Navigating Security Risks in Large-Scale Data Handling: A Big Data and Mis Perspective

  • Nurtaz Begum Asha et al.
Keywords: Big Data, Data Security, Management Information Systems, Encryption, Role-Based Access Control, Anomaly Detection.

Abstract

The exponential rise of big data has revolutionized sectors like healthcare, finance, and e-commerce while introducing complex security challenges. As organizations increasingly rely on vast datasets for decision-making and innovation, they face heightened risks of data breaches, unauthorized access, and cyberattacks. This study, conducted at the Department of Management Information Systems, Lamar University, Beaumont, TX, USA, from January 2022 to December 2023, investigates these security risks from a Management Information Systems (MIS) perspective, aiming to identify key vulnerabilities and propose effective mitigation strategies. Utilizing a mixed-method approach, the research integrates qualitative interviews with 50 IT professionals and quantitative data from 10 organizations managing large-scale datasets. Data analysis was performed using SPSS version 26, focusing on encryption, role-based access control (RBAC), and real-time anomaly detection. The results revealed that the healthcare sector experienced the highest breach rate at 60%, while e-commerce followed closely at 50%. Encryption proved highly effective, reducing breaches by 45%, and real-time anomaly detection systems reduced breaches by 50%. RBAC minimized insider threats, contributing to a 35% reduction in breaches. Furthermore, adopting data governance frameworks improved regulatory compliance by 45%, with 85% of organizations implementing advanced encryption techniques. This study highlights the necessity of integrating sophisticated security measures, such as encryption, RBAC, and anomaly detection, within MIS frameworks to safeguard sensitive data. A multi-layered security approach is crucial for ensuring data protection and regulatory compliance in today's data-driven landscape.

Author Biography

Nurtaz Begum Asha et al.

Nurtaz Begum Asha1*, Tapos Ranjan Biswas2, Fahmida Yasmin3, Asadul Arifin Shawn4, Shohanur Rahman5

1 Department of Digital and Strategic Marketing MBA, Westcliff University, CA 92614, USA

ORCiD ID:  https://orcid.org/0009-0009-5731-2375, E-mail: asha.nurtaz@gmail.com

2 Department of Business Administration in Information Technology, Texas A&M University Texarkana, Texarkana, TX 75503, USA

ORCiD ID: https://orcid.org/0009-0001-3848-3162, E-mail: taposranjan.biswas@ace.tamut.edu

3 Department of Computer and Information Science, Southern Arkansas University, Magnolia, AR 71753, USA

ORCiD ID: https://orcid.org/0009-0006-6074-2024 , E-mail: famia09@yahoo.com

4 Department of Business Analytics, Texas A&M University Texarkana, Texarkana, TX 75503, USA

ORCiD ID: https://orcid.org/0009-0007-0809-9139 , E-mail: mshawn@leomail.tamuc.edu

5 Department of Business Administration (BBA) in Management, Daffodil International University, Dhaka

ORCiD ID: https://orcid.org/0009-0001-4099-6768 , E-mail: shoumikh64@gmail.com

Published
2024-02-04
Section
Regular Issue