ESC

Clarivate

JCR Category: Business in ESCI edition

Entrepreneurship and Sustainability Issues Open access
Journal Impact FactorTM (2024) 1.3 Q3
Journal Citation IndicatorTM (2024) 0.26 Q4
Received: 2024-02-20  |  Accepted: 2024-05-16  |  Published: 2024-06-30

Title

Data security risks and their prevention: Latvian enterprises in the context of selected countries


Abstract

An increasing number of organizations in Latvia are directing their efforts toward digitizing information and data storage. With the onset of the COVID–19 pandemic, there was an essential surge in the number of employees working remotely, eliminating the constraints of their physical workplace. Consequently, the challenges concerning data security within organizations have amplified. The main aim of this study is to explore and recognize the risks related to logistics data protection and subsequently formulate recommendations for mitigating or preventing logistics data security risks in Latvian enterprises. This research is centred on examining the prevailing data security trends in Latvia. An academic literature review was undertaken to gain insights into the core attributes and legislative measures governing data security in Latvia. Statistical and content analyses were employed to uncover deficiencies and risks in data security. The main results show that the data security and risk management measures in Latvian enterprises do not depend on the industry represented by the enterprise, thus applying the commonly used data security protection measures and risk management approaches. The research concluded that, in Latvia, the primary data security risks arise from internal and external threats.


Keywords

logistics, data security, ICT security measures, data security regulations, data privacy, business enterprises


JEL classifications

O10 , R49


URI

http://jssidoi.org/jesi/article/1192


DOI


Pages

78-90


Funding


This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License

Authors

Jurgelāne-Kaldava, Ingūna
Riga Technical University, Riga, Latvia http://www.rtu.lv
Articles by this author in: CrossRef |  Google Scholar

Batenko, Agnese
Riga Technical University, Riga, Latvia http://www.rtu.lv
Articles by this author in: CrossRef |  Google Scholar

Kriviņš, Anatolijs
Daugavpils University, Daugavpils, Latvia https://du.lv
Articles by this author in: CrossRef |  Google Scholar

Durguti, Esat
University "Isa Boletini", Mitrovica, Kosovo https://www.umib.net
Articles by this author in: CrossRef |  Google Scholar

Garškaitė-Milvydienė, Kristina
Vilnius Gediminas Technical University (VILNIUS TECH), Vilnius, Lithuania https://vilniustech.lt
Articles by this author in: CrossRef |  Google Scholar

Journal title

Entrepreneurship and Sustainability Issues

Volume

11


Number

4


Issue date

June 2024


Issue DOI


ISSN

ISSN 2345-0282 (online)


Publisher

VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania

Cited

Google Scholar

Article views & downloads

HTML views: 1362  |  PDF downloads: 622

References


Ali, O., Shrestha, A., Chatfield, A., & Murray, P. (2020). Assessing information security risks in the cloud: A case study of Australian local government authorities. Government Information Quarterly, 37(1), 101419. https://doi.org/10.1016/j.measen.2023.100856

Search via ReFindit


Androniceanu, A., & Georgescu, I., (2023). Digital competencies and human development: a canonical correlation analysis in Romania. Polish Journal of Management Studies, 28 (1), 43-61. https://doi.org/10.17512/pjms.2023.28.1.03

Search via ReFindit


Bruni, M. E., Fadda, E., Fedorov, S., & Perboli, G. (2023). A machine learning optimization approach for last-mile delivery and third-party logistics. Computers & Operations Research, 157, 106262. https://doi.org/10.1016/j.cor.2023.106262

Search via ReFindit


Data Protection Law Enforcement Directive 2016/680 (DIRECTIVE (EU) 2016/680, 2016) https://www.eumonitor.eu/9353000/1/j4nvk6yhcbpeywk_j9vvik7m1c3gyxp/vk3t7p3lb4zo

Search via ReFindit


Ding, Q., & Zhao, H. (2021). Study on e-commerce logistics cost control methods in the context of COVID-19 prevention and control. Soft computing, 25(18), 11955-11963. https://doi.org/10.1007/s00500-021-05624-5

Search via ReFindit


Directive (EU) 2016/680 (2016). Official Journal of the European Union. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L0680&from=EN

Search via ReFindit


Doss, A. N., Shah, D., Smaisim, G. F., Olha, M., & Jaiswal, S. (2022, April). A comprehensive analysis of the Internet of Things (IoT) in enhancing data security for better system integrity critical research on the security attacks and relevant countermeasures. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 165-167). IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9823817

Search via ReFindit


EY (2020). EY Global Information Security Survey. https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/advisory/ey-global-information-security-survey-2020-single-pages.pdf

Search via ReFindit


Filippova, N. A., Bashmakov, I. A., & Kochegura, D. Y. (2021). Goals and Risks of Activity as Factors of Regulation in Social Systems in Transport Sector. World, 19(2), 156-160. https://doi.org/10.30932/1992-3252-2021-19-2-2

Search via ReFindit


GDPR (Regulation (EU) 2016/679, 2016) =(sc.Default)&firstPage=true https://uk.practicallaw.thomsonreuters.com/w-014-2751?transitionType=Default&contextData

Search via ReFindit


Gupta, K., Gupta, D., Prasad, S. K., & Johri, P. (2021, March). A Review on Cryptography-based Data Security Techniques for the Cloud Computing. In 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 1039-1044). IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9404568

Search via ReFindit


Helmold, M., Küçük Yılmaz, A., Dathe, T., & Flouris, T. G. (2022). Digitalization in Air Transportation and Reflections on SCRM. In Supply Chain Risk Management: Cases and Industry Insights (pp. 37-78). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-90800-3_3

Search via ReFindit


Hick, S., Biermann, H., & Ziefle, M. (2024). How deep is your trust? A comparative user requirements analysis of automation in medical and mobility technologies. Humanities and Social Sciences Communications, 11(1). https://doi.org/10.1057/s41599-023-02575-0

Search via ReFindit


Jurgelāne-Kaldava, I., & Batenko, A. (2023). Assessment of Data Security Implementation in the Supply Chain Enterprises in Latvia. WSB Journal of Business and Finance, 57(1), 21-27. https://doi.org/10.2478/wsbjbf-2023-0003

Search via ReFindit


Katina, J., Plėta, T., Petkevičius, R., & Lelešienė, L. (2023). Industrial Control Systems (ICS) cyber prediction model. Insights into Regional Development, 5(1), 86-96. https://doi.org/10.9770/IRD.2023.5.1(6)

Search via ReFindit


Kennedy, E., & Millard, C. (2016). Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States. Computer Law & Security Review, 32(1), 91-110. https://doi.org/10.1016/j.clsr.2015.12.004

Search via ReFindit


Kraska T., Stonebraker M., Brodie M., Servan-Schreiber S., & Weitzner D. (2019) SchengenDB: A Data Protection Database Proposal. In: Gadepally V. et al. (eds) Heterogeneous Data Management, Polystores, and Analytics for Healthcare. DMAH 2019, Poly 2019. Lecture Notes in Computer Science, vol 11721. Springer, Cham. https://doi.org/10.1007/978-3-030-33752-0_2

Search via ReFindit


Li, Y., Cheng, Q., Liu, X., & Li, X. (2020). A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Systems Journal, 15(1), 935-946. https://doi.org/10.1016/j.array.2023.100304

Search via ReFindit


Lincenyi, M., Svejnova Hoesova, K., & Fabus, M. (2023). Innovations in Marketing Communication in the Hospitality Business in Slovakia During the COVID-19 Pandemic. Marketing and Management of Innovations, 14(3), 230–242. https://doi.org/10.21272/mmi.2023.3-20

Search via ReFindit


Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2015). Two-factor data security protection mechanism for the cloud storage system. IEEE Transactions on Computers, 65(6), 1992-2004. https://doi.org/10.1109/TC.2015.2462840

Search via ReFindit


Markos, E., Peña, P., Labrecque, L.I., & Swani, K. (2023). Are data breaches the new norm? Exploring data breach trends, consumer sentiment, and responses to security invasions. Journal of Consumer Affairs, 57(3), 1089-1119. https://doi.org/10.1111/joca.12554

Search via ReFindit


Naim, A., Alqahtani, H., Muniasamy, A., Bilfaqih, S. M., Mahveen, R., & Mahjabeen, R. (2023). Applications of Information Systems and Data Security in Marketing Management. In Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (pp. 57-83). IGI Global. https://doi.org/10.4018/978-1-6684-6581-3.ch003

Search via ReFindit


Navickas, V., Grencikova, A., Kordos, M., & Sramka, M. (2022). The Information and Communications Technologies Usage within the Covid-19 Pandemic Issue. Transformations in Business & Economics, Vol. 21, No 1 (55), pp.101-113.

Search via ReFindit


Nguyen, A., Bougacha, O., Lekens, B., Lamouri, S., Pellerin, R., & Couvreur, C. (2023). On the use of logistics data to anticipate drug shortages through data mining. Procedia Computer Science, 219, 949-956. https://doi.org/10.1016/j.procs.2023.01.371

Search via ReFindit


Nica, E., Androniceanu, A., Sabie, O.-M., & Mișa, A. (2023). Generative artificial intelligence and workplace tracking systems, synthetic training data, and computer-based teamwork simulations in 3D immersive spaces, Analysis and Metaphysics, 22, 24-42. https://doi.org/10.22381/am2220232

Search via ReFindit


Official Statistics Portal of Latvia (2020). ICT security measures in enterprises (percent of total number of enterprises within the corresponding group) 2019. https://data.stat.gov.lv/pxweb/en/OSP_PUB/START__IKT__DL__DLU/EPD040

Search via ReFindit


Official Statistics Portal of Latvia (2022). Activities carried out by enterprises using some IT solution to process the information on clients (CRM) (percent of the total number of enterprises within the corresponding group) 2013 – 2021. https://data.stat.gov.lv/pxweb/en/OSP_PUB/START__IKT__DL__DLU/DLU090/

Search via ReFindit


Official Statistics Portal of Latvia (2024). Employees using any type of device with an Internet connection regularly (percent of total number of employees within the corresponding group) 2017 – 2023. https://data.stat.gov.lv/pxweb/en/OSP_PUB/START__IKT__DL__DLU/DLU020/

Search via ReFindit


Patil, B. P., Kharade, K. G., & Kamat, R. K. (2020). Investigation of data security threats solutions. International Journal of Innovative Science and Research Technology, 5(1), 79-83. https://ijisrt.com/assets/upload/files/IJISRT20JAN177.pdf

Search via ReFindit


Personal Data Processing Law (2018). Likumi. lv webpage. https://likumi.lv/ta/en/en/id/300099

Search via ReFindit


PricewaterhouseCoopers (2008). A Practical Guide to Risk Assessment. http://www.pwc.com/en_us/us/issues/enterprise-risk-management/assets/risk_assessment_guide.pdf

Search via ReFindit


Qatawneh, A. M., Al-Okaily, M. (2024). The mediating role of technological vigilance between IT infrastructure and AIS efficiency. Journal of Open Innovation: Technology, Market, and Complexity, 10(1), 100212. https://doi.org/10.1016/j.joitmc.2024.100212

Search via ReFindit


Ramsaran-Fowdar, R. R., & Fowdar, S. (2013). The Implications of Facebook Marketing for Organizations. Contemporary Management Research, 9(1). https://doi.org/10.7903/cmr.9710

Search via ReFindit


Regulation (EU) 2016/679 (2016). Official Journal of the European Union. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN

Search via ReFindit


Remeikiene, R., Gaspareniene, L., Fedajev, A., Raistenskis, E. & Krivins, A. (2022). Links between crime and economic development: EU classification. Equilibrium. Quarterly Journal of Economics and Economic Policy, 17(4), 909–938. https://doi.org/10.24136/eq.2022.031

Search via ReFindit


Shameli-Sendi, A. (2020). An efficient security data-driven approach for implementing risk assessment. Journal of Information Security and Applications, 54, 102593. https://doi.org/10.1016/j.jisa.2020.102593

Search via ReFindit


Shastri, S., Wasserman, M., & Chidambaram, V. (2019) The seven sins of personal-data processing systems under GDPR. In: 11th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2019), Renton, WA. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3425860

Search via ReFindit


Shen, Y., & Zhang, X. (2024). The impact of artificial intelligence on employment: the role of virtual agglomeration. Humanities and Social Sciences Communications, 11(1), 1-14. https://doi.org/10.1057/s41599-024-02647-9

Search via ReFindit


Shukla, S., George, J. P., Tiwari, K., & Kureethara, J. V. (2022). Data Security. In Data Ethics and Challenges (pp. 41-59). Singapore: Springer Singapore.

Search via ReFindit


Sravan, S. S., Ganesh, C. S., Kiran, K. V. D., Chandra, T. A., Aparna, K., Vignesh, T. (2023, March). Significant Challenges to espouse DevOps Culture in Software Organisations By AWS: A methodical Review. In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, pp. 395-401). IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10113021

Search via ReFindit


Subbalakshmi, S., Madhavi, K (2018). Security challenges of Big Data storage in a Cloud environment: A Survey. International Journal of Applied Engineering, 13(17), 13237-13244. https://www.ripublication.com/ijaer18/ijaerv13n17_36.pdf

Search via ReFindit


Teivāns-Treinovskis, J., Jefimovs, N., Velika, R. & Kriviņš, A. (2022). Conditions for application of criminal liability to the board of a company in the legal system of the Republic of Latvia. Entrepreneurship and Sustainability Issues, 9(4), 45-55. https://doi.org/10.9770/jesi.2022.9.4(2)

Search via ReFindit