The Homeland Security Enterprise (HSE) lacks a process to create a body of knowledge to unify its stakeholders. This thesis asked if a set of rules and an assessment methodology could be applied to three wikis to illustrate how the rules can improve the quality of information-sharing across the HSE. The research for this thesis applied a set of rules and an assessment methodology to case studies testing the hypothesis that wikis are a good example of an enterprise social network (ESN) and could serve to meet the information needs of the HSE. The methodology will apply Bloom's Taxonomy to a rubric and establish a current status, as well as plan a path ahead for development. This thesis investigated the demand for improved information sharing...
Examining the cases of Domain Name System Security (DNSSEC) and the Resource Public Key Infrastruct...
This paper aims to identify user perceived usefulness of enterprise social networking within the pub...
For many years the importance of sharing information on cybersecurity risks, vulnerabilities, and in...
Abstract: The pace of modern warfare requires tools that support intensive, ongoing collaboration be...
An Early Warning System (EWS) for cybersecurity intelligence will provide the capability to share in...
The Industrial Age spawned a revolution that brought fundamental changes to the business of commerce...
Current scholarly understanding of information security regulation in the United States is limited. ...
Traditional approaches to knowledge collaboration and sharing have proven to be limited in the sense...
There is a need to solidify the common folklore understanding of what acceptable behaviors are for c...
Information security policies (ISP) can be seen as a collection of rules, principles, or guidelines ...
As modern organisations are using strategic information systems as their competitive advantage, the ...
Responding to recommendations from the 9/11 Commission, Congress created the Information Sharing Env...
Information security risk management (ISRM) is an integral part of the management practice and is an...
This thesis examines the Department of Homeland Security's (DHS) Homeland Security Information Netwo...
One of the main purposes of a Hastily Formed Network (HFN) is to provide immediate access to network...
Examining the cases of Domain Name System Security (DNSSEC) and the Resource Public Key Infrastruct...
This paper aims to identify user perceived usefulness of enterprise social networking within the pub...
For many years the importance of sharing information on cybersecurity risks, vulnerabilities, and in...
Abstract: The pace of modern warfare requires tools that support intensive, ongoing collaboration be...
An Early Warning System (EWS) for cybersecurity intelligence will provide the capability to share in...
The Industrial Age spawned a revolution that brought fundamental changes to the business of commerce...
Current scholarly understanding of information security regulation in the United States is limited. ...
Traditional approaches to knowledge collaboration and sharing have proven to be limited in the sense...
There is a need to solidify the common folklore understanding of what acceptable behaviors are for c...
Information security policies (ISP) can be seen as a collection of rules, principles, or guidelines ...
As modern organisations are using strategic information systems as their competitive advantage, the ...
Responding to recommendations from the 9/11 Commission, Congress created the Information Sharing Env...
Information security risk management (ISRM) is an integral part of the management practice and is an...
This thesis examines the Department of Homeland Security's (DHS) Homeland Security Information Netwo...
One of the main purposes of a Hastily Formed Network (HFN) is to provide immediate access to network...
Examining the cases of Domain Name System Security (DNSSEC) and the Resource Public Key Infrastruct...
This paper aims to identify user perceived usefulness of enterprise social networking within the pub...
For many years the importance of sharing information on cybersecurity risks, vulnerabilities, and in...