
www.rsisinternational.org
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue II, February 2026
disruption, remain important considerations, along with the parallel move towards the negative consequences
of reputation that may impact the organization’s clients [12]. Therefore, the contemporary move towards the
management of the organization’s office space must now address the issue of the management of the
organization’s data in an environment that is complex, sophisticated, and adversarial.
Despite the increased recognition of the threats, there is a significant gap between having the tools to
effectively deal with the threats and having a comprehensive organization-wide strategy that integrates
cybersecurity into the data management lifecycle effectively. Many organizations invest heavily in the best
available technology, including firewalls and intrusion detection systems, but tend to underestimate the
significance of the human factor and the role of administrative policy [10], [11]. This is because the human
factor is the least predictable and most commonly exploited threat surface.
As a result, the need to bridge this gap is the driving force behind this research. The main aim of this paper is
to examine and articulate a framework for the integration of robust cybersecurity tools into the core of office
data management practices. The research seeks to move beyond the singular focus of cybersecurity tools and
delve into the synergy between cybersecurity tools, administrative policy, and organizational culture.
The paper is organized as follows: the introduction is followed by Section II, which is a detailed literature
review of existing cybersecurity models, their suitability and how it relates to the management of data. Section
III outlines the mixed-methods approach used in the study, followed by Section IV, which outlines the results
and examines the correlation between the integrated security frameworks and the reduction of data breach
incidents. Sections V to VII discuss the implications of the study, the proposed ODSM model, and the
conclusion, respectively.
LITERATURE REVIEW
This section is a comprehensive literature review of all relevant literature related to the subject of cybersecurity
in office data management. The literature is categorized under three main themes, namely, the changing cyber
threat landscape for office data, the traditional triad of technical, administrative, and physical controls, and
the identified gap with regards to integrated frameworks and human factors.
The Evolving Cyber Threat Landscape for Office Data
The digitalization of office work has significantly altered the threat landscape for office data. Initial research
focused on defense strategies against external threats such as computer viruses and worms [15], [21]. Current
research, however, reveals a shift towards a more targeted and insider form of cyber threats. Phishing and
social engineering attacks have been identified as the main entry points for data breaches, indicating a targeted
exploitation of the office worker’s inherent nature of trusting their colleagues and the organization, as well as
their lack of awareness with regards to cybersecurity best practices [8], [9], [16]. Studies by [2] consistently
show that over 80% of all data breaches have a human element, highlighting the office worker’s workstation
as a key front in office data defense. Additionally, the increasing popularity of cloud services and remote work
has eliminated the traditional network boundary, creating new and complex challenges with regards to data
sovereignty, as well as the security of office data accessed via unsecured networks by remote office workers
[18]. Ransomware, once a generic threat, has evolved into a targeted and disruptive threat, wherein essential
data management systems are compromised, thereby impacting an organization’s integrity and ability to
conduct business as usual [1], [7].
Foundational Cybersecurity Measures: The Triad of Technical, Administrative, and Physical Controls
Literature reviews that there are three main types of cybersecurity measures:
Technical Controls: This refers to the technological mechanisms put in place to ensure the security of the
data. There is substantial research evidence proving the efficacy of various forms of technical security
mechanisms. For instance, data encryption, both at rest and in transit, is deemed a hard requirement for