Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel Jan 2022

Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel

Walden Dissertations and Doctoral Studies

Retail organizations are driven to improve security posture for many reasons, including meeting financial regulation requirements, mitigating threats of data breach, and differentiating themselves within markets affected by customer perception. The problem was that little was known about how these drivers of internal control, cybersecurity risk, and competitive advantage impact retail cybersecurity budgets within the retail sector. The purpose of this quantitative nonexperimental correlational study was to describe the relationship between cybersecurity budget and drivers of internal control, cybersecurity risk, and competitive advantage among U.S.-based retail merchant organizations. Real options theory provided a foundation for explaining this decision-making process. Data …


Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley Jan 2021

Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley

Walden Dissertations and Doctoral Studies

As insider threats and data security management concerns become more prevalent, the identification of risky behaviors in the workplace is crucial for the privacy of individuals and the survival of organizations. The purpose of this three-round qualitative Delphi study was to identify real-time consensus among 25 information technology (IT) subject matter experts (SMEs) in the Washington metropolitan area about insider threats and data security management. The SMEs participating in this study were adult IT professionals and senior managers with certification in their area of specialization and at least 5 years of practical experience. The dark triad theory was the conceptual …


Information Technology Disaster Recovery Planning By Florida Nonprofit Organizations, Derek Keith Erfourth Jan 2020

Information Technology Disaster Recovery Planning By Florida Nonprofit Organizations, Derek Keith Erfourth

Walden Dissertations and Doctoral Studies

Inadequate information technology (IT) disaster recovery planning (DRP) by nonprofit organizations could lead to organizational failure post-large-scale natural disasters. Without proper funding and planning, organizations may not be able to withstand the effects of a natural disaster resulting in the closure and the community losing a critical need service. Grounded in resilience theory, the purpose of this qualitative multiple case study was to explore strategies utilized by Florida-based nonprofit organization technology managers to adopt and implement an IT DRP to aid in post-natural disaster recovery efforts. The data collection included interviews with 5 IT managers and reviews of 4 business …


Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson Jan 2020

Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson

Walden Dissertations and Doctoral Studies

Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …


Supply Chain Managers' Reverse Logistics Strategies To Control Cost Through Risk Mitigation, Lawrence A. Reeves Jan 2019

Supply Chain Managers' Reverse Logistics Strategies To Control Cost Through Risk Mitigation, Lawrence A. Reeves

Walden Dissertations and Doctoral Studies

Supply chain managers in the food and beverage industry face significant challenges regarding the use of effective reverse logistics strategies to reduce supply chain disruptions, control risk, and reduce costs. Through the lens of resource dependence theory, the purpose of this multiple case study was to explore reverse logistics strategies used by supply chain managers in the United States to control cost through risk mitigation. Participants in this study included 5 supply chain managers in the food and beverage distribution industry in the state of Georgia who implemented successful reverse logistics strategies to control cost through risk mitigation. Data were …


Enterprise Risk Management Strategies For Organizational Sustainability, Kaleb Matthew Wyma Jan 2019

Enterprise Risk Management Strategies For Organizational Sustainability, Kaleb Matthew Wyma

Walden Dissertations and Doctoral Studies

The purpose of this single case study was to explore enterprise risk management strategies that nonprofit business leaders used to maintain and improve organizational sustainability. The study population included 3 executive leaders from a rehabilitation and social services nonprofit agency located in the northeastern United States. The Committee of Sponsoring Organizations integrated enterprise risk management framework was the conceptual lens used in this study. Data were collected through semistructured interviews with the 3 executive leaders of the client organization and review of internal, external, and publicly available documents. Data and information from documents and interviews were manually coded. Findings were …


Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis Jan 2017

Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis

Walden Dissertations and Doctoral Studies

Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 …


Applying The Analytic Hierarchy Process To Oil Sands Environmental Compliance Risk Management, Izak Johannes Roux Jan 2015

Applying The Analytic Hierarchy Process To Oil Sands Environmental Compliance Risk Management, Izak Johannes Roux

Walden Dissertations and Doctoral Studies

Oil companies in Alberta, Canada, invested $32 billion on new oil sands projects in 2013. Despite the size of this investment, there is a demonstrable deficiency in the uniformity and understanding of environmental legislation requirements that manifest into increased project compliance risks. This descriptive study developed 2 prioritized lists of environmental regulatory compliance risks and mitigation strategies and used multi-criteria decision theory for its theoretical framework. Information from compiled lists of environmental compliance risks and mitigation strategies was used to generate a specialized pairwise survey, which was piloted by 5 subject matter experts (SMEs). The survey was validated by a …