Integrating Cybersecurity into Data Management: A Unified Framework for Office Data Security
Article Sidebar
Main Article Content
The accelerated rate of digitization within the context of the office environment has seen organizational dependence on digital information systems escalate concurrently with an increased threat profile for cybersecurity breaches. This current study seeks to investigate the integration of active cybersecurity controls within the context of organizational data management to improve the security posture for data confidentiality, integrity, and availability. To this end, a mixed-methods research design was utilized to investigate this problem, incorporating a systematic review of existing literature and a quantitative survey of 150 mid- to large-scale organizations. The results highlight a significant disparity between the implementation of individual cybersecurity tools and the development of an overarching cybersecurity framework. The results demonstrate that organizations that implement an integrated data management system, incorporating end-to-end encryption, multi-factor authentication, rigorous administrative controls, cybersecurity training for staff, and effective data governance practices, are significantly less likely to experience data breaches when compared to organizations that implement a disjointed approach to cybersecurity. Additionally, this study recognizes organizational security awareness culture as a key influencer on cybersecurity posture, as employee awareness has a direct influence on the efficacy of cybersecurity controls and the mitigation of cybersecurity threats. As such, this study proposes a Unified Office Data Security Management (ODSM) framework that incorporates a holistic approach to cybersecurity controls to protect organizational data. The proposed framework provides a guide for organizations to improve cybersecurity governance, organizational resilience, and sustainability.
Downloads
References
Abraham, R., Schneider, J., & vom Brocke, J. (2019). Data governance: A conceptual framework, structured review, and research agenda. International Journal of Information Management, 49(C), 424–438.
Brandao, P. R. (2025). Cyber Threat Intelligence with Symmetry for Zero-Trust Security. Computer Science and Mathematics. https://doi.org/10.20944/preprints202508.0059.v1
Creswell, J. W., & Clark, V. L. P. (2018). Qualitative inquiry and research design (Fourth edition). SAGE.
He, M., & Chen, Y. (2025). Personal data protection in China: Progress, challenges and prospects in the age of big data and AI. Telecommunications Policy, 49(10), 103076. https://doi.org/10.1016/j.telpol.2025.103076
Marquis, Y. A. (2024). From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts. Journal of Engineering Research and Reports, 26(5), 138–154. https://doi.org/10.9734/jerr/2024/v26i51141
Mehra, T. (2024). The Critical Role of Role-Based Access Control (RBAC) in securing backup, recovery, and storage systems. International Journal of Science and Research Archive, 13(1), 1192–1194. https://doi.org/10.30574/ijsra.2024.13.1.1733
Merlo, T. R., Fard, F., & Hawamdeh, S. (2025). Cloud Computing’s Impact on the Digital Transformation of the Enterprise: A Mixed-Methods Approach. Sustainability, 17(13), 5755. https://doi.org/10.3390/su17135755
Obiokafor, I. N. (2023). Approaches to a secure, sustainable, and diversified Nigerian economy in a cashless society. World Journal of Advanced Research and Reviews, 20(2), Article 2. https://doi.org/10.30574/wjarr.2023.20.2.2266
Obiokafor, I. N., Ajonuma, M. E., & Aguboshim, F. C. (2025). Integrating Privacy by Design (PbD) in the system development life cycle for enhanced data protection. World Journal of Advanced Research and Reviews, 26(1), 1233–1240. https://doi.org/10.30574/wjarr.2025.26.1.0538
Obiokafor, I. N., & Mbonu, O. (2025). The intersection of digital policy and cybersecurity: Implications for sustainable development. World Journal of Advanced Engineering Technology and Sciences, 14(3), 077–085. https://doi.org/10.30574/wjaets.2025.14.3.0094
Oluremi, D., Vallabhaneni, R., Lallie, H., & Guglielmo, M. C. (2025). Abstract on Human Factors in Cybersecurity: Social Engineering and Insider Threats.
Pool, J., Akhlaghpour, S., Fatehi, F., & Burton-Jones, A. (2024). A systematic analysis of failures in protecting personal health data: A scoping review. International Journal of Information Management, 74, 102719. https://doi.org/10.1016/j.ijinfomgt.2023.102719
Puhakainen, P., & Siponen, M. (2021). Improving Employees’ Compliance Through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34(4), 757-778.
Rabzelj, M., & Sedlar, U. (2025). Beyond the Leak: Analyzing the Real-World Exploitation of Stolen Credentials Using Honeypots. Sensors, 25(12), 3676. https://doi.org/10.3390/s25123676
Schmitt, M. (2023). Securing the digital world: Protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection. Journal of Industrial Information Integration, 36, 100520. https://doi.org/10.1016/j.jii.2023.100520
Sonar, O., Anvekar, N., & Hebbalkar, S. (2025). Phishing and Social Engineering: Analyzing Human Vulnerability. 8(4).
Vararean-Cochisa, D., & Crisan, E.-L. (2025). The digital transformation of the construction industry: A review. IIM Ranchi Journal of Management Studies, 4(1), 3–16. https://doi.org/10.1108/IRJMS-04-2024-0035
Verma, S. (2025). Cybersecurity compliance in the age of remote work: Challenges and solutions. World Journal of Advanced Engineering Technology and Sciences, 15(1), 1112–1120. https://doi.org/10.30574/wjaets.2025.15.1.0286
Webster, J., & Watson, R. T. (2002). Analyzing The Past to Prepare For The Future: Writing A Literature Review. 26(2), xiii–xxiii.
Yee, C. K., & Zolkipli, M. F. (2021). Review on Confidentiality, Integrity and Availability in Information Security. Journal of ICT in Education, 8(2), 34–42. https://doi.org/10.37134/jictie.vol8.2.4.2021
Obiokafor, I. N., Onwuka, U. P., Okoye, O. M., & Ameke, B. C. (2025). Strategies for data protection and privacy in administrative information systems. ANSPOLY Journal of Advanced Research in Science & Technology (AJARST), 2(2), 66–77

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.