Journal of
Marketing Development and Competitiveness






Scholar Gateway


Abstracts prior to volume 5(1) have been archived!

Issue 5(1), October 2010 -- Paper Abstracts
Girard  (p. 9-22)
Cooper (p. 23-32)
Kunz-Osborne (p. 33-41)
Coulmas-Law (p.42-46)
Stasio (p. 47-56)
Albert-Valette-Florence (p.57-63)
Zhang-Rauch (p. 64-70)
Alam-Yasin (p. 71-78)
Mattare-Monahan-Shah (p. 79-94)
Nonis-Hudson-Hunt (p. 95-106) 



JOURNAL OF APPLIED BUSINESS AND ECONOMICS


Emerging Technologies and Cyber Risk: How do we secure the Internet of Things (IoT) environment?



Author(s): Charla Griffy-Brown, Demetrios Lazarikos, Mark Chun

Citation: Charla Griffy-Brown, Demetrios Lazarikos, Mark Chun, (2019) "Emerging Technologies and Cyber Risk: How do we secure the Internet of Things (IoT) environment?," Journal of Applied Business and Economics, Vol. 21, Iss.2,  pp. 70-79

Article Type: Research paper

Publisher: North American Business Press

​Abstract:

Cloud computing and the Internet of Things (IoT) have transformed businesses, enabling agile and cost-effective IT infrastructure. The challenge is that these new opportunities create a co-mingled architecture which is difficult to secure. The complexity of this architecture is magnified with the IoT. Based on interviews with executive leadership teams and boards of directors facing these new environments, we developed the over-arching research question: How do we secure increasingly dynamic architecture in an environment while supporting and creating agile business growth? We then narrowed this down to more specific questions dealt with in this study. The research involved an in-depth exploration of this problem using a survey instrument and multiple qualitative methods involving business leaders from 59 companies between 2017 – 2018. Based on this analysis, we developed an information security framework for executives in this new environment that builds on previous work. This framework is called the Extended Risk-Based Approach and provides businesses with an approach for securing an enterprise amidst the IoT and agile architecture. Importantly, the data analyzed suggests that this approach is critically needed to address the rapidly growing complexity of enterprise architecture and the digital world we live and work.