[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fbpq1C5iMu1ClNW5QzFEgFvghXC3N92DJRpOUaGT0O7s":3,"$f8eIokepG8dvKro6JhaP864AhK498aXyGvemJQVF2IHA":12},{"author":4,"tags":11},{"author_id":5,"author_name":6,"author_name_first_letter":7,"article_count":8,"bio":9,"short_bio":9,"slug":10,"image_url":9},101205,"The IIA Research Foundation","T",1,null,"the-iia-research-foundation",[],{"quotes":13,"pagination":27},[14],{"id":15,"quote_text":16,"author_id":5,"source_id":17,"has_image":18,"author":19,"source":20,"quote_tag":21,"commentary":9},776649,"Information is a significant component of most organizations’ competitive strategy either by the direct collection, management, and interpretation of business information or the retention of information for day-to-day business processing. Some of the more obvious results of IS failures include reputational damage, placing the organization at a competitive disadvantage, and contractual noncompliance. These impacts should not be underestimated.",2,false,{"id":5,"author_name":6,"slug":10,"author_name_first_letter":7,"article_count":8,"image_url":9},{},[22],{"id":23,"tag":24},3651559,{"id":25,"tag_name":26},37064,"cyber-security",{"currentPage":8,"totalPages":8,"totalItems":8,"itemsPerPage":28},10]