Information Security Essentials for Information Technology Managers

Author(s):  
Albert Caballero
Author(s):  
Don Kerr ◽  
John G. Gammack ◽  
Richard Boddington

This chapter provides an overview of digital business security. It is informed by a contemporary analysis of perceived threats through the eyes of information technology managers both from a representative public institution (a University) and from a private company (a retail sales company). A brief overview of malicious software leads into more general consideration of the risks and threats of security breaches, which are analysed from both a company and a customer perspective. Common to both sectors is the requirement to secure corporate records and other digital information and management and policy guidance is provided here. Cybercrime remains rife, but is both under-reported and under-prosecuted. As managers may become involved in legal issues associated with information technology security breaches, this chapter also overviews the special nature of digital evidence.


Author(s):  
Salem Al-Marri ◽  
Muthu Ramachandran

Natural disasters are increasingly frequent in recent years taking peoples’ lives and destructions to our economy, for example, Hurricane Katrina (US 2006), Tsunami (Asia 2004), and other IT related failures. The major aims of this study were to outline the disaster management steps, actions and procedures in the computer environment. The study focused on the role of Information Technology manager (IT) in case of any disaster events. IT manager job to perform a pre-disaster preparedness, mitigation and prevention necessary steps to protect the organisation Information Technology manager resources. Than proposes a model for Disaster Recovery management. This model will support contingencies and will provide a continuous planning management and monitor its activities along with a clear description of the hierarchical roles and activities. Also proposes a model for contingency and continuity planning management and its activities. This model consists of hierarchical roles and activities.


2017 ◽  
Vol 11 (1) ◽  
pp. 37-43 ◽  
Author(s):  
Haleh Ayatollahi ◽  
Ghazal Shagerdi

Background: To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective: The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. Method: This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). Results: The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). Conclusion: The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.


2017 ◽  
Vol 16 (3) ◽  
pp. 1009-1034
Author(s):  
Júlio Cesar Pereira da Silva ◽  
Tereza Cristina Batista de Lima ◽  
Luis Eduardo Brandão Paiva ◽  
Marcos Antônio Martins Lima

ResumoNeste estudo objetivou-se analisar a aprendizagem empreendedora dos gestores de Tecnologia da Informação (TI) da região metropolitana de Fortaleza, CE. Foi adotado o modelo de Politis (2005). Usou-se o método qualitativo de natureza descritiva. Para a sua execução, foi realizada entrevista com 10 gestores de TI, com apoio de um questionário semiestruturado. Para tratamento dos dados, utilizou-se o método de Análise de Conteúdo de natureza temática. Os resultados da pesquisa mostraram que a aprendizagem empreendedora tem papel de meio, contínuo e experiencial na formação em negócios do gestor de TI, isso porque as experiências prévias em negócios foram sendo aprimoradas no modo contínuo de novas experiências empresariais, nos seus primeiros empreendimentos, trabalhando nestes e, em seguida, nos de terceiros. Os dois modos de transformação de experiências de carreira empreendedora, tanto o exploitation (conhecimentos preexistentes) quanto o exploration (novas possibilidades) influenciam e aprimoram o desenvolvimento dos conhecimentos em negócios do gestor de TI.Palavras-chave: Aprendizagem empreendedora. Gestores. Tecnologia da Informação. Entrepreneurial learning: study with managers of Information TechnologyAbstract This study aimed to analyze the entrepreneurial learning of managers of Information Technology in the metropolitan area of Fortaleza, CE. Politis model was adopted (2005). The research used the qualitative method of descriptive nature. For its implementation, an interview was held with ten Information Technology managers, supported by a semi-structured questionnaire. For processing the data, we used the content analysis method of thematic nature. The survey results showed that Entrepreneurial Learning has role of medium, continuous and experiential in the training in IT business manager, because previous experiences in business, were being improved continuously in new business experiences, both in their early projects, working on these and, then, in the third ones. The two ways of transforming entrepreneurial career experiences, both the exploitation (foreground) and the exploration (new opportunities) influence and enhance the development of knowledge in the IT business manager.Keywords: Entrepreneurial learning. Managers. Information technology.


10.28945/2918 ◽  
2005 ◽  
Author(s):  
Qiyang Chen ◽  
Rubin Xin

As computing power and storage needs increase rapidly, companies are looking for ways to reduce costs and improve overall return on investment. Although this is not market responsibility, a better understanding of this knowledge would greatly help managers of the companies that are wishing to enhance their current information technology infrastructure. The purpose of this study is to review issues of virtual server consolidation. Factors contributing to the both the positives and negatives associated with the implementation of virtual server consolidation will be evaluated in order to provide increased awareness of this emerging technology. Practical knowledge is discussed to help information technology managers explore this emerging technology for their enterprise information technology infrastructure.


Sign in / Sign up

Export Citation Format

Share Document