The 13th Annual Conference of the Midwest Association for Information Systems, sponsored by the College of Business Administration at the University of Missouri-St. Louis, accepted two academic papers co-authored by Simon Cleveland, Ph.D. and Marisa Cleveland. A third paper co-authored by David Gould and Simon Cleveland was also accepted. On May 17th and 18th, Dr. Cleveland, Dr. Gould, and Mrs. Cleveland presented their research.
Cybercrime Post-incident Leadership Model
Marisa Cleveland and Simon Cleveland
Cybercrimes are facts of the modern technological society. While extant literature proposes a variety of prescriptive practices to combat cybercrimes, there is scant research to address how organizational leaders should minimize the impact of cybercrimes on their companies and the community after they have occurred. This study addresses the steps leaders should take in the aftermath of cybercrimes and proposes a four-stage leadership model consisting of best practices to guide leaders in preparing, responding, and recovering from a digital or cybersecurity attack.
“Emergency plans—whether natural disaster or cybercrime—should be regularly updated. As a result, this paper aims to address the question: what steps should leaders take in the aftermath of cybercrimes? To address this question, a four-stage leadership model consisting of best practices is proposed to guide leaders in preparing, responding, and recovering from a digital or cybersecurity attack.”
Toward Cybersecurity Leadership Framework
Simon Cleveland and Marisa Cleveland
Cybersecurity is a critical issue for organization and executive leadership faces challenges that their predecessors escaped. If executive leadership and boards of directors are charged with setting policy and regulations regarding the company’s cybersecurity efforts, a greater understanding of the field and the threats needs to be communicated before leadership can be expected to make critical decisions in the face of cyberattacks. This study addresses what type of leadership should be applied in the various cybersecurity preparation and response stages in order to educate cybersecurity leaders in developing a prescriptive approach to addressing future cyberattacks. A novel cybersecurity leadership framework is proposed, which recommends leadership styles against the functional areas of the cybersecurity preparation and response stages.
“Leadership awareness and response to cyberattacks requires a set of best practices for immediate solutions. By the time a cyberattack has occurred, leadership will be unable to respond with preventative measures. Even with robust and resilient controls in place, the global nature of information technology systems makes the response in the moments after a cyberattack much more than technological.”
Evolutionary Systems: Applications to Cybersecurity
David Gould and Simon Cleveland
Evolution is a well-known biological theory; however, there is a gap in literature that examines how evolutionary principles can be applied to other natural as well as artificial systems. This paper includes an extension to the general evolutionary algorithm to showcase how evolutionary principles can be applied through technology evolutionary models and tools to identify and prevent cyber threats.
“The evolution of cybersecurity threats occurs exogenously as new techniques and technologies combine or recombine to form new products or technologies.”
All three papers may be viewed through Google Scholar.