Content: Global student dissertations and literature reviews.
Purpose: Use for foundational research, to locate test instruments and data, and more.
Special Features: Search by advisor (chair), degree, degree level, or department. Includes a read-aloud feature
The ProQuest Dissertations & Theses database (PQDT) is the world's most comprehensive collection of dissertations and theses. It is the database of record for graduate research, with over 2.3 million dissertations and theses included from around the world.
The problem to be addressed by this study is that due to the increasing number and sophistication of threats, there is a need to identify the skills and characteristics required to build an effective and efficient CSIRT. This information was to build onto previous research of CSIRTs regarding the design of different models, both linear and non-linear. The conducted research will allow other researchers and corporations to identified the appropriate human resources needed to build out a successful CSIRT model. A qualitative research methodology was used for this dissertation. Author: Daniel Thomas Cullen, Northcentral University.
This research study examined the reasons for the failure of information technology staff to properly protect the organization’s data systems from cyber threats. Information technology staff have been assigned the responsibility of protecting the organization’s information systems amid a growing number of both internal and external security threats. While the responsibilities have escalated, the funding to adequately protect the organization is not always being made available. The purpose of this qualitative case study was to identify the reasons behind the insufficient funding of information security projects in the private sector. Data collection was conducted by interviewing business leaders and Information Technology (IT) staff from small to medium sized businesses in the United States that are involved in information security decision making. Author: Jeffery J. Madison, Northcentral University.
The purpose of this paper is to analyze and elucidate the onset and progression of techniques and technology employed in defending computer networks and systems. In doing so, this body of research fills a gap by providing a comprehensive examination of the current state of computer network defense as well as a retrospective of the same. Additionally, this paper will examine the tactics, techniques, and procedures employed by computer network defenders and compared those tactics and technology to what computer network attackers utilize. Author: Jess Williams, Utica College.
The problem addressed is the strategies network security managers need to protect their networks from backdoor intrusions. Twelve participants that had experience as network managers or systems administrators were interviewed using nine open-ended questions. The research methodology chosen for this study is a qualitative exploratory approach. The findings on this research resulted in four major themes including human factor, backdoor detection techniques, defense-in-depth and network monitoring strategies. Author: Luis Omar Rivera-Lopez, Colorado Technical University.
The problem addressed was that business leaders and cyber security professionals failed to utilize risk management strategy to protect valuable assets from malicious hackers and thieves. The purpose of the study was to investigate CEO and Presidents’ experience and perspectives related to cyber security risk management decisions to determine which theories might contribute to CEOs and Presidents’ experiences and perspectives of cyber security risks and decisions associated with the mitigation of cyber security risks. Author: Toby Warren Prudhomme, Northcentral University.
Managers at small and midsized businesses (SMBs) may believe they are immune against cyber-attacks and assume that attackers have no interest in them. Due to the intertwining of computer networks in a fashion that represents a complex system where emergent behaviors are rarely fully understood, vulnerabilities common to a major percentage of all SMBs may pose a threat to the nation's economic base. Therefore, if one of these SMBs within the system has a flaw in its security, it could have a triggering effect for all organizations it does business with. The purpose of this qualitative, phenomenological study was to explore the perceptions of SMB owners about their vulnerability to cyber-attacks and the measures they take to safeguard their organizations. Author: Michael A. Bagwell, Northcentral University.
The topic of interest in this study was the question of how small businesses view risks, benefits, and perceived effectiveness when making the decision to outsource IT network security. The research also investigated whether small business owners perceive outsourcing as an effective strategy for ensuring IT network security. While IT network security outsourcing has been examined in many contexts, little research has focused specifically on the unique needs, attitudes, and perceptions of small businesses, despite the disproportionate costs of IT network security in these businesses. Author: Richard L. Nero, Capella University.
Business organizations are faced with an enormous challenge to improve cyber security, as breeches and lapses through firewalls are increasingly commonplace. The Chief Information Security Officer (CISO) and Information Technology (IT) staff are constantly challenged to identify and purge online and network structural weaknesses. The goal is to reduce overall business risk because unresolved risks are a constant concern to consumers who are uneasy about cyber security failures. The purpose of this general qualitative study was to examine the role and impact of Cyber Security Mentoring (CSM) from the perspectives of the workplace CISO, mentors, and protégés, who were randomly polled from various workplace settings across the United States. Author: James O. Ellithorpe, Walden University.
The purpose of this quantitative, correlational study was to understand the relationship between investments in cybersecurity knowledge, security awareness attitudes, and the effects of a cybersecurity breach within the organization guided by the tenets of protection motivation theory. The research was completed entirely online, and the 100 qualified participants were pre-screened to ensure they were aware of their company’s cybersecurity policy and used technology for work functions. Author: Pauline Elaine Williams-Banta, Northcentral University.
This survey collects a number of network modeling papers from several research fields: statistics, data mining, machine learning, and signal processing, and three other related fields. We also summarize the papers based on the taxonomy and provide examples based on their tasks. We expect that this survey will be used to introduce complex network modeling techniques to the communities that are not familiar with network modeling techniques, and provide quick reference to identify suitable methods to different analysis tasks. Author: Unique Wells, The University of North Carolina at Charlotte.