate Data Analysis , Prentice Hall, Upper Saddle River, NJ."},{"key":"key2020122722461961600_b86","doi-asserted-by":"crossref","unstructured":"Herath, T. and Rao, H.R. (2009), \u201cEncouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness\u201d, Decision Support Systems , Vol. 47, pp. 154-165.","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"key2020122722461961600_b31","doi-asserted-by":"crossref","unstructured":"Hong, K.S. , Chi, Y.P. , Chao, L.R. and Tang, J.H. (2003), \u201cAn integrated system theory of information security management\u201d, Information Management and Computer Security , Vol. 11 No. 5, pp. 243-248.","DOI":"10.1108\/09685220310500153"},{"key":"key2020122722461961600_b32","doi-asserted-by":"crossref","unstructured":"Hong, K.S. , Chi, Y.P. , Chao, L.R. and Tang, J.H. (2006), \u201cAn empirical study of information security policy on information security elevation in Taiwan\u201d, Information Management and Computer Security , Vol. 14 No. 2, pp. 104-115.","DOI":"10.1108\/09685220610655861"},{"key":"key2020122722461961600_b33","unstructured":"Kalakota, R. and Whinston, A.B. (1997), Electronic Commerce: A Manager\u2019s Guide , Addison-Wesley Longman, Reading, MA."},{"key":"key2020122722461961600_b34","doi-asserted-by":"crossref","unstructured":"Kankanhalli, A. , Teo, H.-H. , Tan, B.C. and Wei, K.-K. (2003), \u201cAn integrative study of information systems security effectiveness\u201d, International Journal of Information Management , Vol. 23 No. 2, pp. 139-154.","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"key2020122722461961600_b88","doi-asserted-by":"crossref","unstructured":"Karyda, M. , Kiountouzis, E. and Kokolakis, S. (2005), \u201cInformation systems security policies: a contextual perspective\u201d, Computers and Security , Vol. 24, pp. 246-260.","DOI":"10.1016\/j.cose.2004.08.011"},{"key":"key2020122722461961600_b35","doi-asserted-by":"crossref","unstructured":"Knapp, J.K. , Marshall, E.T. , Kelly Rainer, R. and Nelson Ford, F. (2006), \u201cInformation security: management\u2019s effect on\u2018 culture and policy\u201d, Information Management and Computer Security , Vol. 14 No. 1, pp. 24-36.","DOI":"10.1108\/09685220610648355"},{"key":"key2020122722461961600_b36","doi-asserted-by":"crossref","unstructured":"Kotulic, A.G. and Clark, J.G. (2004), \u201cWhy there aren\u2019t more information security research studies?\u201d, Information and Management , Vol. 41 No. 5, pp. 597-407.","DOI":"10.1016\/j.im.2003.08.001"},{"key":"key2020122722461961600_b37","doi-asserted-by":"crossref","unstructured":"Kraemer, S. and Carayon, P. (2007), \u201cHuman errors and violations in computer and information security: the viewpoint of network administrators and security specialists\u201d, Applied Ergonomics , Vol. 38 No. 2, pp. 143-154.","DOI":"10.1016\/j.apergo.2006.03.010"},{"key":"key2020122722461961600_b38","doi-asserted-by":"crossref","unstructured":"Kritzinger, E. and Smith, E. (2008), \u201cInformation security management: an information security retrieval and awareness model for industry\u201d, Computers and Security , Vol. 27 Nos 5\/6, pp. 224-231.","DOI":"10.1016\/j.cose.2008.05.006"},{"key":"key2020122722461961600_b39","unstructured":"Kurien, G.P. and Qureshi, M.N. (2011), \u201cStudy of performance measurement practices in supply chain management\u201d, International Journal of Business, Management and Social Sciences , Vol. 2 No. 4, pp. 19-34."},{"key":"key2020122722461961600_b40","doi-asserted-by":"crossref","unstructured":"Lee, S.M. , Luthans, F. and Olson, D.L. (1982), \u201cA management science approach to contingency models of organizational structure\u201d, Academy of Management Journal , Vol. 25 No. 3, pp. 553-566.","DOI":"10.2307\/256079"},{"key":"key2020122722461961600_b41","unstructured":"Li, S. , Rao, S.S. and Ragu-Nathan, T.S. and Ragu-Nathan, B. (2005), \u201cDevelopment and validation of a measurement instrument for studying supply chain management practices\u201d, Journal of Operations Management , Vol. 23."},{"key":"key2020122722461961600_b42","doi-asserted-by":"crossref","unstructured":"Ma, Q. , Johnston, A.C. and Pearson, J.M. (2008), \u201cImplementation security management objectives and practices: a parsimonious framework\u201d, Information Management and Computer Security , Vol. 16 No. 3, pp. 251-270.","DOI":"10.1108\/09685220810893207"},{"key":"key2020122722461961600_b43","doi-asserted-by":"crossref","unstructured":"Malhotra, A. , Gosain, S. and El Sawy, O.A. (2005), \u201cAbsorptive capacity configurations in supply chains: gearing for partner-enabled market knowledge creation\u201d, MIS Quarterly , Vol. 29 No. 1, pp. 145-187.","DOI":"10.2307\/25148671"},{"key":"key2020122722461961600_b87","unstructured":"Mentzer, J.T. and Konrad, B.P. (1991), \u201cAn efficiency\/effectiveness approach to logistics performance analysis\u201d, Journal of Business Logistics , Vol. 12 No. 1, pp. 33-61."},{"key":"key2020122722461961600_b89","unstructured":"Michelberger, P. and Labodi, C. (2009), \u201cDevelopment of information security management system at the members of the supply chain\u201d, Annals of the University of Petrosani, Economics , Vol. 9 No. 4, pp. 69-78."},{"key":"key2020122722461961600_b44","doi-asserted-by":"crossref","unstructured":"Nadler, S.S. and Kros, J.F. (2008), \u201cAn introduction to Sarbanes-Oxley and its impact on supply chain management\u201d, Journal of Business Logistics , Vol. 29 No. 1, pp. 241-255.","DOI":"10.1002\/j.2158-1592.2008.tb00077.x"},{"key":"key2020122722461961600_b45","doi-asserted-by":"crossref","unstructured":"Nahm, A.Y. , Solis-Galvan, L.E. , Rao, S.S. and Ragu-Nathan, T.S. (2002), \u201cThe Q-sort method: assessing reliability and construct validity of questionnaire items at a pre-testing stage\u201d, Journal of Modern Applied Statistical Methods , Vol. 1 No. 1, pp. 114-125.","DOI":"10.22237\/jmasm\/1020255360"},{"key":"key2020122722461961600_b46","doi-asserted-by":"crossref","unstructured":"Narasimhan, R. and Jayaram, J. (1998), \u201cCausal linkage in supply chain management: an exploratory study of North American manufacturing firms\u201d, Decision Science , Vol. 9 No. 3, pp. 579-605.","DOI":"10.1111\/j.1540-5915.1998.tb01355.x"},{"key":"key2020122722461961600_b47","unstructured":"Pfeffer, J. and Salancik, G.R. (1978), The External Control of Organizations: A Resource Dependence Perspective , Harper and Row, New York, NY."},{"key":"key2020122722461961600_b48","unstructured":"Ratnasingham, P. and Kumar, K. (2000), \u201cTrading partner trust in electronic commerce participation\u201d, in Proceedings of the Twenty First International Conference on Information Systems , Association for Information Systems, Atlanta, GA."},{"key":"key2020122722461961600_b91","unstructured":"Rice, J. and Caniato, F. (2003), \u201cBuilding a secure and resilient supply network\u201d, Supply chain management review , Vol. 7 No. 5, pp. 22-30."},{"key":"key2020122722461961600_b49","unstructured":"Russell, D.M. and Saldanha, J.P. (2003), \u201cFive tenets of security-aware logistics and supply chain operation\u201d, Transportation Journal , Vol. 42 No. 4, pp. 44-54."},{"key":"key2020122722461961600_b51","doi-asserted-by":"crossref","unstructured":"Sambasivan, M. , Nandan, T. and Mohame, Z.A. (2009), \u201cConsolidation of performance measures in a supply chain environment\u201d, Journal of Enterprise Information Management , Vol. 22 No. 6, pp. 660-689.","DOI":"10.1108\/17410390910999576"},{"key":"key2020122722461961600_b52","doi-asserted-by":"crossref","unstructured":"Sarathy, R. (2006), \u201cSecurity and the global supply chain\u201d, Transportation Journal , Vol. 45 No. 4, pp. 29-52.","DOI":"10.5325\/transportationj.45.4.0028"},{"key":"key2020122722461961600_b53","doi-asserted-by":"crossref","unstructured":"Schultz, E.E. , Proctor, R.W. and Lien, M.C. (2001), \u201cUsability and security: an appraisal of usability issues in information security methods\u201d, Computer and Security , Vol. 20 No. 4, pp. 331-339.","DOI":"10.1016\/S0167-4048(01)00712-X"},{"key":"key2020122722461961600_b92","doi-asserted-by":"crossref","unstructured":"Sezen, B. (2008), \u201cRelative effects of design, integration and information sharing on supply chain performance\u201d, Supply Chain Management: An International Journal , Vol. 13 No. 3, pp. 233-240.","DOI":"10.1108\/13598540810871271"},{"key":"key2020122722461961600_b54","doi-asserted-by":"crossref","unstructured":"Sheffi, Y. (2001), \u201cSupply chain management under the threat of international terrorism\u201d, International Journal of Logistics Management , Vol. 12 No. 2, pp. 1-11.","DOI":"10.1108\/09574090110806262"},{"key":"key2020122722461961600_b55","doi-asserted-by":"crossref","unstructured":"Siponen, M.T. (2000), \u201cA conceptual foundation for organizational information security awareness\u201d, Information Management and Computer Security , Vol. 8 No. 1, pp. 31-41.","DOI":"10.1108\/09685220010371394"},{"key":"key2020122722461961600_b90","unstructured":"Stephens, S. (2001), \u201cThe supply chain council and the supply chain operations reference (SCOR) model: integrating processes, performance measurements, technology and best practice\u201d, Annals of the Logistic Spectrum , Vol. 34, pp. 16-18."},{"key":"key2020122722461961600_b58","doi-asserted-by":"crossref","unstructured":"Stewart, G. (1995), \u201cSupply chain performance benchmarking study reveals keys to supply chain excellence\u201d, Logistics Information Management , Vol. 8 No. 2, pp. 38-44.","DOI":"10.1108\/09576059510085000"},{"key":"key2020122722461961600_b59","doi-asserted-by":"crossref","unstructured":"Straub, D.W. and Welke, R.J. (1998), \u201cCoping with systems risk: security planning models for management decision-making\u201d, MIS Quarterly , Vol. 22 No. 4, pp. 441-469.","DOI":"10.2307\/249551"},{"key":"key2020122722461961600_b60","doi-asserted-by":"crossref","unstructured":"Tan, F.B. and Hunter, M.G. (2002), \u201cThe repertory grid technique: a method for the study of cognition in information systems\u201d, MIS Quarterly , Vol. 26 No. 1, pp. 39-57.","DOI":"10.2307\/4132340"},{"key":"key2020122722461961600_b61","doi-asserted-by":"crossref","unstructured":"Thomson, M.E. and von Solms, R. (1998), \u201cInformation security awareness: educating your users effectively\u201d, Information Management and Computer Security , Vol. 6 No. 4, pp. 167-173.","DOI":"10.1108\/09685229810227649"},{"key":"key2020122722461961600_b62","unstructured":"Tornatzky, L.G. and Fleischer, M. (1990), The Processes of Technological Innovation , Lexington Books, Lexington, MA."},{"key":"key2020122722461961600_b65","doi-asserted-by":"crossref","unstructured":"Von Solms, R. (1998), \u201cInformation security management: why information security is so important\u201d, Information Management and Computer Security , Vol. 6 No. 5, pp. 224-225.","DOI":"10.1108\/09685229810240158"},{"key":"key2020122722461961600_b66","doi-asserted-by":"crossref","unstructured":"Voss, M.D. , Whipple, J.M. and Closs, D.J. (2008), \u201cThe role of strategic security: internal and external security measures with security performance implications\u201d, Transportation Journal , Vol. 28 No. 2, pp. 5-23.","DOI":"10.5325\/transportationj.48.2.0005"},{"key":"key2020122722461961600_b67","doi-asserted-by":"crossref","unstructured":"Werlinger, R. , Hawkey, K. and Beznosov, K. (2009), \u201cAn integrated view of human, organizational and technological challenges of IT security management\u201d, Information management and Computer Security , Vol. 17 No. 1, pp. 4-19.","DOI":"10.1108\/09685220910944722"},{"key":"key2020122722461961600_b68","doi-asserted-by":"crossref","unstructured":"Williams, Z. , Leug, E.J. , Taylor, R.D. and Cook, R.L. (2009), \u201cWhy all the changes? An institutional theory approach to exploring the drivers of supply chain security (SCS)\u201d, International Journal of Physical Distribution and Logistics Management , Vol. 39 No. 7, pp. 595-618.","DOI":"10.1108\/09600030910996279"},{"key":"key2020122722461961600_b69","doi-asserted-by":"crossref","unstructured":"Wright, M. (1999), \u201cThird generation risk management practices\u201d, Computers and Security , Vol. 1 No. 2, pp. 9-12.","DOI":"10.1016\/S1361-3723(99)80005-0"},{"key":"key2020122722461961600_b70","doi-asserted-by":"crossref","unstructured":"Yang, C. and Wei, H. (2011), \u201cThe effect of supply chain security management on security performance in container shipping operations\u201d, Supply Chain Management: An International Journal , Vol. 18 No. 1, pp. 74-85.","DOI":"10.1108\/13598541311293195"},{"key":"key2020122722461961600_b93","doi-asserted-by":"crossref","unstructured":"Yu, M. , Ting, S. and Chen, C. (2010), \u201cEvaluating the cross-efficiency of information sharing in supply chains\u201d, Expert Systems with Applications , Vol. 37 No. 4, pp. 2891-2897.","DOI":"10.1016\/j.eswa.2009.09.048"},{"key":"key2020122722461961600_b71","doi-asserted-by":"crossref","unstructured":"Zhou, H. and Bentor, W.C.Jr ( 2007), \u201cSupply chain practice and information sharing\u201d, Journal of Operations Management , Vol. 25 No. 6, pp. 1348-1365.","DOI":"10.1016\/j.jom.2007.01.009"},{"key":"key2020122722461961600_frd1","doi-asserted-by":"crossref","unstructured":"Autry, C.W. and Bobbit, L.M. (2008), \u201cSupply chain security orientation: conceptual development and a proposed framework\u201d, The International Journal of Logistics Management , Vol. 19 No. 1, pp. 42-64.","DOI":"10.1108\/09574090810872596"},{"key":"key2020122722461961600_frd2","unstructured":"Da Veiga, A. and Eloff, J.H.P. (2009), \u201cA framework and assessment instrument for information security culture\u201d, Computers and Security , Vol. 29 No. 2 pp. 1-12."},{"key":"key2020122722461961600_frd3","unstructured":"Da Veiga, A. , Martins, N. and Eloff, J.H.P. (2007), \u201cInformation security culture-validation of an assessment instrument\u201d, Southern African Business Review , Vol. 11 No. 1, pp. 147-166."},{"key":"key2020122722461961600_frd4","doi-asserted-by":"crossref","unstructured":"Dhillon, G. (2001), \u201cViolation of safeguards by trusted personnel and understanding related information security concerns\u201d, Computers and Security , Vol. 20 No. 2, pp. 165-172.","DOI":"10.1016\/S0167-4048(01)00209-7"},{"key":"key2020122722461961600_frd5","doi-asserted-by":"crossref","unstructured":"Dhillon, G. and Backhouse, J. (2001), \u201cCurrent directions in IS security research: toward socio-organizational perspectives\u201d, Information Systems Journal , Vol. 11 No. 2, pp. 127-153.","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"key":"key2020122722461961600_frd6","doi-asserted-by":"crossref","unstructured":"Dhillon, G. and Torkzadeh, G. (2006), \u201cValue focused assessment of information system security in organizations\u201d, Information Systems Journal , Vol. 16 No. 3, pp. 293-314.","DOI":"10.1111\/j.1365-2575.2006.00219.x"},{"key":"key2020122722461961600_frd7","doi-asserted-by":"crossref","unstructured":"Fiala, P. (2005), \u201cInformation sharing in supply chains\u201d, Omega , Vol. 33 No. 5, pp. 419-423.","DOI":"10.1016\/j.omega.2004.07.006"},{"key":"key2020122722461961600_frd8","unstructured":"Gay, L.R. and Airasian, P. (2003), Educational Research: Competencies for Analysis and Applications , Merrill\/Prentice Hall, Upper Saddle River, NJ."},{"key":"key2020122722461961600_frd9","doi-asserted-by":"crossref","unstructured":"Green, K.W.Jr. , Whitten, D. and Inman, R.A. (2008), \u201cThe impact of logistics performance on organizational performance in a supply chain context\u201d, Supply Chain Management , Vol. 13 No. 4, pp. 317-327.","DOI":"10.1108\/13598540810882206"},{"key":"key2020122722461961600_frd10","unstructured":"Russell, D. and Gangemi, G.T. (1991), Computer Security Basics , O\u2019Reilly and Associates, Sebastopol, CA."},{"key":"key2020122722461961600_frd11","doi-asserted-by":"crossref","unstructured":"Siponen, M.T. (2001), \u201cFive dimensions of information security awareness\u201d, Computers and Society , Vol. 31 No. 2, pp. 24-29.","DOI":"10.1145\/503345.503348"},{"key":"key2020122722461961600_frd12","doi-asserted-by":"crossref","unstructured":"Siponen, M.T. and Oinas-Kukkonen, H. (2007), \u201cA review of information security issues and respective research contributions\u201d, The Database for Advances in Information Systems , Vol. 38 No. 1, pp. 60-81.","DOI":"10.1145\/1216218.1216224"},{"key":"key2020122722461961600_frd13","doi-asserted-by":"crossref","unstructured":"Von Solms, B. (2000), \u201cInformation security \u2013 the third wave?\u201d, Computers and Security , Vol. 19 No. 7, pp. 615-620.","DOI":"10.1016\/S0167-4048(00)07021-8"},{"key":"key2020122722461961600_frd14","doi-asserted-by":"crossref","unstructured":"Von Solms, R. (1996), \u201cInformation security management: the second generation\u201d, Computers and Security , Vol. 15 No. 4, pp. 281-288.","DOI":"10.1016\/0167-4048(96)88939-5"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IMCS-05-2013-0035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMCS-05-2013-0035\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMCS-05-2013-0035\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:50:46Z","timestamp":1753393846000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/22\/5\/450-473\/186942"}},"subtitle":["An empirical investigation"],"short-title":[],"issued":{"date-parts":[[2014,11,10]]},"references-count":79,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,11,10]]}},"alternative-id":["10.1108\/IMCS-05-2013-0035"],"URL":"https:\/\/doi.org\/10.1108\/imcs-05-2013-0035","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2014,11,10]]}}}