Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Exploring the Use of Information Sec...
~
Parker, Christina Monique.
Linked to FindBook
Google Book
Amazon
博客來
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks./
Author:
Parker, Christina Monique.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
Description:
110 p.
Notes:
Source: Dissertations Abstracts International, Volume: 82-09, Section: B.
Contained By:
Dissertations Abstracts International82-09B.
Subject:
Information technology. -
Online resource:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28315389
ISBN:
9798582572541
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
Parker, Christina Monique.
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 110 p.
Source: Dissertations Abstracts International, Volume: 82-09, Section: B.
Thesis (Ph.D.)--Northcentral University, 2021.
This item must not be sold to any third party vendors.
Cybersecurity is a framework used to improve business operations by protecting sensitive data and mitigating cyber threats. The problem that the researcher addressed in this study involves the need for effective information security applications and best practices for IT decision-makers working within the federal government to combat cyber threats. As cyber threats continue to increase and evolve, federal IT decision-makers work to prioritize cybersecurity measures. The purpose of this qualitative research study was to gain insight about information security applications and best practices that are utilized to respond to cyberattacks against the U.S. federal agencies and to examine the gaps in understanding of how IT decision-makers handle cyber threats. The participants were 60 employees who worked in the information security government sector. The primary method for data collection in this study consisted of distributing an online 14-question survey. The data was transcribed, coded, then categorized into themes. The literature and the findings show that various best practices and information security applications can reduce and mitigate cyberattacks. The results of the study could improve organizational strategies that decrease the number of cyber threats and help government leaders plan and provide training to become more vigilant about addressing cyberattacks. Based on the findings, the recommendation includes providing cybersecurity and prevention training, conducting frequent computer system testing, implementing information system frameworks, and improving communication with internal and external stakeholders. Future academic researchers should focus on automating cybersecurity defense tasks by utilizing artificial intelligence, broadening the participant selection, implementing academic research best practices, and focusing on the root cause of knowledge gaps.
ISBN: 9798582572541Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Cyberattacks
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
LDR
:03108nmm a2200373 4500
001
2285144
005
20211129123950.5
008
220723s2021 ||||||||||||||||| ||eng d
020
$a
9798582572541
035
$a
(MiAaPQ)AAI28315389
035
$a
AAI28315389
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Parker, Christina Monique.
$3
3564431
245
1 0
$a
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
110 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-09, Section: B.
500
$a
Advisor: Osayamwen, Efosa.
502
$a
Thesis (Ph.D.)--Northcentral University, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
Cybersecurity is a framework used to improve business operations by protecting sensitive data and mitigating cyber threats. The problem that the researcher addressed in this study involves the need for effective information security applications and best practices for IT decision-makers working within the federal government to combat cyber threats. As cyber threats continue to increase and evolve, federal IT decision-makers work to prioritize cybersecurity measures. The purpose of this qualitative research study was to gain insight about information security applications and best practices that are utilized to respond to cyberattacks against the U.S. federal agencies and to examine the gaps in understanding of how IT decision-makers handle cyber threats. The participants were 60 employees who worked in the information security government sector. The primary method for data collection in this study consisted of distributing an online 14-question survey. The data was transcribed, coded, then categorized into themes. The literature and the findings show that various best practices and information security applications can reduce and mitigate cyberattacks. The results of the study could improve organizational strategies that decrease the number of cyber threats and help government leaders plan and provide training to become more vigilant about addressing cyberattacks. Based on the findings, the recommendation includes providing cybersecurity and prevention training, conducting frequent computer system testing, implementing information system frameworks, and improving communication with internal and external stakeholders. Future academic researchers should focus on automating cybersecurity defense tasks by utilizing artificial intelligence, broadening the participant selection, implementing academic research best practices, and focusing on the root cause of knowledge gaps.
590
$a
School code: 1443.
650
4
$a
Information technology.
$3
532993
650
4
$a
Information science.
$3
554358
650
4
$a
Military studies.
$3
2197382
653
$a
Cyberattacks
653
$a
Cybersecurity
653
$a
Federal government
653
$a
Information security
653
$a
Technology
690
$a
0489
690
$a
0723
690
$a
0750
710
2
$a
Northcentral University.
$b
School of Business and Technology Management.
$3
2099493
773
0
$t
Dissertations Abstracts International
$g
82-09B.
790
$a
1443
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28315389
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9436877
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login