Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (5)
- Computer Sciences (5)
- Databases and Information Systems (5)
- Environmental Sciences (3)
- Social and Behavioral Sciences (3)
-
- Sustainability (2)
- Business Administration, Management, and Operations (1)
- Engineering (1)
- Health and Medical Administration (1)
- International and Area Studies (1)
- Management Sciences and Quantitative Methods (1)
- Medicine and Health Sciences (1)
- Oil, Gas, and Energy (1)
- Other International and Area Studies (1)
- Public Affairs, Public Policy and Public Administration (1)
- Transportation (1)
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel
Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel
Walden Dissertations and Doctoral Studies
Retail organizations are driven to improve security posture for many reasons, including meeting financial regulation requirements, mitigating threats of data breach, and differentiating themselves within markets affected by customer perception. The problem was that little was known about how these drivers of internal control, cybersecurity risk, and competitive advantage impact retail cybersecurity budgets within the retail sector. The purpose of this quantitative nonexperimental correlational study was to describe the relationship between cybersecurity budget and drivers of internal control, cybersecurity risk, and competitive advantage among U.S.-based retail merchant organizations. Real options theory provided a foundation for explaining this decision-making process. Data …
Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley
Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley
Walden Dissertations and Doctoral Studies
As insider threats and data security management concerns become more prevalent, the identification of risky behaviors in the workplace is crucial for the privacy of individuals and the survival of organizations. The purpose of this three-round qualitative Delphi study was to identify real-time consensus among 25 information technology (IT) subject matter experts (SMEs) in the Washington metropolitan area about insider threats and data security management. The SMEs participating in this study were adult IT professionals and senior managers with certification in their area of specialization and at least 5 years of practical experience. The dark triad theory was the conceptual …
Information Technology Disaster Recovery Planning By Florida Nonprofit Organizations, Derek Keith Erfourth
Information Technology Disaster Recovery Planning By Florida Nonprofit Organizations, Derek Keith Erfourth
Walden Dissertations and Doctoral Studies
Inadequate information technology (IT) disaster recovery planning (DRP) by nonprofit organizations could lead to organizational failure post-large-scale natural disasters. Without proper funding and planning, organizations may not be able to withstand the effects of a natural disaster resulting in the closure and the community losing a critical need service. Grounded in resilience theory, the purpose of this qualitative multiple case study was to explore strategies utilized by Florida-based nonprofit organization technology managers to adopt and implement an IT DRP to aid in post-natural disaster recovery efforts. The data collection included interviews with 5 IT managers and reviews of 4 business …
Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson
Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson
Walden Dissertations and Doctoral Studies
Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …
Supply Chain Managers' Reverse Logistics Strategies To Control Cost Through Risk Mitigation, Lawrence A. Reeves
Supply Chain Managers' Reverse Logistics Strategies To Control Cost Through Risk Mitigation, Lawrence A. Reeves
Walden Dissertations and Doctoral Studies
Supply chain managers in the food and beverage industry face significant challenges regarding the use of effective reverse logistics strategies to reduce supply chain disruptions, control risk, and reduce costs. Through the lens of resource dependence theory, the purpose of this multiple case study was to explore reverse logistics strategies used by supply chain managers in the United States to control cost through risk mitigation. Participants in this study included 5 supply chain managers in the food and beverage distribution industry in the state of Georgia who implemented successful reverse logistics strategies to control cost through risk mitigation. Data were …
Enterprise Risk Management Strategies For Organizational Sustainability, Kaleb Matthew Wyma
Enterprise Risk Management Strategies For Organizational Sustainability, Kaleb Matthew Wyma
Walden Dissertations and Doctoral Studies
The purpose of this single case study was to explore enterprise risk management strategies that nonprofit business leaders used to maintain and improve organizational sustainability. The study population included 3 executive leaders from a rehabilitation and social services nonprofit agency located in the northeastern United States. The Committee of Sponsoring Organizations integrated enterprise risk management framework was the conceptual lens used in this study. Data were collected through semistructured interviews with the 3 executive leaders of the client organization and review of internal, external, and publicly available documents. Data and information from documents and interviews were manually coded. Findings were …
Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis
Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis
Walden Dissertations and Doctoral Studies
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 …
Applying The Analytic Hierarchy Process To Oil Sands Environmental Compliance Risk Management, Izak Johannes Roux
Applying The Analytic Hierarchy Process To Oil Sands Environmental Compliance Risk Management, Izak Johannes Roux
Walden Dissertations and Doctoral Studies
Oil companies in Alberta, Canada, invested $32 billion on new oil sands projects in 2013. Despite the size of this investment, there is a demonstrable deficiency in the uniformity and understanding of environmental legislation requirements that manifest into increased project compliance risks. This descriptive study developed 2 prioritized lists of environmental regulatory compliance risks and mitigation strategies and used multi-criteria decision theory for its theoretical framework. Information from compiled lists of environmental compliance risks and mitigation strategies was used to generate a specialized pairwise survey, which was piloted by 5 subject matter experts (SMEs). The survey was validated by a …