Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Databases and Information Systems
Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo
Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo
Walden Dissertations and Doctoral Studies
Information system security managers (ISSM) in nonprofits face increased cyberattack cases because nonprofits often use basic technology to save on costs. Nonprofit owners and managers need solutions to secure their data from cyberattacks. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies ISSMs at nonprofit organizations employ to protect against cyberattacks. Participants included five IT managers and directors of information technology in charge of security management in nonprofit organizations in Maryland, the District of Columbia, and Virginia. Data was generated through interviews and reviews of archival documents. The data analysis technique …
User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre
User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre
Walden Dissertations and Doctoral Studies
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of user awareness and knowledge of cybersecurity has been considered a contributing factor to the increase in cyberattacks and cyberthreats. The purpose of this quantitative experimental study was to explore the role and effectiveness of employee training focused on user awareness of cyberattacks and cybersecurity, with the intent to close the gap in understanding about the level of awareness of cybersecurity within the public sector of the Commonwealth of Dominica. The theoretical framework was Bandura’s social cognitive theory, following the idea that learning occurs in …
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Walden Dissertations and Doctoral Studies
The Internet of Things (IoT) has been exploited as a threat vector for cyberattacks in manufacturing environments. Manufacturing industry leaders are concerned with cyberattacks because of the associated costs of damages and lost production for their organizations. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies electrical controls engineers use to implement secure IoT devices in manufacturing environments. The study participants were eight electrical controls engineers working in three separate manufacturing facilities located in the Midwest region of the United States. The data were collected by semistructured interviews and 15 organizational documents. …