{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T12:47:42Z","timestamp":1745326062148,"version":"3.28.0"},"reference-count":78,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899445","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T23:18:43Z","timestamp":1574723923000},"page":"1-9","source":"Crossref","is-referenced-by-count":6,"title":["Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management Alignment"],"prefix":"10.1109","author":[{"given":"Abraham","family":"Althonayan","sequence":"first","affiliation":[]},{"given":"Alina","family":"Andronache","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810908796"},{"journal-title":"Information security risk assessment toolkit Practical Assessments through Data Collection and Data Analysis","year":"2012","author":"talabis","key":"ref72"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2018.92010"},{"journal-title":"Advancing Cyber Resilience - Principles and Tools for Boards","year":"2017","key":"ref70"},{"journal-title":"Net Losses Estimating the Global Cost of Cybercrime Economic Impact of Cybercrime II","year":"2014","key":"ref76"},{"journal-title":"Economic Impact of Cybercrime&#x2014;No Slowing Down","year":"2018","key":"ref77"},{"journal-title":"Economic Impact of Cybercrime and Cyber Espionage","year":"2013","key":"ref74"},{"key":"ref39","first-page":"19","article-title":"Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level","volume":"3","author":"alexander","year":"2017","journal-title":"Crit Infrastructure Protect"},{"journal-title":"2015 Industry drill-down report financial services","year":"2015","key":"ref75"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2544381"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.11.023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.09.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2010.01.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2004.08.002"},{"key":"ref30","first-page":"63","article-title":"Convergence of corporate and information security","volume":"7","author":"rahman","year":"2010","journal-title":"International Journal of Information and Computer Security"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1142\/S0219649216500441"},{"journal-title":"Fundamentals of Enterprise risk management how top companies assess risk manage exposure and seize opportunity","year":"2015","author":"hampton","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.1"},{"key":"ref34","first-page":"109","article-title":"Aligning enterprise risk management with business strategy and information systems","author":"althonayan","year":"2011","journal-title":"European Mediterranean & Middle Eastern Conference on Information Systems 2011 (EMCIS2011)"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2016.7820663"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1177\/1476127013481155"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2819185"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.12.007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.165"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1080\/10580530701239314"},{"journal-title":"Risk in focus 2019 hot topics for internal auditors","year":"2018","key":"ref27"},{"journal-title":"UK 2015 Cyber risk survey report","year":"2015","key":"ref65"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.11.003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00007-0"},{"journal-title":"Cyber Security Culture in organisations","year":"2017","key":"ref67"},{"key":"ref68","first-page":"1","article-title":"A toolkit approach to information security awareness and education","volume":"5","author":"korovessis","year":"2017","journal-title":"Journal of Cybersecurity Education Research and Practice"},{"journal-title":"Risk management perspectives of global corporations","article-title":"Cambridge Centre for Risk Studies","year":"2018","key":"ref69"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.017"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"67","DOI":"10.36965\/OJAKM.2018.6(1)67-80","article-title":"Expert assessment of organizational cybersecurity programs and development of vignettes to measure cybersecurity countermeasures awareness","volume":"6","author":"goode","year":"2018","journal-title":"Online Journal of Applied Knowledge Management"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.10.010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.10.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.11.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3285957.3285971"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.10.009"},{"journal-title":"IT Governance an international guide to data security and IS027001\/ ISO27002","year":"2012","author":"calder","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-007-0024-8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300306"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.005"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"62","DOI":"10.5742\/MEJB.2015.92601","article-title":"Information security aligned to enterprise management","volume":"10","author":"fakhri","year":"2015","journal-title":"Middle East J Bus"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2011.05.002"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(95)00056-9"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.15209\/jbsge.v9i2.718"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(99)00048-8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1147\/sj.382.0472"},{"key":"ref52","article-title":"Information Technology (IT) Integration and Cybersecurity\/Security: The Security Savviness of Board of Directors","author":"islam","year":"2017","journal-title":"Third Americas Conference on Information Systems"},{"key":"ref10","first-page":"798","article-title":"A systematic review of information security governance frameworks in the cloud computing environment","volume":"18","author":"rebollo","year":"2012","journal-title":"J UCS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2016-0061"},{"key":"ref40","first-page":"165","article-title":"An update on IT: business alignment: &#x201C;a line&#x201D; has been drawn","volume":"6","author":"luftman","year":"2007","journal-title":"MIS Quarterly Executive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0159"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.10"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1111\/jori.12035"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6622.2009.00250.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-02-2013-0014"},{"key":"ref17","first-page":"108","article-title":"Holistic cyber security implementation framework: a case study of Jordan International Journal of Information","volume":"9","author":"atoum","year":"2017","journal-title":"Business and Management"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/9781118241530"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1002\/9781119055228","author":"kaplan","year":"2015","journal-title":"Beyond cybersecurity protecting your digital business"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-00333-3_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.02.007"},{"key":"ref6","article-title":"Foundations for an Intelligence-driven Information Security Risk-management System","volume":"17","author":"webb","year":"2016","journal-title":"Journal of Information Technology Theory and Application (JITTA)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2018.02.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.22364\/bjmc.2017.5.1.07"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.10.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-012-0683-0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.00414"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2014.10.090"},{"key":"ref48","article-title":"Enhancing the measurement of information technology (IT) business alignment and its influence on company performance","volume":"32","author":"luftman","year":"2017","journal-title":"Journal of Information"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1108\/17410390510628364"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1108\/FS-02-2018-0020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2016.11.002"},{"journal-title":"Doing a systematic review A student's guide","year":"2014","author":"boland","key":"ref44"},{"key":"ref43","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007","journal-title":"Evidence-Based Software Engineering (EBSE) Technical Report Engineering"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, United Kingdom","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899445.pdf?arnumber=8899445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T09:38:37Z","timestamp":1695461917000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":78,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899445","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}