I would want assistance with analyzing collected data. my research is a qualitative and I want help to code the data. a total of 20 semi structured questionnaire scripts.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Black or African American
4. Sex Male
Survey Questions
RQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Data privacy is one the major problems I have encountered while
promoting cyber security leadership through ethical approaches. I
have encountered a situation where personal data/personally
identifiable information (PII) was not handled appropriately and
was revealed.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Ensuring that everyone participate and contribute effectively
during cyber security leadership training will help to improve
cyber security training programs.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. that has never been a problem since all employees/contractors
are usually fully engaged during these trainings. More to that, these
trainings are paid to encouraged effective participation.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
Every employee/contractor with access to sensitive data. No
employee has ever been fired for not participating effectively
during data privacy trainings.
IQ5. Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes. HIPAA.
Page 3 of 4
Exercise Design study
RQ6. How confident are you in the effectiveness of your organization’s current strategies
for data privacy protection?
confident
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. isolated the affected systems/devices and revoked access rights
to all unauthorized users.
RQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Ensures that data sharing is carried out based on the legal and
organization standards. For example, clients’ must provide their
consent before sharing their information to any third party.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
I would like to see my organization collaborate with other stake holders
to enhance our data privacy protection.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Most employees do not take cyber security trainings seriously.
some attend only because they will be compensated and also
because most of these trainings are mandatory.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Any organization should ensure that all cyber security trainings
are being tracked and recorded for future purpose. This will help
the cyber security leadership to know what changes are needed.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. there has never been any follow up, but we keep records to track
those who have participated effectively. Roll call is one of the
strategy the organization uses to track effective participations.
Employees/contractors who log in to the meeting 5 minutes or logout
before the meetings ends are considered to be absent and are not
paid for the training.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All employees who have access to sensitive data. There has never
been a situation where the organization ever took such decision.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
Somewhat confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. anti-virus was run on all devices affected and the problem was
solved.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Ensure that only those with the right privileges have access to any
data. Also, sensitive data has to be encrypted before being shared
to authorized users. Data encryption and authentication are some
of the strategies implemented by organization to ensure that data
privacy is effectively protected.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
RQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Enforcing cyber security trainings guidelines and policies to ensure
effective participations of all employees.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
RQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Lack of fundings and employees unwillingness to participate
effectively during these trainings unless they are being paid, in
which, in most cases there has never been any budget allocated for
trainings.
Page 2 of 4
Exercise Design study
RQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Cyber security leader should lead by example to encourage the
rest to follow. Employees should not only be motivated through
compensation to attend trainings.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
There is no effective data privacy trainings at the moment.
Sometimes trainings are being rescheduled due to either emergency
or low participation.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the employees/contractors in the IT department are often
solicited to participate in these trainings. The organizations I have
worked for has never fired or suspended any employee based on
not participating effectively during data privacy trainings.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
I am not very confident with the current strategies being
implemented to protect data privacy because much has to be done
in regard to this. However, I believe we are making progress.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Data encryption is one the strategies the organization uses to
ensure that ethical consideration is integrated in data privacy
protection. the organization also ensures strong authentication for
users verification. It also ensures that data sharing falls within the
organization’s data sharing policy guidelines.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
One of the changes would be to improve cyber security trainings on
data privacy. Also, the organization policy of bring your own device
(BYOD) should be discouraged because it might help to save the
organization money, but the security challenges are enormous.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Female
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
One of the biggest challenges I have encountered while promoting
better cyber security leadership through ethical approaches
getting candidates with the right skills for some positions.
Funding is another setback.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Adapting to and meeting up with the current threats in cyber
security by implementing technical-now to integrate ethical
consideration into cybersecurity trainings will help to improve
cybersecurity leadership trainings programs.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
The organization data privacy trainings has been inconsistent and
there has never been any follow up.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the IT employees and contractors are required to participate in
all data privacy trainings. Employees can be suspended but fired.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
Confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. it was resolved immediately by tracing the intrusion and data
was restored using backups.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Making sure that cyber security tools are being updated to meet
the organization’s security guidelines. This is normally enforced
during cyber security trainings and awareness. implementing
multi-factor authentication has helped to reshape my decisions
regarding data privacy protection. this has helped to strengthen
the security systems to mitigate data breach.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
I would like too to see more cyber security experts hired. Some of the
employees are entry level and most of them do not know how to use
the new technologies effectively.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Black or African American
4. Sex Male
Survey Questions
RQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
One of the challenges I have encountered if lack of funding and
difficulty getting the right skills for the job. to promoting better
cyber security leadership through ethical approaches.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
The organizations I worked for and/or supported as a contractor
have enforced ethical considerations in their decision-making
process regarding data privacy protection through enforcing their
policies and procedures with effective documentation and
archiving.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. sometimes emails are sent to employees after trainings to
complete a survey. Doing this permits the management to determine
whether the employee has participated effectively.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
Every employee/contractor in the IT department. No employee has
ever been fired but we have had cases of suspension for not
participating during data privacy trainings.
IQ5. Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
1Q6. How confident are you in the effectiveness of your organization’s current strategies
for data privacy protection?
Somewhat confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. The IT Team went straight to work and got the issue resolved.
Some employees/contractors had to work overtime.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
The use of two-factor user’s authentication and data encryption to
prevent sensitive data to fall in the wrong hands.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
1Q10. What changes would you make to improve your organization’s current data privacy
protection practices?
Request for more funding to meet up with the industry standard needed
for data privacy protection.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Black or African American
4. Sex Male
Survey Questions
RQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Data privacy is one the major problems I have encountered while
promoting cyber security leadership through ethical approaches. I
have encountered a situation where personal data/personally
identifiable information (PII) was not handled appropriately and
was revealed.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Ensuring that everyone participate and contribute effectively
during cyber security leadership training will help to improve
cyber security training programs.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. that has never been a problem since all employees/contractors
are usually fully engaged during these trainings. More to that, these
trainings are paid to encouraged effective participation.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
Every employee/contractor with access to sensitive data. No
employee has ever been fired for not participating effectively
during data privacy trainings.
IQ5. Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes. HIPAA.
Page 3 of 4
Exercise Design study
RQ6. How confident are you in the effectiveness of your organization’s current strategies
for data privacy protection?
confident
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. isolated the affected systems/devices and revoked access rights
to all unauthorized users.
RQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Ensures that data sharing is carried out based on the legal and
organization standards. For example, clients’ must provide their
consent before sharing their information to any third party.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
I would like to see my organization collaborate with other stake holders
to enhance our data privacy protection.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Most employees do not take cyber security trainings seriously.
some attend only because they will be compensated and also
because most of these trainings are mandatory.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Any organization should ensure that all cyber security trainings
are being tracked and recorded for future purpose. This will help
the cyber security leadership to know what changes are needed.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. there has never been any follow up, but we keep records to track
those who have participated effectively. Roll call is one of the
strategy the organization uses to track effective participations.
Employees/contractors who log in to the meeting 5 minutes or logout
before the meetings ends are considered to be absent and are not
paid for the training.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All employees who have access to sensitive data. There has never
been a situation where the organization ever took such decision.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
Somewhat confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. anti-virus was run on all devices affected and the problem was
solved.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Ensure that only those with the right privileges have access to any
data. Also, sensitive data has to be encrypted before being shared
to authorized users. Data encryption and authentication are some
of the strategies implemented by organization to ensure that data
privacy is effectively protected.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
RQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Enforcing cyber security trainings guidelines and policies to ensure
effective participations of all employees.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
RQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Lack of fundings and employees unwillingness to participate
effectively during these trainings unless they are being paid, in
which, in most cases there has never been any budget allocated for
trainings.
Page 2 of 4
Exercise Design study
RQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Cyber security leader should lead by example to encourage the
rest to follow. Employees should not only be motivated through
compensation to attend trainings.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
There is no effective data privacy trainings at the moment.
Sometimes trainings are being rescheduled due to either emergency
or low participation.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the employees/contractors in the IT department are often
solicited to participate in these trainings. The organizations I have
worked for has never fired or suspended any employee based on
not participating effectively during data privacy trainings.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
I am not very confident with the current strategies being
implemented to protect data privacy because much has to be done
in regard to this. However, I believe we are making progress.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Data encryption is one the strategies the organization uses to
ensure that ethical consideration is integrated in data privacy
protection. the organization also ensures strong authentication for
users verification. It also ensures that data sharing falls within the
organization’s data sharing policy guidelines.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
One of the changes would be to improve cyber security trainings on
data privacy. Also, the organization policy of bring your own device
(BYOD) should be discouraged because it might help to save the
organization money, but the security challenges are enormous.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Female
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
One of the biggest challenges I have encountered while promoting
better cyber security leadership through ethical approaches
getting candidates with the right skills for some positions.
Funding is another setback.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Adapting to and meeting up with the current threats in cyber
security by implementing technical-now to integrate ethical
consideration into cybersecurity trainings will help to improve
cybersecurity leadership trainings programs.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
The organization data privacy trainings has been inconsistent and
there has never been any follow up.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the IT employees and contractors are required to participate in
all data privacy trainings. Employees can be suspended but fired.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
Confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. it was resolved immediately by tracing the intrusion and data
was restored using backups.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Making sure that cyber security tools are being updated to meet
the organization’s security guidelines. This is normally enforced
during cyber security trainings and awareness. implementing
multi-factor authentication has helped to reshape my decisions
regarding data privacy protection. this has helped to strengthen
the security systems to mitigate data breach.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
I would like too to see more cyber security experts hired. Some of the
employees are entry level and most of them do not know how to use
the new technologies effectively.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Black or African American
4. Sex Male
Survey Questions
RQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
One of the challenges I have encountered if lack of funding and
difficulty getting the right skills for the job. to promoting better
cyber security leadership through ethical approaches.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
The organizations I worked for and/or supported as a contractor
have enforced ethical considerations in their decision-making
process regarding data privacy protection through enforcing their
policies and procedures with effective documentation and
archiving.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. sometimes emails are sent to employees after trainings to
complete a survey. Doing this permits the management to determine
whether the employee has participated effectively.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
Every employee/contractor in the IT department. No employee has
ever been fired but we have had cases of suspension for not
participating during data privacy trainings.
IQ5. Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
1Q6. How confident are you in the effectiveness of your organization’s current strategies
for data privacy protection?
Somewhat confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. The IT Team went straight to work and got the issue resolved.
Some employees/contractors had to work overtime.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
The use of two-factor user’s authentication and data encryption to
prevent sensitive data to fall in the wrong hands.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
1Q10. What changes would you make to improve your organization’s current data privacy
protection practices?
Request for more funding to meet up with the industry standard needed
for data privacy protection.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Most employees do not take cybersecurity trainings seriously.
also, getting the right candidate during hiring is another major
issues because most of them do not meet the technical know-how.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Ensuring that all trainings regarding cyber security are paid is
very essential to motivate effective participation.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. my organization has not cultivated the habit of following up
with employees after these trainings because we believe in our
employees
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the IT teams. this ensures that all the IT professionals meets
and adhere to the requirements needed to ensure data privacy
protection. No employee has ever been fired or suspended
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
Somewhat confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. action was taken immediately by identifying the intrusions
and security threats were eliminated. Also, the victims were
informed immediately and were informed about the rapid action
taken.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Ensuring that only those with the right privileges have access to
sensitive data.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No.
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Migrating to cloud would help to improve the organization’s current
data privacy protection practices.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Female
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
One of the major Challenges is funding to meet up with the
modern technologies. Also, there is problem of some employees
not participating effectively during cybersecurity trainings.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Cyber security leaders should lead by examples. It is also
important to make sure that these trainings are paid to motivate
attendance.
RQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. There has never been a need to follow up with employees to
determine if they participated effectively or not.
RQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All employees who have access to sensitive data. No employee has
ever been fired or suspended.
RQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes. my organization adheres to HIPAA guidelines.
Page 3 of 4
Exercise Design study
RQ6. How confident are you in the effectiveness of your organization’s current strategies
for data privacy protection?
Very confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Ensuring that the right technologies are used to protect data
privacy. Also, my organization has a policy where only privileges
are granted to limit access to data.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No.
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
The organization just need increase funding to meet up with the new
and enhance technologies to improve data privacy protection.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
The greatest challenge I have encountered while promoting better
cyber security leadership through ethical approaches is lack of
funding to meet with the industry standards.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Cybersecurity leaders should be role models by ensuring that they
take the lead. Employees should be motivated by making sure that
they get paid during these trainings.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. Unfortunately, we do not follow up, but we make sure all
employees understand risks involves when these trainings are not
taken seriously.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
Every employee in the IT Team. Firing employees has never been
necessary because we trust our employees.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
The use of enhanced technologies such as encryption to prevent
unauthorized access to sensitive information. My organization also
practices two-factor authentication to mitigate unauthorized
access.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No.
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Migrating to cloud would a better option to improve the organization
current data privacy protection practices.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Asian
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
The greatest challenge I have encountered while promoting better
cyber security leadership through ethical approaches is getting
the right candidate during hiring and lack of funds
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Leading by example ensures that ethical consideration is
effectively integrated in cybersecurity leadership trainings.
Cybersecurity leaders should be seen as role models who do not
just give instructions but follows as well.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. No, we do not follow up with employees after trainings, but we
keep records for those who attend.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All employees regardless of your position. No employee has been
fired. We only fire employees who intentionally mishandle sensitive
and suspend those who unintentionally misuse data.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. we identified the intrusion, took action, and reported to the
victims.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
The use of encryption and also the implementation of multi-factor
authentication.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No.
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Increase funding and also motivate employees to adhere to guidelines
and policies implemented by the organization for protection of data
privacy.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Asian
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
One of the major challenges I have encountered while promoting
better is getting the right fit for certain positions. It is always
difficult to get the right candidate with the technical skills during
interviews. In some case we hire candidates and discover that they
don’t have the technical skills.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
All cybersecurity leaders should lead by example. Trainings
should be carried out regularly to ensure effectiveness.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. we send out surveys for all attendees to complete and share their
thoughts if changes need to be made. With this strategy, it is easy to
determine if the employee participated effectively or not.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the employees participates in the trainings. Employees are fired
when they intentionally mishandles data and are suspended for at
least a week when it is unintentional.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. we took immediate action by addressing the situation
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Encryption and the use of two-factor or multi-factor
authentication are used.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Use better hiring strategy during hiring process in order to get the
right candidates. For example, the use of third party can be a
better option but this may be costly.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Black or African American
4. Sex Female
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Some of the major challenges I have encountered when promoting
cyber security leadership through ethical approaches include lack
of funds and employees unwillingness to attend trainings unless
they are being paid for the training
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
All cybersecurity leadership trainings should be paid, and
cybersecurity leaders should also lead by setting examples.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. All employees who attends any training are required to
complete a survey within 24 hours and provide recommendation.
this case those who did not pay attention might get trapped.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the employees are required to participates in all data privacy
trainings. We have a policy where employees are fired when they
intentionally steal or misuse data. Sometimes they get a warning
letter if the act was unintentional.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. we resolved the problem immediately and report to the client.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
My organization implemented the use of Encryption and the use of
multi-factor authentication to prevent any unauthorized access.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Solicit for increase in fundings. Another change that can implemented
is to ensure that all employees are paid during trainings so encourage
participation.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
The major challenges I have encountered is insufficient budget.
Lack of funds makes it extremely difficult to meet up with the
industry standards.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Increasing the budget for cybersecurity leadership training
programs can help to ethical considerations into cybersecurity
leadership training.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. we don’t usually follow up, but we keep track on those who
attend and those who not. This one of the elements required for pay
raise and promotion.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
It is mandatory for all employees to attend all data privacy
trainings. My organization has never fired anyone because all
employees participates effectively during these trainings.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
The use of multi-factor authentication. We also use encryption
especially when sensitive data is being sent via email.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Increase fundings.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Black or African American
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
The major challenges I have encountered is insufficient budget.
Lack of funds makes it extremely difficult to meet up with the
industry standards.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
By increasing the funding for cybersecurity leadership training
programs. Also, by ensuring that cybersecurity leaders lead by
example. Leading by example is essential for leadership
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. All employees are always requested to provide feedback via
survey which helps keep tack on those who participated effectively.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All employees. the organization has never fired anyone but have
had cases where some employees are suspended for not
participating in data privacy trainings.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
Somewhat confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. By identifying the intrusion and implemented action and it
was resolved.
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Access to data is granted by the policy of privilege and role. the use
of multi-factor authentication, encryption is also implemented.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Funding should increased to meet data privacy protection need.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
One of the major challenges I have encountered is employees
having difficulties adapting to new technologies. Most employees
are stuck with the old technologies.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Increasing the funding for cybersecurity leadership training
programs. Cybersecurity leaders should be able to lead by
example.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. there has never been a need for a follow up because the
organization always registers 100% participation rate.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All employees are required to participate in all trainings regarding
data privacy. No employee has ever been fired because there has
never been any need to so.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
The implementation of data encryption and also the use of twofactor authentication. The organization also restrict users access to
sensitive data by implementing user’s privilege and role.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Making it mandatory employees to learn the new technologies either
by sponsoring them to further their education or attend cyber security
training programs on modern technologies
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Female
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
I have encountered some challenges in regard to promoting
cybersecurity leadership through ethical approaches. One of the
challenges is resource allocation which most often resulted in high
cost. Also, there was this issue of transparency where the
organization failed to notify its clients on time about a
vulnerability in its software. There was also an issue with abuse of
technology where an employee took company’s USB home that
contained sensitive data and used it for personal convenience but
was never fired because he was related to the CEO.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Implementing Ethical hacking would play an essential role in
enhancing cybersecurity leadership programs. Also, ensuring that
everyone is involved in the training program would play a vital
role in encouraging commitment by all. Sometimes some
employees feels like they are not part of the process. Also, cyber
security leaders should be able to lead by examples. When the
leader becomes the role model to others, it becomes easier to
enhance cyber security training programs.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
My organization does not have a regular data privacy trainings, but
we make sure that trainings related to data privacy are carried out
at least once a year.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
Every employee, including the contractors working in the
Information technology department. No employee has ever been
fired but we do suspend those who do not participate during these
trainings.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Page 3 of 4
Yes.
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
There are several strategies the I employ to ensure ethical
considerations are integrated into data privacy protection
decisions, but I would like to limit to these three main strategies
which include ensuring that strong identity verification is being
implemented to ensure that devices are not compromised.
Secondly, I enforced the limit of third-party software and browsing
to unsafe websites and finally, data encryption to protect against
compromise or theft
Page 4 of 4
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
The main changes I would like my organization to implement in
order to improve my organization’s data privacy protection
practices is to ensure that there is a consistency in data privacy
training and awareness. Improving collaboration with other
stakeholders is another policy I would like the organization to
implement in order to foster data privacy protection.
Implementing data privacy protection by implementing regular
security tools updates and ensuring that only efficient security tools
are used protect both organizations and clients’ data.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Black or African American
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Some of the challenges the challenges include; organizational policy
change- some policies are obsolete, phishing, gap in security
awareness for variety of staff, contractors, and stakeholders, malware
attacks, Bring-Your-Own Devices (BYOD) for some clients, and
vendors/contractors, lack of training for users and employees,
insufficient resources including staff and cybersecurity professionals
to keep up with evolving cyberattacks, poorly configured network
layers, pushback to change in secured processes and security tools,
lack of fund for capital security related projects.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Integration can be done by presenting periodic training on new
cyber threat and attacks, report on vulnerability assessment and
recommended mitigation processes, Auditing and compliance based
on industry standards, results on penetration test conducted as
appropriate, continuous monitoring, refinements, and fixes on security
software used across the agency based on changing business needs
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Unfortunately, no but we are progressing towards that goal. Also,
there is no follow up policy after trainings.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the employees. No employee has ever been fired but we have
had cases where employees were suspended for not participating
during data privacy trainings.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Page 3 of 4
Yes.
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
Some strategies we implement include cybersecurity trainings,
ownership of data and information, Protection from unauthorized
access, development of strategic plan which incorporates, nondisclosure, validation of data using security protocols and network
devices, availability of data or information for legal or investigation.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
Page 4 of 4
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Some recommendations I would like to see being implemented will
include security patches and use of sophisticated industry tools to
strengthen security postures as required. effective training and
awareness program, effective data protection plan and incident
response plan for management or leadership, Good cybersecurity
practices for all users where leaders lead by example, memorandums to
remind employees and managers on data security related policies and
procedures, ensuring the signing of “Non-Disclosure” form by
responsible parties for accountability.
Page 1 of 4
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Asian
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
I can say the main challenges I have encountered when promoting
cybersecurity leadership through ethical approaches are privacy
issues, and accuracy with regards to cyber security training and
awareness. There is a need to adjust cybersecurity trainings and
awareness to consistency. Also, users always try to access data
which they do not have privilege to though these kind of things
are now taken seriously by the leadership to prevent any misuse of
data.
Page 2 of 4
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
As a cybersecurity leader, I understand that cyber security
leadership training programs is crucial which brings me back to
the aspect of cybersecurity training and awareness. You know
security training is very important and that is one of the strategies
that I have considered as one of the most crucial. Also, I ensure that
access to data is strictly based on the privilege the user has.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
No. we are carry these trainings once a year where all employees
are required complete the training and earn a certificate before they
can continue work.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the employees. For now, no employee has ever been fired
because all have met with the training requirements.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 4
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
We ensure two-factor authentication to our systems to prevent
unauthorized access. This ensures that the identity of every user is
verified before granting access to the system. data encryption is
another important strategy implemented by the company to
prevent unauthorized access sensitive data. The company also
ensures that users that users do not share sensitive data without
consent and authorization
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Page 4 of 4
Some of the changes I would want to see being implemented is
regular cybersecurity training and awareness. I would also like to
see these trainings being tracked to see progress and also to get
feedback from users about their personal feelings and opinions
about the trainings. It is always good to know how employees feels
about these trainings to ensure that they don’t only see these
trainings as mandatory but also from the ethical standpoint.
Page 1 of 3
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Asian
4. Sex Female
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
Adjusting to new cyber security technologies. For instance,
migrating to cloud would help to improve better cyber security
leadership through ethical considerations. However, lack of
funding has hindered this achievement.
Exercise Design study
Page 2 of 3
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Ethical consideration can be integrated into cybersecurity
leadership by ensuring all that all leaders lead by example and also
participate effectively during trainings.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. there has never been any tangible reason to do so
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All the employees who have access to sensitive data. The
organization has never fired any employee based on data privacy
trainings but those who do not participate are not paid during
training hours.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Exercise Design study
Page 3 of 3
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
Yes. we immediately took action and removed the data online
immediately a client contacted that he saw his credentials online
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
We use a multi-leveled approach to ensure security is integrated into
data privacy protection. The multi-leveled approach includes
administrative and technical security controls to deter, detect, prevent,
protect, and in some cases, correct actions that may lead to security
incidents. Administrative controls include periodic risk assessments,
vulnerability assessments, and penetration testing. Technical controls
include encryption, antivirus software, intrusion detection/intrusion
prevention systems (IDS/IPS), email protection systems, firewalls, and
implementation of standard security practices such as least privileges,
permissions review and audits, and separation of duties.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Though we have a robust policy regarding IT security, people tend to
be the weakest link in any data protection effort. We would like to
guarantee compliance with our policies by ensuring our staff has
adequate training to prevent security mishaps from happening.
Page 1 of 3
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race Black or African American
4. Sex Female
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
The main challenges I have faced had to do with some of the wellknown issues, such as data privacy and security breaches which
requires effective cybersecurity training and awareness, but most
employees always take these trainings for granted. Some
participates just because it is mandatory to do so without fully
understanding why these trainings are all about. Also, some
employees still use company’s devices for private use.
Page 2 of 3
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
By ensuring that all leaders participate effectively during training
without skipping. I have witnessed situations where cybersecurity
leaders do not take these trainings seriously.
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
No but trainings are carried out twice a year which for me does not
meet the definition of regular.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
every employee with access to sensitive data. There has never been
a case where an employee is fired based on not participating
effectively during data privacy trainings.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Exercise Design study
Page 3 of 3
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
The use of two and multi-factor authentication. Also, data encryption is
implemented to restrict unauthorized access to sensitive data
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Incorporate other frameworks that can help in data privacy by
adjusting cybersecurity trainings and awareness to all staffs on
data privacy best practices from yearly to monthly, and also ensure
that all employees do not only participate in these trainings but
also adhere to them. This will also mean that the budget for
allocated for these trainings has to be increased.
Page 1 of 3
Exercise Design study
Research Objective:
The primary objective of this research is to assess how ethical influences can help reshape
cybersecurity leadership and improve data privacy protection
Survey Overview.
Please read and response to all questions. For Demographic questions, click on choose an item
then use the scroll down arrow to select a response. Each survey question is an open-ended
question. The aim is to solicit detail information from you with regards to each topic. Please use
the box provided to enter your response. Your knowledge will help to enhance this research for
future studies. Thank you in advance for your participation. Please contact the principal
investigator at gefiagbor@captechu.edu if you have any questions
Demographic Questions:
1. Are you over 18 years. Yes
2. Do you have a minimum of 5 years’ experience in cybersecurity. Yes
3. Race White
4. Sex Male
Survey Questions
IQ1. What challenges have you encountered while promoting better cyber security
leadership through ethical approaches?
There are several challenges I have encountered throughout my
career as a cybersecurity professional but some of the most
challenging problems are ineffective cybersecurity training and
awareness, employees with limited skills, and weak security policy
implementation. There is also the abuse of technology where some
employees uses company’s devices for personal purposes. There is
also the problem of funding
Page 2 of 3
Exercise Design study
IQ2. How can ethical considerations be integrated into your cybersecurity leadership
training programs?
Cybersecurity leaders should be able adapt to rapid growth in the
industry by learning the new technologies in order to meet up with
the frequent cyber-attacks. Most leaders are stuck with outdated
technologies and reluctant to learn the new ones while hoping that
ordinary employees should be the one to do so
IQ3. Does your organization carry out regular data privacy trainings? If yes, do you follow
up with employees like testing them to determine if they participated effectively?
Yes. we do follow up via email requesting for feedbacks and
recommendation from all attendees. Those who did not effectively
participate would be caught.
IQ4. Who are the participants in the organization’s data privacy trainings? Has any
employee been fired or suspended for not participating effectively during data privacy
trainings.
All employees employee and contractors who access to the
organization’s sensitive data. No employee has ever been fired or
suspended for not participating effectively during data privacy
trainings, but we have had cases where some employees were given
warning notice for not participating effectively or not participating
at all.
IQ5 Are there any legal or industry standards you adhere to when making decisions about
cyber security leadership and data privacy protection?
Yes.
Page 3 of 3
Exercise Design study
IQ6. How confident are you in the effectiveness of your organization’s current strategies for
data privacy protection?
confident.
IQ7. Has your organization ever encountered data breach. If yes, how was the situation
handled.
No
IQ8. What strategies do you employ to ensure ethical considerations are integrated into
data privacy protection decisions?
The organization I work for has a two factor or and multi-factor
authentication to restrict unauthorized access. We also use data
encryption as a strategy to ensure that ethical consideration is
integrated into data privacy protection decisions.
IQ9. Are there any organizations or stakeholders outside your organization that you
consult with regarding ethical issues related to cyber security leadership and data privacy
protection?
No
IQ10. What changes would you make to improve your organization’s current data privacy
protection practices?
Migrating to cloud is one possible way that help to enhance the
organization’s data privacy protection practices.