48 research outputs found

    A systematic literature review of cyberwarfare and state-sponsored hacking teams

    Full text link
    It is expected that the creation of next-generation wireless networks would result in the availability of high-speed and low-latency connectivity for every part of our life. As a result, it is important that the network is secure. The network's security environment has grown more complicated as a result of the growing number of devices and the diversity of services that 5G will provide. This is why it is important that the development of effective security solutions is carried out early. Our findings of this review have revealed the various directions that will be pursued in the development of next-generation wireless networks. Some of these include the use of Artificial Intelligence and Software Defined Mobile Networks. The threat environment for 5G networks, security weaknesses in the new technology paradigms that 5G will embrace, and provided solutions presented in the key studies in the field of 5G cyber security are all described in this systematic literature review for prospective researchers. Future research directions to protect wireless networks beyond 5G are also covered.Comment: 3 figure

    The Trajectory of IT in Healthcare at HICSS: A Literature Review, Analysis, and Future Directions

    Get PDF
    Research has extensively demonstrated that healthcare industry has rapidly implemented and adopted information technology in recent years. Research in health information technology (HIT), which represents a major component of the Hawaii International Conference on System Sciences, demonstrates similar findings. In this paper, review the literature to better understand the work on HIT that researchers have conducted in HICSS from 2008 to 2017. In doing so, we identify themes, methods, technology types, research populations, context, and emerged research gaps from the reviewed literature. With much change and development in the HIT field and varying levels of adoption, this review uncovers, catalogs, and analyzes the research in HIT at HICSS in this ten-year period and provides future directions for research in the field

    Digital Security Governance: What Can We Learn from High Reliability Organizations (HROs)?

    Get PDF
    With the growing digitalization of businesses, digital security governance (DSG) is becoming central to organizational survival strategies. However, many organizations fail to establish successful DSG practices and, consequently, fail to understand how DSG can lower the severity of cybersecurity failures. This paper aims to contribute to filling this gap. By putting the five principles of the High Reliability Organization (HRO) central to the design of our qualitative investigation, we engage in interviewing forty-two chief information security officers (CISOs) and chief information officers (CIOs) of large organizations in the Netherlands about their views on why organizations fail to successfully achieve DSG. Our data show that HRO principles are partly relevant but lacking in DSG approaches, which potentially increases security failure. We conclude this paper by discussing these findings in light of future research and practice

    Dark Traits and Hacking Potential

    Get PDF
    This paper investigates the psychological traits of individuals' attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. A new set of scales have been developed to assist in the delineation of the three hat categories. We have also developed a scale to measure each subject's perception of the probability of being apprehended for violating privacy laws. The results suggest that white hat, grey hat, and black hat hackers score high on the Machiavellian and psychopathy scales. We also found evidence that grey hatters oppose authority, black hatters score high in the thrill-seeking dimension, and white hatters, the good guys, tend to be narcissists. Thrill-seeking was moderately important for white hat and black hat hacking, and opposition to authority was significant for grey hat hacking. Narcissism was not statistically significant in any of the models. A perceived probability of being apprehended had a negative effect on both grey hat and black hat hacking. Additional models were explored to examine the relationships among the research variables
    corecore