Open Access. Powered by Scholars. Published by Universities.®
Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Library and Information Science
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Walden Dissertations and Doctoral Studies
Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Walden Dissertations and Doctoral Studies
Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …
Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias
Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias
Walden Dissertations and Doctoral Studies
Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …