Sandra Blanke

Sandra Blanke
  • PhD
  • Professor (Associate) at University of Dallas

About

23
Publications
4,780
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
100
Citations
Current institution
University of Dallas
Current position
  • Professor (Associate)

Publications

Publications (23)
Chapter
Full-text available
Mental models are essential in learning how to adapt to new and evolving circumstances. The landscape of best practices in cybersecurity is a constantly changing area, as the list of best practices evolves in response to the increasing complexity and scope of threats. In response, users have adapted to the threats and corresponding countermeasures...
Chapter
The need for cybersecurity professionals extends across government and private industries. Estimates place the shortage of cybersecurity professionals at 1.8 million by 2022. This chapter provides aspiring cybersecurity students a clear understanding of the various educational pathways they can choose to achieve their goals. The authors describe ed...
Chapter
The need for cybersecurity professionals extends across government and private industries. Estimates place the shortage of cybersecurity professionals at 1.8 million by 2022. This chapter provides aspiring cybersecurity students a clear understanding of the various educational pathways they can choose to achieve their goals. The authors describe ed...
Article
Background: Health care stakeholders are concerned about the growing risk of protecting sensitive patient health information from breaches. The Federal Emergency Management Agency (FEMA) has identified cyber attacks as an emerging concern, and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Inform...
Article
Full-text available
In many companies, accounting departments deal with downloaded data that is analyzed using worksheet software. Many firms allow employee reporting that bypasses formal IS standards and is not subjected to formal IS audit controls. By neglecting to follow IS controls, end user created reports may not include complete or accurate data or formulae. Th...
Article
Full-text available
This study was conducted to provide lessons learned from the experience of a small, rural hospice care organization to an actual crisis that required evacuation of the facility. A process improvement framework using the emergency response certification guidelines was used to first provide details of the incident, second analyze the effectiveness of...
Article
Full-text available
This case discusses the importance of business continuity and disaster recovery planning (BCDRP) well in advance of a disaster. While the Visiting Nurses Association (VNA) of Texas experienced a devastating fire, the agency continued operations without interruption and met the needs of all patients. The agency’s ability to continue operations was p...
Conference Paper
Full-text available
Recently ISC2, the organization that provides the Certified Information Systems Security Professionals (CISSP) exam and CISSP certification, announced new changes for the 10 domains in the Common Body of Knowledge (CBK). This announcement has many security individuals rushing to “Boot Camps” and other training programs to prepare and take the exam...
Article
Full-text available
The purpose of this prescriptive research is to help decision makers become better informed about three technologies emerging in the healthcare arena by providing a basic description of the technology and describing their current applications, future healthcare deployment, potential risks, and related managerial issues. Two of the technologies, rad...
Conference Paper
Full-text available
Computer abuse continues to be a problem for organizations both small and large. More than half of the computer abuse losses were due to trusted employees and other authorized users. Computer Security Policies (CSPs) are often incomplete and not implemented correctly within organizations. General Deterrence Theory (GDT) provides a sound research th...
Conference Paper
Full-text available
Healthcare organizations have new, maturing technologies that appear capable of decreasing costs but are under continuous pressure to stay current in technologies while being frugal with funding. Several new technologies that are beginning to be implemented in healthcare environments appear able to save millions of dollars but all have disruptive p...
Article
Full-text available
There is a common misconception that internal IP networks (intranets) are secure and that only external networks such as the Internet and extranets are vulnerable and unsecured. The truth is that information on a network is not secure. With increases in network connectivity, the potential of bridging multiple networks on a single device, shared kno...
Article
Full-text available
Many universities offer capstone projects as an integrating, experiential learning device for diverse theories that students might otherwise not be able to practice. This research describes two variations on capstones as exemplifying the diversity of such courses. This research develops a conceptual mapping of types of capstones, discussing two var...
Article
Full-text available
Nonprofit organizations fill critical roles in disaster response, however, focus on client needs and scarce resources divert attention to effective continuity and disaster recovery planning. This article describes a straightforward 7-step approach that will help nonprofit organizations expediently build a proven continuity and disaster recovery pla...

Network

Cited By