A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
<p> The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security...
Main Author: | |
---|---|
Language: | EN |
Published: |
Grand Canyon University
2019
|
Subjects: | |
Online Access: | http://pqdtopen.proquest.com/#viewpdf?dispub=13423232 |
id |
ndltd-PROQUEST-oai-pqdtoai.proquest.com-13423232 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-PROQUEST-oai-pqdtoai.proquest.com-134232322019-01-10T16:13:36Z A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches Osei-Amanfi, Michael Business administration|Management|Information technology <p> The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.</p><p> Grand Canyon University 2019-01-08 00:00:00.0 thesis http://pqdtopen.proquest.com/#viewpdf?dispub=13423232 EN |
collection |
NDLTD |
language |
EN |
sources |
NDLTD |
topic |
Business administration|Management|Information technology |
spellingShingle |
Business administration|Management|Information technology Osei-Amanfi, Michael A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches |
description |
<p> The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.</p><p> |
author |
Osei-Amanfi, Michael |
author_facet |
Osei-Amanfi, Michael |
author_sort |
Osei-Amanfi, Michael |
title |
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches |
title_short |
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches |
title_full |
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches |
title_fullStr |
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches |
title_full_unstemmed |
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches |
title_sort |
case study exploration of strategies to avoid cloud computing data breaches |
publisher |
Grand Canyon University |
publishDate |
2019 |
url |
http://pqdtopen.proquest.com/#viewpdf?dispub=13423232 |
work_keys_str_mv |
AT oseiamanfimichael acasestudyexplorationofstrategiestoavoidcloudcomputingdatabreaches AT oseiamanfimichael casestudyexplorationofstrategiestoavoidcloudcomputingdatabreaches |
_version_ |
1718813106706055168 |