Walden University
ScholarWorks
Walden Dissertations and Doctoral Studies
Walden Dissertations and Doctoral Studies
Collection
2019
Strategies for Improving Data Protection to Reduce
Data Loss from Cyberattacks
Jennifer Elizabeth Cannon
Walden University
Follow this and additional works at:
https://scholarworks.waldenu.edu/dissertations
Part of the
Business Commons
This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been
accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please
contact
ScholarWorks@waldenu.edu
.
Walden University
College of Management and Technology
This is to certify that the doctoral study by
Jennifer E. Cannon
has been found to be complete and satisfactory in all respects,
and that any and all revisions required by
the review committee have been made.
Review Committee
Dr. Peter Anthony, Committee Chairperson, Doctor of Business Administration Faculty
Dr. Jaime Klein, Committee Member, Doctor of Business Administration Faculty
Dr. Matthew Knight, University Reviewer, Doctor of Business Administration Faculty
Chief Academic Officer
Eric Riedel, Ph.D.
Walden University
2019
Abstract
Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks
by
Jennifer E. Cannon
MS, Troy University, 2006
BS, University of South Florida, 2000
Doctoral Study Submitted in Partial Fulfillment
of the Requirements for the Degree of
Doctor of Business Administration
Walden University
August 2019
Abstract
Accidental and targeted data breaches threaten sustainable business practices and
personal privacy, exposing all types of businesses to increased data loss and financial
impacts. This single case study was conducted in a medium-sized enterprise located in
Brevard County, Florida, to explore the successful data protection strategies employed by
the information system and information technology business leaders. Actor–network
theory was the conceptual framework for the study with a graphical syntax to model data
protection strategies. Data were collected from semistructured interviews of 3 business
leaders, archival documents, and field notes. Data were analyzed using thematic, analytic,
and software analysis, and methodological triangulation. Three themes materialized from
the data analyses: people--inferring security personnel, network engineers, system
engineers, and qualified personnel to know how to monitor data; processes--inferring the
activities required to protect data from data loss; and technology--inferring scientific
knowledge used by people to protect data from data loss. The findings are indicative of
successful application of data protection strategies and may be modeled to assess
vulnerabilities from technical and nontechnical threats impacting risk and loss of
sensitive data. The implications of this study for positive social change include the
potential to alter attitudes toward data protection, creating a better environment for
people to live and work; reduce recovery costs resulting from Internet crimes, improving
social well-being; and enhance methods for the protection of sensitive, proprietary, and
personally identifiable information, which advances the privacy rights for society.
Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks
by
Jennifer E. Cannon
MS, Troy University, 2006
BS, University of South Florida, 2000
Doctoral Study Submitted in Partial Fulfillment
of the Requirements for the Degree of
Doctor of Business Administration
Walden University
August 2019
Dedication
Some people walk into your life and make little impact on your path. Others walk
into your life, make a profound impression, and leave an everlasting mark on your soul. I
dedicate this work of heart to one such person, the love of my life, my best friend, and
confidant. I also dedicate this work to our children, all of whom sacrificed their time and
4 years of their lives to support me in this endeavor. I further dedicate this work to my
parents who provided support, encouragement, and most importantly their genetic
material, and that of my ancestors, coding my motivations and desires to achieve great
things in life. An additional dedication to my sister, her husband, and my nieces and
nephew, all of whom provided humor and gracious smiles when I needed them most.
A final dedication to the men and women, quietly and sometimes without
recognition, battling the cyberspace war on a day-to-day basis to protect our nation’s
data.
Data are the building blocks of information unlocking our potential as a species
in defining our interpretations, philosophies, and perceptions of the world, societies, and
individuals. Humans can innovate monumental wonders if we can only protect the
information that arises from our data. ~Jennifer E. Cannon
Acknowledgments
First and foremost, I recognize the mentorship, guidance, and friendship offered
by Dr. Peter Anthony. There were times through this process the struggles felt
insurmountable, and Dr. Anthony gave perspective to the situation. His facilitation of the
DBA process, availability, and his above and beyond attitude made a lasting impression.
Thank you.
My sincerest appreciation to Dr. Jaime Klein and Dr. Matthew Knight for their
continued patience and professionalism with my study. Your combined insights and
feedback elevated my opus to a quality product. Thank you.
I extend my deepest appreciation to the partnering organization and the
Do'stlaringiz bilan baham: |