5 research outputs found

    Analysis of Cybersecurity Standard and Framework Components

    Get PDF
    Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began.  Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research

    Cyberattacks Strategy for Nonprofit Organizations

    Get PDF
    Information system security managers (ISSM) in nonprofits face increased cyberattack cases because nonprofits often use basic technology to save on costs. Nonprofit owners and managers need solutions to secure their data from cyberattacks. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies ISSMs at nonprofit organizations employ to protect against cyberattacks. Participants included five IT managers and directors of information technology in charge of security management in nonprofit organizations in Maryland, the District of Columbia, and Virginia. Data was generated through interviews and reviews of archival documents. The data analysis technique used was thematic analysis. Three themes emerged from the analysis: cybersecurity awareness, cybersecurity strategy, and third-party dependence. The nonprofits should consider the following recommendations: first, evaluate cybersecurity health by assessing the existent cyber threat environment. Second, develop and execute a comprehensive strategic plan on cybersecurity, including policies and procedures targeted at protecting sensitive and likely sensitive data. Third, evaluate in-house IT capabilities and consider hiring third-party vendors with expert skills. Fourth, create cybersecurity awareness by training the employees on data protection. The implications for positive social change include the potential for ISSMs conveying effective cybersecurity strategies for nonprofits to mitigate and prevent potential cybersecurity attacks, thus furthering the nonprofits’ missions

    Developing Cloud Computing Infrastructures in Developing Countries in Asia

    Get PDF
    Developing Cloud Computing Infrastructures in Developing Countries in Asia by Daryoush Charmsaz Moghaddam MS, Sharif University, 2005 BS, Civil Aviation Higher Education Complex, 1985 Doctoral Study Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Information Technology Walden University March 202

    ‘Technology as a trusted companion for accountants and business professionals in the business unusual environment’

    Get PDF
    Abstract: A conceptual model of corporate social responsibility (CSR) and service quality for Islamic bank service users is developed in this paper. The model is expected to bring about a better understanding of customer perceptions relating to issues of social responsibility and its impact on service quality as it pertains to Islamic banking in South Africa. The conceptual model is developed by synthesising relevant literature and theories pertaining to this study. This conceptual model is proposed to be tested in due course of time by using customer perceptions derived from a survey instrument to assess the relationship between aspects of social responsibility and service quality at the Islamic bank. The proposed model has implications towards enhancing the CSR and service quality offered by the Islamic bank according to their customer expectations
    corecore