Skip to main content

Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14045))

Included in the following conference series:

  • 802 Accesses

Abstract

Digital transformation has become the trend of enterprise operation in the digital economy era. In this context, data security has become the focus of academic research and industrial circles. This paper aims to develop an enterprise data security capability maturity model in the era of digital transformation. Firstly, systematic literature review (SLR) was used to build up the hierarchical model of enterprise data security, which consists of three first level indicators and twelve second level indicators. Secondly, expert interview was used to develop the capability maturity model of data security with five different maturity levels. In the end, a series of suggestions was put forward to improve enterprise data security, namely: 1) Daily maintenance is required for computer and network security; 2) Physical safety protection to avoid safety accidents caused by environmental factors; 3) Establish a complete monitoring and automatic response mechanism; 4) Enterprise data disaster tolerance measures can systematically ensure security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Litvinenko, V.S.: Digital economy as a factor in the technological development of the mineral sector. Nat. Resour. Res. 29(3), 1521–1541 (2020)

    Article  Google Scholar 

  2. Verhoef, P.C., et al.: Digital transformation: a multidisciplinary reflection and research agenda. J. Bus. Res. 122, 889–901 (2021)

    Article  Google Scholar 

  3. Manita, R., Elommal, N., Baudier, P., Hikkerova, L.: The digital transformation of external audit and its impact on corporate governance. Technol. Forecast. Soc. Chang. 150, 119751 (2020)

    Article  Google Scholar 

  4. Mergel, I., Edelmann, N., Haug, N.: Defining digital transformation: results from expert interviews. Gov. Inf. Q. 36(4), 101385 (2019)

    Article  Google Scholar 

  5. Fenech, R., Baguant, P., Ivanov, D.: The changing role of human resource management in an era of digital transformation. J. Manage. Inf. Decis. Sci. 22(2) (2019)

    Google Scholar 

  6. Piepponen, A., Ritala, P., Keränen, J., Maijanen, P.: Digital transformation of the value proposition: a single case study in the media industry. J. Bus. Res. 150, 311–325 (2022)

    Article  Google Scholar 

  7. Datta, P.: Digital transformation of the Italian public administration: a case study. Commun. Assoc. Inf. Syst. 46(1), 11 (2020)

    Google Scholar 

  8. Thapa, C., Camtepe, S.: Precision health data: requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Med. 129, 104130 (2021)

    Article  Google Scholar 

  9. Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: a survey. IEEE Access 8, 131723–131740 (2020)

    Article  Google Scholar 

  10. Xue, L., Zhang, Q., Zhang, X., Li, C.: Can digital transformation promote green technology innovation? Sustainability 14(12), 7497 (2022)

    Article  Google Scholar 

  11. Xing, F., Peng, G., Wang, J., Li, D.: Critical obstacles affecting adoption of industrial big data solutions in smart factories: an empirical study in China. J. Glob. Inf. Manage. (JGIM) 30(1), 1–21 (2022)

    Article  Google Scholar 

  12. Gao, J., Zhang, W., Guan, T., Feng, Q.: Evolutionary game study on multi-agent collaboration of digital transformation in service-oriented manufacturing value chain. Electron. Commer. Res. 1–22 (2022)

    Google Scholar 

  13. Chapman, R.J.: Exploring the value of risk management for projects: improving capability through the deployment of a maturity model. IEEE Eng. Manage. Rev. 47(1), 126–143 (2019)

    Article  Google Scholar 

  14. Ge, J., Wang, F., Sun, H., Fu, L., Sun, M.: Research on the maturity of big data management capability of intelligent manufacturing enterprise. Syst. Res. Behav. Sci. 37(4), 646–662 (2020)

    Article  Google Scholar 

  15. Wu, J., Ma, Z., Liu, Z., Lei, C.K.: A contingent view of institutional environment, firm capability, and innovation performance of emerging multinational enterprises. Ind. Mark. Manage. 82, 148–157 (2019)

    Article  Google Scholar 

  16. Kim, S., Pérez-Castillo, R., Caballero, I., Lee, D.: Organizational process maturity model for IoT data quality management. J. Ind. Inf. Integr. 26, 100256 (2022)

    Google Scholar 

  17. Xiao, Y., Watson, M.: Guidance on conducting a systematic literature review. J. Plan. Educ. Res. 39(1), 93–112 (2019)

    Article  Google Scholar 

  18. Brereton, P., Kitchenham, B.A., Budgen, D., Turner, M., Khalil, M.: Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Softw. 80(4), 571–583 (2007)

    Article  Google Scholar 

  19. Bogner, A., Menz, W.: The theory-generating expert interview: epistemological interest, forms of knowledge, interaction. In: Interviewing Experts, pp. 43–80. Palgrave Macmillan, London (2009)

    Google Scholar 

  20. Xing, F., Peng, G., Zhang, B., Li, S., Liang, X.: Socio-technical barriers affecting large-scale deployment of AI-enabled wearable medical devices among the ageing population in China. Technol. Forecast. Soc. Chang. 166, 120609 (2021)

    Article  Google Scholar 

  21. Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)

    Article  Google Scholar 

  22. Kong, D., Dong, H., Li, H., Wang, Z., Li, J.: Research on situation analysis technology of network security incidents. In: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, pp. 213–218 (2020)

    Google Scholar 

  23. Xing, F., Peng, G., Liang, Z.: Research on the Application of Blockchain Technology in the Cross-border E-Commerce Supply Chain Domain. In: Streitz, N.A., Konomi, S. (eds.) HCII 2022. LNCS, vol. 13326, pp. 99–109. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-05431-0_7

  24. Fraga-Lamas, P., Fernández-Caramés, T.M.: A review on blockchain technologies for an advanced and cyber-resilient automotive industry. IEEE Access 7, 17578–17598 (2019)

    Article  Google Scholar 

  25. Nabbosa, V., Kaar, C.: Societal and ethical issues of digitalization. In: Proceedings of the 2020 International Conference on Big Data in Management, pp. 118–124 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fei Xing .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, Z., Xing, F., Peng, G. (2023). Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2023. Lecture Notes in Computer Science, vol 14045. Springer, Cham. https://doi.org/10.1007/978-3-031-35822-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35822-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35821-0

  • Online ISBN: 978-3-031-35822-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics