Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
A Case Study Exploration of Strategi...
~
Osei-Amanfi, Michael.
Linked to FindBook
Google Book
Amazon
博客來
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
Record Type:
Electronic resources : Monograph/item
Title/Author:
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches./
Author:
Osei-Amanfi, Michael.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
Description:
359 p.
Notes:
Source: Dissertations Abstracts International, Volume: 80-07, Section: A.
Contained By:
Dissertations Abstracts International80-07A.
Subject:
Business administration. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13423232
ISBN:
9780438763425
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
Osei-Amanfi, Michael.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 359 p.
Source: Dissertations Abstracts International, Volume: 80-07, Section: A.
Thesis (D.B.A.)--Grand Canyon University, 2018.
This item must not be sold to any third party vendors.
The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.
ISBN: 9780438763425Subjects--Topical Terms:
3168311
Business administration.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
LDR
:02510nmm a2200337 4500
001
2206817
005
20190906083236.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780438763425
035
$a
(MiAaPQ)AAI13423232
035
$a
(MiAaPQ)gcu:10941
035
$a
AAI13423232
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Osei-Amanfi, Michael.
$3
3433735
245
1 0
$a
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
359 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-07, Section: A.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Badal, Alen.
502
$a
Thesis (D.B.A.)--Grand Canyon University, 2018.
506
$a
This item must not be sold to any third party vendors.
520
$a
The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.
590
$a
School code: 1582.
650
4
$a
Business administration.
$3
3168311
650
4
$a
Management.
$3
516664
650
4
$a
Information Technology.
$3
1030799
690
$a
0310
690
$a
0454
690
$a
0489
710
2
$a
Grand Canyon University.
$b
Doctoral Studies.
$3
2102896
773
0
$t
Dissertations Abstracts International
$g
80-07A.
790
$a
1582
791
$a
D.B.A.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13423232
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9383366
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login