Abstract
In recent years, some major earthquakes, such as those in Indonesia and Sichuan, China, have brought out huge losses to enterprises, and have made many enterprises disable to recover their transport business information system and transaction data. Therefore, many enterprises have started to outsource their operative information to the internet data center in order to monitor critical business data operations. Although there are literatures proposing some information safety related subjects, it is still immature to conclude with a suitable data integrity risk & data center operation research. Based on literature review, case study, deeply interview with 11 top CEOs & experts, and Fuzzy Delphi method, we came up with two frameworks: business data integrity risk management framework and data center service operation reference framework. The former is from the enterprise risk viewpoint and the later one is from IT service firm’s viewpoint.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
BISHOP, T. Building a Better Data Center -- The dos and don'ts of state-of-the-art data center design. Wall Street & Technology. Vol. 26, No.10, pp.36, 2008.
CARTER, K., PULTORAK, D. (2003) ITIL, COBIT, CMMI, Balanced Scorecard, IS-9000, Six Sigma: Putting Them All Together.
CHANG, P.T., HUANG, L.C., AND LIN, H.J. The fuzzy Delphi via fuzzy statistics and membership function fitting and an application to human resources. Fuzzy Sets and Systems. vol.112, pp.511-520, 2000.
ELOFF, J. H. P., ELOFF, M. Integrated Information security Architecture. Computer Fraud and security. Vol.11,pp.10-16, 2005.
GARG, A., CURTIS, J., & HALPER, H. Quantifying the financial impact of information security breaches. Information Management and Computer Security. Vol.77, No.2, pp.74-83, 2003.
GLAZER, R. Measuring the value of information: The information intensive organization. IBM Systems Journa. Vol.32, No1, pp.99-110, 1993.
HINDE, S. Security surveys spring crop. Computers and Security. Vol.27, No.4, pp.310-321, 2002.
ISO/IEC 17799. BS 7799-1. (2005). Information technology/security techniques/Code of practice for information security management. Britain.
LINDENMAYER, G. Information security standards: The 10 Keys to protecting your network. Risk Management. Vol. 54, No. 12, pp11, 2007.
McCARTHY, M. P. and Campbell, S. (2001). Security transformation. McGraw-Hill: New York.
Ovum research(2007). http://www.ovum.com/expertise/itservices/
STRAUB, D.W. & WELKE, RJ. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, Vol.22, No.4, pp.441-470, 1998.
VEIGA, A. D. and Eloff, J.H.P. An Information Security Governance Framework. Information Systems Management, Boston: Fall, Vol.24, No.4, pp. 361-73, 2007.
von SOLMS, B. & von SOLMS, R. The ten deadly sins of information security management. Computers & Security. Vol.25, pp.371-376. 2004.
YIN, R.K. (1994). Case Study Research: Design and Methods, California: SAGE Publications.
ZADEH, L.A., Fuzzy Sets. Information Control, 8, 338–353, 1965.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer London
About this paper
Cite this paper
Chen, M., Wang, SC. (2009). The Business Data Integrity Risk Management Model: A Benchmark Data Center Case of IT Service Firm. In: Chou, SY., Trappey, A., Pokojski, J., Smith, S. (eds) Global Perspective for Competitive Enterprise, Economy and Ecology. Advanced Concurrent Engineering. Springer, London. https://doi.org/10.1007/978-1-84882-762-2_67
Download citation
DOI: https://doi.org/10.1007/978-1-84882-762-2_67
Publisher Name: Springer, London
Print ISBN: 978-1-84882-761-5
Online ISBN: 978-1-84882-762-2
eBook Packages: EngineeringEngineering (R0)