Using Robust Data Governance to Mitigate the Impact of Cybercrime

被引:4
作者
Onwujekwe, Gerald [1 ]
Thomas, Manoj [1 ]
Osei-Bryson, Kweku-Muata [1 ]
机构
[1] Virginia Commonwealth Univ, Dept Informat Syst, Richmond, VA 23284 USA
来源
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019) | 2019年
关键词
Data governance; cybercrime; cyberattack; cyber threat; cybersecurity; CRITICAL SUCCESS FACTORS; INFORMATION GOVERNANCE; ECONOMIC-IMPACT; SECURITY; MANAGEMENT; INTERNET; PRIVACY; CLASSIFICATION; AWARENESS; BUSINESS;
D O I
10.1145/3325917.3325923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Deloitte's report (2015) on cybersecurity trends states that emerging technologies, coupled with a shifting threat profile, are challenging organizations to deal more and more with sophisticated "bad actors" that are motivated, skilled, and adaptable [1]. There is little doubt that cybercrime is growing more rapidly than cybersecurity measures are able to deal with and businesses and governments have never been more at risk from cyberattacks. In this paper, we ask the question, 'what are some of the robust data governance practices that can be put in place to forestall cybercrime?' We also asked the question, 'are there some research papers that have been published to address this concern? We then took a deep into extant literature to find out. Furthermore, we proposed a cybercrime mitigation framework using robust data governance. Our literature synthesis revealed that there is little research that investigated the concept of data governance and cybercrime together, which leads us to propose research hypotheses for a future quantitative research.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 80 条
[1]   Phishing detection based Associative Classification data mining [J].
Abdelhamid, Neda ;
Ayesh, Aladdin ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5948-5959
[2]  
Al-Ruithe M., 2018, PERSONAL UBIQUITOUS
[3]   Data Governance Taxonomy: Cloud versus Non-Cloud [J].
Al-Ruithe, Majid ;
Benkhelifa, Elhadj ;
Hameed, Khawar .
SUSTAINABILITY, 2018, 10 (01)
[4]   Analysis and Classification of Barriers and Critical Success Factors for Implementing a Cloud Data Governance Strategy [J].
Al-Ruithe, Majid ;
Benkhelifa, Elhadj .
8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 :223-232
[5]   Data governance activities: a comparison between scientific and practice-oriented literature [J].
Alhassan, Ibrahim ;
Sammon, David ;
Daly, Mary .
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2018, 31 (02) :300-316
[6]   Critical success factors (CSFs) for information technology governance (ITG) [J].
Alreemy, Zyad ;
Chang, Victor ;
Walters, Robert ;
Wills, Gary .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (06) :907-916
[7]  
[Anonymous], 2017, IS GDPR OPPORTUNITY
[8]  
[Anonymous], DATA PROTECTION GOVE
[9]  
[Anonymous], 2016, COMBATTING CYBERCRIM
[10]   Phishing threat avoidance behaviour: An empirical investigation [J].
Arachchilage, Nalin Asanka Gamagedara ;
Love, Steve ;
Beznosov, Konstantin .
COMPUTERS IN HUMAN BEHAVIOR, 2016, 60 :185-197