Using Robust Data Governance to Mitigate the Impact of Cybercrime

被引:4
作者
Onwujekwe, Gerald [1 ]
Thomas, Manoj [1 ]
Osei-Bryson, Kweku-Muata [1 ]
机构
[1] Virginia Commonwealth Univ, Dept Informat Syst, Richmond, VA 23284 USA
来源
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2019) | 2019年
关键词
Data governance; cybercrime; cyberattack; cyber threat; cybersecurity; CRITICAL SUCCESS FACTORS; INFORMATION GOVERNANCE; ECONOMIC-IMPACT; SECURITY; MANAGEMENT; INTERNET; PRIVACY; CLASSIFICATION; AWARENESS; BUSINESS;
D O I
10.1145/3325917.3325923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Deloitte's report (2015) on cybersecurity trends states that emerging technologies, coupled with a shifting threat profile, are challenging organizations to deal more and more with sophisticated "bad actors" that are motivated, skilled, and adaptable [1]. There is little doubt that cybercrime is growing more rapidly than cybersecurity measures are able to deal with and businesses and governments have never been more at risk from cyberattacks. In this paper, we ask the question, 'what are some of the robust data governance practices that can be put in place to forestall cybercrime?' We also asked the question, 'are there some research papers that have been published to address this concern? We then took a deep into extant literature to find out. Furthermore, we proposed a cybercrime mitigation framework using robust data governance. Our literature synthesis revealed that there is little research that investigated the concept of data governance and cybercrime together, which leads us to propose research hypotheses for a future quantitative research.
引用
收藏
页码:70 / 79
页数:10
相关论文
共 80 条
[71]  
Tallon PP, 2013, MIS Q EXEC, V12, P189
[72]   Government data does not mean data governance: Lessons learned from a public sector application audit [J].
Thompson, Nik ;
Ravindran, Ravi ;
Nicosia, Salvatore .
GOVERNMENT INFORMATION QUARTERLY, 2015, 32 (03) :316-322
[73]  
Viano EC, 2016, Cybercrime, Organized Crime, and Societal Responses: International Approaches
[74]   Master data management and its organizational implementation An ethnographical study within the public sector [J].
Vilminko-Heikkinen, Riikka ;
Pekkola, Samuli .
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2017, 30 (03) :454-475
[75]   Measuring and ranking attacks based on vulnerability analysis [J].
Wang, Ju An ;
Guo, Minzhe ;
Wang, Hao ;
Zhou, Linfeng .
INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) :455-490
[76]   Hacker Taggers: A new type of hackers [J].
Warren, Matthew ;
Leitch, Shona .
INFORMATION SYSTEMS FRONTIERS, 2010, 12 (04) :425-431
[77]   Data warehouse governance: best practices at Blue Cross and Blue Shield of North Carolina [J].
Watson, HJ ;
Fuller, C ;
Ariyachandra, T .
DECISION SUPPORT SYSTEMS, 2004, 38 (03) :435-450
[78]   A process control approach to cyber attack detection [J].
Ye, N ;
Giordano, J ;
Feldman, J .
COMMUNICATIONS OF THE ACM, 2001, 44 (08) :76-82
[79]   An attack-norm separation approach for detecting cyber attacks [J].
Ye, Nong ;
Farley, Toni ;
Lakshminarasimhan, Deepak .
INFORMATION SYSTEMS FRONTIERS, 2006, 8 (03) :163-177
[80]   Opportunities and threats: A security assessment of state e-government websites [J].
Zhao, Jensen J. ;
Zhao, Sherry Y. .
GOVERNMENT INFORMATION QUARTERLY, 2010, 27 (01) :49-56