Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

A Resource View Of Information Security Incident Response, Mark-David J. Mclaughlin Apr 2018

A Resource View Of Information Security Incident Response, Mark-David J. Mclaughlin

2018

This dissertation investigates managerial and strategic aspects of InfoSec incident preparation and response. This dissertation is presented in four chapters:

Chapter 1: an introduction

Chapter 2: a systematic literature review

Chapter 3: two field-based case studies of InfoSec incident response processes

Chapter 4: a repertory grid study identifying characteristics of effective individual incident responders.

Together these chapters demonstrate that the lenses of the Resource Based View, Theory of Complementary Resources, and Accounting Control Theory, can be combined to classify and analyze the resources organizations use during incident response. I find that incident response is maturing as a discipline and organizations …


Exploring Sme Vulnerabilities To Cyber-Criminal Activities Through Employee Behavior And Internet Access, Jerry Allen Twisdale Jan 2018

Exploring Sme Vulnerabilities To Cyber-Criminal Activities Through Employee Behavior And Internet Access, Jerry Allen Twisdale

Walden Dissertations and Doctoral Studies

Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies …