
Shaughnn Raschid Muller- DBA PhD
- Doctoral Chair at Capitol Technology University
Shaughnn Raschid Muller
- DBA PhD
- Doctoral Chair at Capitol Technology University
About
20
Publications
5,982
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
67
Citations
Introduction
Cybersecurity executive with 20 years of experience working in the federal government sectors, military and civilian. Leads analytical and strategic teams in the evolving cyber space AOR to execute mission.
Research interests evolve around cyber policy, cyber psychology, compliance, human factors engineering, and systems engineering.
Current institution
Publications
Publications (20)
The increasing demand for cybersecurity professionals in the tech sector has created a talent shortage unlike ever before. While initiatives such as hiring inclusiveness, broader outreach, and apprenticeship programs have been implemented to bring additional talent to the field, it has remained largely homogeneous. Historically Black Colleges and U...
Cyber threats have become a major concern in today's world. As the United States Department of Defense (DoD) increasingly relies on the military supply chain systems to support the operations of their military forces, cyber threats have the potential to cause significant damage. These systems are responsible for the transportation, storage, and dis...
The COVID-19 pandemic has presented healthcare institutions with unprecedented challenges in maintaining robust cybersecurity practices to safeguard patient data and protect critical healthcare operations. This chapter explores the ethical, organizational cultural, and leadership complexities hospitals face in cybersecurity during and after the pan...
This chapter addresses the rationale behind commissioning the Cybersecurity Maturity Model Certification by the Department of Defense to address critical supply chain issues that directly affect services provided by contractors. The fourth pillar of cybersecurity was added to the existent three-pillar model (cost, schedule, and performance) to sign...
Insider threats pose a significant risk to organizational data security, and many organizations implement information security policies (ISPs) to reduce insider threats. This study used the unified theory of acceptance and use of technology 2 (UTAUT2) to examine factors that predict compliance among nonmalicious employees. A partial least squares s...
Interference in the election process from both abroad and within the United States has produced chaos and confusion in business markets, communities, and among voters. Elections have become less reliable as a result of misleading statements. Election deniers are actively working to undermine confidence in our elections and suppress turnout, particu...
Unauthorized access to protected information in the healthcare industry is what constitutes a cyber breach. The repercussions of a data breach in cyberspace might be quite severe. Legal fees and settlements can result in a significant amount of additional expenses for leaders of organizations. When managing a data breach requires advance planning,...
This article addresses the lack of cybersecurity awareness addressing critical gaps in the managerial decision-making of Supply Chain Officers (SCO) at the executive level. Research suggests that C-Suite Level SCOs do not address technology integration and have not adopted cybersecurity as a threat to supply chains. This research seeks to understan...
Through the Cybersecurity Information Sharing Act of 2015, a DHS information-sharing program was mandated to protect U.S. businesses and critical infrastructure and mitigate cyberattacks. The present study examined cybersecurity professionals’ willingness to collaborate and share information regarding cybersecurity threats via that program. The tec...
National security in the 21st Century require investments in social cybersecurity that involves basic research into the human interaction between technology and social behavior and beliefs. National security dictates increasing capital spending into appropriate tools for identifying and neutralizing external manipulation of open and free societies....
According to the US Federal Bureau of Investigations (FBI) the number of complaints about cyberattacks to their cyber division is up to as many as 4,000 a day. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cybersecurity-related roles. Colleges and universities h...
A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were exposed from data breaches, and 340,000 records were exposed in December 2017. In 2019, 23,000 patient records at Critical Care, Pulmonary & Sleep Associates were compromi...
A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were exposed from data breaches, and 340,000 records were exposed in December 2017. In 2019, 23,000 patient records at Critical Care, Pulmonary & Sleep Associates were compromi...
In 2017 Executive Order 13800 was enacted for all federal entities to use the NIST Cybersecurity Framework to report on FISMA compliance. According to GAO-19-545 report sixteen agencies were identified as failing to successfully implement FISMA regulations rooted in information security policies (ISPs). This paper will introduce the link between in...
This paper reflects a conducted assessment of the Defense Information Systems Agency's (Department of Defense) compliance with the Federal Information Technology Acquisition Reform Action (FITARA) Section 833: Portfolio Management and Section 834: Federal Data Center Consolidation Initiatives. The paper is organized by providing an overview of DISA...
Because presidential and congressional elections (hereinafter Federal elections) are State-administered activities with a Federal nexus, the Federal government should both reimburse and provide grants to the States when using their National Guards in their State Active Duty (SAD) status1 to perform cybersecurity assessments and testing before the e...
Information security policies (ISPs) serve to clarify and formalize organizational information security practices and reduce data risks, but research shows that ISP noncompliance remains a prominent concern for both scholars and practitioners. This study utilized the unified theory of acceptance and use of technology 2 (UTAUT2) to explore factors t...
Information security policies (ISPs) serve to clarify and formalize organizational information security practices and reduce data risks, but research shows that ISP noncompliance remains a prominent concern for both scholars and practitioners. Within large organizations, information assurance professionals are employees with specialized training an...