Data Governance & Security: Protecting Business-Critical Information

Authors

  • N V Rama Sai Chalapathi Gupta Lakkimsetty Independent Researcher, USA

DOI:

https://doi.org/10.36676/j.sust.sol.v2.i1.55

Keywords:

Decision-Making, Operational Efficiency, Growing Adoption, E-Government, Leverage Middleware-Based, MDM Systems, Data Protection (DP), Clear Governance

Abstract

The growing dependence of organisations on data for operational efficiency and decision-making has made protecting sensitive data a top issue.  Instead of seeing security as an afterthought, the "Security by Design" approach promotes incorporating security measures into data systems' architecture and design from the beginning.  The integration of security and governance into data systems is examined in this study, with a focus on the function of the governance of data in guaranteeing data protection, privacy, and compliance.  Organisations may reduce the risk of data breaches, unauthorised access, and abuse by implementing clear governance structures that guarantee data security procedures are regularly followed.  Layers of product-specific regulations and standards form the foundation of this structure.  To satisfy a product's needs and meet the cutting-edge specifications of its field, the layers might be combined into a particular set.  The deployment of eGovernment systems, which are often backed by middleware-based integration platforms, is a result of governments' increasing usage of information technology.  Specifically, the necessity for government organisations to exchange information more often has spurred the adoption of provided Master Data Management (MDM) systems.  However, these systems must adhere to data protection laws, which might make it more difficult for the government to reuse a lot of information.  The challenges of implementing Data Protection (DP) laws in e-Government MDM system are discussed in this study.  Specifically, it examines the demands that DP problems place on these systems and suggests ways to enforce these rules while taking into account various MDM architectural styles. These solutions make use of middleware-based capabilities and conventional MDM systems.

References

W. Van Grembergen and S. De Haes. Implementing Information Technology Governance; Models Practices and Cases. Hershey. United States: IGI Publishing. 2008. DOI: https://doi.org/10.4018/978-1-59904-924-3

W. v. Grembergen. Strategies for Information Technology Governance. United States: Idea Group Publishing. 2004. DOI: https://doi.org/10.4018/978-1-59140-140-7

ISACA. Cobit5: for Information Security. ISACA. 2012.

G. Vreede. D. Vogel. G. Kolfschoten and J. Wien. "Fifteen Years of GSS in the Field: A Comparison Across Time and National Boundaries." in Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS’03). 2003. DOI: https://doi.org/10.1109/HICSS.2003.1173646

R. Newby. G. Soutbar and J. Watson. "Group Support System Approach." International Small Business Journal. vol. 21. no. 4. pp. 421- 433. 2003. DOI: https://doi.org/10.1177/02662426030214003

S. Asch. "Effects of group pressure upon the modification and distortion of judgment." In H.Guetzkow (ed.) Groups. leadership and men. vol. Carnegie Press. p. Pittsburgh. 1951.

A. Rutkowski. B. Van de Walle and G. van den Eede. "The effect of Group Support Systems on the Emergence of Unique Information in a Risk Management Process: A Field Study." in Proceedings of the 39th Hawaii International Conference on System Sciences. Hawaii. 2006. DOI: https://doi.org/10.1109/HICSS.2006.459

Yao, L., & Liu, W. (2020). Privacy-preserving governance models for data security in healthcare systems. IEEE Transactions on Industrial Informatics, 16(10), 7012- 7023.

Zhou, X., & Wei, Y. (2018). Integrating security and compliance into enterprise data governance. IEEE Transactions on Data and Knowledge Engineering, 30(9), 1842- 1854.

Choudhary, P., & Sharma, P. (2019). Governance in data security: Challenges and solutions. IEEE Transactions on Cloud Computing, 7(4), 1011- 1023.

Li, J., & Zhang, H. (2020). Implementing data governance in blockchain-based systems for enhanced security. IEEE Transactions on Industrial Informatics, 16(8), 4706- 4718.

Gupta, A., & Rathi, N. (2018). A framework for integrating data security and privacy in data governance. IEEE Access, 6, 30584-30595.

Cheng, W., & Liu, H. (2019). Governance and security integration for scalable data systems: A design approach. IEEE Transactions on Cloud Computing, 8(2), 498- 509.

Feltus, C., Grandry, E. and Fontaine, F.X., 2017. Capability-driven design of business service ecosystem to support risk governance in regulatory ecosystems. Complex Systems Informatics and Modeling Quarterly, (10), pp.75-99. DOI: https://doi.org/10.7250/csimq.2017-10.05

Downloads

Published

21-01-2025

How to Cite

N V Rama Sai Chalapathi Gupta Lakkimsetty. (2025). Data Governance & Security: Protecting Business-Critical Information. Journal of Sustainable Solutions, 2(1), 19–28. https://doi.org/10.36676/j.sust.sol.v2.i1.55

Issue

Section

Original Research Articles

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.