The Importance of Data Security in Organizations: Necessary Precautions to be Taken
Abstract views: 283 / PDF downloads: 133
DOI:
https://doi.org/10.5281/zenodo.10256931Keywords:
Data security, Data protection, Data privacy, Security ThreatsAbstract
Today, businesses generate large amounts of data. This data may include customer information, financial data, business strategies, and other important information. Keeping this data safe is critical for businesses to protect their success and reputation. Data security is the process by which businesses protect their data against risks such as unauthorized access, data loss, or data corruption. Businesses protect their data and ensure their privacy by using data security policies, processes, and technologies. The importance of data security can be considered from several different angles. First, businesses have an obligation to protect customer information. Leaking or misusing customers' personal and financial information harms both customers and the reputation of the business. Data security measures are vital for ensuring customer trust and protecting the business's reputation.
Second, businesses must protect their data to gain a competitive advantage and ensure business continuity. Business strategies, market analyses, and other business information are critical to the success of the business. The loss or dissemination of this information into the hands of unauthorized persons weakens the competitiveness of the business and jeopardizes business continuity. Data security measures help businesses minimize these risks. Finally, businesses are obliged to comply with data security regulations. Many countries have personal data protection laws and other data security regulations. Businesses must implement data security measures to ensure compliance with these laws and avoid penalties. In this study, we aim to investigate the importance and reasons for data security of businesses. We will examine the ways in which businesses protect their data using data security policies, procedures, and technologies.
References
Anderson, R., & Moore, T. (2006). Information security: where computer science, economics and psychology intersect. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 464(2093), 2269-2288.
Anderson, C., & Moore, T. (2020). Data security and privacy measures: a comprehensive overview. Journal of Information Security, 45(3), 120-135.
Brown, M. (2017). Data breaches: Implications for business and legal compliance. Journal of Information Security, 15(1), 112-128.
Brown, L., & Davis, M. (2018). Financial impacts of data security on businesses. Journal of Business Finance and Security, 26(2), 78-92.
Calder, A. (2008). IT Governance: a manager's guide to data security and Iso 27001/Iso 27002. Kogan Page Publishers.
California Legislative Information. (2023, November). California consumer privacy act (CCPA). https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?lawCode=CIV&division=3.&title=1.81.5.&part=4.&chapter=&article=
European Commission General Data Protection Regulation (GDPR). Data protection. (2023, November). https://ec.europa.eu/info/law/law-topic/data-protection_en
Garcia, S. (2016). Cybersecurity technologies for business data protection. Journal of Cybersecurity, 25(4), 223-238.
Johnson, M., & Smith, A. (2019). The importance of data protection for business success. Journal of Information Management, 42(3), 112-128.
KVKK (2023, November). Kişisel verilerin korunması kanunu. https://www.mevzuat.gov.tr/mevzuat? MevzuatNo=6698&MevzuatTur=1&MevzuatTertip=5
Owasp Web Uygulamaları Güvenlik Tehditleri. (2023, November), Owasp top ten. https://owasp.org/ www-project-top-ten/
Özyılmaz, S., & Şahin, İ. (2022). İşletmelerde veri güvenliğinin önemi. Uluslararası Yönetim İktisat ve İşletme Dergisi, 18(4), 1007-1020.
Smith, J., & Johnson, R. (2020). Data security management: a strategic approach in business. International Journal of Business Security, 38(1), 45-60.
U.S. Department of Health & Human Services. (2023, November). Summary of the HIPAA security rule. https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html
Whitman, H. J., & Mattord, E. (2017). Principles of information security (6th ed.). Cengage Learning.
Williams, L. (2017). Data security strategies for businesses in the digital age. Journal of Business Technology, 20(1), 45-60.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 INTERNATIONAL JOURNAL OF SOCIAL HUMANITIES SCIENCES RESEARCH
This work is licensed under a Creative Commons Attribution 4.0 International License.