Research in this area will investigate why data breaches continue to occur in an organization’s IT/OT environment despite heightened cybersecurity efforts. Work in this area has been limited despite breaches growing and the amplified impact on confidential data. Locations where breaches emanate may be due to organizational design, processes, and structure, and/or the tool sets involved(i.e., hardware, software, people). A rigorous qualitative approach using Grounded Theory Method (GTM) will be applied by way of interviews and analysis. The first chapter of the thesis will demonstrate emergent patterns where the phenomena lay and how the problems are prioritized.
The second chapter seeks to incorporate methodology with practice by way of Design Science ResearchMethodology (DSRM) to find feasible resolutions to the breaches by way of a theoretical framework. The researcher is expected to play an active role contributing to the academic conversation, through collaboration and addressing the phenomena.