Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber Threats in e-Government.
~
Moore, Barbara N.
Linked to FindBook
Google Book
Amazon
博客來
Cyber Threats in e-Government.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cyber Threats in e-Government./
Author:
Moore, Barbara N.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
Description:
114 p.
Notes:
Source: Dissertation Abstracts International, Volume: 79-12(E), Section: A.
Contained By:
Dissertation Abstracts International79-12A(E).
Subject:
Business administration. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10845542
ISBN:
9780438282421
Cyber Threats in e-Government.
Moore, Barbara N.
Cyber Threats in e-Government.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 114 p.
Source: Dissertation Abstracts International, Volume: 79-12(E), Section: A.
Thesis (D.B.A.)--Northcentral University, 2018.
This research paper explores the topic of cyber security in public administration. Public administration refers to the inner workings of governmental organizations. Specifically, this paper focuses on the problem of a need for best practices for government agencies to implement to combat cyber threats. The purpose of this qualitative case study is to gain insight into government employee's perspectives on existing procedures and practices concerning cyber threats to e-government systems, how policies may be improved, and suggest procedures and strategies for combating cybercrimes. The researcher chose three research questions to help address the problem of the study: what were the perspectives of federal government managers concerning the existing procedures and practices to combat the threat of cybercrime in e-government? How can the existing procedure and practices be improved? What new strategies and practices could be adopted to combat cyber threats in the future, and why? The research, which was conducted online via a case study style survey where a sample size of three federal employees shared their views on what issues exist with cyber security policy and procedures, echoes this notion. The study findings indicated employees desire more training and education focused on cyber preparedness. Findings also indicate employees feel that current cyber procedures are generally effective, but can be improved. Employees acknowledged the yearly training requirements, but employees desire more effective training. The research shows that employees want to be better prepared for cyber attacks. The implications of the study are the need for open communication between supervisors and employees, the need for improved cyber training, and the need for improved education and training for government employees.
ISBN: 9780438282421Subjects--Topical Terms:
3168311
Business administration.
Cyber Threats in e-Government.
LDR
:02756nmm a2200313 4500
001
2203377
005
20190531104656.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780438282421
035
$a
(MiAaPQ)AAI10845542
035
$a
(MiAaPQ)northcentral:13192
035
$a
AAI10845542
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Moore, Barbara N.
$3
3430167
245
1 0
$a
Cyber Threats in e-Government.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
114 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-12(E), Section: A.
500
$a
Adviser: Lori Demeter.
502
$a
Thesis (D.B.A.)--Northcentral University, 2018.
520
$a
This research paper explores the topic of cyber security in public administration. Public administration refers to the inner workings of governmental organizations. Specifically, this paper focuses on the problem of a need for best practices for government agencies to implement to combat cyber threats. The purpose of this qualitative case study is to gain insight into government employee's perspectives on existing procedures and practices concerning cyber threats to e-government systems, how policies may be improved, and suggest procedures and strategies for combating cybercrimes. The researcher chose three research questions to help address the problem of the study: what were the perspectives of federal government managers concerning the existing procedures and practices to combat the threat of cybercrime in e-government? How can the existing procedure and practices be improved? What new strategies and practices could be adopted to combat cyber threats in the future, and why? The research, which was conducted online via a case study style survey where a sample size of three federal employees shared their views on what issues exist with cyber security policy and procedures, echoes this notion. The study findings indicated employees desire more training and education focused on cyber preparedness. Findings also indicate employees feel that current cyber procedures are generally effective, but can be improved. Employees acknowledged the yearly training requirements, but employees desire more effective training. The research shows that employees want to be better prepared for cyber attacks. The implications of the study are the need for open communication between supervisors and employees, the need for improved cyber training, and the need for improved education and training for government employees.
590
$a
School code: 1443.
650
4
$a
Business administration.
$3
3168311
650
4
$a
Management.
$3
516664
650
4
$a
Military studies.
$3
2197382
690
$a
0310
690
$a
0454
690
$a
0750
710
2
$a
Northcentral University.
$b
School of Business and Technology Management.
$3
2099493
773
0
$t
Dissertation Abstracts International
$g
79-12A(E).
790
$a
1443
791
$a
D.B.A.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10845542
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9379926
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login