語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Obstacles with Data Security: Strate...
~
Compton, Yamiah R.
FindBook
Google Book
Amazon
博客來
Obstacles with Data Security: Strategies from Carolina Universities.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Obstacles with Data Security: Strategies from Carolina Universities./
作者:
Compton, Yamiah R.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
面頁冊數:
156 p.
附註:
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
Contained By:
Dissertations Abstracts International82-04B.
標題:
Information technology. -
電子資源:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28092597
ISBN:
9798672178622
Obstacles with Data Security: Strategies from Carolina Universities.
Compton, Yamiah R.
Obstacles with Data Security: Strategies from Carolina Universities.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 156 p.
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
Thesis (D.I.T.)--Walden University, 2020.
This item must not be sold to any third party vendors.
Some university data custodians lack information security strategies to prevent data security breaches. Reducing duplicitous use of personally identifiable information (PII) obtained maliciously from colleges and universities should be important to university data custodians, IT leadership of all levels, state legislators, and individuals that have an interest in moving into the cybersecurity space in higher education. Grounded in general systems theory, the purpose of this multiple qualitative case study was to examine information security strategies that university data custodians use to protect PII collected from staff, students, and other stakeholders. The participants consisted of 15 college and university data custodians in North Carolina and South Carolina, who implemented security strategies. Semistructured virtual interviews were used to collect data. The verbatim transcripts were analyzed using thematic analysis in conjunction with Tesch's data coding process then compared to current literature as a control. There were 5 key emergent themes (a) adaptive security measures, (b) necessity for buy-in resources, or both (c) proper management and personnel, (d) requirements based on state/industry regulations, and (e) security education training and awareness. University data custodians should implement, promote, and monitor comprehensive information security strategies to protect university PII. The implications for positive social change include potential leadership awareness to protect university PII and minimize the adverse effects of a data breach.
ISBN: 9798672178622Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Breaches
Obstacles with Data Security: Strategies from Carolina Universities.
LDR
:02908nmm a2200457 4500
001
2276976
005
20210510092452.5
008
220723s2020 ||||||||||||||||| ||eng d
020
$a
9798672178622
035
$a
(MiAaPQ)AAI28092597
035
$a
AAI28092597
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Compton, Yamiah R.
$3
3555276
245
1 0
$a
Obstacles with Data Security: Strategies from Carolina Universities.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
156 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
500
$a
Advisor: Griffith, Gary;Duhainy, Bob.
502
$a
Thesis (D.I.T.)--Walden University, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
Some university data custodians lack information security strategies to prevent data security breaches. Reducing duplicitous use of personally identifiable information (PII) obtained maliciously from colleges and universities should be important to university data custodians, IT leadership of all levels, state legislators, and individuals that have an interest in moving into the cybersecurity space in higher education. Grounded in general systems theory, the purpose of this multiple qualitative case study was to examine information security strategies that university data custodians use to protect PII collected from staff, students, and other stakeholders. The participants consisted of 15 college and university data custodians in North Carolina and South Carolina, who implemented security strategies. Semistructured virtual interviews were used to collect data. The verbatim transcripts were analyzed using thematic analysis in conjunction with Tesch's data coding process then compared to current literature as a control. There were 5 key emergent themes (a) adaptive security measures, (b) necessity for buy-in resources, or both (c) proper management and personnel, (d) requirements based on state/industry regulations, and (e) security education training and awareness. University data custodians should implement, promote, and monitor comprehensive information security strategies to protect university PII. The implications for positive social change include potential leadership awareness to protect university PII and minimize the adverse effects of a data breach.
590
$a
School code: 0543.
650
4
$a
Information technology.
$3
532993
650
4
$a
Educational administration.
$3
2122799
650
4
$a
Higher education.
$3
641065
650
4
$a
Systems science.
$3
3168411
653
$a
Breaches
653
$a
Cybersecurity
653
$a
PII
653
$a
Security strategies
653
$a
SETA
653
$a
Universities
653
$a
Data custodians
653
$a
North Carolina
653
$a
South Carolina
653
$a
Transcipts
690
$a
0489
690
$a
0454
690
$a
0514
690
$a
0745
690
$a
0790
710
2
$a
Walden University.
$b
Information Systems and Technology.
$3
3176643
773
0
$t
Dissertations Abstracts International
$g
82-04B.
790
$a
0543
791
$a
D.I.T.
792
$a
2020
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28092597
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9428710
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入