Abstract
Digital transformation has become the trend of enterprise operation in the digital economy era. In this context, data security has become the focus of academic research and industrial circles. This paper aims to develop an enterprise data security capability maturity model in the era of digital transformation. Firstly, systematic literature review (SLR) was used to build up the hierarchical model of enterprise data security, which consists of three first level indicators and twelve second level indicators. Secondly, expert interview was used to develop the capability maturity model of data security with five different maturity levels. In the end, a series of suggestions was put forward to improve enterprise data security, namely: 1) Daily maintenance is required for computer and network security; 2) Physical safety protection to avoid safety accidents caused by environmental factors; 3) Establish a complete monitoring and automatic response mechanism; 4) Enterprise data disaster tolerance measures can systematically ensure security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Litvinenko, V.S.: Digital economy as a factor in the technological development of the mineral sector. Nat. Resour. Res. 29(3), 1521–1541 (2020)
Verhoef, P.C., et al.: Digital transformation: a multidisciplinary reflection and research agenda. J. Bus. Res. 122, 889–901 (2021)
Manita, R., Elommal, N., Baudier, P., Hikkerova, L.: The digital transformation of external audit and its impact on corporate governance. Technol. Forecast. Soc. Chang. 150, 119751 (2020)
Mergel, I., Edelmann, N., Haug, N.: Defining digital transformation: results from expert interviews. Gov. Inf. Q. 36(4), 101385 (2019)
Fenech, R., Baguant, P., Ivanov, D.: The changing role of human resource management in an era of digital transformation. J. Manage. Inf. Decis. Sci. 22(2) (2019)
Piepponen, A., Ritala, P., Keränen, J., Maijanen, P.: Digital transformation of the value proposition: a single case study in the media industry. J. Bus. Res. 150, 311–325 (2022)
Datta, P.: Digital transformation of the Italian public administration: a case study. Commun. Assoc. Inf. Syst. 46(1), 11 (2020)
Thapa, C., Camtepe, S.: Precision health data: requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Med. 129, 104130 (2021)
Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: a survey. IEEE Access 8, 131723–131740 (2020)
Xue, L., Zhang, Q., Zhang, X., Li, C.: Can digital transformation promote green technology innovation? Sustainability 14(12), 7497 (2022)
Xing, F., Peng, G., Wang, J., Li, D.: Critical obstacles affecting adoption of industrial big data solutions in smart factories: an empirical study in China. J. Glob. Inf. Manage. (JGIM) 30(1), 1–21 (2022)
Gao, J., Zhang, W., Guan, T., Feng, Q.: Evolutionary game study on multi-agent collaboration of digital transformation in service-oriented manufacturing value chain. Electron. Commer. Res. 1–22 (2022)
Chapman, R.J.: Exploring the value of risk management for projects: improving capability through the deployment of a maturity model. IEEE Eng. Manage. Rev. 47(1), 126–143 (2019)
Ge, J., Wang, F., Sun, H., Fu, L., Sun, M.: Research on the maturity of big data management capability of intelligent manufacturing enterprise. Syst. Res. Behav. Sci. 37(4), 646–662 (2020)
Wu, J., Ma, Z., Liu, Z., Lei, C.K.: A contingent view of institutional environment, firm capability, and innovation performance of emerging multinational enterprises. Ind. Mark. Manage. 82, 148–157 (2019)
Kim, S., Pérez-Castillo, R., Caballero, I., Lee, D.: Organizational process maturity model for IoT data quality management. J. Ind. Inf. Integr. 26, 100256 (2022)
Xiao, Y., Watson, M.: Guidance on conducting a systematic literature review. J. Plan. Educ. Res. 39(1), 93–112 (2019)
Brereton, P., Kitchenham, B.A., Budgen, D., Turner, M., Khalil, M.: Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Softw. 80(4), 571–583 (2007)
Bogner, A., Menz, W.: The theory-generating expert interview: epistemological interest, forms of knowledge, interaction. In: Interviewing Experts, pp. 43–80. Palgrave Macmillan, London (2009)
Xing, F., Peng, G., Zhang, B., Li, S., Liang, X.: Socio-technical barriers affecting large-scale deployment of AI-enabled wearable medical devices among the ageing population in China. Technol. Forecast. Soc. Chang. 166, 120609 (2021)
Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)
Kong, D., Dong, H., Li, H., Wang, Z., Li, J.: Research on situation analysis technology of network security incidents. In: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, pp. 213–218 (2020)
Xing, F., Peng, G., Liang, Z.: Research on the Application of Blockchain Technology in the Cross-border E-Commerce Supply Chain Domain. In: Streitz, N.A., Konomi, S. (eds.) HCII 2022. LNCS, vol. 13326, pp. 99–109. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-05431-0_7
Fraga-Lamas, P., Fernández-Caramés, T.M.: A review on blockchain technologies for an advanced and cyber-resilient automotive industry. IEEE Access 7, 17578–17598 (2019)
Nabbosa, V., Kaar, C.: Societal and ethical issues of digitalization. In: Proceedings of the 2020 International Conference on Big Data in Management, pp. 118–124 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Gao, Z., Xing, F., Peng, G. (2023). Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2023. Lecture Notes in Computer Science, vol 14045. Springer, Cham. https://doi.org/10.1007/978-3-031-35822-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-35822-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35821-0
Online ISBN: 978-3-031-35822-7
eBook Packages: Computer ScienceComputer Science (R0)