The prevailing approach to cyber security continues to be the implementation of controls—technical, formal, and informal. We have seen little departure from a fundamentally preventive strategy. The criminal justice field has called for an increased emphasis on deterrence strategies, specifically Situational Crime Prevention (SCP). This paper presents the results of an exploratory (pilot) study based on interviews of CISOs (or approximate equivalents). We found that while the balance of controls does appear to be improving, technical controls are still the priority— particularly in small organizations. We found that IS security strategies are still predominantly preventive; organizations do not view offender deterrence as a strategy. The res...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
Academic institutions house enormous amounts of critical information from social security numbers of...
Dependence on information, including for some of the world’s largest organisations such as governmen...
The prevailing approach to cyber security continues to be the implementation of controls—technical, ...
Existing approaches to formulating IS security strategy rely primarily on the risk management proces...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
In a society where information represents one of the most valuable assets of business and government...
In the paper the author proposes that effectively and efficiently addressing cyber crime requires a ...
This study presents a synthesis of the literature on information security strategy that identifies t...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Abstract—This study looks into the employment of deterrence to reduce security breaches within organ...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
Information Technology transformed the way people executed their tasks at work. With the information...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
Academic institutions house enormous amounts of critical information from social security numbers of...
Dependence on information, including for some of the world’s largest organisations such as governmen...
The prevailing approach to cyber security continues to be the implementation of controls—technical, ...
Existing approaches to formulating IS security strategy rely primarily on the risk management proces...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
In a society where information represents one of the most valuable assets of business and government...
In the paper the author proposes that effectively and efficiently addressing cyber crime requires a ...
This study presents a synthesis of the literature on information security strategy that identifies t...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Abstract—This study looks into the employment of deterrence to reduce security breaches within organ...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
Information Technology transformed the way people executed their tasks at work. With the information...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
Academic institutions house enormous amounts of critical information from social security numbers of...
Dependence on information, including for some of the world’s largest organisations such as governmen...