Success Factors for Data Protection in Services and Support Roles: Combining Traditional Interviews with Delphi Method

Success Factors for Data Protection in Services and Support Roles: Combining Traditional Interviews with Delphi Method

Pedro Ruivo, Vitor Santos, Tiago Oliveira
DOI: 10.4018/IJHCITP.2015070104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The transformation of today's information and communications technology (ICT) firms requires the services and support organizations to think differently about customers data protection. Data protection represents one of the security and privacy areas considered to be the next “blue ocean” in leveraging the creation of business opportunities. Based in contemporary literature, the authors conducted a two phases' qualitative methodology - the expert's interviews and Delphi method to identify and rank 12 factors on which service and support professionals should follow in their daily tasks to ensure customer data protection: 1) Data classification, 2) Encryption, 3) Password protection, 4) Approved tools, 5) Access controls, 6) How many access data, 7) Testing data, 8) Geographic rules, 9) Data retention, 10) Data minimization, 11) Escalating issues, and 12) Readiness and training. This paper contribute to the growing body of knowledge of data protection filed. The authors provide directions for future work for practitioners and researchers.
Article Preview
Top

Introduction

Businesses and organizations are creating and using data at unprecedented rates. With this boom in data comes challenges and problems in data protection. Customers expect their data to be protected and not used in a manner inconsistent. The protection of their data is paramount to customers, and they evaluate information and communications technology (ICTs) firms in part on how well they handle and protect it from being stolen or used improperly. In many industries customers are specifically mandated to evaluate how ICTs firms protects their data. When customers create an account with ICTs firms, or use their services, they expect that a set of specific rules around how ICTs are used to manage their information (Cruz-Cunha & Portela, 2015). Previously, enterprises emphasized perimeter security over things like endpoint protection and data-centric security. If from one side the ever-expanding security and privacy perimeters make it necessary for companies to find data protection processes that secure data from both internal and external threats, placing the focus on sensitive data as it travels within and outside of enterprise networks. On the other side, the ever-changing landscape of data protection is not resulting in knowledge sharing and thoughts. With the sheer quantity of information and resources on data protection available today, it can be difficult to sort through it to find the most trusted and experienced sources that provide accurate insights and educated perspectives on relevant data protection challenges facing modern enterprises. In particular, the literature is lacking on methodological grounded knowledge about how ICT professionals should follow in order to ensure data protection. This is becoming critical as more and more ICT firms are evolving from a purely focus on software and communications to services providers, customer’s data protection is critical factors in winning customer trust (Bélanger & Crossler, 2011; Pavlou, 2011; Slyke, Shim, Johnson, & Jiang, 2006; Stantcheva & Stantchev, 2014).

Reputable ICTs firms such as Microsoft, SAP, Portugal Telecom, ONI-Communications and Vodafone among others, have built a strong foundation of privacy and security practices (OECD, 2012). The past decade has brought immense changes in technology, requiring ICTs firms to continually evolve and reaffirm their commitment to trustworthy computing regardless if inshore, nearshore or offshore service and support models (Casado-Lumbreras, Colomo-Palacios, Ogwueleka, & Misra, 2014; Colomo-Palacios, Casado-Lumbreras, Soto-Acosta, Misra, & García-Peñalvo, 2012; Leeney, Varajão, Trigo Ribeiro & Colomo-Palacios, 2011). Hence is a must to continue to meet customer’s data protection demands to meet regulations, customer expectations, and consumer perceptions (Hong & Thong, 2013; Pavlou, 2011). Instead of broadly study privacy or security situations handled by professionals this research paper focuses on the data protection field from the outlook of good practice in the management of IT human capital, filling a gap in the literature (Pavlou, 2011). Motivated by these issues, this study seeks to answer to the following research question:

  • RQ: What are the critical factors and their importance on which ICTs professionals in support and services roles should follow in their daily tasks in order to ensure customer’s data protection?

To answer this question we developed and implemented a two phase’s research: we commenced with the traditional questionnaires interview methodology with 17 experts in order to identify the factors, and then the Delphi method with 20 experts in order to obtain the ranking and consensus on the factors. The theoretical background is presented in the next section. Then we introduce the combined methodologies. After we present the results and analysis. Then the paper concludes with the main findings, including implications, limitations and future research opportunities.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing