Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Walden University

2020

Risk Management

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Information Technology Disaster Recovery Planning By Florida Nonprofit Organizations, Derek Keith Erfourth Jan 2020

Information Technology Disaster Recovery Planning By Florida Nonprofit Organizations, Derek Keith Erfourth

Walden Dissertations and Doctoral Studies

Inadequate information technology (IT) disaster recovery planning (DRP) by nonprofit organizations could lead to organizational failure post-large-scale natural disasters. Without proper funding and planning, organizations may not be able to withstand the effects of a natural disaster resulting in the closure and the community losing a critical need service. Grounded in resilience theory, the purpose of this qualitative multiple case study was to explore strategies utilized by Florida-based nonprofit organization technology managers to adopt and implement an IT DRP to aid in post-natural disaster recovery efforts. The data collection included interviews with 5 IT managers and reviews of 4 business …


Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson Jan 2020

Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson

Walden Dissertations and Doctoral Studies

Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …