Open Access. Powered by Scholars. Published by Universities.®
Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (11)
- Physical Sciences and Mathematics (11)
- Databases and Information Systems (5)
- Business (4)
- Computer Engineering (4)
-
- Digital Communications and Networking (4)
- Engineering (4)
- Information Literacy (4)
- Law (3)
- Law Librarianship (3)
- Science and Technology Studies (3)
- Business Intelligence (2)
- Communication (2)
- Communication Technology and New Media (2)
- Computer Law (2)
- Computer and Systems Architecture (2)
- Consumer Protection Law (2)
- Data Storage Systems (2)
- E-Commerce (2)
- Information Security (2)
- Management Information Systems (2)
- Management Sciences and Quantitative Methods (2)
- Operational Research (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Privacy Law (2)
- Scholarly Communication (2)
- Social Media (2)
- Technology and Innovation (2)
- Institution
- Publication
-
- Library Philosophy and Practice (e-journal) (4)
- Walden Dissertations and Doctoral Studies (4)
- CCE Theses and Dissertations (2)
- Journal of International Technology and Information Management (2)
- USF Tampa Graduate Theses and Dissertations (2)
-
- All Faculty Scholarship (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Information Science Faculty Publications (1)
- Law Library Newsletters/Blog (1)
- Lori B. Andrews (1)
- Selected Full Text Dissertations, 2011- (1)
- Theses/Capstones/Creative Projects (1)
- University Libraries Faculty and Staff Publications (1)
- Publication Type
Articles 1 - 22 of 22
Full-Text Articles in Library and Information Science
A Comprehensive Review Of Literature And Exploration On Library Security System, Amreen Khan, S. K. Sonkar
A Comprehensive Review Of Literature And Exploration On Library Security System, Amreen Khan, S. K. Sonkar
Library Philosophy and Practice (e-journal)
The most important component in libraries is the security system. which is responsible to keep up the library safe and secure against any type of threat. Libraries today use the newest security systems available, which are very beneficial and effective for them. In light of this, the present study is carried out for literature review on the use and applications of security system in libraries. The paper aims to evaluate numerous aspects of security system for libraries, including their benefits and drawbacks. The paper will also be revealed that what are the challenging factor which libraries facing for the efficient …
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Theses/Capstones/Creative Projects
This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Walden Dissertations and Doctoral Studies
Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Walden Dissertations and Doctoral Studies
Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …
Business Hacking: A Case Study Of Business Information Systems, Donald W. Wright
Business Hacking: A Case Study Of Business Information Systems, Donald W. Wright
Selected Full Text Dissertations, 2011-
This study aims to explore, understand, and explain the hacking of business information systems (BIS) and the measures managers can take to secure their systems. Eight research questions guide the study: 1. What are managers' perceptions of hacking business information systems? 2. What types of attacks do business managers perceive as current and potential dangers to their organizations? 3. What issues prevent participants from participating in BIS security research studies? 4. What protocols are in place to prevent hacking? 5. What measures can managers take to secure their business information systems against hacking? 6. How can knowledge management and information …
Disruption Of Library Services Due To Hospital Cyberattack: A Case Study, Alice Stokes
Disruption Of Library Services Due To Hospital Cyberattack: A Case Study, Alice Stokes
University Libraries Faculty and Staff Publications
Cyberattacks on healthcare organizations increased dramatically in 2020 and 2021. The University of Vermont Medical Center suffered an attack in October 2020, during the second wave of the COVID-19 pandemic. The disruption to hospital computer systems had wide ranging impacts, including loss of online access to the medical library for nearly three months. Library staff worked to reduce impacts and increase access for hospital employees until full access was restored. This case study offers lessons learned and resources for health sciences libraries planning for a potential cyberattack.
A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker
A Universal Cybersecurity Competency Framework For Organizational Users, Patricia A. Baker
CCE Theses and Dissertations
The global reliance on the Internet to facilitate organizational operations necessitates further investments in organizational information security. Such investments hold the potential for protecting information assets from cybercriminals. To assist organizations with their information security, The National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) was created. The framework referenced the cybersecurity work, knowledge, and skills required to competently complete the tasks that strengthen their information security. Organizational users’ limited cybersecurity competency contributes to the financial and information losses suffered by organizations year after year. While most organizational users may be able to respond positively to a cybersecurity threat, …
Self-Protection In Cyberspace: Assessing The Processual Relationship Between Thoughtfully Reflective Decision Making, Protection Motivation Theory, Cyber Hygiene, And Victimization, C. Jordan Howell
USF Tampa Graduate Theses and Dissertations
The current study, using structural equation modeling, assesses the processual relationship between thoughtfully reflective decision making (TRDM), theoretical constructs derived from protection motivation theory (PMT), cyber hygiene, and online victimization to determine the cognitive decision-making process that leads to the adoption of online self-protective behaviors, which reduces the occurrence of victimization experiences. Findings, derived from a general sample of Internet users in the United States, reveal: (1) engagement in cyber hygiene practices, as a form of target hardening, decreases Internet users’ experiences with online victimization; (2) thoughtfully reflective decision makers, in the face of cyber threats, develop higher threat appraisals …
Exploring The Information Security Practices On The Smartphone By The Postgraduate Students Of University Of Calicut, Vysakh C, Amina Jasmina K V
Exploring The Information Security Practices On The Smartphone By The Postgraduate Students Of University Of Calicut, Vysakh C, Amina Jasmina K V
Library Philosophy and Practice (e-journal)
This paper aims to report on the information security practices on the smartphone by the students of the University of Calicut, Kerala. Data were gathered by using a survey questionnaire which was administered to 344 smartphone cohorts at the postgraduate level. The study findings reported the scanty knowledge of the participants regarding the issues and risks associated with smartphones even though most of the respondents were aware of the information security practices available in the smartphones. The data analysis delineated the habit of students storing secret and sensitive information like ATM password, bank or credit card account details and personal …
Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite
Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite
Library Philosophy and Practice (e-journal)
Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …
Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo
Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo
CCE Theses and Dissertations
Information Systems (IS) are critical for employee productivity and organizational success. Data breaches are on the rise—with thousands of data breaches accounting for billions of records breached and annual global cybersecurity costs projected to reach $10.5 trillion by 2025. A data breach is the unauthorized disclosure of sensitive information—and can be achieved intentionally or unintentionally. Significant causes of data breaches are hacking and human error; in some estimates, human error accounted for about a quarter of all data breaches in 2018. Furthermore, the significance of human error on data breaches is largely underrepresented, as hackers often capitalize on organizational users’ …
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
Journal of International Technology and Information Management
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.
In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.
With an increasing threat to information security for …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
USF Tampa Graduate Theses and Dissertations
Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.
To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …
Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan
Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan
Information Science Faculty Publications
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI's …
Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle
Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle
Walden Dissertations and Doctoral Studies
Small business leaders face a wide range of cybersecurity threats. Ransomware is a specific cybersecurity threat that cybercriminals can use to deny small business leaders’ access to data in exchange for a ransom payment. Grounded in routine activity conceptual framework, the purpose of this qualitative multiple case study was to explore effective strategies small business leaders use to address ransomware. Data were collected from 5 leaders of small businesses in the southeast region of the United States. Data sources included interviews and archival documents. Data were analyzed using Yin’s 5 step process. The analysis revealed 3 primary themes: ransomware strategy, …
Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove
Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove
Walden Dissertations and Doctoral Studies
Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Copyright, Fair Use, Scholarly Communication, etc.
The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …
Law Library Blog (September 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (September 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Lori B. Andrews
Effectiveness Of Metadata Information And Tools Applied To National Security, Cassidy Pham
Effectiveness Of Metadata Information And Tools Applied To National Security, Cassidy Pham
Library Philosophy and Practice (e-journal)
No abstract provided.