Wilmington Universtity Measures to Prevent Data Breach Discussion

User Generated

fvqvqvnx

Computer Science

Wilmington universtity

Description

The paper must include:

  • A discussion and evaluation of the conflicting results
  • A discussion of the unexpected findings
  • A discussion on how the findings answer your research questions, address the hypotheses or propositions
  • An explanation of the implication of your findings (why they are important and how they affect our understanding of the research problem).

The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain scholarly references. In addition, the paper will be submitted through the Turnitin originality-checking tool.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

Running head: DATA BREACH

Data Breach
Student’s Name
Institutional Affiliation

2

DATA BREACH
Measures to Prevent Data Breach in Identity Theft
Discussion and Evaluation of the Conflicting Results
The conflicting results on the findings were on the fact that its occurrence characterizes
data breach. It is an idea that relates from the data collected within the organizations that have

experienced data breach over recent years. Here, it considers cyber-attack as an issue that occurs
as a result of external factors within the IT departments. Analyzing the patterns of the occurrence
of these breaches make it clear that the running of the organization causes most of these cases. It
also exists depending on the IT departments and how it is managed. The results, in this case, are
conflicting as it focuses on analyzing how data leaks take place by looking at its occurrence. The
conflicting results apply in analyzing the internal factors that threaten the performance of an
organization.
According to the research, it was also evident that cases of data breach have also been on
the rise due to internal factors. The initial finding emphasizes the need to look at the external
factors which are considered responsible for data leaks. The analysis calls for the need to have
firms adapt to measures that can be used to refill the gaps present. This assumption is a
conflicting result that requires organizations to look unto the issue of identity theft with much
emphasis on the overall factors. It is evident that the primary cause of its occurrence cannot only
be determined by working on either the internal and external factors. Data breach in identity theft
acr...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags