語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
A Case Study Exploration of Strategi...
~
Osei-Amanfi, Michael.
FindBook
Google Book
Amazon
博客來
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches./
作者:
Osei-Amanfi, Michael.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
面頁冊數:
359 p.
附註:
Source: Dissertations Abstracts International, Volume: 80-07, Section: A.
Contained By:
Dissertations Abstracts International80-07A.
標題:
Business administration. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13423232
ISBN:
9780438763425
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
Osei-Amanfi, Michael.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 359 p.
Source: Dissertations Abstracts International, Volume: 80-07, Section: A.
Thesis (D.B.A.)--Grand Canyon University, 2018.
This item must not be sold to any third party vendors.
The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.
ISBN: 9780438763425Subjects--Topical Terms:
3168311
Business administration.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
LDR
:02510nmm a2200337 4500
001
2206817
005
20190906083236.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780438763425
035
$a
(MiAaPQ)AAI13423232
035
$a
(MiAaPQ)gcu:10941
035
$a
AAI13423232
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Osei-Amanfi, Michael.
$3
3433735
245
1 0
$a
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
359 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-07, Section: A.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Badal, Alen.
502
$a
Thesis (D.B.A.)--Grand Canyon University, 2018.
506
$a
This item must not be sold to any third party vendors.
520
$a
The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.
590
$a
School code: 1582.
650
4
$a
Business administration.
$3
3168311
650
4
$a
Management.
$3
516664
650
4
$a
Information Technology.
$3
1030799
690
$a
0310
690
$a
0454
690
$a
0489
710
2
$a
Grand Canyon University.
$b
Doctoral Studies.
$3
2102896
773
0
$t
Dissertations Abstracts International
$g
80-07A.
790
$a
1582
791
$a
D.B.A.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13423232
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9383366
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入