
Sandra Blanke- PhD
- Professor (Associate) at University of Dallas
Sandra Blanke
- PhD
- Professor (Associate) at University of Dallas
About
23
Publications
4,780
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
100
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (23)
Mental models are essential in learning how to adapt to new and evolving circumstances. The landscape of best practices in cybersecurity is a constantly changing area, as the list of best practices evolves in response to the increasing complexity and scope of threats. In response, users have adapted to the threats and corresponding countermeasures...
The need for cybersecurity professionals extends across government and private industries. Estimates place the shortage of cybersecurity professionals at 1.8 million by 2022. This chapter provides aspiring cybersecurity students a clear understanding of the various educational pathways they can choose to achieve their goals. The authors describe ed...
The need for cybersecurity professionals extends across government and private industries. Estimates place the shortage of cybersecurity professionals at 1.8 million by 2022. This chapter provides aspiring cybersecurity students a clear understanding of the various educational pathways they can choose to achieve their goals. The authors describe ed...
Background:
Health care stakeholders are concerned about the growing risk of protecting sensitive patient health information from breaches. The Federal Emergency Management Agency (FEMA) has identified cyber attacks as an emerging concern, and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Inform...
In many companies, accounting departments deal with downloaded data that is analyzed using worksheet software. Many firms allow employee reporting that bypasses formal IS standards and is not subjected to formal IS audit controls. By neglecting to follow IS controls, end user created reports may not include complete or accurate data or formulae. Th...
This study was conducted to provide lessons learned from the experience of a small, rural hospice care organization to an actual crisis that required evacuation of the facility. A process improvement framework using the emergency response certification guidelines was used to first provide details of the incident, second analyze the effectiveness of...
This case discusses the importance of business continuity and disaster recovery planning (BCDRP) well in advance of a disaster. While the Visiting Nurses Association (VNA) of Texas experienced a devastating fire, the agency continued operations without interruption and met the needs of all patients. The agency’s ability to continue operations was p...
Recently ISC2, the organization that provides the Certified Information Systems Security Professionals (CISSP) exam and CISSP certification, announced new changes for the 10 domains in the Common Body of Knowledge (CBK). This announcement has many security individuals rushing to “Boot Camps” and other training programs to prepare and take the exam...
The purpose of this prescriptive research is to help decision makers become better informed about three technologies emerging in the healthcare arena by providing a basic description of the technology and describing their current applications, future healthcare deployment, potential risks, and related managerial issues. Two of the technologies, rad...
Computer abuse continues to be a problem for organizations both small and large. More than half of the computer abuse losses were due to trusted employees and other authorized users. Computer Security Policies (CSPs) are often incomplete and not implemented correctly within organizations. General Deterrence Theory (GDT) provides a sound research th...
Healthcare organizations have new, maturing technologies that appear capable of decreasing costs but are under continuous pressure to stay current in technologies while being frugal with funding. Several new technologies that are beginning to be implemented in healthcare environments appear able to save millions of dollars but all have disruptive p...
There is a common misconception that internal IP networks (intranets) are secure and that only external networks such as the Internet and extranets are vulnerable and unsecured. The truth is that information on a network is not secure. With increases in network connectivity, the potential of bridging multiple networks on a single device, shared kno...
Many universities offer capstone projects as an integrating, experiential learning device for diverse theories that students might otherwise not be able to practice. This research describes two variations on capstones as exemplifying the diversity of such courses. This research develops a conceptual mapping of types of capstones, discussing two var...
Nonprofit organizations fill critical roles in disaster response, however, focus on client needs and scarce resources divert attention to effective continuity and disaster recovery planning. This article describes a straightforward 7-step approach that will help nonprofit organizations expediently build a proven continuity and disaster recovery pla...