Abstract

Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that were significantly impacting the operations of Mumias Sugar Company. The researcher used the case study methods where both qualitative and quantitative data was collected by use of questionnaire, interviewing and observation. From the findings the researcher developed data security guidelines for Mumias Sugar Company. The information gained from extensive literature review was tested and observed during the case study.The research revealed that data security lapses in the company was as a result of system administrators’ failure to update and train computer users in the company on how to implement different data security measures that were in place. The final outcome of the research was data security guidelines that were practical enough to be used at Mumias Sugar Company.

Highlights

  • Today, most companies need information systems to prosper and survive for too long

  • It was imperative for Mumias Sugar Company to take the protection of their information resources seriously. (Geer, 2003), Lack of knowledge in the organization is the greatest threats to data security (Mitnick & Simon 2002)

  • The general objective of this research was to establish how the companies‟ data security could be determined by the data security measures that it had put in place and how it required different controls

Read more

Summary

INTRODUCTION

Most companies need information systems to prosper and survive for too long. Data has become a valuable asset to modern organizations. It was imperative for Mumias Sugar Company to take the protection of their information resources seriously. (Geer, 2003), Lack of knowledge in the organization is the greatest threats to data security (Mitnick & Simon 2002). Most people believe that it is impossible to set up a computer system in a network environment and ensure that the system is secured. According to (Connolly, 2000), “the only secure system is one that is completely disconnected from a network and lying off the bottom of the ocean” it is a fact that “data security is an information technology hot issue as long as a computer is networked” (Connolly, 2000)

General Objective
Specific Objectives
Research questions
Purpose of the Study
Conceptual frame work
Literature review
Qualitative and Quantitative Research Methods
Findings
Views on Security Policy
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call