Comprehensive Technology Research Report on Network Security Attacks
VerifiedAdded on  2023/06/07
|10
|2787
|394
Report
AI Summary
This report provides a comprehensive analysis of network security attacks from both academic and business perspectives. It identifies the type of research as empirical computer research and business research, focusing on network security attacks in wireless sensor networks and cloud computing environments. The report delves into key areas of interest such as software-defined networking, cloud systems, cyber security, and real-time systems. It discusses constructs like security effectiveness, system auditing, customer loyalty, and customer satisfaction, highlighting their influence on network security. Furthermore, the report identifies articles that demonstrate leadership in addressing security challenges and discusses theories and applications for integrating new technologies, such as cryptography, to enhance network security in wireless sensor networks. The research emphasizes the importance of securing sensitive data and ensuring the reliability of network services against various threats.

Running head: PERFORM TECHNOLOGY RESEARCH
Network Security Attacks
Name of the Student:
Name of the University:
Network Security Attacks
Name of the Student:
Name of the University:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1PERFORM TECHNOLOGY RESEARCH
1. Identification of type of research
From the academic viewpoint, the research is based on computer research where the
selected research topic is network security attacks. This is an empirical research, is a way to
gain knowledge by means of direct as well as indirect observation. This research is analyzed
both quantitatively as well as qualitatively. Wireless sensor network is a growing advanced
technology and there are possibility of security attacks as the network is prone to malicious
users. Security is fundamental requirements of the networks, therefore this paper is focused
on the security attacks in the network (Anwar et al., 2014). Security attacks are major concern
for the network due to its physical accessibility of the sensor and using of minimal capacity
into the network. Reddy and Sreenivasulu (2016) stated that availability into the network
ensures that the network services are feasible even into denial of the service attacks.
Authenticity is required for the network as adversary is easier to inject the messages.
Authenticity of data is required to identify the communicational nodes.
From the business viewpoint, it is a business research which is involved to acquire of
information as well as knowledge for the professional as well as commercial purposes. It
determines opportunities for the business organization. The network is developed due to new
level of IT environments, networking, administration of the information, security as well as
social variables. Hajli and Lin (2016) argued that capabilities of the software defined
networking is easier to detect as well as react to the security attacks. The research is basically
network based where identification of the security issues are analyzed. The existing system
has lack of accuracy as well as faster while data aggregation that decreases performance of
errors. In selected articles, the researcher is focused to analyse reasons why security attacks
are becoming prevalent into the cloud computing and wireless sensor network (Chang, Shen,
& Liu ¸2016). This paper is based on exploring current technologies which are related to
1. Identification of type of research
From the academic viewpoint, the research is based on computer research where the
selected research topic is network security attacks. This is an empirical research, is a way to
gain knowledge by means of direct as well as indirect observation. This research is analyzed
both quantitatively as well as qualitatively. Wireless sensor network is a growing advanced
technology and there are possibility of security attacks as the network is prone to malicious
users. Security is fundamental requirements of the networks, therefore this paper is focused
on the security attacks in the network (Anwar et al., 2014). Security attacks are major concern
for the network due to its physical accessibility of the sensor and using of minimal capacity
into the network. Reddy and Sreenivasulu (2016) stated that availability into the network
ensures that the network services are feasible even into denial of the service attacks.
Authenticity is required for the network as adversary is easier to inject the messages.
Authenticity of data is required to identify the communicational nodes.
From the business viewpoint, it is a business research which is involved to acquire of
information as well as knowledge for the professional as well as commercial purposes. It
determines opportunities for the business organization. The network is developed due to new
level of IT environments, networking, administration of the information, security as well as
social variables. Hajli and Lin (2016) argued that capabilities of the software defined
networking is easier to detect as well as react to the security attacks. The research is basically
network based where identification of the security issues are analyzed. The existing system
has lack of accuracy as well as faster while data aggregation that decreases performance of
errors. In selected articles, the researcher is focused to analyse reasons why security attacks
are becoming prevalent into the cloud computing and wireless sensor network (Chang, Shen,
& Liu ¸2016). This paper is based on exploring current technologies which are related to

2PERFORM TECHNOLOGY RESEARCH
security attacks and future research are beneficial to the issues. Into the smart cities, security
of the network is a key issue. Wireless security network components are not included of
mutable attributes, therefore the security components are not defend the ongoing attacks.
2. Identification of three areas of interest from the theoretical
standpoint
Based on the empirical research on selected research topic, the three areas of interest from
the theoretical standpoint are:
ï‚· Software defined networking
ï‚· Cloud system and network
ï‚· Network security or cyber security
Software defined networking (SDN): It is such an architecture which aims to make
network agile in addition to flexible. The goal of this network is to make improvement over
network control by enabling the enterprises to respond to the business requirement changes.
The network devices are made to take of traffic decisions based on configurations of the
routing tables (Liu et al., 2016).
Cloud system and network: It is such a computer network which is provided of
interconnectivity among the cloud based applications as well as network. It is a term which is
used to describe access to the networking resources from the centralized third party providers.
Therefore, the cloud network is such a network which is existed in the infrastructure of cloud
based server (Rezvani et al., 2015).
Network security: It is a body of technologies which is used to protect the network,
computers and data from the network attacks or any type of unauthorized access. Network
security is enabled to ensure that security of the assets is included of network traffic such as
security attacks and future research are beneficial to the issues. Into the smart cities, security
of the network is a key issue. Wireless security network components are not included of
mutable attributes, therefore the security components are not defend the ongoing attacks.
2. Identification of three areas of interest from the theoretical
standpoint
Based on the empirical research on selected research topic, the three areas of interest from
the theoretical standpoint are:
ï‚· Software defined networking
ï‚· Cloud system and network
ï‚· Network security or cyber security
Software defined networking (SDN): It is such an architecture which aims to make
network agile in addition to flexible. The goal of this network is to make improvement over
network control by enabling the enterprises to respond to the business requirement changes.
The network devices are made to take of traffic decisions based on configurations of the
routing tables (Liu et al., 2016).
Cloud system and network: It is such a computer network which is provided of
interconnectivity among the cloud based applications as well as network. It is a term which is
used to describe access to the networking resources from the centralized third party providers.
Therefore, the cloud network is such a network which is existed in the infrastructure of cloud
based server (Rezvani et al., 2015).
Network security: It is a body of technologies which is used to protect the network,
computers and data from the network attacks or any type of unauthorized access. Network
security is enabled to ensure that security of the assets is included of network traffic such as
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3PERFORM TECHNOLOGY RESEARCH
software as well as hardware technologies. Access to this network is managed through
network security which can target wide range of the threats from the entering into the
network (Xu, Yu, & Yang, 2017).
Based the business research on selected research topic, the three areas of interest from the
theoretical standpoint are:
ï‚· Cloud security
ï‚· Cyber security
ï‚· Real time system
Cloud security: Security is a main concern for that type of network as through use of
cloud computing, various personal and confidential information are shared and transferred
through it (Jain & Pal, 2017). There are chances of loss and stolen of those data which would
hamper the business operations.
Cyber security: The cyber security is such a process which take of physical as well as
software measures for protection of the cyber infrastructure from any unauthorized access,
destruction and improper disclosure (Soomro, Shah, & Ahmed, 2016). It helps to create of
secured platform for the users and computers to perform critical functions into secured IT
environments.
Real time system: It is such an operating system which is intended to aid real time
applications to course the data as it comes (Hajli et al., 2017). The requirements of processing
time is being measured in tenths of smaller increases of the time.
3. Description of key constructs and variables used in the articles
Into the selected empirical research articles, there are higher quality of quantitative
research data which are required to bring of theory, constructs as well as variables. Constructs
software as well as hardware technologies. Access to this network is managed through
network security which can target wide range of the threats from the entering into the
network (Xu, Yu, & Yang, 2017).
Based the business research on selected research topic, the three areas of interest from the
theoretical standpoint are:
ï‚· Cloud security
ï‚· Cyber security
ï‚· Real time system
Cloud security: Security is a main concern for that type of network as through use of
cloud computing, various personal and confidential information are shared and transferred
through it (Jain & Pal, 2017). There are chances of loss and stolen of those data which would
hamper the business operations.
Cyber security: The cyber security is such a process which take of physical as well as
software measures for protection of the cyber infrastructure from any unauthorized access,
destruction and improper disclosure (Soomro, Shah, & Ahmed, 2016). It helps to create of
secured platform for the users and computers to perform critical functions into secured IT
environments.
Real time system: It is such an operating system which is intended to aid real time
applications to course the data as it comes (Hajli et al., 2017). The requirements of processing
time is being measured in tenths of smaller increases of the time.
3. Description of key constructs and variables used in the articles
Into the selected empirical research articles, there are higher quality of quantitative
research data which are required to bring of theory, constructs as well as variables. Constructs
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4PERFORM TECHNOLOGY RESEARCH
in this paper are related to theories on network security (Zaini et al., 2016). The constructs are
consisted of number of variables when creating of theoretical model. The main objective into
the network security is to avert the negative consequences as well as valence behaviour is
consequences of the negative outcomes. There are main four key constructs which can
influence the network security attacks such as security effectiveness, system auditing, and
clarity in security policies as well as determine the security activities. As in most of the
organizations, security is a main concern, therefore proper security measures are to be taken
(Chelli, 2015). Based on the four constructs, the dependent variable is security effectiveness
and independent variables are system auditing, and clarity in security policies as well as
determine the security activities (Reddy & Sreenivasulu, 2016). Those are identified to
perform a theoretical framework of the selected research topic.
Into the business articles, the constructs are customer loyalty towards security, customer
satisfaction and security review. Chari (2015) stated that perceived severity is a factor to
influence the variables which affect the network security behaviour. The paper is
investigating impact of two of the software authenticated encryption security constructs. The
security constructs which are examined in the paper are affecting average quantity of
capacities up to three hops. When a client organization is sharing of any confidential
information with other organization, therefore it is the first responsibility of the organization
to keep the client information secured over the network and in cloud computing (Yang &
Wen, 2017). The dependent variable is security review and independent variables are
customer loyalty towards security and customer satisfaction.
4. Identification of the business articles demonstrate the leadership
Among the selected ten business articles, there are some articles which demonstrate
the leadership. The wireless sensor networks are deployed into the security critical
in this paper are related to theories on network security (Zaini et al., 2016). The constructs are
consisted of number of variables when creating of theoretical model. The main objective into
the network security is to avert the negative consequences as well as valence behaviour is
consequences of the negative outcomes. There are main four key constructs which can
influence the network security attacks such as security effectiveness, system auditing, and
clarity in security policies as well as determine the security activities. As in most of the
organizations, security is a main concern, therefore proper security measures are to be taken
(Chelli, 2015). Based on the four constructs, the dependent variable is security effectiveness
and independent variables are system auditing, and clarity in security policies as well as
determine the security activities (Reddy & Sreenivasulu, 2016). Those are identified to
perform a theoretical framework of the selected research topic.
Into the business articles, the constructs are customer loyalty towards security, customer
satisfaction and security review. Chari (2015) stated that perceived severity is a factor to
influence the variables which affect the network security behaviour. The paper is
investigating impact of two of the software authenticated encryption security constructs. The
security constructs which are examined in the paper are affecting average quantity of
capacities up to three hops. When a client organization is sharing of any confidential
information with other organization, therefore it is the first responsibility of the organization
to keep the client information secured over the network and in cloud computing (Yang &
Wen, 2017). The dependent variable is security review and independent variables are
customer loyalty towards security and customer satisfaction.
4. Identification of the business articles demonstrate the leadership
Among the selected ten business articles, there are some articles which demonstrate
the leadership. The wireless sensor networks are deployed into the security critical

5PERFORM TECHNOLOGY RESEARCH
applications. Due to internet constraints, there are different security attacks which affects
the data collection (Xu, Yu, & Yang, 2017). In order to overcome with this challenge,
active detection based security is used. The distribution of detection routes in active trust
scheme is used to achieve desired security measures of the wireless sensor network. WSN
is emerging as one of the technologies for the future because of wide range of the
applications in the security domains (Liu et al., 2016). WSN is one of most challenging
research domains of the time. It has potential to deploy in wide mission of the critical
applications. Development as well as effective mechanisms are used to address the
system design.
Because of wireless medium which is broadcasted into the nature, the packets are
damaged because of errors into the channels and also conflicts. The examination is
fundamentally arrange based where identification of the security issues which are
dissected (Porter & Heppelmann, 2014). The current framework has absence of exactness
and also quicker while information accumulation that reductions execution of mistakes. In
chose articles, the researcher is engaged to dissect reasons why security assaults are
getting to be predominant into the distributed computing and remote sensor arrange. It is
required to hide the messages from the positive attacker in addition to this, it is
considered as most important issue into the network security (AlHogail, 2015). Sensor
identifies are encrypted to protect against the traffic attack.
5. Discussion of theories and application for integration of new
technologies
In order to address the security issues into wireless security network, cryptography is
used as well as its applicability. For secured transmission of the information over the
sensor networks, various cryptographic techniques are being used such as asymmetric key
applications. Due to internet constraints, there are different security attacks which affects
the data collection (Xu, Yu, & Yang, 2017). In order to overcome with this challenge,
active detection based security is used. The distribution of detection routes in active trust
scheme is used to achieve desired security measures of the wireless sensor network. WSN
is emerging as one of the technologies for the future because of wide range of the
applications in the security domains (Liu et al., 2016). WSN is one of most challenging
research domains of the time. It has potential to deploy in wide mission of the critical
applications. Development as well as effective mechanisms are used to address the
system design.
Because of wireless medium which is broadcasted into the nature, the packets are
damaged because of errors into the channels and also conflicts. The examination is
fundamentally arrange based where identification of the security issues which are
dissected (Porter & Heppelmann, 2014). The current framework has absence of exactness
and also quicker while information accumulation that reductions execution of mistakes. In
chose articles, the researcher is engaged to dissect reasons why security assaults are
getting to be predominant into the distributed computing and remote sensor arrange. It is
required to hide the messages from the positive attacker in addition to this, it is
considered as most important issue into the network security (AlHogail, 2015). Sensor
identifies are encrypted to protect against the traffic attack.
5. Discussion of theories and application for integration of new
technologies
In order to address the security issues into wireless security network, cryptography is
used as well as its applicability. For secured transmission of the information over the
sensor networks, various cryptographic techniques are being used such as asymmetric key
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6PERFORM TECHNOLOGY RESEARCH
cipher and symmetric key cipher. Security of the asymmetric cryptography is based on
difficulties of the mathematical issues (Zaini et al., 2016). The possibility of the
symmetric cryptography is to stack secret data in the sensor hubs before their
organization in the system. This secret data might be simply the secret key or helper data
that causes the sensor hubs to infer the real secret key. With this secret key, hubs can
safely discuss. The principle inconvenience of this arrangement is that trading off one hub
(access to the pre-stacked key) may prompt compromise the whole system (Anwar et al.,
2014). To conquer this restriction, a few specialists propose plans that build up pairwise
keys as opposed to an interesting worldwide key.
Open key cryptosystems are thought to be too substantial to use in WSNs (Porter &
Heppelmann, 2014). In any case, late works demonstrate successful execution cases of
open key cryptography in constrained sensors devices. The remote sensor frameworks
continue to create and end up being by and large used in various mission-essential
applications. Along these lines, the necessity for security becomes critical Larson and
Chang (2015). In any case, the remote sensor organize encounters various impediments,
for instance, confined imperativeness, processing capability, in addition limit restrict, and
moreover conflicting correspondence in addition unattended errand.
cipher and symmetric key cipher. Security of the asymmetric cryptography is based on
difficulties of the mathematical issues (Zaini et al., 2016). The possibility of the
symmetric cryptography is to stack secret data in the sensor hubs before their
organization in the system. This secret data might be simply the secret key or helper data
that causes the sensor hubs to infer the real secret key. With this secret key, hubs can
safely discuss. The principle inconvenience of this arrangement is that trading off one hub
(access to the pre-stacked key) may prompt compromise the whole system (Anwar et al.,
2014). To conquer this restriction, a few specialists propose plans that build up pairwise
keys as opposed to an interesting worldwide key.
Open key cryptosystems are thought to be too substantial to use in WSNs (Porter &
Heppelmann, 2014). In any case, late works demonstrate successful execution cases of
open key cryptography in constrained sensors devices. The remote sensor frameworks
continue to create and end up being by and large used in various mission-essential
applications. Along these lines, the necessity for security becomes critical Larson and
Chang (2015). In any case, the remote sensor organize encounters various impediments,
for instance, confined imperativeness, processing capability, in addition limit restrict, and
moreover conflicting correspondence in addition unattended errand.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7PERFORM TECHNOLOGY RESEARCH
References
Empirical research
Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., Qureshi, K. N., Computing, F.,
& Bahru, J. (2014). Security issues and attacks in wireless sensor network. World
Applied Sciences Journal, 30(10), 1224-1227.
Chelli, K. (2015, July). Security issues in wireless sensor networks: Attacks and
countermeasures. In Proceedings of the World Congress on Engineering (Vol. 1,
pp. 1-3).
Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication
scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking
and Applications, 8(6), 1070-1081.
Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: secure and trustable routing in
wireless sensor networks. IEEE Transactions on Information Forensics and
Security, 11(9), 2013-2027.
Reddy V. K., & Sreenivasulu, D. (2016). Software-Defined Networking with DDoS
Attacks in Cloud Computing.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation
technique for wireless sensor networks in the presence of collusion attacks. IEEE
transactions on Dependable and Secure Computing, 12(1), 98-110.
Wu, J., Ota, K., Dong, M., & Li, C. (2016). A Hierarchical Security Framework for
Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart
Cities. IEEE Access, 4(4), 416-424.
References
Empirical research
Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., Qureshi, K. N., Computing, F.,
& Bahru, J. (2014). Security issues and attacks in wireless sensor network. World
Applied Sciences Journal, 30(10), 1224-1227.
Chelli, K. (2015, July). Security issues in wireless sensor networks: Attacks and
countermeasures. In Proceedings of the World Congress on Engineering (Vol. 1,
pp. 1-3).
Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication
scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking
and Applications, 8(6), 1070-1081.
Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: secure and trustable routing in
wireless sensor networks. IEEE Transactions on Information Forensics and
Security, 11(9), 2013-2027.
Reddy V. K., & Sreenivasulu, D. (2016). Software-Defined Networking with DDoS
Attacks in Cloud Computing.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation
technique for wireless sensor networks in the presence of collusion attacks. IEEE
transactions on Dependable and Secure Computing, 12(1), 98-110.
Wu, J., Ota, K., Dong, M., & Li, C. (2016). A Hierarchical Security Framework for
Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart
Cities. IEEE Access, 4(4), 416-424.

8PERFORM TECHNOLOGY RESEARCH
Xu, X., Yu, H., & Yang, K. (2017). DDoS Attack in Software Defined Networks: A
Survey. ZTE COMMUNICATIONS, 15(3).
Zaini, J., Hameau, F., Taris, T., Morche, D., & Audebert, P. (2016, June). Channel aware
receiver front end for low power 2.4 GHz Wireless Sensor Network: A system
level analysis. In New Circuits and Systems Conference (NEWCAS), 2016 14th
IEEE International (pp. 1-4). IEEE.
Zhang, D., Li, G., Zheng, K., Ming, X., & Pan, Z. H. (2014). An energy-balanced routing
method based on forward-aware factor for wireless sensor networks. IEEE
transactions on industrial informatics, 10(1), 766-773.
Business journals
AlHogail, A. (2015). Design and validation of information security culture
framework. Computers in Human Behavior, 49, 567-575.
Chang, S. E., Shen, W. C., & Liu, A. Y. (2016). Why mobile users trust smartphone
social networking services? A PLS-SEM approach. Journal of Business
Research, 69(11), 4890-4895.
Chari, S. (2015). Discussion of ‘Statistical learning methods for information security:
fundamentals and case studies’. Applied Stochastic Models in Business and
Industry, 31(2), 116-118.
Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social
networking sites: The role of perceived control of information. Journal of
Business Ethics, 133(1), 111-123.
Xu, X., Yu, H., & Yang, K. (2017). DDoS Attack in Software Defined Networks: A
Survey. ZTE COMMUNICATIONS, 15(3).
Zaini, J., Hameau, F., Taris, T., Morche, D., & Audebert, P. (2016, June). Channel aware
receiver front end for low power 2.4 GHz Wireless Sensor Network: A system
level analysis. In New Circuits and Systems Conference (NEWCAS), 2016 14th
IEEE International (pp. 1-4). IEEE.
Zhang, D., Li, G., Zheng, K., Ming, X., & Pan, Z. H. (2014). An energy-balanced routing
method based on forward-aware factor for wireless sensor networks. IEEE
transactions on industrial informatics, 10(1), 766-773.
Business journals
AlHogail, A. (2015). Design and validation of information security culture
framework. Computers in Human Behavior, 49, 567-575.
Chang, S. E., Shen, W. C., & Liu, A. Y. (2016). Why mobile users trust smartphone
social networking services? A PLS-SEM approach. Journal of Business
Research, 69(11), 4890-4895.
Chari, S. (2015). Discussion of ‘Statistical learning methods for information security:
fundamentals and case studies’. Applied Stochastic Models in Business and
Industry, 31(2), 116-118.
Hajli, N., & Lin, X. (2016). Exploring the security of information sharing on social
networking sites: The role of perceived control of information. Journal of
Business Ethics, 133(1), 111-123.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9PERFORM TECHNOLOGY RESEARCH
Hajli, N., Sims, J., Zadeh, A. H., & Richard, M. O. (2017). A social commerce
investigation of the role of trust in a social networking site on purchase
intentions. Journal of Business Research, 71, 133-141.
Jain, J., & Pal, P. R. (2017). A Recent Study over Cyber Security and its
Elements. International Journal of Advanced Research in Computer Science, 8(3).
Larson, D., & Chang, V. (2016). A review and future direction of agile, business
intelligence, analytics and data science. International Journal of Information
Management, 36(5), 700-710.
Porter, M. E., & Heppelmann, J. E. (2014). How smart, connected products are
transforming competition. Harvard business review, 92(11), 64-88.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management
needs more holistic approach: A literature review. International Journal of
Information Management, 36(2), 215-225.
Yang, S. C., & Wen, B. (2017). Toward a cybersecurity curriculum model for
undergraduate business schools: A survey of AACSB-accredited institutions in the
United States. Journal of Education for Business, 92(1), 1-8.
Hajli, N., Sims, J., Zadeh, A. H., & Richard, M. O. (2017). A social commerce
investigation of the role of trust in a social networking site on purchase
intentions. Journal of Business Research, 71, 133-141.
Jain, J., & Pal, P. R. (2017). A Recent Study over Cyber Security and its
Elements. International Journal of Advanced Research in Computer Science, 8(3).
Larson, D., & Chang, V. (2016). A review and future direction of agile, business
intelligence, analytics and data science. International Journal of Information
Management, 36(5), 700-710.
Porter, M. E., & Heppelmann, J. E. (2014). How smart, connected products are
transforming competition. Harvard business review, 92(11), 64-88.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management
needs more holistic approach: A literature review. International Journal of
Information Management, 36(2), 215-225.
Yang, S. C., & Wen, B. (2017). Toward a cybersecurity curriculum model for
undergraduate business schools: A survey of AACSB-accredited institutions in the
United States. Journal of Education for Business, 92(1), 1-8.
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.