Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Motivating Cybersecurity Compliance ...
~
McSweeney, Kelly.
Linked to FindBook
Google Book
Amazon
博客來
Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study./
Author:
McSweeney, Kelly.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
Description:
211 p.
Notes:
Source: Dissertation Abstracts International, Volume: 79-07(E), Section: A.
Contained By:
Dissertation Abstracts International79-07A(E).
Subject:
Organizational behavior. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10744158
ISBN:
9780355621709
Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study.
McSweeney, Kelly.
Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 211 p.
Source: Dissertation Abstracts International, Volume: 79-07(E), Section: A.
Thesis (Ph.D.)--Capella University, 2018.
A theoretical gap was identified in explaining the motivational factors behind private sector cybersecurity policy compliance in critical infrastructure industries. A constructivist grounded theory approach was used to collect and analyze qualified participant experiences, resulting in a theoretical model that frames these motivational constructs as event-driven actions. The full population for this study encompassed the private sector infrastructure owners and operators of the 16 recognized critical infrastructure industries within the United States. The sample frame for this study was the InfraGard Members Alliance, a national volunteer network of more than 55,000 public-private sector and academic associates. The recruited sample included 13 purposively selected participants from nine different critical infrastructure industries across five California counties with a variety of cybersecurity occupations and years of experience. An open-ended interview protocol was used to collect participant experiences, which were inductively analyzed using grounded theory's constant comparative processes for theory construction. The core variable emerging from the data represented reactive impulses towards compliance closely related to the design-time, run-time, and post-processing characteristics of event-driven processes. The results of this study support a new theory of event-driven cybersecurity compliance motivation (ECCM) that is grounded in the theoretical constructs of regulatory density, organizational maturity, and compliance return-on-investment. Attributes of these ECCM theoretical constructs included pre-existing regulatory conditions, capability enabling interactions, and compliance consequences as described by the private sector owners and operators of critical U.S. infrastructure industries.
ISBN: 9780355621709Subjects--Topical Terms:
516683
Organizational behavior.
Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study.
LDR
:02834nmm a2200325 4500
001
2202091
005
20190513114555.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780355621709
035
$a
(MiAaPQ)AAI10744158
035
$a
(MiAaPQ)capella:20022
035
$a
AAI10744158
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
McSweeney, Kelly.
$3
3428843
245
1 0
$a
Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
211 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-07(E), Section: A.
500
$a
Adviser: Glenn Bottomly.
502
$a
Thesis (Ph.D.)--Capella University, 2018.
520
$a
A theoretical gap was identified in explaining the motivational factors behind private sector cybersecurity policy compliance in critical infrastructure industries. A constructivist grounded theory approach was used to collect and analyze qualified participant experiences, resulting in a theoretical model that frames these motivational constructs as event-driven actions. The full population for this study encompassed the private sector infrastructure owners and operators of the 16 recognized critical infrastructure industries within the United States. The sample frame for this study was the InfraGard Members Alliance, a national volunteer network of more than 55,000 public-private sector and academic associates. The recruited sample included 13 purposively selected participants from nine different critical infrastructure industries across five California counties with a variety of cybersecurity occupations and years of experience. An open-ended interview protocol was used to collect participant experiences, which were inductively analyzed using grounded theory's constant comparative processes for theory construction. The core variable emerging from the data represented reactive impulses towards compliance closely related to the design-time, run-time, and post-processing characteristics of event-driven processes. The results of this study support a new theory of event-driven cybersecurity compliance motivation (ECCM) that is grounded in the theoretical constructs of regulatory density, organizational maturity, and compliance return-on-investment. Attributes of these ECCM theoretical constructs included pre-existing regulatory conditions, capability enabling interactions, and compliance consequences as described by the private sector owners and operators of critical U.S. infrastructure industries.
590
$a
School code: 1351.
650
4
$a
Organizational behavior.
$3
516683
650
4
$a
Organization theory.
$3
2122787
650
4
$a
Public policy.
$3
532803
650
4
$a
Computer science.
$3
523869
690
$a
0703
690
$a
0635
690
$a
0630
690
$a
0984
710
2
$a
Capella University.
$b
Business and Technology.
$3
2095645
773
0
$t
Dissertation Abstracts International
$g
79-07A(E).
790
$a
1351
791
$a
Ph.D.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10744158
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9378640
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login