The Effects of Computer Crimes on the Management of Disaster Recovery
Total Page:16
File Type:pdf, Size:1020Kb
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2018 The ffecE ts of Computer Crimes on the Management of Disaster Recovery Tim Gene Proffitt Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Databases and Information Systems Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Management and Technology This is to certify that the doctoral dissertation by Timothy Gene Proffitt has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. David Gould, Committee Chairperson, Management Faculty Dr. Howard Schechter, Committee Member, Management Faculty Dr. Richard Schuttler, University Reviewer, Management Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2018 Abstract The Effects of Computer Crimes on the Management of Disaster Recovery by Timothy Gene Proffitt MS, SANS Technology Institute, 2010 BS, Sam Houston State University, 1998 Dissertation in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Management Walden University May 2018 Abstract The effects of a technology disaster on an organization can include a prolonged disruption, loss of reputation, monetary damages, and the inability to remain in business. Although much is known about disaster recovery and business continuance, not much research has been produced on how businesses can leverage other technology frameworks to assist information technology disaster recovery. The problem was the lack of organizational knowledge to recover from computer crime interruptions given the maturity level of existing disaster recovery programs. The purpose of this Delphi study was to understand how disaster recovery controls and processes can be modified to improve response to a computer crime caused business interruption. The overarching research question in this study was to understand what factors emerge relative to the ability of disaster recovery programs to respond to disasters caused by computer crimes. The conceptual framework included a maturity model to look at how programs might be improved to respond to the computer crimes threat. Research data were collected from a 3 round Delphi study of 22 disaster recovery experts in the fields of disaster recovery and information security. Results from the Delphi encompass a consensus by the panel. Key findings included the need for planning for cyber security, aligning disaster recovery with cyber security, providing cyber security training for managers and staff, and applying lessons learned from experience. Implications for positive social change include the ability for organizations to return to an acceptable level of operation and continue their service benefiting employees, customers, and other stakeholders. The Effects of Computer Crimes on the Management of Disaster Recovery by Timothy Gene Proffitt MS, SANS Technology Institute, 2010 BS, Sam Houston State University, 1998 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Management Walden University May 2018 Dedication First and foremost, I would like to give thanks to my wife Crystal and two children, Charley and Samuel, who have given me strength and their precious time to get me through this challenge. I would also like to acknowledge my father and mother who believed in me even when I doubted myself. They encouraged me to stay in college which ultimately led me to the completion of this doctoral journey. Acknowledgments I would like to acknowledge and thank the Walden University faculty who took the time to provide valuable feedback and encouragement. Each class was a step in the direction of completing this dissertation, and the faculty made the program enjoyable. I want to give special thanks to my committee of Dr. David Gould and Dr. Howard Schechter who took my project and guided my writing into the dissertation it is today. I want to thank my URR. Dr. Richard Schuttler for his invaluable contributions. I would also like to thank Robert Armstrong and the management team of my company for allowing me to take the time away from work when I needed to stay on track with this program. Table of Contents List of Tables .......................................................................................................................v List of Figures .................................................................................................................... vi Chapter 1: Introduction to the Study ....................................................................................1 Background of the Study ...............................................................................................2 Problem Statement .........................................................................................................3 Purpose of the Study ......................................................................................................4 Research Questions ........................................................................................................5 Conceptual Framework ..................................................................................................6 Nature of the Study ........................................................................................................7 Definitions......................................................................................................................9 Assumptions .................................................................................................................10 Scope and Delimitations ..............................................................................................11 Limitations ...................................................................................................................13 Significance of the Study .............................................................................................13 Significance to Practice......................................................................................... 14 Significance to Theory .......................................................................................... 15 Significance to Social Change .............................................................................. 15 Summary and Transition ..............................................................................................16 Chapter 2: Literature Review .............................................................................................17 Literature Search Strategy............................................................................................18 Conceptual Framework ................................................................................................19 i Literature Review.........................................................................................................23 History of Disaster Recovery ................................................................................ 23 Disaster Recovery Standards, Certifications, and Guidelines .............................. 51 First Responders.................................................................................................... 54 Disaster Planners ................................................................................................... 57 Risk Assessment ................................................................................................... 58 Dangers of Disasters to Organizations .................................................................. 60 Common Information Security Frameworks ........................................................ 75 Current Research in Information Technology Disaster Recovery ........................ 81 Summary and Conclusions ..........................................................................................87 Chapter 3: Research Method ..............................................................................................89 Research Design and Rationale ...................................................................................89 Role of the Researcher .................................................................................................92 Methodology ................................................................................................................93 Participant Selection Logic ................................................................................... 96 Instrumentation ..................................................................................................... 98 Pilot Study ............................................................................................................. 99 Procedures for Recruitment, Participation, and Data Collection ........................ 100 Data Analysis Plan .............................................................................................. 101 Issues of Trustworthiness ...........................................................................................102 Credibility ..........................................................................................................