語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Exploring the Use of Information Sec...
~
Parker, Christina Monique.
FindBook
Google Book
Amazon
博客來
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks./
作者:
Parker, Christina Monique.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
面頁冊數:
110 p.
附註:
Source: Dissertations Abstracts International, Volume: 82-09, Section: B.
Contained By:
Dissertations Abstracts International82-09B.
標題:
Information technology. -
電子資源:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28315389
ISBN:
9798582572541
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
Parker, Christina Monique.
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 110 p.
Source: Dissertations Abstracts International, Volume: 82-09, Section: B.
Thesis (Ph.D.)--Northcentral University, 2021.
This item must not be sold to any third party vendors.
Cybersecurity is a framework used to improve business operations by protecting sensitive data and mitigating cyber threats. The problem that the researcher addressed in this study involves the need for effective information security applications and best practices for IT decision-makers working within the federal government to combat cyber threats. As cyber threats continue to increase and evolve, federal IT decision-makers work to prioritize cybersecurity measures. The purpose of this qualitative research study was to gain insight about information security applications and best practices that are utilized to respond to cyberattacks against the U.S. federal agencies and to examine the gaps in understanding of how IT decision-makers handle cyber threats. The participants were 60 employees who worked in the information security government sector. The primary method for data collection in this study consisted of distributing an online 14-question survey. The data was transcribed, coded, then categorized into themes. The literature and the findings show that various best practices and information security applications can reduce and mitigate cyberattacks. The results of the study could improve organizational strategies that decrease the number of cyber threats and help government leaders plan and provide training to become more vigilant about addressing cyberattacks. Based on the findings, the recommendation includes providing cybersecurity and prevention training, conducting frequent computer system testing, implementing information system frameworks, and improving communication with internal and external stakeholders. Future academic researchers should focus on automating cybersecurity defense tasks by utilizing artificial intelligence, broadening the participant selection, implementing academic research best practices, and focusing on the root cause of knowledge gaps.
ISBN: 9798582572541Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Cyberattacks
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
LDR
:03108nmm a2200373 4500
001
2285144
005
20211129123950.5
008
220723s2021 ||||||||||||||||| ||eng d
020
$a
9798582572541
035
$a
(MiAaPQ)AAI28315389
035
$a
AAI28315389
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Parker, Christina Monique.
$3
3564431
245
1 0
$a
Exploring the Use of Information Security Practices in Response to Cyberattacks to Protect U.S. Federal Systems and Networks.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
110 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-09, Section: B.
500
$a
Advisor: Osayamwen, Efosa.
502
$a
Thesis (Ph.D.)--Northcentral University, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
Cybersecurity is a framework used to improve business operations by protecting sensitive data and mitigating cyber threats. The problem that the researcher addressed in this study involves the need for effective information security applications and best practices for IT decision-makers working within the federal government to combat cyber threats. As cyber threats continue to increase and evolve, federal IT decision-makers work to prioritize cybersecurity measures. The purpose of this qualitative research study was to gain insight about information security applications and best practices that are utilized to respond to cyberattacks against the U.S. federal agencies and to examine the gaps in understanding of how IT decision-makers handle cyber threats. The participants were 60 employees who worked in the information security government sector. The primary method for data collection in this study consisted of distributing an online 14-question survey. The data was transcribed, coded, then categorized into themes. The literature and the findings show that various best practices and information security applications can reduce and mitigate cyberattacks. The results of the study could improve organizational strategies that decrease the number of cyber threats and help government leaders plan and provide training to become more vigilant about addressing cyberattacks. Based on the findings, the recommendation includes providing cybersecurity and prevention training, conducting frequent computer system testing, implementing information system frameworks, and improving communication with internal and external stakeholders. Future academic researchers should focus on automating cybersecurity defense tasks by utilizing artificial intelligence, broadening the participant selection, implementing academic research best practices, and focusing on the root cause of knowledge gaps.
590
$a
School code: 1443.
650
4
$a
Information technology.
$3
532993
650
4
$a
Information science.
$3
554358
650
4
$a
Military studies.
$3
2197382
653
$a
Cyberattacks
653
$a
Cybersecurity
653
$a
Federal government
653
$a
Information security
653
$a
Technology
690
$a
0489
690
$a
0723
690
$a
0750
710
2
$a
Northcentral University.
$b
School of Business and Technology Management.
$3
2099493
773
0
$t
Dissertations Abstracts International
$g
82-09B.
790
$a
1443
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28315389
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9436877
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入