Discussion and reflection

Discussion 1 – InfoTech Import in Strat Plan

During this session, we looked at several topics on Strategic IT planning and strategy. We examined researchers, models, and issues in the area, and as you get closer to starting your own dissertation, you will need to choose a topic in your first dissertation class DSRT-736, so it is essential to start preparing.

This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics. Since you have already examined several research articles, another way would be to examine previous dissertations in these areas. Visit the University of Cumberland’s library, go to the Dissertation Database, and locate an interesting topic on IT atrategy, or examine a model presented this term. Here are some pointers that will help critically evaluate some viable topics. • Is the topic attainable for a first-time dissertation student? • Is the problem rooted in the literature? • Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool? • Is there a theoretical model or framework discussed? Discuss the topic, the problem the model has been used in the research, and any present findings.

Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research.




Title: Managing and Using Information Systems

ISBN: 9781119560562

Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta

Publisher: John Wiley & Sons

Publication Date: 2019-12-05



Chen, Chau, P. Y. ., & Li, W. (2019).  The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior. Information Technology & People (West Linn, Or.), 32(4), 973–992.

Discussion 1 – Emerging Threat & counter Measures

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

350-400 Words


Poyraz, Canan, M., McShane, M., Pinto, C. A., & Cotter, T. S. (2020).  Cyber assets at risk: monetary impact of U.S. personally identifiable information mega data breaches. Geneva Papers on Risk and Insurance. Issues and Practice, 45(4), 616–638. Fausto, Gaggero, G. B., Patrone, F., Girdinio, P., & Marchese, M. (2021).  Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures. Sensors (Basel, Switzerland), 21(21), 6970–.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *