ipl-logo

Conceptual Or Qualitative Exploratory Case Study

987 Words4 Pages

Conceptual or Theoretical Framework (2-4 pages) The theoretical frame work adopted for this qualitative exploratory case study revolved around 3 central themes. The theory of education, theory of management and theory of policy. Although the theories are broad in relation to the specific topic of front-line cybersecurity management and policy, it is imperative to understand how the broad theories apply to the granular theme of cybersecurity. At its essence education, management and policy make up the issues currently being explored throughout this research it relates to public sector cybersecurity management. According to Abraham, S., & Shih, L. (2015) cybersecurity breeches have exponentially risen to altitudes which in essence have become …show more content…

Of those incidents, a lack of educational effort was cited as one of the major issues contributing to the high number of cybersecurity incidents. GAO-17-440T: Cybersecurity Actions (2017) explained the need for creating an educated and well trained cybersecurity minded workforce which have led to many unnecessary cybersecurity breeches within the federal government. Cybersecurity education, although a necessity for cybersecurity technical professionals is imperative for front-line managers which guide and lead cybersecurity technical personnel. The next section will look at the general theory of …show more content…

Jackson School of International Studies, 2016). According to Henry M. Jackson School of International Studies 2016 the interconnection of systems has created a path in which new rules and regulations must be created in order to facilitate new ways of conducting business. As with the invention of new and innovative ways of producing a product, utilizing a service or providing a solution brings new and innovative necessities to ensure proper protections of the user. This concept is attributed with a growing society which is needed in order to create progress. However, according to Henry M. Jackson School of International Studies 2016 with progress comes malicious avenues in which users can be taken advantage of. This is where cybersecurity policy is imperative in ensuring proper protections for users, organizations and products

Open Document