Using Robust Data Governance to Mitigate the Impact of Cybercrime

被引:4
作者
Onwujekwe, Gerald [1 ]
Thomas, Manoj [1 ]
Osei-Bryson, Kweku-Muata [1 ]
机构
[1] Virginia Commonwealth Univ, Dept Informat Syst, Richmond, VA 23284 USA
来源
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019) | 2019年
关键词
Data governance; cybercrime; cyberattack; cyber threat; cybersecurity; CRITICAL SUCCESS FACTORS; INFORMATION GOVERNANCE; ECONOMIC-IMPACT; SECURITY; MANAGEMENT; INTERNET; PRIVACY; CLASSIFICATION; AWARENESS; BUSINESS;
D O I
10.1145/3325917.3325923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Deloitte's report (2015) on cybersecurity trends states that emerging technologies, coupled with a shifting threat profile, are challenging organizations to deal more and more with sophisticated "bad actors" that are motivated, skilled, and adaptable [1]. There is little doubt that cybercrime is growing more rapidly than cybersecurity measures are able to deal with and businesses and governments have never been more at risk from cyberattacks. In this paper, we ask the question, 'what are some of the robust data governance practices that can be put in place to forestall cybercrime?' We also asked the question, 'are there some research papers that have been published to address this concern? We then took a deep into extant literature to find out. Furthermore, we proposed a cybercrime mitigation framework using robust data governance. Our literature synthesis revealed that there is little research that investigated the concept of data governance and cybercrime together, which leads us to propose research hypotheses for a future quantitative research.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 80 条
[51]   The effects of attacker identity and individual user characteristics on the value of information privacy [J].
Nguyen, Kenneth D. ;
Rosoff, Heather ;
John, Richard S. .
COMPUTERS IN HUMAN BEHAVIOR, 2016, 55 :372-383
[52]   The Economic Impact of Privacy Violations and Security Breaches A Laboratory Experiment [J].
Nofer, Michael ;
Hinz, Oliver ;
Muntermann, Jan ;
Rossnagel, Heiko .
BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2014, 6 (06) :339-348
[53]   Automatic identification of integrity attacks in cyber-physical systems [J].
Ntalampiras, Stavros .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 58 :164-173
[54]  
Nurse A., 2014, INT J INFORM MANAGE, V35, P529
[55]   Data Governance [J].
Otto, Boris .
BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2011, 3 (04) :241-244
[56]   Social categorization and right-wing authoritarianism in reporting potential terrorist threats in cyberspace [J].
Palasinski, Marek ;
Granat, Jacek ;
Seol, Kyoung Ok ;
Bowman-Grieve, Lorraine .
COMPUTERS IN HUMAN BEHAVIOR, 2014, 36 :76-81
[57]   An ontology-based distributed whiteboard to determine legal responses to online cyber attacks [J].
Peng, Leisheng ;
Wijesekera, Duminda ;
Wingfield, Thomas C. ;
Michael, James B. .
INTERNET RESEARCH, 2006, 16 (05) :475-490
[58]  
POIER S, 2008, INFORM SOC, V24, P270
[59]   Information governance requirements in dynamic business networking [J].
Rasouli, Mohammad Reza ;
Trienekens, Jos J. M. ;
Kusters, Rob J. ;
Grefen, Paul W. P. J. .
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2016, 116 (07) :1356-1379
[60]   ISGcloud: a Security Governance Framework for Cloud Computing [J].
Rebollo, Oscar ;
Mellado, Daniel ;
Fernandez-Medina, Eduardo .
COMPUTER JOURNAL, 2015, 58 (10) :2233-2254