Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Walden Dissertations and Doctoral Studies

Computer Sciences

Data breaches

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Business

Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa Jan 2020

Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa

Walden Dissertations and Doctoral Studies

Leaders in the U.S. hospitality industry experience significant losses in profitability, increased mitigation cost, and reduced revenues because of business and consumer identity theft. Grounded in the fraud triangle theory and the fraud diamond theory, the purpose of this qualitative multiple-case study was to explore strategies leaders in the hospitality industry use to mitigate identity theft. A purposeful sample of 5 leaders of 5 different hospitality businesses in Montana participated in the study. Data were collected through semistructured interviews, member checking, and a review of company documents. During data analysis using Yin’s 5-step process, 3 key themes emerged: a new …


Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa Jan 2020

Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa

Walden Dissertations and Doctoral Studies

Leaders in the U.S. hospitality industry experience significant losses in profitability, increased mitigation cost, and reduced revenues because of business and consumer identity theft. Grounded in the fraud triangle theory and the fraud diamond theory, the purpose of this qualitative multiple-case study was to explore strategies leaders in the hospitality industry use to mitigate identity theft. A purposeful sample of 5 leaders of 5 different hospitality businesses in Montana participated in the study. Data were collected through semistructured interviews, member checking, and a review of company documents. During data analysis using Yin’s 5-step process, 3 key themes emerged: a new …


Best Practices To Minimize Data Security Breaches For Increased Business Performance, Fedinand Jaiventume Kongnso Jan 2015

Best Practices To Minimize Data Security Breaches For Increased Business Performance, Fedinand Jaiventume Kongnso

Walden Dissertations and Doctoral Studies

In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased business performance. Systems theory served as the conceptual framework for this study. Fourteen participants were interviewed, including …