Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Management Information Systems (5)
- Technology and Innovation (5)
- Business Intelligence (2)
- Communication (2)
- Communication Technology and New Media (2)
-
- Computer Engineering (2)
- Computer and Systems Architecture (2)
- Data Storage Systems (2)
- Digital Communications and Networking (2)
- E-Commerce (2)
- Engineering (2)
- Information Literacy (2)
- Library and Information Science (2)
- Management Sciences and Quantitative Methods (2)
- Operational Research (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Science and Technology Studies (2)
- Social Media (2)
- Social and Behavioral Sciences (2)
- Computer Sciences (1)
- Information Security (1)
- Law (1)
- Physical Sciences and Mathematics (1)
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Business
Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie
Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie
Electronic Theses, Projects, and Dissertations
With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.
This project …
Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame
Managing And Securing Endpoints: A Solution For A Telework Environment, David Adame
Electronic Theses, Projects, and Dissertations
This project introduces a business problem in which a water utility company – known as H2O District – was forced to discover and implement a solution that would enable the IT Department to effectively manage and secure their endpoints in a telework environment. Typically, an endpoint is defined as any device that is physically connected to a network. For the purposes of this project, the endpoints that the IT Department was concerned with consisted of Windows 10 PC’s, Laptops, and Apple iOS devices that employees use to access company resources while working outside of the corporate network. To properly manage …
Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor
Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor
Electronic Theses, Projects, and Dissertations
This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
Journal of International Technology and Information Management
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.
In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.
With an increasing threat to information security for …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
Geofencing As Applied Within The Field Of Cybersecurity: An Overview Of Potential Risks And Advantages, Kasandra Adams
Geofencing As Applied Within The Field Of Cybersecurity: An Overview Of Potential Risks And Advantages, Kasandra Adams
Electronic Theses, Projects, and Dissertations
This culminating experience project explores geofencing as a potential risk and advantageous tool within the field of cybersecurity. Geofencing is defined here as a software program feature that allows its users to collect and deliver data within a specific targeted geographical area. Currently used applications are addressed from a cybersecurity mindset by applying the hacker methodology to demonstrate the potential threat. Additionally, geofencing is applied to the NIST Cybersecurity Framework to demonstrate potential benefits for cyber defence. Finally, vulnerabilities associated with applying geofencing to cyber defense, and its potential implications on privacy and cybersecurity laws is discussed and recommendations for …
Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler
Cyber Capability Planning And The Need For An Expanded Cybersecurity Workforce, Tony Coulson, Megan Mason, Vincent Nestler
Communications of the IIMA
Cybersecurity is a national concern for the United States, yet the cybersecurity workforce is currently understaffed. Military capability planning can be used as a framework to evaluate and establish cybersecurity workforce development models, such as the National Initiative for Cybersecurity Education (NICE) Framework. These models can be used in a way that provides the nation a methodology to enhance human resource capabilities and fill the cybersecurity workforce deficit. Furthermore, this report discusses the importance of establishing and enhancing strategic recruitment initiatives that can be utilized for building a cybersecurity pipeline.