Management Challenges in the Implementation of an Email Boundary Control for Data Leakage Prevention

J. Dunn, C. Maple, G. Epiphaniou
{"title":"Management Challenges in the Implementation of an Email Boundary Control for Data Leakage Prevention","authors":"J. Dunn, C. Maple, G. Epiphaniou","doi":"10.1049/icp.2021.2407","DOIUrl":null,"url":null,"abstract":"In a digital economy, more of an organisation's valuable assets are digital, enabling competitive advantage. However, they also represent a threat, illustrated by increasing levels of data leakage. Such leakage via email remains a key concern across organisations and, to combat this, a range of data leakage prevention (DLP) measures exist. One such technology is an email boundary control (or guard). However, even with mature tools there is a gap between availability and adoption, that this paper proposes is due to the management challenges in application, rather than technology. The home working trend, accelerated by the pandemic, has further exacerbated data leakage risks and heightened the need to ensure an organisation's operations remain resilient and enable trust while keeping private data secure. This paper describes work whose methodology combined the results of a literature review with an in-depth practical case study in an industrial company. This was followed by analysis of the management challenges and then proposed steps to address these. The steps require management commitment and subject matter expertise. Finally, this applied research is important to industry to address the gap between technological capability and its application, in order to support the secure sustainment of increasingly digital enterprises.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Advantage in the Digital Economy (CADE 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/icp.2021.2407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In a digital economy, more of an organisation's valuable assets are digital, enabling competitive advantage. However, they also represent a threat, illustrated by increasing levels of data leakage. Such leakage via email remains a key concern across organisations and, to combat this, a range of data leakage prevention (DLP) measures exist. One such technology is an email boundary control (or guard). However, even with mature tools there is a gap between availability and adoption, that this paper proposes is due to the management challenges in application, rather than technology. The home working trend, accelerated by the pandemic, has further exacerbated data leakage risks and heightened the need to ensure an organisation's operations remain resilient and enable trust while keeping private data secure. This paper describes work whose methodology combined the results of a literature review with an in-depth practical case study in an industrial company. This was followed by analysis of the management challenges and then proposed steps to address these. The steps require management commitment and subject matter expertise. Finally, this applied research is important to industry to address the gap between technological capability and its application, in order to support the secure sustainment of increasingly digital enterprises.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
为防止数据泄漏而实施电子邮件边界控制的管理挑战
在数字经济中,企业更多的宝贵资产是数字化的,从而实现竞争优势。然而,它们也代表着一种威胁,数据泄露的水平不断上升就说明了这一点。这种通过电子邮件泄露的数据仍然是各组织关注的一个关键问题,为了解决这个问题,存在一系列数据泄漏预防(DLP)措施。其中一项技术是电子邮件边界控制(或守卫)。然而,即使使用成熟的工具,在可用性和采用之间也存在差距,这篇论文提出的是由于应用程序中的管理挑战,而不是技术挑战。疫情加速了在家办公的趋势,进一步加剧了数据泄露风险,并提高了确保组织运营保持弹性、在确保私人数据安全的同时建立信任的必要性。本文描述的工作,其方法结合了文献综述的结果与深入的实际案例研究在一家工业公司。接下来是对管理挑战的分析,然后提出解决这些挑战的步骤。这些步骤需要管理层的承诺和专业知识。最后,这项应用研究对于解决技术能力与其应用之间的差距,以支持日益数字化的企业的安全维持具有重要意义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Comparative Analysis of LSTM-FCN on Multiple Datasets 5G SECURITY THREATS AFFECTING DIGITAL ECONOMY AND THEIR COUNTERMEASURES PRIVACY PRESERVATION IN DIGITAL ECONOMY PLATFORMS PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR VANETS IN DIGITAL ECONOMY INVESTIGATING THE IMPACT OF UNDERLYING HEALTH CONDITIONS ON PRIVACY CONCERNS OF IOT HEALTHCARE DEVICES
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1