Integrating Cybersecurity into Data Management: A Unified Framework for Office Data Security

Article Sidebar

Main Article Content

Ifeyinwa Nkemdilim Obiokafor
Blessing Nwamaka Iduh

The accelerated rate of digitization within the context of the office environment has seen organizational dependence on digital information systems escalate concurrently with an increased threat profile for cybersecurity breaches. This current study seeks to investigate the integration of active cybersecurity controls within the context of organizational data management to improve the security posture for data confidentiality, integrity, and availability. To this end, a mixed-methods research design was utilized to investigate this problem, incorporating a systematic review of existing literature and a quantitative survey of 150 mid- to large-scale organizations. The results highlight a significant disparity between the implementation of individual cybersecurity tools and the development of an overarching cybersecurity framework. The results demonstrate that organizations that implement an integrated data management system, incorporating end-to-end encryption, multi-factor authentication, rigorous administrative controls, cybersecurity training for staff, and effective data governance practices, are significantly less likely to experience data breaches when compared to organizations that implement a disjointed approach to cybersecurity. Additionally, this study recognizes organizational security awareness culture as a key influencer on cybersecurity posture, as employee awareness has a direct influence on the efficacy of cybersecurity controls and the mitigation of cybersecurity threats. As such, this study proposes a Unified Office Data Security Management (ODSM) framework that incorporates a holistic approach to cybersecurity controls to protect organizational data. The proposed framework provides a guide for organizations to improve cybersecurity governance, organizational resilience, and sustainability.

Integrating Cybersecurity into Data Management: A Unified Framework for Office Data Security. (2026). International Journal of Latest Technology in Engineering Management & Applied Science, 15(2), 1778-1788. https://doi.org/10.51583/IJLTEMAS.2026.15020000151

Downloads

References

Abraham, R., Schneider, J., & vom Brocke, J. (2019). Data governance: A conceptual framework, structured review, and research agenda. International Journal of Information Management, 49(C), 424–438.

Brandao, P. R. (2025). Cyber Threat Intelligence with Symmetry for Zero-Trust Security. Computer Science and Mathematics. https://doi.org/10.20944/preprints202508.0059.v1

Creswell, J. W., & Clark, V. L. P. (2018). Qualitative inquiry and research design (Fourth edition). SAGE.

He, M., & Chen, Y. (2025). Personal data protection in China: Progress, challenges and prospects in the age of big data and AI. Telecommunications Policy, 49(10), 103076. https://doi.org/10.1016/j.telpol.2025.103076

Marquis, Y. A. (2024). From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts. Journal of Engineering Research and Reports, 26(5), 138–154. https://doi.org/10.9734/jerr/2024/v26i51141

Mehra, T. (2024). The Critical Role of Role-Based Access Control (RBAC) in securing backup, recovery, and storage systems. International Journal of Science and Research Archive, 13(1), 1192–1194. https://doi.org/10.30574/ijsra.2024.13.1.1733

Merlo, T. R., Fard, F., & Hawamdeh, S. (2025). Cloud Computing’s Impact on the Digital Transformation of the Enterprise: A Mixed-Methods Approach. Sustainability, 17(13), 5755. https://doi.org/10.3390/su17135755

Obiokafor, I. N. (2023). Approaches to a secure, sustainable, and diversified Nigerian economy in a cashless society. World Journal of Advanced Research and Reviews, 20(2), Article 2. https://doi.org/10.30574/wjarr.2023.20.2.2266

Obiokafor, I. N., Ajonuma, M. E., & Aguboshim, F. C. (2025). Integrating Privacy by Design (PbD) in the system development life cycle for enhanced data protection. World Journal of Advanced Research and Reviews, 26(1), 1233–1240. https://doi.org/10.30574/wjarr.2025.26.1.0538

Obiokafor, I. N., & Mbonu, O. (2025). The intersection of digital policy and cybersecurity: Implications for sustainable development. World Journal of Advanced Engineering Technology and Sciences, 14(3), 077–085. https://doi.org/10.30574/wjaets.2025.14.3.0094

Oluremi, D., Vallabhaneni, R., Lallie, H., & Guglielmo, M. C. (2025). Abstract on Human Factors in Cybersecurity: Social Engineering and Insider Threats.

Pool, J., Akhlaghpour, S., Fatehi, F., & Burton-Jones, A. (2024). A systematic analysis of failures in protecting personal health data: A scoping review. International Journal of Information Management, 74, 102719. https://doi.org/10.1016/j.ijinfomgt.2023.102719

Puhakainen, P., & Siponen, M. (2021). Improving Employees’ Compliance Through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34(4), 757-778.

Rabzelj, M., & Sedlar, U. (2025). Beyond the Leak: Analyzing the Real-World Exploitation of Stolen Credentials Using Honeypots. Sensors, 25(12), 3676. https://doi.org/10.3390/s25123676

Schmitt, M. (2023). Securing the digital world: Protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection. Journal of Industrial Information Integration, 36, 100520. https://doi.org/10.1016/j.jii.2023.100520

Sonar, O., Anvekar, N., & Hebbalkar, S. (2025). Phishing and Social Engineering: Analyzing Human Vulnerability. 8(4).

Vararean-Cochisa, D., & Crisan, E.-L. (2025). The digital transformation of the construction industry: A review. IIM Ranchi Journal of Management Studies, 4(1), 3–16. https://doi.org/10.1108/IRJMS-04-2024-0035

Verma, S. (2025). Cybersecurity compliance in the age of remote work: Challenges and solutions. World Journal of Advanced Engineering Technology and Sciences, 15(1), 1112–1120. https://doi.org/10.30574/wjaets.2025.15.1.0286

Webster, J., & Watson, R. T. (2002). Analyzing The Past to Prepare For The Future: Writing A Literature Review. 26(2), xiii–xxiii.

Yee, C. K., & Zolkipli, M. F. (2021). Review on Confidentiality, Integrity and Availability in Information Security. Journal of ICT in Education, 8(2), 34–42. https://doi.org/10.37134/jictie.vol8.2.4.2021

Obiokafor, I. N., Onwuka, U. P., Okoye, O. M., & Ameke, B. C. (2025). Strategies for data protection and privacy in administrative information systems. ANSPOLY Journal of Advanced Research in Science & Technology (AJARST), 2(2), 66–77

Article Details

How to Cite

Integrating Cybersecurity into Data Management: A Unified Framework for Office Data Security. (2026). International Journal of Latest Technology in Engineering Management & Applied Science, 15(2), 1778-1788. https://doi.org/10.51583/IJLTEMAS.2026.15020000151