Cybersecurity

Image

Title-TBD

Abstract-TBD

Abstract-TBD

Abstract-TBD

Image

Title-TBD

Abstract-TBD

Abstract-TBD

Abstract-TBD


Academic Oriented

Change Management Strategy

Evaluation and analysis of potential stakeholder resistance and overcoming such resistance using change management planning. The analysis encompasses communication planning, training planning, and stakeholder decision-making processes, while examining the relevant evaluation of change management theory in the context of developing a business change management plan.

Keywords: change management, innovation, communication plan, training plan, stakeholder decision-making, leadership, management, transformation, process improvement

Note: This is not a peer-reviewed research paper. Do not use as a primary or secondary source within a thesis, dissertation, or research paper. If you find a reasonable perspective for research and would like to discuss a research perspective, please reach out to the author: jjfisher@jamesjfisher.org. Updated: July 14, 2025.

Frameworks of Governance and Cybersecurity Management

A critical analysis of concepts, theories, and literature concerning the impact of frameworks on governance and cybersecurity management. This will include trends, challenges, and issues related to the implementation of governance and cybersecurity management within the modern business landscape. An assessment of solutions and limitations will include impacts from frameworks for implementing governance and cybersecurity management, with a discussion on the TJX Companies, Inc. cybersecurity breach.

Keywords: frameworks, best practices, cybersecurity, information security, governance, architecture, management, leadership, SABSA, ISO/IEC 27000, PCI-DSS, TJX

Note: This is not a peer-reviewed research paper. Do not use as a primary or secondary source within a thesis, dissertation, or research paper. If a reasonable perspective for research is found and a viable research perspective is being considered, please reach out to the author: jjfisher@jamesjfisher.org.Updated: July 3, 2025




As a working cybersecurity professional, every attempt is made to separate professional and personal endeavors in a manner consistent with reducing conflicts of interest and maintaining ethics. Statements contained within this site are the explicit and implicit goals, objectives, endorsements, and educated opinion of the author of this site and not those of current or former employers.


Image
© 2025 James J. Fisher, All Rights Reserved. Contact Me


This site only uses session cookies for maintaining the state of each page. Users are not tracked, and information is not stored, processed, or analyzed for any other purpose. However, third parties linked to this site may use tracking cookies and techniques outside of the realm of control for this site.