48 research outputs found
A systematic literature review of cyberwarfare and state-sponsored hacking teams
It is expected that the creation of next-generation wireless networks would
result in the availability of high-speed and low-latency connectivity for every
part of our life. As a result, it is important that the network is secure. The
network's security environment has grown more complicated as a result of the
growing number of devices and the diversity of services that 5G will provide.
This is why it is important that the development of effective security
solutions is carried out early. Our findings of this review have revealed the
various directions that will be pursued in the development of next-generation
wireless networks. Some of these include the use of Artificial Intelligence and
Software Defined Mobile Networks. The threat environment for 5G networks,
security weaknesses in the new technology paradigms that 5G will embrace, and
provided solutions presented in the key studies in the field of 5G cyber
security are all described in this systematic literature review for prospective
researchers. Future research directions to protect wireless networks beyond 5G
are also covered.Comment: 3 figure
The Trajectory of IT in Healthcare at HICSS: A Literature Review, Analysis, and Future Directions
Research has extensively demonstrated that healthcare industry has rapidly implemented and adopted information technology in recent years. Research in health information technology (HIT), which represents a major component of the Hawaii International Conference on System Sciences, demonstrates similar findings. In this paper, review the literature to better understand the work on HIT that researchers have conducted in HICSS from 2008 to 2017. In doing so, we identify themes, methods, technology types, research populations, context, and emerged research gaps from the reviewed literature. With much change and development in the HIT field and varying levels of adoption, this review uncovers, catalogs, and analyzes the research in HIT at HICSS in this ten-year period and provides future directions for research in the field
Digital Security Governance: What Can We Learn from High Reliability Organizations (HROs)?
With the growing digitalization of businesses, digital security governance (DSG) is becoming central to organizational survival strategies. However, many organizations fail to establish successful DSG practices and, consequently, fail to understand how DSG can lower the severity of cybersecurity failures. This paper aims to contribute to filling this gap. By putting the five principles of the High Reliability Organization (HRO) central to the design of our qualitative investigation, we engage in interviewing forty-two chief information security officers (CISOs) and chief information officers (CIOs) of large organizations in the Netherlands about their views on why organizations fail to successfully achieve DSG. Our data show that HRO principles are partly relevant but lacking in DSG approaches, which potentially increases security failure. We conclude this paper by discussing these findings in light of future research and practice
Dark Traits and Hacking Potential
This paper investigates the psychological traits of individuals' attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. A new set of scales have been developed to assist in the delineation of the three hat categories. We have also developed a scale to measure each subject's perception of the probability of being apprehended for violating privacy laws. The results suggest that white hat, grey hat, and black hat hackers score high on the Machiavellian and psychopathy scales. We also found evidence that grey hatters oppose authority, black hatters score high in the thrill-seeking dimension, and white hatters, the good guys, tend to be narcissists. Thrill-seeking was moderately important for white hat and black hat hacking, and opposition to authority was significant for grey hat hacking. Narcissism was not statistically significant in any of the models. A perceived probability of being apprehended had a negative effect on both grey hat and black hat hacking. Additional models were explored to examine the relationships among the research variables