Date of Conferral

5-14-2024

Date of Award

May 2024

Degree

Doctor of Information Technology (D.I.T.)

School

Information Systems and Technology

Advisor

Alan Dawson

Abstract

Many information technology (IT) leaders lack the strategies to protect IoT devices from information security threats in the manufacturing sector, which puts IoT devices and modern manufacturing systems at risk of external threats and introduces security risks to organizations and workers. Grounded in the diffusion of innovation (DOI) theory, the purpose of this qualitative multiple-case study was to determine strategies that IT leaders use to implement security for IoT devices in the manufacturing sector. The participants were three IT leaders from three separate manufacturing facilities in the Los Angeles area of the United States. The data were collected from semistructured interviews and organizational public documents. The data were analyzed using methodological triangulation to identify codes and themes. The three major themes that emerged were (a) authentication and access control, (b) data privacy and confidentiality, and (c) device and network security. A key recommendation for IT leaders is to use a defense-in-depth approach in which a series of defensive mechanisms are layered to protect IoT devices. The implications for positive social change include the potential for improving the organization’s quality of goods and employees’ safety.

Share

 
COinS