A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches

<p> The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security...

Full description

Bibliographic Details
Main Author: Osei-Amanfi, Michael
Language:EN
Published: Grand Canyon University 2019
Subjects:
Online Access:http://pqdtopen.proquest.com/#viewpdf?dispub=13423232
id ndltd-PROQUEST-oai-pqdtoai.proquest.com-13423232
record_format oai_dc
spelling ndltd-PROQUEST-oai-pqdtoai.proquest.com-134232322019-01-10T16:13:36Z A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches Osei-Amanfi, Michael Business administration|Management|Information technology <p> The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.</p><p> Grand Canyon University 2019-01-08 00:00:00.0 thesis http://pqdtopen.proquest.com/#viewpdf?dispub=13423232 EN
collection NDLTD
language EN
sources NDLTD
topic Business administration|Management|Information technology
spellingShingle Business administration|Management|Information technology
Osei-Amanfi, Michael
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
description <p> The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.</p><p>
author Osei-Amanfi, Michael
author_facet Osei-Amanfi, Michael
author_sort Osei-Amanfi, Michael
title A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
title_short A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
title_full A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
title_fullStr A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
title_full_unstemmed A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
title_sort case study exploration of strategies to avoid cloud computing data breaches
publisher Grand Canyon University
publishDate 2019
url http://pqdtopen.proquest.com/#viewpdf?dispub=13423232
work_keys_str_mv AT oseiamanfimichael acasestudyexplorationofstrategiestoavoidcloudcomputingdatabreaches
AT oseiamanfimichael casestudyexplorationofstrategiestoavoidcloudcomputingdatabreaches
_version_ 1718813106706055168