12 research outputs found

    Decision Support for Holistic IT Risk Feature Selection

    Get PDF
    The failure or misuse of IT has the potential to negatively impact business objectives. The risk resulting from the failure of IT/IS artifacts can be categorized as IT risk, with holistic IT risk representing the overarching composite of all types of IT/IS failures that can prevent an enterprise from realizing one or more business objectives. The likelihood of holistic IT risk having a significant impact on the global business community is growing, with the Internet of Things capable of spreading IT risk far more widely than the Internet has to date. Feature selection for holistic IT risk can be more difficult than feature selection for non-IT business risk, and can vary from one organization to the next. This research explores the use of decision support and fuzzy logic to design a better method for performing holistic IT risk feature selection

    Effects of a Comprehensive Computer Security Policy on Computer Security Culture

    Get PDF
    It is well known that humans are the weakest link in computer security, and that developing and maintaining a culture of computer security is essential for managing the human aspect of computer security. It is less well known how a comprehensive computer security policy incorporating both information technology computer security, and operational technology computer security, impacts a culture of computer security. While a literature review of this domain includes research on the impact of various aspects of a computer security policy on computer security culture, no peer reviewed research was found that explained the impact of a comprehensive computer security policy on computer security culture through an understanding of its direct or indirect effects. Thus, it is the thesis of this study that a comprehensive computer security policy has a direct effect on computer security culture, which can be further explained through indirect effects

    Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance

    Get PDF
    It is well known that humans are the weakest link in computer security, and that developing and maintaining a culture of computer security is essential for managing the human aspect of computer security. It is less well known how a comprehensive computer security policy incorporating both information technology computer security, and operational technology computer security, impacts a culture of computer security. While a literature review of this domain includes research on the impact of various aspects of a computer security policy on computer security culture, no peer reviewed research was found that explained the impact of a comprehensive computer security policy on computer security culture through an understanding of its direct or indirect effects. Thus, it is the thesis of this study that a comprehensive computer security policy has a direct effect on computer security culture, which can be further explained through indirect effects

    Enterprise Computer Security: A Literature Review

    Get PDF
    Information technology (IT) is a global phenomenon that provides organizations of all types the ability to achieve enterprise objectives. One IT component is computer security, sometimes referred to as cybersecurity, the detection and prevention of a rapidly evolving collection of threats and vulnerabilities capable of introducing significant IT risk to an organization. Seminal events such as the creation of U.S. Cyber Command in 2009 acknowledging cyberspace as the fifth domain of war, and the 2015 recall by Fiat Chrysler of 1.4 million vehicles to mitigate an Internet enabled threat, serve as bookends framing the rapid evolution of cybersecurity threats and the need for organizations to better understand the collective vulnerabilities that enable computer security risk. However, a recent literature review of a major information systems (IS) research journal suggests publication of academic research associated with management of computer security from an enterprise perspective is limited. Given the relevance of computer security in today’s IT environment, this finding suggests that enterprise computer security is an under studied research topic. This article addresses this finding and the research gaps with the intent of encouraging new research in this domain

    Manifest Observations on a Comprehensive Computer Security Policy

    Get PDF
    This paper presents the summarized results of a data gathering operation, conducted as part of IRB approved research into the effects of a comprehensive computer security policy on human computer security policy compliance. For this study, a comprehensive computer security policy was defined as an enterprise policy encompassing all aspects of computer security including IT computer security and OT computer security, as opposed to only one domain or the other. The survey instrument included a questionnaire that utilized a Likert scale for belief strength measurement. In addition to questions designed as reflective indicators for latent constructs, the questionnaire included questions to authenticate participants and to gather demographic data. The empirical findings of this study suggest manifest support, regardless of domain, for human intent to comply with a comprehensive computer security policy

    Recommendations from the ICM-VTE: General

    No full text

    Geoscience for Understanding Habitability in the Solar System and Beyond

    No full text

    Rationale, design, and baseline characteristics in Evaluation of LIXisenatide in Acute Coronary Syndrome, a long-term cardiovascular end point trial of lixisenatide versus placebo

    No full text
    BACKGROUND: Cardiovascular (CV) disease is the leading cause of morbidity and mortality in patients with type 2 diabetes mellitus (T2DM). Furthermore, patients with T2DM and acute coronary syndrome (ACS) have a particularly high risk of CV events. The glucagon-like peptide 1 receptor agonist, lixisenatide, improves glycemia, but its effects on CV events have not been thoroughly evaluated. METHODS: ELIXA (www.clinicaltrials.gov no. NCT01147250) is a randomized, double-blind, placebo-controlled, parallel-group, multicenter study of lixisenatide in patients with T2DM and a recent ACS event. The primary aim is to evaluate the effects of lixisenatide on CV morbidity and mortality in a population at high CV risk. The primary efficacy end point is a composite of time to CV death, nonfatal myocardial infarction, nonfatal stroke, or hospitalization for unstable angina. Data are systematically collected for safety outcomes, including hypoglycemia, pancreatitis, and malignancy. RESULTS: Enrollment began in July 2010 and ended in August 2013; 6,068 patients from 49 countries were randomized. Of these, 69% are men and 75% are white; at baseline, the mean ± SD age was 60.3 ± 9.7 years, body mass index was 30.2 ± 5.7 kg/m(2), and duration of T2DM was 9.3 ± 8.2 years. The qualifying ACS was a myocardial infarction in 83% and unstable angina in 17%. The study will continue until the positive adjudication of the protocol-specified number of primary CV events. CONCLUSION: ELIXA will be the first trial to report the safety and efficacy of a glucagon-like peptide 1 receptor agonist in people with T2DM and high CV event risk
    corecore