Alignment between organizational critical success factors (CSFs) and competencies is widely believed to improve performance. This study examines the performance implications of alignment between CSFs and one source of competence, the organization's information technology capability. The effects of three antecedent factors-environmental uncertainty, integration, and IT management sophistication-are also examined.This paper uses survey data from 244 large academic institutions, along with some secondary data. Following the profile deviation approach to measure alignment, the academic institutions are divided into three clusters based on their CSFs: the academic comprehensives, the reputed giants, and the small educators. The ideal profile of IT capability is next developed for each cluster in terms of four dimensions: information retrieval, electronic communication, computing facilities for students, and computer-aided education. Alignment is then computed for each institution as the proximity of its IT capability profile from the ideal IT capability profile for the cluster to which it belongs.The results suggest that alignment facilitates both perceived IT success and organizational performance. Moreover, sophisticated IT management facilitates both alignment and perceived IT success, environmental uncertainty facilitates perceived IT success but not alignment, and integration facilitates neither alignment nor perceived IT success.
Organizations store data regarding their operations, employees, consumers, and suppliers in their databases. Some of the data are considered confidential, and by law, the organization is required to provide appropriate security measures in order to preserve privacy. Yet a number of companies have little or no security measures. The reason for this lack of security may, at least in part, be attributed to a lack of awareness and empirical evidence about the relative effectiveness of security mechanisms. This study investigates the effectiveness of different security mechanisms for protecting numerical database attributes. The trade-off between security, accessibility, and accuracy are examined. A comparison of different security mechanisms reveals that fixed data perturbation is preferred because it maximizes both security and accessibility. An investigation of the different approaches to fixed data perturbation indicates that multiplicative method best meets these criteria.database management, data security, data perturbation
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.