References
Alexy, O., West, J., Klapper, H., & Reitzig, M. (2017). Surrendering control to gain advantage: Reconciling openness and the resource-based view of the firm. Strategic Management Journal, 39(6), 1704–1727. https://doi.org/10.1002/smj.2706
Alkasasbeh, A. A. (2014). The Effect of Information Technology Capabilities in Implementing Information Security Management Systems. European Scientific Journal, 10(18), 377–385. https://eujournal.org/index.php/esj/article/view/3606
Al-Sartawi, A. M., & Razzaque, A. (2020). Cyber Security, IT Governance, and Performance: A Review of the Current Literature. In Albastaki, Y. A., & Awad, W. (Eds.), Implementing Computational Intelligence Techniques for Security Systems Design (pp. 275-288). IGI Global. https://doi.org/10.4018/978-1-7998-2418-3.ch014
Bohme, R., & Moore, T. (2010). The iterated weakest link. IEEE Security & Privacy Magazine, 8(1), 53–55. https://doi.org/10.1109/msp.2010.51
Bose, R., & Luo, X. R. (2014). Investigating security investment impact on firm performance. International Journal of Accounting & Information Management, 22(3), 194–208. https://doi.org/10.1108/IJAIM-04-2014-0026
Brody, R. G., Chang, H. U., & Schoenberg, E. S. (2018). Malware at its worst: death and destruction. International Journal of Accounting & Information Management, 26(4), 527–540. https://doi.org/10.1108/ijaim-04-2018-0046
Chen, Y., Wang, Y., Nevo, S., Benitez, J., & Kou, G. (2017). Improving Strategic Flexibility with Information Technologies: Insights for Firm Performance in an Emerging Economy. Journal of Information Technology, 32(1), 10–25. https://doi.org/10.1057/jit.2015.26
Cobanoglu, C., Ayoun, B., Connolly, D., & Nusair, K. (2013). The Effect of Information Technology Steering Committees on Perceived IT Management Sophistication in Hotels. International Journal of Hospitality & Tourism Administration, 14(1), 1-22. https://doi.org/10.1080/15256480.2013.753801
Coltman, T., Tallon, P., Sharma, R., & Queiroz, M. (2015). Strategic IT Alignment: Twenty-Five Years on. Journal of Information Technology, 30(2), 91–100. https://doi.org/10.1057/jit.2014.35
D’Arcy, J., Adjerid, I., Angst, C. M., & Glavas, A. (2020). Too Good to Be True: Firm Social Performance and the Risk of Data Breach. Information Systems Research, 31(4), 1200–1223. https://doi.org/10.1287/isre.2020.0939
DeGroote, S. E., & Marx, T. G. (2013). The impact of IT on supply chain agility and firm performance: An empirical investigation. International Journal of Information Management, 33(6), 909–916. https://doi.org/10.1016/j.ijinfomgt.2013.09.001
Fink, L., & Neumann, S. (2009). Exploring the perceived business value of the flexibility enabled by information technology infrastructure. Information & Management, 46(2), 90–99. https://doi.org/10.1016/j.im.2008.11.007
Furnell, S., Heyburn, H., Whitehead, A., & Shah, J. N. (2020). Understanding the full cost of cyber security breaches. Computer Fraud & Security, 2020(12), 6–12. https://doi.org/10.1016/s1361-3723(20)30127-5
Georg, L. (2017). Information security governance: Pending legal responsibilities of non-executive boards. Journal of Management & Governance, 21(4), 793–814. https://doi.org/10.1007/s10997-016-9358-0
Ghasemaghaei, M. (2021). Understanding the impact of big data on firm performance: The necessity of conceptually differentiating among big data characteristics. International Journal of Information Management, 57(1). https://doi.org/10.1016/j.ijinfomgt.2019.102055
Ilmudeen, A., & Bao, Y. (2020). IT strategy and business strategy mediate the effect of managing IT on firm performance: empirical analysis. Journal of Enterprise Information Management, 33(6), 1357–1378. https://doi.org/10.1108/jeim-03-2019-0068
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993. https://doi.org/10.1016/j.jcss.2014.02.005
Johnston, J. A., & Zhang, J. H. (2018). Information Technology Investment and the Timeliness of Financial Reports. Journal of Emerging Technologies in Accounting, 15(1), 77–101. https://doi.org/10.2308/jeta-52066
Jha, A.V., Appasani, B., Ghazali, A.N., 2021, Smart grid cyber-physical systems: communication technologies, standards and challenges. Wireless Netw 27, 2595–2613.
https://doi.org/10.1007/s11276-021-02579-1
Kwon, J., & Johnson, M. E. (2018). Meaningful healthcare security: Does meaningful-use attestation improve information security performance? MIS Quarterly, 42(4), 1043–1067.
Mithas, S., Almirall, D., & Krishnan, M. S. (2006). Do CRM Systems Cause One-to-One Marketing Effectiveness? Statistical Science, 21(2). https://doi.org/10.1214/088342306000000213
Morimura, F., & Sakagawa, Y. (2018). Information technology use in retail chains: Impact on the standardisation of pricing and promotion strategies and performance. Journal of Retailing and Consumer Services, 45, 81–91. https://doi.org/10.1016/j.jretconser.2018.08.009
Nevo, S., & Wade, M. (2011). Firm-level benefits of IT-enabled resources: A conceptual extension and an empirical assessment. The Journal of Strategic Information Systems, 20(4), 403–418. https://doi.org/10.1016/j.jsis.2011.08.001
Park, Y., & Mithas, S. (2020). Organized Complexity of Digital Business Strategy: A Configurational Perspective. MIS Quarterly, 44(1), 85–127. https://doi.org/10.25300/misq/2020/14477
Sabherwal, R., Sabherwal, S., Havaknor, T., & Steelman, Z. (2019). How Does Strategic Alignment Affect Firm Performance? The Roles of Information Technology Investment and Environmental Uncertainty. MIS Quarterly, 43(2), 453–474. https://doi.org/10.25300/misq/2019/13626
Saeidi, P., Saeidi, S. P., Sofian, S., Saeidi, S. P., Nilashi, M., & Mardani, A. (2019). The impact of enterprise risk management on competitive advantage by moderating role of information technology. Computer Standards & Interfaces, 63, 67–82. https://doi.org/10.1016/j.csi.2018.11.009
Thompson, C. G., Kim, R. S., Aloe, A. M., & Becker, B. J. (2017). Extracting the Variance Inflation Factor and Other Multicollinearity Diagnostics from Typical Regression Results. Basic and Applied Social Psychology, 39(2), 81–90. https://doi.org/10.1080/01973533.2016.1277529
Xue, Y., Liang, H., & Boulton, W. (2008). Information Technology Governance in Information Technology Investment Decision Processes: The Impact of Investment Characteristics, External Environment, and Internal Context. MIS Quarterly, 32(1), 67–96. https://doi.org/10.2307/25148829