Open Access. Powered by Scholars. Published by Universities.®
Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 4 of 4
Full-Text Articles in Library and Information Science
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Theses/Capstones/Creative Projects
This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Walden Dissertations and Doctoral Studies
Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Walden Dissertations and Doctoral Studies
Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …
Business Hacking: A Case Study Of Business Information Systems, Donald W. Wright
Business Hacking: A Case Study Of Business Information Systems, Donald W. Wright
Selected Full Text Dissertations, 2011-
This study aims to explore, understand, and explain the hacking of business information systems (BIS) and the measures managers can take to secure their systems. Eight research questions guide the study: 1. What are managers' perceptions of hacking business information systems? 2. What types of attacks do business managers perceive as current and potential dangers to their organizations? 3. What issues prevent participants from participating in BIS security research studies? 4. What protocols are in place to prevent hacking? 5. What measures can managers take to secure their business information systems against hacking? 6. How can knowledge management and information …