Ensuring Network Security through Hazard Recognition in the Office of the President

Date of Publication

2015

Document Type

Master's Thesis

Degree Name

Master of Business Administration

College

Ramon V. Del Rosario College of Business

Department/Unit

Decision Sciences and Innovation

Thesis Adviser

Maria Victoria P. Tibon

Defense Panel Chair

Benito L. Teehankee

Defense Panel Member

Pia Redempta T. Manalastas
Ma. C.P. Assumpta C. Marasigan

Abstract/Summary

I pursued opportunities for upgrading the network security system of the Office of the President, the Private Office in particular, and creating safer environment in the cyberspace that will protect confidential government assets or information. By focusing my study to the Private Office, my colleagues and I realized greater potentials for anti-hacking. We pursued these opportunities by providing the necessary structures, processes, and resources to raise awareness and support action to the Office of the President.

I performed insider action research, guided by Coghlan and Brannicks (2010) Doing Action Research in Your Own Organization. My group completed a single main cycle of the four-step action research process of constructing, planning, taking action, and evaluating action. I used Jones (2007) framework for the management of information security risks to complement action research and aid in understanding of the concept of hazard recognition and its importance in ensuring network security. In this paper, my colleagues and I in the Office of the President identified issues encountered in achieving the desired state of zero hacking incidents and discussed the strategies adopted to resolve them. We generated knowledge about personal learning and inquiry process, about the capability of the workforce and current firewall used in protecting the network, about experiential learning and the actual performance of action research, about information of national concerns, about upgrading technology, and about identifying and managing risks in the computer network. My colleagues and I also identified inputs for the next step of action research. Finally, I identified the features of the next generation firewall that can replace the current software-based firewall to mitigate or treat the risk exposure of the network for the future.

Abstract Format

html

Language

English

Format

Electronic

Accession Number

CDTG006513

Shelf Location

Archives, The Learning Commons, 12F Henry Sy Sr. Hall

Physical Description

computer optical disc.

Upload Full Text

wf_no

This document is currently not available here.

Share

COinS