IDEAS home Printed from https://ideas.repec.org/a/mir/mirbus/v4y2014i4p1-7.html
   My bibliography  Save this article

An Evaluation of the Cybersecurity Policies for the United States Health & Human Services Department

Author

Listed:
  • Derek Mohammed PhD

    (Associate Professor of Computer Information Systems, Department, School of Business, Saint Leo University, United States,)

  • Ronda Mariani

    (Assistant Professor of Management, Department, School of Business, Saint Leo University, United States)

Abstract

This paper examines the criteria necessary for the evaluation of the cybersecurity policies for the United States Health and Human Services Department of the Federal Government. The overall purpose of cybersecurity policies and procedures is supported through compliance with Federal mandated regulation and standards, which serve to protect the organizational services and goals of the United States Health and Human Services Department, and to promote the best possible security practices in the protection of information systems from unauthorized actors and cyber-threats. The criteria of the cybersecurity evaluation is identified and analyzed for quality, strengths, weaknesses, and future applicability. Topics within the criteria include organizational operation, regulations and industrial standards compliance, service delivery to national customers, and the prevention and mitigation of IT system and security failure. This analysis determines the strengths and weaknesses, and makes recommendations for revising the cybersecurity policies within the United States Health and Human Services Department.

Suggested Citation

  • Derek Mohammed PhD & Ronda Mariani, 2014. "An Evaluation of the Cybersecurity Policies for the United States Health & Human Services Department," International Journal of Business and Social Research, MIR Center for Socio-Economic Research, vol. 4(4), pages 1-7, April.
  • Handle: RePEc:mir:mirbus:v:4:y:2014:i:4:p:1-7
    as

    Download full text from publisher

    File URL: http://thejournalofbusiness.org/index.php/site/article/view/392/378
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:mir:mirbus:v:4:y:2014:i:4:p:1-7. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: M Kabir (email available below). General contact details of provider: https://edirc.repec.org/data/csmirus.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.