Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Obstacles with Data Security: Strate...
~
Compton, Yamiah R.
Linked to FindBook
Google Book
Amazon
博客來
Obstacles with Data Security: Strategies from Carolina Universities.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Obstacles with Data Security: Strategies from Carolina Universities./
Author:
Compton, Yamiah R.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
Description:
156 p.
Notes:
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
Contained By:
Dissertations Abstracts International82-04B.
Subject:
Information technology. -
Online resource:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28092597
ISBN:
9798672178622
Obstacles with Data Security: Strategies from Carolina Universities.
Compton, Yamiah R.
Obstacles with Data Security: Strategies from Carolina Universities.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 156 p.
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
Thesis (D.I.T.)--Walden University, 2020.
This item must not be sold to any third party vendors.
Some university data custodians lack information security strategies to prevent data security breaches. Reducing duplicitous use of personally identifiable information (PII) obtained maliciously from colleges and universities should be important to university data custodians, IT leadership of all levels, state legislators, and individuals that have an interest in moving into the cybersecurity space in higher education. Grounded in general systems theory, the purpose of this multiple qualitative case study was to examine information security strategies that university data custodians use to protect PII collected from staff, students, and other stakeholders. The participants consisted of 15 college and university data custodians in North Carolina and South Carolina, who implemented security strategies. Semistructured virtual interviews were used to collect data. The verbatim transcripts were analyzed using thematic analysis in conjunction with Tesch's data coding process then compared to current literature as a control. There were 5 key emergent themes (a) adaptive security measures, (b) necessity for buy-in resources, or both (c) proper management and personnel, (d) requirements based on state/industry regulations, and (e) security education training and awareness. University data custodians should implement, promote, and monitor comprehensive information security strategies to protect university PII. The implications for positive social change include potential leadership awareness to protect university PII and minimize the adverse effects of a data breach.
ISBN: 9798672178622Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Breaches
Obstacles with Data Security: Strategies from Carolina Universities.
LDR
:02908nmm a2200457 4500
001
2276976
005
20210510092452.5
008
220723s2020 ||||||||||||||||| ||eng d
020
$a
9798672178622
035
$a
(MiAaPQ)AAI28092597
035
$a
AAI28092597
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Compton, Yamiah R.
$3
3555276
245
1 0
$a
Obstacles with Data Security: Strategies from Carolina Universities.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
156 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
500
$a
Advisor: Griffith, Gary;Duhainy, Bob.
502
$a
Thesis (D.I.T.)--Walden University, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
Some university data custodians lack information security strategies to prevent data security breaches. Reducing duplicitous use of personally identifiable information (PII) obtained maliciously from colleges and universities should be important to university data custodians, IT leadership of all levels, state legislators, and individuals that have an interest in moving into the cybersecurity space in higher education. Grounded in general systems theory, the purpose of this multiple qualitative case study was to examine information security strategies that university data custodians use to protect PII collected from staff, students, and other stakeholders. The participants consisted of 15 college and university data custodians in North Carolina and South Carolina, who implemented security strategies. Semistructured virtual interviews were used to collect data. The verbatim transcripts were analyzed using thematic analysis in conjunction with Tesch's data coding process then compared to current literature as a control. There were 5 key emergent themes (a) adaptive security measures, (b) necessity for buy-in resources, or both (c) proper management and personnel, (d) requirements based on state/industry regulations, and (e) security education training and awareness. University data custodians should implement, promote, and monitor comprehensive information security strategies to protect university PII. The implications for positive social change include potential leadership awareness to protect university PII and minimize the adverse effects of a data breach.
590
$a
School code: 0543.
650
4
$a
Information technology.
$3
532993
650
4
$a
Educational administration.
$3
2122799
650
4
$a
Higher education.
$3
641065
650
4
$a
Systems science.
$3
3168411
653
$a
Breaches
653
$a
Cybersecurity
653
$a
PII
653
$a
Security strategies
653
$a
SETA
653
$a
Universities
653
$a
Data custodians
653
$a
North Carolina
653
$a
South Carolina
653
$a
Transcipts
690
$a
0489
690
$a
0454
690
$a
0514
690
$a
0745
690
$a
0790
710
2
$a
Walden University.
$b
Information Systems and Technology.
$3
3176643
773
0
$t
Dissertations Abstracts International
$g
82-04B.
790
$a
0543
791
$a
D.I.T.
792
$a
2020
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28092597
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9428710
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login