語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber-Security Policy Decisions in S...
~
Patterson, Joanna.
Cyber-Security Policy Decisions in Small Businesses.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Cyber-Security Policy Decisions in Small Businesses./
作者:
Patterson, Joanna.
面頁冊數:
1 online resource (108 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: A.
標題:
Business administration. -
電子資源:
click for full text (PQDT)
ISBN:
9780355493436
Cyber-Security Policy Decisions in Small Businesses.
Patterson, Joanna.
Cyber-Security Policy Decisions in Small Businesses.
- 1 online resource (108 pages)
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: A.
Thesis (D.B.A.)--Walden University, 2017.
Includes bibliographical references
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions was to identify strategies that successful small business owners use to make cyber-security decisions. Data analysis consisted of coding keywords, phrases, and sentences from semi structured interviews as well as document analysis. The following themes emerged: government requirements, peer influence, budgetary constraints, commercial standards, and lack of employee involvement. According to the participants, budgetary constraints and peer influence were the most influential factors when making decisions regarding cyber-security strategies. Through exposing small business owners to proven strategies, the implications for social change include a reduction of their small business operating costs and assistance with compliance activities.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355493436Subjects--Topical Terms:
1148568
Business administration.
Index Terms--Genre/Form:
554714
Electronic books.
Cyber-Security Policy Decisions in Small Businesses.
LDR
:02592ntm a2200325K 4500
001
915861
005
20180823122929.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355493436
035
$a
(MiAaPQ)AAI10680962
035
$a
(MiAaPQ)waldenu:19859
035
$a
AAI10680962
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Patterson, Joanna.
$3
1189389
245
1 0
$a
Cyber-Security Policy Decisions in Small Businesses.
264
0
$c
2017
300
$a
1 online resource (108 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: A.
500
$a
Adviser: Elisabeth Musil.
502
$a
Thesis (D.B.A.)--Walden University, 2017.
504
$a
Includes bibliographical references
520
$a
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions was to identify strategies that successful small business owners use to make cyber-security decisions. Data analysis consisted of coding keywords, phrases, and sentences from semi structured interviews as well as document analysis. The following themes emerged: government requirements, peer influence, budgetary constraints, commercial standards, and lack of employee involvement. According to the participants, budgetary constraints and peer influence were the most influential factors when making decisions regarding cyber-security strategies. Through exposing small business owners to proven strategies, the implications for social change include a reduction of their small business operating costs and assistance with compliance activities.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Business administration.
$3
1148568
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0310
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Walden University.
$b
Management.
$3
1148485
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10680962
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入