Week 13 Final Search – How Database Leaks Effect The Bottom Line

My topic for these past weeks has been in data protection, I’m looking at how cybersecurity can help and want to produce a research proposal that breaks down how data breaches hurt both companies and customers and why cybersecurity is necessary to prevent this. I am nearing saturation but have considered that perhaps in order to get my point across better, I may need an additional article or two to fill in the gaps, but as it stands right now I think the arsenal I’m equipped with will work for what I’m trying to go for with this proposal. This week was mostly about finding information on how companies feel about their data on customers, I’ve found and read a few articles on customers but I want to know if companies feel like investing in cybersecurity is going to pay off.

 

Search 1

Database: Computer Science Collection
Search: Companies AND data protection AND money
Limiters: Full-text, peer-reviewed
Results: 529
Citation: Data breaches cost more than money. Information Management Journal, vol. 50, no. 6, Nov.-Dec. 2016, p. 7. Gale OneFile: Computer Science, link.gale.com/apps/doc/A499915176/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=95f4dd2e. Accessed 22 Apr. 2022.

Annotated Bibliography

Information Management Journal attempts to break down a list of losses incurred by a company during a database breach, with things such as loss of reputation and difficulty to secure contracts topping the list. Issues with insurance companies arise as well. For example if you have a history of car crashes then car insurance will be more expensive, well the same applies for insuring data. It is far more expensive for a company to insure its data once it has had a breach. Very helpful in providing context on why data protection is important and how it effects the company’s balance sheet.

 

Search 2

Database: Computer Science Collection
Search: data breach AND money AND loss
Limiters: Full-text, peer-reviewed
Results: 59
Citation:
Executives say–but don’t act like–data security is vital. Information Management Journal, vol. 49, no. 1, Jan.-Feb. 2015, p. 8. Gale OneFile: Computer Science, link.gale.com/apps/doc/A420929524/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=6d4e8669. Accessed 22 Apr. 2022.

Annotated Bibliography

The article seems to talk about executives’ opinions on data security. How they make statements regarding the importance of data security, but rarely increase the spending afterward. Very useful in orchestrating a point on executives’ opinions on cyber spending. Keeping true to the theme of major employers seeing cybersecurity as something they would like to spend as little as possible on.

Search 3

Database: Computer Science Collection
Search: data breach AND finance AND security
Limiters: full-text, peer-reviewed
Results: 69
Citation: Eisenga, Amanda, et al. Investing in IT security: how to determine the maximum threshold. International Journal of Information Security and Privacy, vol. 6, no. 3, July-Sept. 2012, pp. 75+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A311851552/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=536e608a. Accessed 22 Apr. 2022.

Annotated Bibliography

This report analyzes losses in data breaches versus cost of IT teams. Many examples are brought up and while it is nearing a decade old, the information is still relevant as ever. The report found an average of $214 lost per record breached, with the cost scaling for larger versus smaller companies. There is more perceived value for investing more into IT in this study as a company gets bigger.

Search 4:

Database: Computer Science Collection
Search: data security AND cost AND data breach
Limiters: full-text, peer-reviewed
Results: 218
Citation: Data breaches may be up, but costs are down. (2012, July-August). Information Management Journal, 46(4), 14. https://link.gale.com/apps/doc/A319975184/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=31d5ed12

Annotated Bibliography

In trying to justify cutting back on IT budgets, this article discusses how costs of data breaches are going down on average. As data has become more commonly collected its value is going down. With cheaper breaches some companies consider letting a few get through as it may end up being cheaper than buying additional security. This is becoming a growing threat as companies value having the additional capital over more security for their customers.

Search 5:

Database: Computer Science Collection
Search: data security AND finance AND loss
Limiters: full-text, peer-reviewed
Results: 221
Citation:
Spruit, Marco, and Wouter de Bruijn. CITS: the Cost of IT Security Framework. International Journal of Information Security and Privacy, vol. 6, no. 4, Oct.-Dec. 2012, pp. 94+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A322564618/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=c46b6c81. Accessed 22 Apr. 2022.

Annotated Bibliography

This article applies a risk-management type approach to deciding whether investing in additional IT infrastructure is worth it. Calculations on loss prevention from data breaches versus cost to hire new staff are taken into account. The article additionally discusses differences in small businesses and scalability with organizations having to alter their management style as they increase in size.

About ztgrelinger

Student attending Fort Hays full time, born and raised in Wichita, Kansas. Looking to progress toward a career in Network Engineering. He/him

Leave a Reply

Your email address will not be published. Required fields are marked *