SlideShare a Scribd company logo
Software and Tear
Kyle Skidmore
Akira Wickes
Ryan Lindholm
Joshua Howell
Lucas Schafer
Zaymeen Deen
LIS 3201 Research and Data Analysis
Introduction
1
Research Problem, Significance, & Purpose
● Small companies face their fair share of technical issues. Mainly, we want to
focus on software integration and data security issues, as well as what can be
done to find solutions.
● “The tendency for small businesses to rely on outdated or illegally
downloaded software can lead to many holes in their business's information
security” (Keller, 2005)
● This is the reason we must research these issues: to pinpoint main
software and data security faults, and to help small companies triumph
them.
2
Research Questions
Q1) What are the main issues with software integration in small businesses?
Q2) How do small businesses suffer from practicing poor data security?
Q3) How can software and security issues be improved within small
businesses?
3
Methods
4
Data Collection
We conducted surveys and
interviews at small businesses
we currently work for
Convenience strategy for
recruitment process
Interviewed managers and bosses of
companies we have worked for
Only way to conduct interview regarding
sensitive information
Decided mixed methods of survey and
interviews would facilitate the process
and offer greater insight by gathering
the opinions of regular employees
(survey) and employees of a
management position (interviews)
5
Research Instrument Development
● Survey: Questions were more general
and direct. Used to gather the thoughts
of company employees regarding their
software use and thoughts on their
company’s software integration and
data security.
● Interview: Questions were more
specific in order to get in-depth
information. Used to gather insight
from employees with power (manager,
boss, etc.)
6
Population, Sample, & Sampling Techniques
● Population: Small business
employees in Florida
● Sample: Employees of all levels
throughout small businesses we are
associated with.
● Sampling Techniques (Non-random):
○ Convenience Sampling
■ We were able to conduct
interviews and surveys regarding
such sensitive information by
choosing small companies that
we already work for and have
trusted relationships
○ Snowball Sampling
■ After we got a handful of
employees to complete the
survey, we asked them to spread
the word to their co-workers
87
Data Collection Process
Interviews: Made appointments for
interviews over the phone
Interviews were mainly conducted in
person, while a few had to be
completed over a phone call
(timing/schedule clashes)
● Survey: Strictly online through
qualtrics.
○ We asked employees to complete
the survey online and shared the
link through text or email
8
Findings/Results
9
Findings/Results (Cont’d.)
Figure 1.
10
Figure 2.
15 Participants
80%
20%
Findings/Results (Cont’d.): RQ1
Q1) What are the main issues with software
integration in small businesses?
Employees are usually not informed that there
is an update for software or new software
being integrated
Leads to loss of revenue
Glitching and crashing
Software chosen cannot smoothly handle
necessary tasks
Figure 3.
1
Findings/Results (Cont’d.): RQ 2
Q2) How do small businesses suffer from practicing poor data security?
Security breaches
Phishing attacks
Identity theft
Most attacks experienced are minor and not too detrimental
Hinders customer’s opinion/loyalty
12
Findings/Results (Cont’d.): RQ 3
Q3) How can software and security issues be improved within small businesses?
Businesses must orate new software and updates to all their employees
Reinforce software and security protocol through emails and meetings
“I sat down with employees to discuss risky behavior after some monitoring of
the network, but after the sit down I don’t think we’ve experienced any further
issues”
Take time to analyze your company's needs in order to accurately choose software
that can handle such tasks
Address and take security breaches as learning experiences to prevent future issues
“Last year we got attacked by some version of the Crypto malware and as a
result we now have backups taken daily that prevent such an attack from
doing damage like it did before”
Backup all data on a regular/daily basis!
Improve data security practices (antivirus software, encryption, etc.)
13
Findings/Results (Cont’d.): RQ 3
Figure 4. Figure 5.
Q3) Although employees are only slightly to moderately knowledgeable on software
security, they all agree that it is very to extremely important, and agree small
businesses should improve their data security practices.
14
Implications - RQ1
Biggest issue with software is functionality
Software doesn’t function as the small
business expects it to.
According to Kara & Cheikhrouhou (2014) it is
becoming more difficult to pick the most
proficient software for their rapidly growing
needs.
We found from the interviews that small
businesses encounter software glitches
and crashes because of the software they
chose to execute the needed tasks
Just as big businesses encounter many software
issues, small businesses do as well.
Problems include finding the right
software and software integration
issues
Main implications of these software issues:
Software freezing
Software crashing
Having to restart the software
Various glitches with the software 15
Implications - RQ2(cont.)
From researched gathered by Hahn and Layne-Farrar
(2006), they found that businesses that have
cheap and poor security software are at a huge
risk for having data breaches.
In our interviews, we found that some
businesses use cheap security software
and are open to the same issues and
experience minor data breaches.
Companies knew that they had security features
but they weren’t exactly sure of how secure
their devices were. They only took security
precautions for their computers but not any
other devices.
Other devices that small businesses use
could be open to attack when they don’t
care about security precautions for
devices other than computers.
16
Limitations
17
Limitations (Cont’d.)
1. Small businesses
Only used small businesses in the Tallahassee area
Small businesses that we work or have previously worked at
1. Interviewing small business personnel
Making the right time that works for the interviewer and interviewee
The interviewee completely understands the purpose of the study
Many questions were asked; difficulty understanding
Locating the proper personnel in the small business who could answer the questions in the
most accurate and precise manner
18
Conclusion
19
Conclusion - RQ1, RQ2, RQ3
● Companies stay up to date with software
security
● Security issues are only addressed a few
times a year
● All businesses have suffered a security
attack, but most are not very detrimental
● Few businesses send mass emails or hold
meetings to ensure employees follow
proper security protocol
● Interview:
○ Companies do not orate software
updates and requirements as well as
they should - leads to revenue loss
● Recurring Technical Problems:
○ Software freezing/crashing
○ Device has to be restarted
○ Glitches in software
○ Relaxed data security
● Solutions:
○ Orate & enforce updates to employees
○ Analyze business needs to properly
choose software
○ Backup all data on a regular/daily
basis!
○ Improve data security practices
(antivirus software, encryption, etc.)
20
Reflection on Conducting Research
- Challenges
- Tracking down experts and finding times to interview them on their schedules.
- Condensing the research from 6 group members with very different schedules.
- Trouble finding willing participants to take our survey.
- Oftentimes our questions involved companies’ weaknesses in some of their software
implementation practices and experts were somewhat unwilling to discuss it.
- Oftentimes our questions were directed at the weak points in a company’s security and
experts were extremely unwilling to discuss these points.
- Lessons
21

More Related Content

PDF
A Study of Automated Decision Making Systems
PDF
BEST CYBER SECURITY PRACTICES
PPTX
International Technology Adoption & Workforce Issues Study - Japan Summary
PPTX
2011 09 18 United "Platitudes, reality and promise"
PPT
Operational Improvements
PDF
How to Build a Business Case for an eTMF
PDF
IT_Crisis_Problem_Management_Whitepaper
PPTX
International Technology Adoption & Workforce Issues Study - Canadian Summary
A Study of Automated Decision Making Systems
BEST CYBER SECURITY PRACTICES
International Technology Adoption & Workforce Issues Study - Japan Summary
2011 09 18 United "Platitudes, reality and promise"
Operational Improvements
How to Build a Business Case for an eTMF
IT_Crisis_Problem_Management_Whitepaper
International Technology Adoption & Workforce Issues Study - Canadian Summary

What's hot (20)

PPTX
Andrew Vermes: Major Incident Management
PDF
Automated decision making with predictive applications – Big Data Amsterdam
PPTX
Getting Started with Business Continuity
PPTX
Improving Incident Response: Building a More Efficient IT Infrastructure
PPTX
International Technology Adoption & Workforce Issues Study - Thailand Summary
PPT
Data Protection Governance IT
PPTX
3.7 developing ict solutions
PPTX
International Technology Adoption & Workforce Issues Study - Middle East Summary
PPTX
Understanding the security_organization
PPTX
International Technology Adoption & Workforce Issues Study - India Summary
PPTX
Security Organization/ Infrastructure
PDF
Ciso organizational priorities to build a resilient bimodal it
PDF
How to Secure your Fintech Solution - A Whitepaper by RapidValue
PDF
Performance Engineering: Strategies, Analysis and Management meet your busine...
PDF
6 computer systems
PDF
8 steps to Successful Accounts System Selection - Xledger Whitepaper
PPTX
TysonStargelDocumentManagementManagedITServices
PPT
intel ignite refresh_rmd
DOCX
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
PDF
McNair_Paper_Hill
Andrew Vermes: Major Incident Management
Automated decision making with predictive applications – Big Data Amsterdam
Getting Started with Business Continuity
Improving Incident Response: Building a More Efficient IT Infrastructure
International Technology Adoption & Workforce Issues Study - Thailand Summary
Data Protection Governance IT
3.7 developing ict solutions
International Technology Adoption & Workforce Issues Study - Middle East Summary
Understanding the security_organization
International Technology Adoption & Workforce Issues Study - India Summary
Security Organization/ Infrastructure
Ciso organizational priorities to build a resilient bimodal it
How to Secure your Fintech Solution - A Whitepaper by RapidValue
Performance Engineering: Strategies, Analysis and Management meet your busine...
6 computer systems
8 steps to Successful Accounts System Selection - Xledger Whitepaper
TysonStargelDocumentManagementManagedITServices
intel ignite refresh_rmd
P g 0 0 0 4 m a y 0 6 , 2 0 1 1
McNair_Paper_Hill
Ad

Viewers also liked (9)

PPTX
LAMP Server Vulnerabilities
PPTX
WP7: System Integration and Task 7.1 – Definition of evaluation methodology
PDF
Top 100 .Net Interview Questions and Answer
PPT
TERMINALFOUR t44u 2008 - Research Management System Integration With TERMINAL...
PPTX
System Analysis and Design Proposal presentation
PPT
System analysis and design
PPT
System Analysis And Design Management Information System
PPTX
System Analysis and Design
PPTX
Network Effects
LAMP Server Vulnerabilities
WP7: System Integration and Task 7.1 – Definition of evaluation methodology
Top 100 .Net Interview Questions and Answer
TERMINALFOUR t44u 2008 - Research Management System Integration With TERMINAL...
System Analysis and Design Proposal presentation
System analysis and design
System Analysis And Design Management Information System
System Analysis and Design
Network Effects
Ad

Similar to Software and Tear (20)

DOCX
Maintain data privacy during software development
PDF
Application Security Maturity Model
KEY
Application Security Done Right
PPTX
Digital Product Security
PPT
Software Security in the Real World
PDF
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
PPTX
Information security software security presentation.pptx
PPT
Software Security Engineering
PPTX
Information Security - Back to Basics - Own Your Vulnerabilities
PPTX
Robust Software Solutions.pptx
ODP
CISSP Week 12
PDF
Running a Software Security Program with Open Source Tools
PPTX
Best Practices for Embedding Security in the Development Stage
PPTX
Advantages of Data Security - Sociale Controle
PDF
Running a Software Security Program with Open Source Tools (Course)
PDF
Introduction to Software Security Initiative
PPTX
Information-security and best pracrices tools for the enhanced security of s...
PPTX
How is Your AppSec Program Doing Compared to Others
PDF
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
PPTX
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
Maintain data privacy during software development
Application Security Maturity Model
Application Security Done Right
Digital Product Security
Software Security in the Real World
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
Information security software security presentation.pptx
Software Security Engineering
Information Security - Back to Basics - Own Your Vulnerabilities
Robust Software Solutions.pptx
CISSP Week 12
Running a Software Security Program with Open Source Tools
Best Practices for Embedding Security in the Development Stage
Advantages of Data Security - Sociale Controle
Running a Software Security Program with Open Source Tools (Course)
Introduction to Software Security Initiative
Information-security and best pracrices tools for the enhanced security of s...
How is Your AppSec Program Doing Compared to Others
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation_ Review paper, used for researhc scholars
sap open course for s4hana steps from ECC to s4
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Software and Tear

  • 1. Software and Tear Kyle Skidmore Akira Wickes Ryan Lindholm Joshua Howell Lucas Schafer Zaymeen Deen LIS 3201 Research and Data Analysis
  • 3. Research Problem, Significance, & Purpose ● Small companies face their fair share of technical issues. Mainly, we want to focus on software integration and data security issues, as well as what can be done to find solutions. ● “The tendency for small businesses to rely on outdated or illegally downloaded software can lead to many holes in their business's information security” (Keller, 2005) ● This is the reason we must research these issues: to pinpoint main software and data security faults, and to help small companies triumph them. 2
  • 4. Research Questions Q1) What are the main issues with software integration in small businesses? Q2) How do small businesses suffer from practicing poor data security? Q3) How can software and security issues be improved within small businesses? 3
  • 6. Data Collection We conducted surveys and interviews at small businesses we currently work for Convenience strategy for recruitment process Interviewed managers and bosses of companies we have worked for Only way to conduct interview regarding sensitive information Decided mixed methods of survey and interviews would facilitate the process and offer greater insight by gathering the opinions of regular employees (survey) and employees of a management position (interviews) 5
  • 7. Research Instrument Development ● Survey: Questions were more general and direct. Used to gather the thoughts of company employees regarding their software use and thoughts on their company’s software integration and data security. ● Interview: Questions were more specific in order to get in-depth information. Used to gather insight from employees with power (manager, boss, etc.) 6
  • 8. Population, Sample, & Sampling Techniques ● Population: Small business employees in Florida ● Sample: Employees of all levels throughout small businesses we are associated with. ● Sampling Techniques (Non-random): ○ Convenience Sampling ■ We were able to conduct interviews and surveys regarding such sensitive information by choosing small companies that we already work for and have trusted relationships ○ Snowball Sampling ■ After we got a handful of employees to complete the survey, we asked them to spread the word to their co-workers 87
  • 9. Data Collection Process Interviews: Made appointments for interviews over the phone Interviews were mainly conducted in person, while a few had to be completed over a phone call (timing/schedule clashes) ● Survey: Strictly online through qualtrics. ○ We asked employees to complete the survey online and shared the link through text or email 8
  • 12. Findings/Results (Cont’d.): RQ1 Q1) What are the main issues with software integration in small businesses? Employees are usually not informed that there is an update for software or new software being integrated Leads to loss of revenue Glitching and crashing Software chosen cannot smoothly handle necessary tasks Figure 3. 1
  • 13. Findings/Results (Cont’d.): RQ 2 Q2) How do small businesses suffer from practicing poor data security? Security breaches Phishing attacks Identity theft Most attacks experienced are minor and not too detrimental Hinders customer’s opinion/loyalty 12
  • 14. Findings/Results (Cont’d.): RQ 3 Q3) How can software and security issues be improved within small businesses? Businesses must orate new software and updates to all their employees Reinforce software and security protocol through emails and meetings “I sat down with employees to discuss risky behavior after some monitoring of the network, but after the sit down I don’t think we’ve experienced any further issues” Take time to analyze your company's needs in order to accurately choose software that can handle such tasks Address and take security breaches as learning experiences to prevent future issues “Last year we got attacked by some version of the Crypto malware and as a result we now have backups taken daily that prevent such an attack from doing damage like it did before” Backup all data on a regular/daily basis! Improve data security practices (antivirus software, encryption, etc.) 13
  • 15. Findings/Results (Cont’d.): RQ 3 Figure 4. Figure 5. Q3) Although employees are only slightly to moderately knowledgeable on software security, they all agree that it is very to extremely important, and agree small businesses should improve their data security practices. 14
  • 16. Implications - RQ1 Biggest issue with software is functionality Software doesn’t function as the small business expects it to. According to Kara & Cheikhrouhou (2014) it is becoming more difficult to pick the most proficient software for their rapidly growing needs. We found from the interviews that small businesses encounter software glitches and crashes because of the software they chose to execute the needed tasks Just as big businesses encounter many software issues, small businesses do as well. Problems include finding the right software and software integration issues Main implications of these software issues: Software freezing Software crashing Having to restart the software Various glitches with the software 15
  • 17. Implications - RQ2(cont.) From researched gathered by Hahn and Layne-Farrar (2006), they found that businesses that have cheap and poor security software are at a huge risk for having data breaches. In our interviews, we found that some businesses use cheap security software and are open to the same issues and experience minor data breaches. Companies knew that they had security features but they weren’t exactly sure of how secure their devices were. They only took security precautions for their computers but not any other devices. Other devices that small businesses use could be open to attack when they don’t care about security precautions for devices other than computers. 16
  • 19. Limitations (Cont’d.) 1. Small businesses Only used small businesses in the Tallahassee area Small businesses that we work or have previously worked at 1. Interviewing small business personnel Making the right time that works for the interviewer and interviewee The interviewee completely understands the purpose of the study Many questions were asked; difficulty understanding Locating the proper personnel in the small business who could answer the questions in the most accurate and precise manner 18
  • 21. Conclusion - RQ1, RQ2, RQ3 ● Companies stay up to date with software security ● Security issues are only addressed a few times a year ● All businesses have suffered a security attack, but most are not very detrimental ● Few businesses send mass emails or hold meetings to ensure employees follow proper security protocol ● Interview: ○ Companies do not orate software updates and requirements as well as they should - leads to revenue loss ● Recurring Technical Problems: ○ Software freezing/crashing ○ Device has to be restarted ○ Glitches in software ○ Relaxed data security ● Solutions: ○ Orate & enforce updates to employees ○ Analyze business needs to properly choose software ○ Backup all data on a regular/daily basis! ○ Improve data security practices (antivirus software, encryption, etc.) 20
  • 22. Reflection on Conducting Research - Challenges - Tracking down experts and finding times to interview them on their schedules. - Condensing the research from 6 group members with very different schedules. - Trouble finding willing participants to take our survey. - Oftentimes our questions involved companies’ weaknesses in some of their software implementation practices and experts were somewhat unwilling to discuss it. - Oftentimes our questions were directed at the weak points in a company’s security and experts were extremely unwilling to discuss these points. - Lessons 21