Question
Description of Doctoral Research Study Business Problem The problem statement and the purpose are in alignment. The questions must be designed to analyze both sides
Description of Doctoral Research Study Business Problem
The problem statement and the purpose are in alignment. The questions must be designed to analyze both sides of the issue: the customer and the organization. My research will be geared toward quantitative study focusing on idealized behaviors and idealized attributes, which will expand the research (Walden University, 2016b). Therefore, there is a lack of protection for consumers' information when numerous mobile applications are installed on devices with a lack of data protection and acknowledgment from organizations.
Explanation of the Significance of the Business Problem
Data leakage poses severe threats to organizations that involve reputation damage and financial loss. Also, with the increase in data growth, data breaches are happening more often, and security concerns are a pressing issue for organizations (Cheng et al., 2017). Data breaches can be caused by internal and external information breaches by way of intentional data theft or inside attackers. Some data breaches happen inadvertently, meaning accidental by sensitive (Cheng et al., 2017). The theoretical framework includes content-based and context approaches, such as servers, cloud storage, and network traffic. The statistical analysis involves analyzing the sequences of bytes within documents. Some of the context-based approaches are based on data mining. An abduction approach uses data collection to identify themes and patterns that are in a conceptual framework (Saunders et al., 2019).
An Application of the Significance to Promoting Positive Social Change
Social change involves the improvement of human and social conditions that include individuals, communities, organizations, etc. (Walden University, LLC., 2016c). The focal point of my study is exploring the harm that data breaches cause organizations and consumers. The solutions and recommendations produced from the research will significantly impact data protection for all parties involved.
References:
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions.Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery,7(5), e1211.
Saunders, M. N. K., Lewis, P., & Thornhill, A. (2019).Research methods for business students(8th ed.). Pearson Education Unlimited.
Walden University, LLC. (Producer). (2016c).The purpose statement[Video file]. Walden University Canvas. https://waldenu.instructure.com
Walden University Office of Research and Doctoral Services. (n.d.).DBA capstone studieshttps://academicguides.waldenu.edu/research-center/program-Links to an external site.Links to an external site.
Respond to your colleagues' postings in one or more of the following ways:
- Address a colleague's analysis and evaluation of the topic(s).
- Expand or remark upon a colleague's integration of relevant resources.
- Answer question(s) posed by your colleague(s) for further discussion.
- Link a colleague's posting to other postings or to course materials and concepts, where appropriate and relevant.
- Extend or constructively challenge your colleagues' work.
include a minimum of one appropriately cited scholarly reference.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started