Grounded Theory

Cybersecurity in the Maritime Industry: A Grounded Theory Exploration in the Hampton Roads Region

Abstract:

This study delves into the escalating cybersecurity concerns in the maritime sector as technology becomes more integrated with daily operations. Focused on the Hampton Roads region, it employs Grounded Theory to decipher the intricate dynamics of cybersecurity. Through interviews with key stakeholders and participant observation, it aims to grasp the challenges, risks, and remedies pertinent to maritime cybersecurity. Additionally, it scrutinizes existing frameworks and regulations to gauge their efficacy. Initial findings reveal resistance from organizations in complying with cybersecurity standards, hinting at pervasive vulnerabilities. The research promises to enrich scholarly dialogue and practical strategies for maritime entities, cybersecurity practitioners, and policymakers. By shedding light on the unique cybersecurity landscape of the Hampton Roads area, the study seeks to foster tailored approaches for bolstering cybersecurity resilience in maritime operations. This endeavor is crucial amid the digitalization wave, underscoring the imperative of safeguarding maritime activities for their safety, security, and sustainability.

Information Influence in Society’s Information Environment: An Empirical Analysis Using the Grounded Theory

Abstract: 

This paper investigates information influence in society’s Information Environment. The Grounded Theory approach was used to collect and to analyse the data. A conceptual framework of the thematic categories and item categories was developed on the basis of empirical evidence and past studies that reflect the findings of the field. The most fundamental components in this conceptual framework were six thematic categories (information influence, information operations, cyber operations, psychological operations, kinetic operations, and deception), their item categories, the items themselves, and the interrelationships between the thematic categories. 

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com