Understanding Security Threats in Cloud-Based Shadow It Work-from-Home Applications Using the General Strain Theory Lens

dc.contributor.advisorBeebe, Nicole L.
dc.contributor.advisorKim-Kwang, Raymond C.
dc.contributor.authorAkello, Patricia
dc.contributor.committeeMemberKrasikova, Dina
dc.contributor.committeeMemberZanella, Gianluca
dc.date.accessioned2024-01-25T19:32:11Z
dc.date.available2024-01-25T19:32:11Z
dc.date.issued2022
dc.descriptionThis item is available only to currently enrolled UTSA students, faculty or staff. To download, navigate to Log In in the top right-hand corner of this screen, then select Log in with my UTSA ID.
dc.description.abstractThe rapid rise of remote work in response to the COVID-19 pandemic resulted in a rise in the reliance on cloud computing for sharing data between secure office networks and un-secure remote networks. This greatly increases the impact and importance of answering critical questions regarding the blurring boundaries between work and non-work and any related the cyber security risks. This individual-level survey design study aims to examine one of such risks, known as Shadow IT, a non-malicious insider-related data security threat whose acceleration is partly due to the power of the cloud. This research seeks to understand the acceleration of Shadow IT proliferation in the remote work setting by looking into the factors that influence adoption against the backdrop of COVID-Strains. Specifically, the research's aim is to understand the moderating effects of strain, along with other individual level variables on deviance (the volitional non malicious use of shadow IT in remote workplaces in violation of injunctive IT/ security norms).This research's contributions are in the areas of information security, threat intelligence and management in the remote workplace, remote work security, insider threats, and shadow it and security compliance.
dc.description.departmentInformation Systems and Cyber Security
dc.format.extent132 pages
dc.format.mimetypeapplication/pdf
dc.identifier.isbn9798841760849
dc.identifier.urihttps://hdl.handle.net/20.500.12588/2380
dc.languageen
dc.subjectInformation Security
dc.subjectInsider Threat
dc.subjectNon Malicious End User Violations
dc.subjectRemote workplace Threat Awareness
dc.subjectRemote workplace Threat Intelligence
dc.subjectShadow IT
dc.subject.classificationInformation technology
dc.subject.classificationInformation technology
dc.titleUnderstanding Security Threats in Cloud-Based Shadow It Work-from-Home Applications Using the General Strain Theory Lens
dc.typeThesis
dc.type.dcmiText
dcterms.accessRightspq_closed
thesis.degree.departmentInformation Systems and Cyber Security
thesis.degree.grantorUniversity of Texas at San Antonio
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Akello_utsa_1283D_13699.pdf
Size:
1.69 MB
Format:
Adobe Portable Document Format