+44 203 318 3300 +61 2 7908 3995 help@nativeassignmenthelp.co.uk

Pages: 13

Words: 3261

How Can Personal and Corporate Data Security Be Ensured While Working from Home?

Get free samples written by our Top-Notch subject experts for taking assignment help services.

1. Introduction -Securing Personal and Corporate Data for Remote Work

Data security mainly refers to the specific process of data protection, where the confidential data will be protected from the access of unauthorized persons or organizations and from data corruption through the entire lifecycle. This data security mainly includes different elements such as hashing, data encryption, tokenization, along with the practices of key management that will help to protect the data from the different platforms and applications. In simple words, data protection helps in the process of protecting the data from unauthorized access that might result in delegation and the corruption of the essential data (Purwanto et al. 2020). Data protection is one of the essential parts of the organization, where helps the organization to protect the organizational data because the loss of this essential and confidential data can be dangerous for the organization. There are different types of data security that help the data security process in the organization, where includes controlling the access, authentication of the data access, data erasure, masking the data, data resiliency, encryption, and others. In this assessment, the main discussion will be on the data security measure of the personal and corporate day in the area of home working, where there will be some sub-points related to that. These sub-points that will support the main discussion are detailing the topic, method for the pilot study, including methodology, study hypothesis, and questionnaire. There will also be a discussion of the feasibility of the study result discussion, and ethics along with the possible ways to enhance the data security measure of the personal and corporate day in the area of home working as a recommendation.

2. Simplicity of the topic

Data protection is one of the most crucial parts of a business because it aids in the security of the company's vital and confidential data. The loss of this information might be terrible for the company. Data security consists primarily of techniques such as hashing, data encryption, tokenization, and key management, all of which aim to protect data from a variety of platforms and apps (Dwivedi, et al. 2020). Simply said, data protection supports the process of protecting data against unauthorized access, which could lead to data theft and corruption. Controlling access, data access authentication, data deletion, data masking, data resiliency, encryption, and other types of data security improve the company's data security process. Throughout its lifecycle, data security refers to the process of securing confidential data from unauthorized persons or organizations, as well as data corruption. According to the research topic, there is the main focus on data security, measurement of personal and corporate data during work from home, because this type of work from home has the great possibility of data hacking. That is the reason there is a need to measure eth data security in the office system in relation to working at home, where the personal and corporate data both are not safe (Politou, et al. 2018). There are several elements of data security where three are main such as confidentiality, availability, and integrity. Element of the data security as confidentiality refers to the security of the data where the data is needed to be accessed by the authorized users along with the proper credentials. Element of the data security integrity refers to the data security ensure where it is associated with the data storage in terms of reliability, accuracy and not subject to changes of unwarranted. Data security mainly refers to the critical element for regulatory compliance (Pasquier, et al. 2018). There are several regulations of data security such as “General Data Protection Regulation (GDPR), California Consumer Protection Act (CCPA), Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX) Payment Card Industry, Data Security Standard (PCI DSS), International Standards Organization (ISO) 27001” and others.

3. Method for the pilot study

In this section, the main discussion will be on the method for the entire pilot study, where there will be three supporting sub-points as the methodology of the research, study hypothesis, and the questionnaire. These different areas are discussed below in detail.

3.1. Methodology

The methodology is one of the main elements of the pilot study, where this section helps to determine the proper methods of the research or the pilot study. In this section of the methodology, the discussion will be based on the research method, data collection method, and data analysis approach. Here in this research, the research method will be followed as a quantitative research method, where it will help the pilot study to be completed successfully in the area of data collection and data analysis (Lallie et al. 2021). In this pilot study, the data collection will follow the primary data collection model, where the data will be collected from primary sources such as through questionnaire surveys. In this pilot study, the data analysis will follow the primary approach where the primary data will be processed with the SPSS software, and the output of the SPSS will be analyzed according to the SPSS statistical table output.

3.2. Study hypothesis

In this section, the main discussion will be on the hypothesis formation that will be related to the research topic. These research hypotheses are discussed below.

H1: There is a strong connection of data security in the working home along with the corporate and personal data.

H0: There is no connection of data security in the working home along with the corporate and personal data.

H2: There is a strong connection of data security in the working home along with the usage of VPN and implementation of reputable software.

H0: There is no connection of data security in the working home along with the usage of VPN and implementation of reputable software.

H3: There is a strong connection of data security in the working home along with the Encrypt the laptops and updating the software and devices.

H0: There is no connection of data security in the working home along with the Encrypt the laptops and updating the software and devices.

H3: There is a strong connection of data security in the working home along with the installation of anti-malware.

H0: There is no connection of data security in the working home along with the installation of anti-malware.

3.3. Questionnaire

The data for this pilot project will be acquired using the primary data collection model, which involves gathering information through primary sources such as questionnaire surveys. The data analysis in this pilot project will use the primary approach, in which the primary data will be processed using the SPSS program, and the SPSS output will be examined using the SPSS statistical table output (Belzunegui-Eraso and Erro-Garcés, 2020). This questionnaire will include 10 questions, where the first two questions are related to the demographic identity of the respondent and the remaining eight questions are related to the topic of the pilot study. The questionnaire will be surveyed among the employees of the organizations of the UK those have provided work from home facilities during the pandemic. The employees during work from home option will determine how much their information as well as the company information is secured. 

4. Feasibility of the study

In this specific section, the main discussion will be based on the feasibility of the study, where the usefulness or the advantages will be discussed. This pilot study will help the organization to know the risk factors of the working home in relation to the data security of corporate and personal data. Through this pilot study, the organization will be able to measure the data security of the personal and corporate data during the working home. This study will also help to identify the different factors of the organization that can help them to manage their data security through Usage of the VPN, Implementation of reputable software, Encrypt the laptops, Offer basic training for the security, Update the software and devices, and others (Thompson, et al. 2017). This study will also help to understand the essentiality of data protection for organizational benefit, where the essentiality of updating the software and devices along with the installation of anti-malware will be useful.

5. Result discussion

In this section, the main focus will be on the result analysis of the SPSS statistics that has the outcome of the SPSS analysis of primary data.

Descriptives

N

Mean

Std. Deviation

Std. Error

95% Confidence Interval for Mean

Minimum

Maximum

Lower Bound

Upper Bound

majorsteps

Limiting the usage of personal devices

26

1.38

.496

.097

1.18

1.59

1

2

Consult with the expert

25

2.68

.476

.095

2.48

2.88

2

3

Total

51

2.02

.812

.114

1.79

2.25

1

3

softwereUpdate

Limiting the usage of personal devices

26

1.23

.430

.084

1.06

1.40

1

2

Consult with the expert

25

3.84

1.143

.229

3.37

4.31

2

5

Total

51

2.51

1.567

.219

2.07

2.95

1

5

encyption

Limiting the usage of personal devices

26

1.42

.504

.099

1.22

1.63

1

2

Consult with the expert

25

3.76

1.165

.233

3.28

4.24

2

5

Total

51

2.57

1.473

.206

2.15

2.98

1

5

usefulness

Limiting the usage of personal devices

26

1.00

.000

.000

1.00

1.00

1

1

Consult with the expert

25

2.72

.542

.108

2.50

2.94

1

3

Total

51

1.84

.946

.132

1.58

2.11

1

3

Table 1: One way Descriptive

In the above statistical table of the One way Descriptive, the focus is on measuring the data security of the personal and corporate data during the working home. In this statistical table, there are different factors that are related to one another. They are major steps, software update, encryption, and usefulness. Here the factor of major steps refers to the different major steps to ensure the data protection in the organizational sector especially when working at home is being implemented. This factor has three different major steps such as quarantining the sensitive data, preparing for cyber threats and deleting the unused data (Hoofnagle, et al. 2019). Here the factor of software update refers to the essentiality of the software update in the system of the organization, where this will help the organization to be updated and enhance the data security. Here the factor of encryption refers to the laptop encryption to ensure the corporate and personal data. Here the factor of usefulness refers to the VPN usage that is useful for data protection.

In this statistical table for the factor of the major steps, the mean value is 2.02, the value of the standard deviation is .812, the value of the standard error is .114, and lower value of 1.79, upper value of 2.25, where the minimum value is 1, and the maximum value is 3. In this statistical table for the factor of the software update, the mean value is 2.51, the value of the standard deviation is 1.567, the value of the standard error is .219, lower value of 2.07, upper value of 2.95, where the minimum value is 1, and the maximum value is 5 (Vanderbruggen, et al. 2020). In this statistical table for the factor of the encryption, the mean value is 2.57, the value of the standard deviation is 1.743, the value of the standard error is .206, and lower value of 2.15, upper value of 2.98, where the minimum value is 1, and the maximum value is 5. In this statistical table for the factor of the usefulness, the mean value is 1.84, the value of the standard deviation is .946, the value of the standard error is .132, and lower value of 1.58, upper value of 2.11, where the minimum value is 1, and the maximum value is 3. After analyzing this table it can be said that according to the response of the respondent there is a major role of these different factors. The term measures refer to the several main actions taken to secure data protection in the organizational sector, particularly when working from home. There are three primary processes in this factor: quarantine sensitive data, prepare for cyber risks and erase unused data. The factor of software update here refers to the importance of software updates in an organization's system, which will assist the organization stay current and improving data security (Xu, et al. 2018). The encryption aspect here refers to laptop encryption to protect both corporate and personal data. The factor of usefulness here refers to the use of a VPN for data protection.

Correlations
Control Variables usefulness factors encyption improvement support
-none-a usefulness Correlation 1.000 .926 .898 .901 .877
Significance (2-tailed) . .000 .000 .000 .000
df 0 49 49 49 49
factors Correlation .926 1.000 .947 .962 .853
Significance (2-tailed) .000 . .000 .000 .000
df 49 0 49 49 49
encyption Correlation .898 .947 1.000 .947 .934
Significance (2-tailed) .000 .000 . .000 .000
df 49 49 0 49 49
improvement Correlation .901 .962 .947 1.000 .865
Significance (2-tailed) .000 .000 .000 . .000
df 49 49 49 0 49
support Correlation .877 .853 .934 .865 1.000
Significance (2-tailed) .000 .000 .000 .000 .
df 49 49 49 49 0
support usefulness Correlation 1.000 .709 .456 .592
Significance (2-tailed) . .000 .001 .000
df 0 48 48 48
factors Correlation .709 1.000 .807 .855
Significance (2-tailed) .000 . .000 .000
df 48 0 48 48
encyption Correlation .456 .807 1.000 .779
Significance (2-tailed) .001 .000 . .000
df 48 48 0 48
improvement Correlation .592 .855 .779 1.000
Significance (2-tailed) .000 .000 .000 .
df 48 48 48 0
a. Cells contain zero-order (Pearson) correlations.

Table 1: Partial correlation

In the above statistical table of the partial correlation, the focus is on measuring the data security of the personal and corporate data during the working home, where there are different factors that are related to one another. These different factors are usefulness, factors, encryption, improvement, support (Smith, et al. 2018). Here the factor of usefulness refers to the VPN usage that is useful for data protection, and the factor of factors refers to the different factors such as usage of the VPN, Implementation of the reputable software, Encrypt the laptops, Offer basic training for the security, Update the software and devices. Here the factor of encryption refers to the laptop encryption to ensure the corporate and personal data. Here the factor of improvement refers to the installation of the anti-malware where through these steps the organization will be able to protect the organizational data during the working home. Here the factor of support refers to the fact that the organization supports to protect the data of the organization, where the organization will be able to protect the data of the individual and the corporate in relation to the working home. For the factor of usefulness, the correlation value of the usefulness along with the other different factors is 1.000. For the factor of factors, the correlation value of the factors along with the other different factors is .926. For the factor of encryption, the correlation value of the encryption along with the other different factors is .898. For the factor of improvement, the correlation value of the improvement along with the other different factors is .901, and for the factor of support, the correlation value of the support along with the other different factors is .877 (Schwartz and Peifer, 2017). After analyzing this statistical table it can be said that usefulness, factors, encryption, improvement, support are related to each other, where they are mainly related to the fact that in a working home there is a huge chance of data loss or data hacking, that is the reason there is a need to protect the data.

6. Ethics

In this section, the main discussion will be based on the ethics of the pilot study, where the research ethics will deal with the ethical consideration of the pilot study. The data analysis in this pilot project will use the primary approach, in which the primary data will be processed using the SPSS program, and the SPSS output will be examined using the SPSS statistical table output. This questionnaire will include 10 questions, where the first two questions are related to the demographic identity of the respondent and the remaining eight questions are related to the topic of the pilot study (Gordon, et al. 2020). In this pilot study, the ethical consideration has been maintained through maintaining the privacy of the respondent, where their identity will be confidential.

7. Conclusion

After discussion of the above sections, it can be said that data security mostly consists of aspects such as hashing, data encryption, tokenization, and key management techniques, all of which serve to secure data from various platforms and apps. In simple terms, data protection aids in the process of safeguarding data against illegal access, which could lead to data delegation and corruption. Data protection is the most important aspect of an organization, as it aids in the security of the business's data, which is vital and secret. Loss of this data can be disastrous for the organization (Morrow and Fitzpatrick, 2020). Controlling access, authentication of data access, data erasure, masking data, data resiliency, encryption, and other types of data security enhance the data security process in the company. With certain sub-points on that, the main focus of this assessment was on personal and business data security measures in the sphere of home working. Some of the sub-points that supported the major debate include a description of the theme, a technique for the pilot study, including methodology, study hypothesis, and a questionnaire (Cereola and Dynowska, 2019). As a suggestion, there was a discussion of the study's practicality, ethics, and potential approaches to strengthen personal and corporate data security measures in the area of home working. Limitation and appropriateness of the method are also discussed, where the main limitation of this pilot study is the lack of proper information because there is no proper solution for data protection. The appropriateness of this pilot study is to identify the different factors of the organization that can help them to manage their data security through Usage of the VPN, Implementation of reputable software, Encrypt the laptops, Offering basic training for security, Update the software and devices and others.

Reference list

Journal

Annathurai, A., 2019. Corporate Governance Analysis on Risk Exposure and Performance of AIA Bhd. Available at SSRN 3494806.

Belzunegui-Eraso, A. and Erro-Garcés, A., 2020. Teleworking in the Context of the Covid-19 Crisis. Sustainability12(9), p.3662.

Cereola, S.J. and Dynowska, J., 2019. Investigating the impact of publicly announced information security breaches on corporate risk factor disclosure tendencies. Journal of Cybersecurity Education, Research and Practice2019(2), p.3.

Dwivedi, Y.K., Hughes, D.L., Coombs, C., Constantiou, I., Duan, Y., Edwards, J.S., Gupta, B., Lal, B., Misra, S., Prashant, P. and Raman, R., 2020. Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life. International Journal of Information Management55, p.102211.

Gordon, A.L., Goodman, C., Achterberg, W., Barker, R.O., Burns, E., Hanratty, B., Martin, F.C., Meyer, J., O’Neill, D., Schols, J. and Spilsbury, K., 2020. Commentary: COVID in care homes—challenges and dilemmas in healthcare delivery. Age and ageing49(5), pp.701-705.

Hoofnagle, C.J., van der Sloot, B. and Borgesius, F.Z., 2019. The European Union general data protection regulation: what it is and what it means. Information & Communications Technology Law28(1), pp.65-98.

Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C. and Bellekens, X., 2021. Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security105, p.102248.

Morrow, P.J. and Fitzpatrick, T.M., 2020. US and International Legal Perspectives Affecting Cybersecurity Corporate Governance. International Relations8(06), pp.231-239.

Pasquier, T., Singh, J., Powles, J., Eyers, D., Seltzer, M. and Bacon, J., 2018. Data provenance to audit compliance with privacy policy in the Internet of Things. Personal and Ubiquitous Computing22(2), pp.333-344.

Politou, E., Alepis, E. and Patsakis, C., 2018. Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. Journal of Cybersecurity4(1), p.tyy001.

Purwanto, A., Asbari, M., Fahlevi, M., Mufid, A., Agistiawati, E., Cahyono, Y. and Suryani, P., 2020. Impact of work from home (WFH) on Indonesian teachers performance during the Covid-19 pandemic: An exploratory study. International Journal of Advanced Science and Technology29(5), pp.6235-6244.

Schwartz, P.M. and Peifer, K.N., 2017. Transatlantic Data Privacy Law. Geo. LJ106, p.115.

Smith, T.D., Hughes, K., DeJoy, D.M. and Dyal, M.A., 2018. Assessment of relationships between work stress, work-family conflict, burnout and firefighter safety behavior outcomes. Safety science103, pp.287-292.

Thompson, N., McGill, T.J. and Wang, X., 2017. “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security70, pp.376-391.

Tomic, D. and Saljic, E., 2019. The Social Significance of Corporate Security. In Smart Technologies and Innovation for a Sustainable Future (pp. 413-420). Springer, Cham.

Vanderbruggen, N., Matthys, F., Van Laere, S., Zeeuws, D., Santermans, L., Van den Ameele, S. and Crunelle, C.L., 2020. Self-reported alcohol, tobacco, and cannabis use during COVID-19 lockdown measures: results from a web-based survey. European addiction research26(6), pp.309-315.

Xu, M., David, J.M. and Kim, S.H., 2018. The fourth industrial revolution: Opportunities and challenges. International journal of financial research9(2), pp.90-95.

Zeng, W. and Koutny, M., 2019. Modelling and analysis of corporate efficiency and productivity loss associated with enterprise information security technologies. Journal of Information Security and Applications49, p.102385.

Recently Downloaded Answers by Customers
Our Exceptional Advantages
Complete your order here
54000+ Project Delivered
Get best price for your work

Ph.D. Writers For Best Assistance

Plagiarism Free

No AI Generated Content

offer valid for limited time only*