Phishing: The Importance of IT Security in the Private Sector

Students will complete a research paper during the semester that will be no less
than 6-pages in length (12-point font, double spaced) containing no less than 4
sources from scholarly, peer-reviewed articles or government sources.
Wikipedia or other open-source material is not permitted. The title page and
references page do not count towards the 6-page minimum length.

It must contain the following headings Title, Introduction, Issues, Professional Relevance, Discussion, & Conclusion. Follow the outline attached and only use these references for the Paper.

Reference Options

Lam, C. (2018). A SLAP ON THE WRIST: COMBATTING RUSSIA’S CYBER ATTACK ON THE 2016 U.S. PRESIDENTIAL ELECTION. Boston College.Law School.Boston College Law Review, 59(6), 2167-2201. Retrieved from https://uc.idm.oclc.org/login?qurl=https%3A%2F%2Fwww.proquest.com%2Fscholarly-journals%2Fslap-on-wrist-combatting-russias-cyber-attack%2Fdocview%2F2108180208%2Fse-2%3Faccountid%3D2909

Griffin, L. (2021). The effectiveness of cybersecurity awareness training in reducing employee negligence within department of defense (DoD) affiliated organizations-qualitative exploratory case study (Order No. 28319332). Available from ProQuest Dissertations & Theses A&I: Business; ProQuest Dissertations & Theses A&I: Science & Technology; ProQuest Dissertations & Theses Global: Business; ProQuest Dissertations & Theses Global: Science & Technology. (2498537724). Retrieved from https://uc.idm.oclc.org/login?qurl=https%3A%2F%2Fwww.proquest.com%2Fdissertations-theses%2Feffectiveness-cybersecurity-awareness-training%2Fdocview%2F2498537724%2Fse-2%3Faccountid%3D2909

Suzuki, Y. E., & Monroy, S. A. S. (2022). Prevention and mitigation measures against phishing emails: A sequential schema model. Security Journal, 35(4), 1162-1182. doi:https://doi.org/10.1057/s41284-021-00318-x

Romanosky, S., & Boudreaux, B. (2021). Private-sector attribution of cyber incidents: Benefits and risks to the U.S. government. The International Journal of Intelligence and Counter Intelligence, 34(3), 463. doi:https://doi.org/10.1080/08850607.2020.1783877

Pouani Tientcheu, P. (2021). Security awareness strategies used in the prevention of cybercrimes by cybercriminals (Order No. 28721698). Available from Criminal Justice Database. (2572548553). Retrieved from https://uc.idm.oclc.org/login?qurl=https%3A%2F%2Fwww.proquest.com%2Fdissertations-theses%2Fsecurity-awareness-strategies-used-prevention%2Fdocview%2F2572548553%2Fse-2%3Faccountid%3D2909

Federal Register :: The Department of Homeland Security, Stakeholder Engagement & Cyber Infrastructure Resilience Division (SECIR)
https://www.federalregister.gov/documents/2017/12/18/2017-27114/the-department-of-homeland-security-stakeholder-engagement-and-cyber-infrastructure-resilience

Osmak, K. A. (2019). A new approach to cyber-security (Order No. 13895158). Available from Criminal Justice Database; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (2240080463). Retrieved from https://uc.idm.oclc.org/login?qurl=https%3A%2F%2Fwww.proquest.com%2Fdissertations-theses%2Fnew-approach-cyber-security%2Fdocview%2F2240080463%2Fse-2%3Faccountid%3D2909

Marriott International revealed that hackers had breached its Starwood reservation system and had stolen the personal data of up to 500 million guests.
D’Arcy, J., & Basoglu, A. (2022). The influences of public and institutional pressure on firms cybersecurity disclosures. Journal of the Association for Information Systems, 23(3), 779-805. doi:https://doi.org/10.17705/1jais.00740

Phishing

Akopyan, D. A., & Yelyakov, A. D. (2009). Cybercrimes in the information structure of society: A survey. Scientific and Technical Information Processing, 36(6), 338-350. doi:https://doi.org/10.3103/S0147688209060057

Attili, V. S. P., Mathew, S. K., & Sugumaran, V. (2018). Understanding information privacy assimilation in IT organizations using multi-site case studies. Communications of the Association for Information Systems, 42, 4. doi:https://doi.org/10.17705/1CAIS.04204

Perera, S., Jin, X., Maurushat, A., & De-Graft, J. (2022). Factors affecting reputational damage to organisations due to cyberattacks. Informatics, 9(1), 28. doi:https://doi.org/10.3390/informatics9010028

Last Completed Projects

topic title academic level Writer delivered