Shaughnn Raschid Muller

Shaughnn Raschid Muller
  • DBA PhD
  • Doctoral Chair at Capitol Technology University

About

20
Publications
5,982
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
67
Citations
Introduction
Cybersecurity executive with 20 years of experience working in the federal government sectors, military and civilian. Leads analytical and strategic teams in the evolving cyber space AOR to execute mission. Research interests evolve around cyber policy, cyber psychology, compliance, human factors engineering, and systems engineering.
Current institution
Capitol Technology University
Current position
  • Doctoral Chair

Publications

Publications (20)
Chapter
The increasing demand for cybersecurity professionals in the tech sector has created a talent shortage unlike ever before. While initiatives such as hiring inclusiveness, broader outreach, and apprenticeship programs have been implemented to bring additional talent to the field, it has remained largely homogeneous. Historically Black Colleges and U...
Chapter
Full-text available
Cyber threats have become a major concern in today's world. As the United States Department of Defense (DoD) increasingly relies on the military supply chain systems to support the operations of their military forces, cyber threats have the potential to cause significant damage. These systems are responsible for the transportation, storage, and dis...
Chapter
Full-text available
The COVID-19 pandemic has presented healthcare institutions with unprecedented challenges in maintaining robust cybersecurity practices to safeguard patient data and protect critical healthcare operations. This chapter explores the ethical, organizational cultural, and leadership complexities hospitals face in cybersecurity during and after the pan...
Chapter
Full-text available
This chapter addresses the rationale behind commissioning the Cybersecurity Maturity Model Certification by the Department of Defense to address critical supply chain issues that directly affect services provided by contractors. The fourth pillar of cybersecurity was added to the existent three-pillar model (cost, schedule, and performance) to sign...
Conference Paper
Full-text available
Insider threats pose a significant risk to organizational data security, and many organizations implement information security policies (ISPs) to reduce insider threats. This study used the unified theory of acceptance and use of technology 2 (UTAUT2) to examine factors that predict compliance among nonmalicious employees. A partial least squares s...
Chapter
Full-text available
Interference in the election process from both abroad and within the United States has produced chaos and confusion in business markets, communities, and among voters. Elections have become less reliable as a result of misleading statements. Election deniers are actively working to undermine confidence in our elections and suppress turnout, particu...
Chapter
Full-text available
Unauthorized access to protected information in the healthcare industry is what constitutes a cyber breach. The repercussions of a data breach in cyberspace might be quite severe. Legal fees and settlements can result in a significant amount of additional expenses for leaders of organizations. When managing a data breach requires advance planning,...
Conference Paper
Full-text available
This article addresses the lack of cybersecurity awareness addressing critical gaps in the managerial decision-making of Supply Chain Officers (SCO) at the executive level. Research suggests that C-Suite Level SCOs do not address technology integration and have not adopted cybersecurity as a threat to supply chains. This research seeks to understan...
Conference Paper
Full-text available
Through the Cybersecurity Information Sharing Act of 2015, a DHS information-sharing program was mandated to protect U.S. businesses and critical infrastructure and mitigate cyberattacks. The present study examined cybersecurity professionals’ willingness to collaborate and share information regarding cybersecurity threats via that program. The tec...
Article
Full-text available
National security in the 21st Century require investments in social cybersecurity that involves basic research into the human interaction between technology and social behavior and beliefs. National security dictates increasing capital spending into appropriate tools for identifying and neutralizing external manipulation of open and free societies....
Chapter
Full-text available
According to the US Federal Bureau of Investigations (FBI) the number of complaints about cyberattacks to their cyber division is up to as many as 4,000 a day. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cybersecurity-related roles. Colleges and universities h...
Chapter
Full-text available
A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were exposed from data breaches, and 340,000 records were exposed in December 2017. In 2019, 23,000 patient records at Critical Care, Pulmonary & Sleep Associates were compromi...
Article
Full-text available
A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were exposed from data breaches, and 340,000 records were exposed in December 2017. In 2019, 23,000 patient records at Critical Care, Pulmonary & Sleep Associates were compromi...
Conference Paper
Full-text available
In 2017 Executive Order 13800 was enacted for all federal entities to use the NIST Cybersecurity Framework to report on FISMA compliance. According to GAO-19-545 report sixteen agencies were identified as failing to successfully implement FISMA regulations rooted in information security policies (ISPs). This paper will introduce the link between in...
Conference Paper
Full-text available
This paper reflects a conducted assessment of the Defense Information Systems Agency's (Department of Defense) compliance with the Federal Information Technology Acquisition Reform Action (FITARA) Section 833: Portfolio Management and Section 834: Federal Data Center Consolidation Initiatives. The paper is organized by providing an overview of DISA...
Conference Paper
Full-text available
Because presidential and congressional elections (hereinafter Federal elections) are State-administered activities with a Federal nexus, the Federal government should both reimburse and provide grants to the States when using their National Guards in their State Active Duty (SAD) status1 to perform cybersecurity assessments and testing before the e...
Article
Full-text available
Information security policies (ISPs) serve to clarify and formalize organizational information security practices and reduce data risks, but research shows that ISP noncompliance remains a prominent concern for both scholars and practitioners. This study utilized the unified theory of acceptance and use of technology 2 (UTAUT2) to explore factors t...
Thesis
Full-text available
Information security policies (ISPs) serve to clarify and formalize organizational information security practices and reduce data risks, but research shows that ISP noncompliance remains a prominent concern for both scholars and practitioners. Within large organizations, information assurance professionals are employees with specialized training an...

Network

Cited By