Discussion and reflection
Discussion 1 – InfoTech Import in Strat Plan
During this session, we looked at several topics on Strategic IT planning and strategy. We examined researchers, models, and issues in the area, and as you get closer to starting your own dissertation, you will need to choose a topic in your first dissertation class DSRT-736, so it is essential to start preparing.
This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics. Since you have already examined several research articles, another way would be to examine previous dissertations in these areas. Visit the University of Cumberland’s library, go to the Dissertation Database, and locate an interesting topic on IT atrategy, or examine a model presented this term. Here are some pointers that will help critically evaluate some viable topics. • Is the topic attainable for a first-time dissertation student? • Is the problem rooted in the literature? • Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool? • Is there a theoretical model or framework discussed? Discuss the topic, the problem the model has been used in the research, and any present findings.
Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research.
Text-Book
Title: Managing and Using Information Systems
ISBN: 9781119560562
Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta
Publisher: John Wiley & Sons
Publication Date: 2019-12-05
Readings:
Chen, Chau, P. Y. ., & Li, W. (2019). The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior. Information Technology & People (West Linn, Or.), 32(4), 973–992.
Discussion 1 – Emerging Threat & counter Measures
Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.
When or where would you think it would be necessary to implement security measures for both?
350-400 Words
Readings
Poyraz, Canan, M., McShane, M., Pinto, C. A., & Cotter, T. S. (2020). Cyber assets at risk: monetary impact of U.S. personally identifiable information mega data breaches. Geneva Papers on Risk and Insurance. Issues and Practice, 45(4), 616–638. Fausto, Gaggero, G. B., Patrone, F., Girdinio, P., & Marchese, M. (2021). Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures. Sensors (Basel, Switzerland), 21(21), 6970–.
Leave a Reply
Want to join the discussion?Feel free to contribute!