Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Business

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Game Theory For Security Investments In Cyber And Supply Chain Networks, Shivani Shukla Nov 2017

Game Theory For Security Investments In Cyber And Supply Chain Networks, Shivani Shukla

Doctoral Dissertations

In a constantly and intricately connected world that is going digital, cybersecurity is imperative to not just the success but also the survival of a business. The ubiquitous digital transformation is fueled by a convulsive growth of devices and data that are leading important innovations in the domain of cyber-physical systems. However, this growth has also enabled internal and external threats to skyrocket, depicting the inherent dichotomy. With an evolving threat landscape, a perpetrator has to be successful once, while the defenders have to continually succeed in fending-off attacks to protect critical infrastructure and digital assets. Businesses are facing a …


Strategies For Recruiting Cybersecurity Professionals In The Financial Service Industry, Iva Walters Jan 2017

Strategies For Recruiting Cybersecurity Professionals In The Financial Service Industry, Iva Walters

Walden Dissertations and Doctoral Studies

The cybersecurity market is the fastest growing market in the United States; as such, leaders in financial institutions recognize their businesses are vulnerable, as money is accessible within computerized banking systems. The purpose of this multiple case study was to explore what strategies financial service leaders- use to recruit cybersecurity professionals. The conceptual framework for this study was the hierarchy of needs and stakeholder management theory. Data collection involved company archival documents and semistructured, open-ended interviews with 5 financial service leaders in the Midlands area of South Carolina who recruited skilled cybersecurity professionals to support long-term business sustainability. Coding, clustering, …


Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye Jan 2017

Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye

Walden Dissertations and Doctoral Studies

Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had …


Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo Jan 2017

Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo

Walden Dissertations and Doctoral Studies

According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination of diffusion of innovation theory and technology-organization-environment framework as the foundation, a predictive cybersecurity model was developed to determine the factors that …


Impact Of Framing And Priming On Users' Behavior In Cybersecurity, Kavya Sharma Jan 2017

Impact Of Framing And Priming On Users' Behavior In Cybersecurity, Kavya Sharma

Masters Theses

"This research examines the impact of framing and priming on users' behavior (i.e., action) in a cybersecurity setting. It also examines perceptual outcomes (i.e., confidence, perceived severity, perceived susceptibility, trust, and fear) associated with the users' cybersecurity action. The research draws on prospect theory in the behavioral economics literature and instance-based learning theory in the education literature to generate the hypotheses for the research. A between-subject experimental design (N=129) was used. The results suggest that priming users to cybersecurity risks reduces their risk-taking behavior associated with cybersecurity whereas negative framing of messages associated with cybersecurity has no significant effect on …


Are You Ready? A Proposed Framework For The Assessment Of Digital Forensic Readiness, Andres Felipe Diaz Lopez Jan 2017

Are You Ready? A Proposed Framework For The Assessment Of Digital Forensic Readiness, Andres Felipe Diaz Lopez

Electronic Theses and Dissertations

This dissertation develops a framework to assess Digital Forensic Readiness (DFR) in organizations. DFR is the state of preparedness to obtain, understand, and present digital evidence when needed. This research collects indicators of digital forensic readiness from a systematic literature review. More than one thousand indicators were found and semantically analyzed to identify the dimensions to where they belong. These dimensions were subjected to a q-sort test and validated using association rules, producing a preliminary framework of DFR for practitioners. By classifying these indicators into dimensions, it was possible to distill them into 71 variables further classified into either extant …