Figure 3 - uploaded by Aias Martakis
Content may be subject to copyright.
9: Kaplan and Norton's Balanced Scorecard 

9: Kaplan and Norton's Balanced Scorecard 

Source publication
Thesis
Full-text available
Decisions in an enterprise are often complex and deal with many uncertainties. Uncertainties, if left unmanaged, can hamper value creation, lead to a loss of value or even result in catastrophic failures. The Enterprise Architecture (EA) of an organization is the enterprise-wide model that describes and aligns its business- and IT-architectures wit...

Similar publications

Conference Paper
Full-text available
Only if the right people equipped with the necessary competencies fulfill the tasks correctly that should be done in their designated roles, the full concept of Enterprise Architecture Management (EAM) can be deployed. This topic has been discussed quite rarely in the past. Therefore, this work systematically analyzes manifold EAM literature source...
Conference Paper
Full-text available
Ensuring the alignment between IT and business can be a difficult challenge. That is the reason why the Enterprise Architecture domain exists, to provide guidance on how to better align Business and IT. There are several methods in existence that guide an organization in developing its Enterprise Architecture. However, putting these methods in prac...
Article
Full-text available
Business–IT alignment and misalignment are duality-like concepts referring to the harmony or disharmony between business and IT. The state between these two areas can be viewed either through its presence (a.k.a. alignment) or through its absence or difficulties (a.k.a. misalignment). Most of alignment studies deal with alignment achievement, while...
Article
Full-text available
Backgrounds: Nowadays developing smart and fast services for patients and transforming hospitals to modern hospitals is considered a necessity. Living in the world inundated with information systems, designing services based on information technology entails a suitable architecture framework. Objectives: This paper aims to present a localized en...

Citations

... Real options theory informs the way subconscious decisions are made to minimize investment based on perceived risk (Benaroch, 2018), and describes the relationship between anticipated cost and cybersecurity return (Martakis, 2015), but does not factor nonfinancial decisions and their impact on determining security budget. Informed by real options theory and its use of multiple decision-influencing factors for investment, Gordon et al. (2015a) measured the influence of certain organizational traits on enterprise cybersecurity investment. ...
... Originally used in decisionmaking for investments in petroleum exploration, real options theory has also been used in minimizing IT security investments to cover identified costs by incorporating quantitative assessments of uncertain outcomes (Fichman, 2004). Real options theory helps explain subconscious decisions to minimize investment based on perceived risk (Benaroch, 2018) and describes the relationship between anticipated cost and cybersecurity return (Martakis, 2015). ...
Thesis
Retail organizations are driven to improve security posture for many reasons, including meeting financial regulation requirements, mitigating threats of data breach, and differentiating themselves within markets affected by customer perception. The problem was that little was known about how these drivers of internal control, cybersecurity risk, and competitive advantage impact retail cybersecurity budgets within the retail sector. The purpose of this quantitative nonexperimental correlational study was to describe the relationship between cybersecurity budget and drivers of internal control, cybersecurity risk, and competitive advantage among U.S.-based retail merchant organizations. Real options theory provided a foundation for explaining this decision-making process. Data were collected from a web-based survey of 66 U.S. retail merchants. Results from multiple linear regression analysis indicated a positive predictive relationship between the driver of internal control and cybersecurity budget (F = 10.369, p = .002). Analysis also resulted in a regression formula by which assessment of this predictive organizational trait may be used to forecast or benchmark expected cybersecurity budget. Retail organizations may evaluate these factors to learn how they may be contributing to inefficient cybersecurity investment strategies, and security firms and regulators may develop improved tools and education initiatives by which to address drivers of underinvestment. With this information, leaders may effect social change by optimizing security investments that lead to lower prices, improved consumer privacy, and a more stable retail economy.