You are previewing Organizational, Legal, and Technological Dimensions of Information System Administration.
O'Reilly logo
Organizational, Legal, and Technological Dimensions of Information System Administration

Book Description

In addition to capital infrastructure and consumers, digital information created by individual and corporate consumers of information technology is quickly being recognized as a key economic resource and an extremely valuable asset to a company. Organizational, Legal, and Technological Dimensions of Information System Administration recognizes the importance of information technology by addressing the most crucial issues, challenges, opportunities, and solutions related to the role and responsibility of an information system. Highlighting various aspects of the organizational and legal implications of system administration, this reference work will be useful to managers, IT professionals, and graduate students who seek to gain an understanding in this discipline.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  6. Foreword
  7. Preface
  8. Section 1: The Role and Responsibility of the System’s Administrator
    1. Chapter 1: The Role and Responsibilities of the System’s Administrator
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. EDUCATION, ROLE EVOLUTION AND FUTURE CHALLENGES
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    2. Chapter 2: Trust Management and Delegation for the Administration of Web Services
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. DELEGATION MODELS AND SYSTEMS
      5. 4. FUTURE RESEARCH DIRECTIONS
      6. 5. CONCLUSION
    3. Chapter 3: Academic and Professional Qualifications of the Systems Administrator Required to Work in the Organizational Context
      1. ABSTRACT
      2. INTRODUCTION
      3. METHODOLOGICAL APPROACH
      4. HOW DOES THE SYSTEMS ADMINISTRATOR ACQUIRE HIS SKILLS?
      5. THE ROLES AND TASKS OF THE SYSTEMS ADMINISTRATOR
      6. THE SYSTEMS’ ADMINISTRATOR AND INFORMATION TECNOLOGIES / INFORMATION SYSTEMS AREAS OF EXPERTISE
      7. THE RESPONSIBILITIES AND DECISION TAKING OF THE SYSTEMS’ ADMINISTRATOR
      8. A CONCEPTUAL VIEW ABOUT THE ROLES AND THE RESPONSIBILITIES OF THE SYSTEMS ADMINISTRATOR
      9. CONCLUSION
  9. Section 2: Legal and Regulatory Frameworks
    1. Chapter 4: Beyond Compliance
      1. ABSTRACT
      2. BACKGROUND ON THE NATURE OF LAW
      3. AREAS OF RESPONSIBILITY
      4. CLASSIFYING INFORMATION ASSETS
      5. AN OVERVIEW OF INTELLECTUAL PROPERTY
      6. EMPLOYMENT LAW
      7. SOCIAL MEDIA, ADVERTISING, AND ACCESSIBILITY
      8. KNOWABLE RISKS
      9. WITHDRAWAL AND DISSOLUTION THRESHOLDS
    2. Chapter 5: Due Diligence in Cyberspace
      1. ABSTRACT
      2. INTRODUCTION
      3. STATE RESPONSIBILITY VS. INTERNATIONAL LIABILITY IN INTERNATIONAL LAW
      4. DUE DILIGENCE IN INTERNATIONAL ENVIRONMENTAL LAW
      5. DUE DILIGENCE IN CYBERSPACE
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    3. Chapter 6: Criminal Liability of Organizations, Corporations, Legal Persons, and Similar Entities on Law of Portuguese Cybercrime
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE CRIMINAL LIABILITY OF INDIVIDUAL’S AND “LEGAL PERSON’S” (“ORGANIZATIONS,” “CORPORATIONS,” “COLLECTIVE ENTITIES,” “LEGAL ENTITIES,” AND SIMILAR) CRIMES DEFINED AND PUNISHED BY THE DESIGNATED “LAW OF CYBERCRIME”
      4. 3. SOLUTIONS AND RECOMMENDATIONS
      5. 4. FUTURE RESEARCH DIRECTIONS
      6. 5. CONCLUSION
    4. Chapter 7: Redressing Violations of Privacy
      1. ABSTRACT
      2. INTRODUCTION
      3. THE PORTUGUESE “E-INVOICING SYSTEM”
      4. THE ROLE OF THE SYSTEM ADMINISTRATOR AND THE ROLE OF THE CNPD
      5. THE SECURITY POLICY OF THE E-GOVERNMENT AND THE E-INVOICE
      6. CONCLUSION
  10. Section 3: Privacy and Security
    1. Chapter 8: Role of Cloud Systems as Enabler of Global Competitive Advantages
      1. ABSTRACT
      2. INTRODUCTION
      3. KNOWLEDGE TRANSFER AND THE INNOVATION CHAIN
      4. CHARACTERISTICS AND INTEGRITY OF INNOVATION KNOWLEDGE
      5. BENEFITS OBTAINABLE FROM DEPLOYMENT OF CLOUD SYSTEMS
      6. READINESS OF THE INNOVATIVE FIRM FOR CLOUD SYSTEM DEPLOYMENT
      7. CLOUD SYSTEMS AS ENABLER OF GLOBAL COMPETITIVE ADVANTAGES
      8. ORGANIZATIONAL PERSPECTIVES OF CLOUD SYSTEMS
      9. LEGAL PERSPECTIVES OF CLOUD SYSTEMS
      10. TECHNOLOGICAL PERSPECTIVES OF CLOUD SYSTEMS
      11. CLOUD SYSTEM IMPLEMENTATION CRITICAL SUCCESS FACTORS
      12. RESEARCH MODEL
      13. CONCLUSION
    2. Chapter 9: Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. IT GOVERNANCE FRAMEWORKS: LEGAL, PUBLIC POLICIES, AND THE CLOUD
      5. LEGAL AND PUBLIC POLICY ASPECTS OF CLOUD COMPUTING ()
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    3. Chapter 10: Information Security and Information Assurance
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. INFORMATION SECURITY
      4. 3. INFORMATION ASSURANCE
      5. 4. INFORMATION SECURITY VS. INFORMATION ASSURANCE: THE DISCUSSION
      6. 5. THE ADAPTED DEFINITIONS OF INFORMATION SECURITY AND INFORMATION ASSURANCE
      7. 6. CONCLUSION
    4. Chapter 11: A Conceptual Framework for Big Data Analysis
      1. ABSTRACT
      2. INTRODUCTION
      3. PHASES IN BIG DATA PROCESSING
      4. CHALLENGES IN BIG DATA ANALYSIS
      5. IMPLEMENTATION FRAMEWORK
      6. CONCLUSION
  11. Section 4: Survey and Case Studies
    1. Chapter 12: The Role of Security Culture
      1. ABSTRACT
      2. INTRODUCTION
      3. HUMAN RISKS
      4. THE ROLE OF CULTURE
      5. SAFETY CULTURE AND SECURITY CULTURE
      6. SECURITY CULTURE
      7. ADDRESSING THE GAPS: A CASE STUDY
      8. SOLUTIONS AND RECOMMENDATIONS
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
    2. Chapter 13: The 2011 Survey of Information Security and Information Assurance Professionals
      1. ABSTRACT
      2. INTRODUCTION
      3. THE SURVEY RESULTS
      4. CONCLUSION
    3. Chapter 14: Mitigation of Security Concerns of VoIP in the Corporate Environment
      1. ABSTRACT
      2. INTRODUCTION
      3. THE VOIP IN CORPORATE ENVIRONMENT
      4. MAIN SECURITY ISSUES
      5. TECHNIQUES FOR THE MITIGATION OF SECURITY ISSUES
      6. CONCLUSION
    4. Chapter 15: Practical Approach for Data Breach Cases in ERP Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. CASE STUDY: DATA BREACH IN PUBLIC SECTOR
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
  12. Compilation of References
  13. About the Contributors