語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity Strategies Information...
~
Ruiz Caino, Alejandro.
FindBook
Google Book
Amazon
博客來
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware./
作者:
Ruiz Caino, Alejandro.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2024,
面頁冊數:
184 p.
附註:
Source: Dissertations Abstracts International, Volume: 85-09, Section: A.
Contained By:
Dissertations Abstracts International85-09A.
標題:
Information technology. -
電子資源:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30993688
ISBN:
9798381855579
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
Ruiz Caino, Alejandro.
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
- Ann Arbor : ProQuest Dissertations & Theses, 2024 - 184 p.
Source: Dissertations Abstracts International, Volume: 85-09, Section: A.
Thesis (D.I.T.)--Walden University, 2024.
This item must not be sold to any third party vendors.
Healthcare organizations' (HCOs') information systems (IS) are prone to increasing ransomware cyberattacks. For HCO information technology (IT) leaders, protecting IS from ransomware attacks is vital because these systems manage large amounts of confidential and sensitive data. Grounded in general systems theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies used by IT leaders in HCOs to protect IS from ransomware attacks. Participants included eight IT leaders from HCOs in the United States responsible for IS protection against ransomware cyberattacks. Data sources included semistructured interviews conducted with the participants via videoconferencing, the researcher's field notes, and 10 online industry documents. Data were analyzed using a thematic analysis; three themes emerged: (a) implement and align technical defense practices with protective technology tools; (b) assess and align security planning elements such as governance, procedures, and policies; and (c) monitor and measure human security elements such as security training and security awareness. IT leaders should implement robust security policies and procedures with proper planning skills aligned with organizational training and awareness plans. The implications for positive social change include the potential to increase security standards that help protect HCOs, thus providing better protection for health IS and personally identifiable patient information.
ISBN: 9798381855579Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Cyberattacks
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
LDR
:02804nmm a2200421 4500
001
2396983
005
20240618081835.5
006
m o d
007
cr#unu||||||||
008
251215s2024 ||||||||||||||||| ||eng d
020
$a
9798381855579
035
$a
(MiAaPQ)AAI30993688
035
$a
AAI30993688
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Ruiz Caino, Alejandro.
$3
3766747
245
1 0
$a
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2024
300
$a
184 p.
500
$a
Source: Dissertations Abstracts International, Volume: 85-09, Section: A.
500
$a
Advisor: Carpenter, Donald.
502
$a
Thesis (D.I.T.)--Walden University, 2024.
506
$a
This item must not be sold to any third party vendors.
520
$a
Healthcare organizations' (HCOs') information systems (IS) are prone to increasing ransomware cyberattacks. For HCO information technology (IT) leaders, protecting IS from ransomware attacks is vital because these systems manage large amounts of confidential and sensitive data. Grounded in general systems theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies used by IT leaders in HCOs to protect IS from ransomware attacks. Participants included eight IT leaders from HCOs in the United States responsible for IS protection against ransomware cyberattacks. Data sources included semistructured interviews conducted with the participants via videoconferencing, the researcher's field notes, and 10 online industry documents. Data were analyzed using a thematic analysis; three themes emerged: (a) implement and align technical defense practices with protective technology tools; (b) assess and align security planning elements such as governance, procedures, and policies; and (c) monitor and measure human security elements such as security training and security awareness. IT leaders should implement robust security policies and procedures with proper planning skills aligned with organizational training and awareness plans. The implications for positive social change include the potential to increase security standards that help protect HCOs, thus providing better protection for health IS and personally identifiable patient information.
590
$a
School code: 0543.
650
4
$a
Information technology.
$3
532993
650
4
$a
American studies.
$3
2122720
653
$a
Cyberattacks
653
$a
Cybersecurity
653
$a
General systems theory
653
$a
Healthcare organizations
653
$a
Information systems
653
$a
Ransomware
690
$a
0489
690
$a
0323
690
$a
0310
690
$a
0769
710
2
$a
Walden University.
$b
Information Systems and Technology.
$3
3176643
773
0
$t
Dissertations Abstracts International
$g
85-09A.
790
$a
0543
791
$a
D.I.T.
792
$a
2024
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30993688
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9505303
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入