Gap in Literature

Healthcare cyber-attacks and their mitigation techniques in Industry 4.0 is the topic selected. Advanced threats and attacks have developed by cyber criminals unaware of healthcare professionals. I want to address the latest threats and mitigation strategies that help healthcare organizations and patients secure their information. Cybercriminals believe the healthcare industry is a soft target. Cybercriminals routinely target healthcare organizations. Healthcare industry vulnerabilities can be linked to various issues, including a lack of security awareness among care personnel, reliance on old unpatched systems that are no longer supported, a broad attack surface, and a lack of staffing resources. 
Qualitative and quantitative research methods address the problem by conducting interviews and an online survey with healthcare professionals. Factor Analysis Information Risk (FAIR) and Technology acceptance models (TAM) are utilized for this study. 
Humayun, M. (2021). Industry 4.0 and cyber security issues and challenges. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2957-2971.
Research questions
What are the most common types of social attacks against humans encountered by healthcare organizations?
What policies and governance adopted by healthcare organizations have resulted in enhanced resilience?
How does an organization perform a cybersecurity risk assessment to identify the role of humans in the loop for enhancing cybersecurity?
What is the role of the training program in enhancing healthcare professionals’ awareness of cyber threats, and how can we measure the impact of training and awareness activities adopted within an organization?
What have cyber defense strategies been proposed by national and international organizations to strengthen cyber resilience?
Findings: The research aims to synthesize the recent literature on human behavior-related security weaknesses that compromise the cyber defense strategy used by healthcare organizations.
====================================================
Professor Response:
Hi Student
Interesting topic but remember that your research question must fill a scholarly gap in the literature. Also, take care to proof read your APA Style works. Typo’s and grammar mistakes in this one as this is aproposal should be in the future tense. Glad to have you in the class,
Good progress on an interesting topic area and good progress on finding scholarly literature, but what is the scholarly gap in the literature. Identifying that gap will help narrow your look at an IT topic in healthcare. Remember too that proper APA Style is essential as you refine your scholarly writing skills needed in this scholarly writing effort. Example, your third paragraph first sentence “…attacks trick…” and use nouns rather than pronouns, ex. “it” HINT, again, the Purdue OWL is a great source of citation and grammar requirements for APA style seventh edition.

Assignment

Explain a situation where computer security has been compromised (a personal experience is preferred if you know of one). If you do not have any personal experience with a security compromise, explain one that you have read about on the Internet. What can be learned from the experience?

WEEK'S ASSIGNMENT 5

In this week’s assignment you are instructed to create a stack class and name it ArrayStack then add several methods to it (ArrayClass(), push(), pop(), isEmpty(), peek(), and count()). Will the ArrayStack class have a main() method? Why or Why not?

need resources and APA

Developing an Effective Fortune 500 Strategy

Choose a Fortune 500 company from this website (Links to an external site.) https://fortune.com/fortune500/

Use – Amazon company

Use the five integrated stages to set a new effective strategy for the chosen company.

  1. Develop a strategic vision that charts the company’s long-term direction.
  2. Set objectives for measuring the company’s performance and tracking its progress.
  3. Craft a strategy for advancing the company.
  4. Implement and execute the chosen strategy efficiently and effectively.
  5. Evaluate and analyze the external environment and the company’s internal situation and performance.

please follow the template provided when answering the questions

Ethical Hacking week 15

 

In a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month? 

Sentiment Analysis

What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?

Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words, and continue to use in-text citations. 

Pls, use the references from textbooks, not internet sources.