Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity Strategies Information...
~
Ruiz Caino, Alejandro.
Linked to FindBook
Google Book
Amazon
博客來
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware./
Author:
Ruiz Caino, Alejandro.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2024,
Description:
184 p.
Notes:
Source: Dissertations Abstracts International, Volume: 85-09, Section: A.
Contained By:
Dissertations Abstracts International85-09A.
Subject:
Information technology. -
Online resource:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30993688
ISBN:
9798381855579
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
Ruiz Caino, Alejandro.
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
- Ann Arbor : ProQuest Dissertations & Theses, 2024 - 184 p.
Source: Dissertations Abstracts International, Volume: 85-09, Section: A.
Thesis (D.I.T.)--Walden University, 2024.
This item must not be sold to any third party vendors.
Healthcare organizations' (HCOs') information systems (IS) are prone to increasing ransomware cyberattacks. For HCO information technology (IT) leaders, protecting IS from ransomware attacks is vital because these systems manage large amounts of confidential and sensitive data. Grounded in general systems theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies used by IT leaders in HCOs to protect IS from ransomware attacks. Participants included eight IT leaders from HCOs in the United States responsible for IS protection against ransomware cyberattacks. Data sources included semistructured interviews conducted with the participants via videoconferencing, the researcher's field notes, and 10 online industry documents. Data were analyzed using a thematic analysis; three themes emerged: (a) implement and align technical defense practices with protective technology tools; (b) assess and align security planning elements such as governance, procedures, and policies; and (c) monitor and measure human security elements such as security training and security awareness. IT leaders should implement robust security policies and procedures with proper planning skills aligned with organizational training and awareness plans. The implications for positive social change include the potential to increase security standards that help protect HCOs, thus providing better protection for health IS and personally identifiable patient information.
ISBN: 9798381855579Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Cyberattacks
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
LDR
:02804nmm a2200421 4500
001
2396983
005
20240618081835.5
006
m o d
007
cr#unu||||||||
008
251215s2024 ||||||||||||||||| ||eng d
020
$a
9798381855579
035
$a
(MiAaPQ)AAI30993688
035
$a
AAI30993688
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Ruiz Caino, Alejandro.
$3
3766747
245
1 0
$a
Cybersecurity Strategies Information Technology Leaders Use to Protect Healthcare Information Systems From Ransomware.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2024
300
$a
184 p.
500
$a
Source: Dissertations Abstracts International, Volume: 85-09, Section: A.
500
$a
Advisor: Carpenter, Donald.
502
$a
Thesis (D.I.T.)--Walden University, 2024.
506
$a
This item must not be sold to any third party vendors.
520
$a
Healthcare organizations' (HCOs') information systems (IS) are prone to increasing ransomware cyberattacks. For HCO information technology (IT) leaders, protecting IS from ransomware attacks is vital because these systems manage large amounts of confidential and sensitive data. Grounded in general systems theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies used by IT leaders in HCOs to protect IS from ransomware attacks. Participants included eight IT leaders from HCOs in the United States responsible for IS protection against ransomware cyberattacks. Data sources included semistructured interviews conducted with the participants via videoconferencing, the researcher's field notes, and 10 online industry documents. Data were analyzed using a thematic analysis; three themes emerged: (a) implement and align technical defense practices with protective technology tools; (b) assess and align security planning elements such as governance, procedures, and policies; and (c) monitor and measure human security elements such as security training and security awareness. IT leaders should implement robust security policies and procedures with proper planning skills aligned with organizational training and awareness plans. The implications for positive social change include the potential to increase security standards that help protect HCOs, thus providing better protection for health IS and personally identifiable patient information.
590
$a
School code: 0543.
650
4
$a
Information technology.
$3
532993
650
4
$a
American studies.
$3
2122720
653
$a
Cyberattacks
653
$a
Cybersecurity
653
$a
General systems theory
653
$a
Healthcare organizations
653
$a
Information systems
653
$a
Ransomware
690
$a
0489
690
$a
0323
690
$a
0310
690
$a
0769
710
2
$a
Walden University.
$b
Information Systems and Technology.
$3
3176643
773
0
$t
Dissertations Abstracts International
$g
85-09A.
790
$a
0543
791
$a
D.I.T.
792
$a
2024
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30993688
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9505303
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login