Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber-Security Policy Decisions in S...
~
Patterson, Joanna.
Cyber-Security Policy Decisions in Small Businesses.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
Cyber-Security Policy Decisions in Small Businesses./
Author:
Patterson, Joanna.
Description:
1 online resource (108 pages)
Notes:
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: A.
Subject:
Business administration. -
Online resource:
click for full text (PQDT)
ISBN:
9780355493436
Cyber-Security Policy Decisions in Small Businesses.
Patterson, Joanna.
Cyber-Security Policy Decisions in Small Businesses.
- 1 online resource (108 pages)
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: A.
Thesis (D.B.A.)--Walden University, 2017.
Includes bibliographical references
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions was to identify strategies that successful small business owners use to make cyber-security decisions. Data analysis consisted of coding keywords, phrases, and sentences from semi structured interviews as well as document analysis. The following themes emerged: government requirements, peer influence, budgetary constraints, commercial standards, and lack of employee involvement. According to the participants, budgetary constraints and peer influence were the most influential factors when making decisions regarding cyber-security strategies. Through exposing small business owners to proven strategies, the implications for social change include a reduction of their small business operating costs and assistance with compliance activities.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355493436Subjects--Topical Terms:
1148568
Business administration.
Index Terms--Genre/Form:
554714
Electronic books.
Cyber-Security Policy Decisions in Small Businesses.
LDR
:02592ntm a2200325K 4500
001
915861
005
20180823122929.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355493436
035
$a
(MiAaPQ)AAI10680962
035
$a
(MiAaPQ)waldenu:19859
035
$a
AAI10680962
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Patterson, Joanna.
$3
1189389
245
1 0
$a
Cyber-Security Policy Decisions in Small Businesses.
264
0
$c
2017
300
$a
1 online resource (108 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-03(E), Section: A.
500
$a
Adviser: Elisabeth Musil.
502
$a
Thesis (D.B.A.)--Walden University, 2017.
504
$a
Includes bibliographical references
520
$a
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions was to identify strategies that successful small business owners use to make cyber-security decisions. Data analysis consisted of coding keywords, phrases, and sentences from semi structured interviews as well as document analysis. The following themes emerged: government requirements, peer influence, budgetary constraints, commercial standards, and lack of employee involvement. According to the participants, budgetary constraints and peer influence were the most influential factors when making decisions regarding cyber-security strategies. Through exposing small business owners to proven strategies, the implications for social change include a reduction of their small business operating costs and assistance with compliance activities.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Business administration.
$3
1148568
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0310
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Walden University.
$b
Management.
$3
1148485
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10680962
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login