Skip to main content

The Business Data Integrity Risk Management Model: A Benchmark Data Center Case of IT Service Firm

  • Conference paper
Global Perspective for Competitive Enterprise, Economy and Ecology

Part of the book series: Advanced Concurrent Engineering ((ACENG))

  • 1889 Accesses

Abstract

In recent years, some major earthquakes, such as those in Indonesia and Sichuan, China, have brought out huge losses to enterprises, and have made many enterprises disable to recover their transport business information system and transaction data. Therefore, many enterprises have started to outsource their operative information to the internet data center in order to monitor critical business data operations. Although there are literatures proposing some information safety related subjects, it is still immature to conclude with a suitable data integrity risk & data center operation research. Based on literature review, case study, deeply interview with 11 top CEOs & experts, and Fuzzy Delphi method, we came up with two frameworks: business data integrity risk management framework and data center service operation reference framework. The former is from the enterprise risk viewpoint and the later one is from IT service firm’s viewpoint.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. BISHOP, T. Building a Better Data Center -- The dos and don'ts of state-of-the-art data center design. Wall Street & Technology. Vol. 26, No.10, pp.36, 2008.

    Google Scholar 

  2. CARTER, K., PULTORAK, D. (2003) ITIL, COBIT, CMMI, Balanced Scorecard, IS-9000, Six Sigma: Putting Them All Together.

    Google Scholar 

  3. CHANG, P.T., HUANG, L.C., AND LIN, H.J. The fuzzy Delphi via fuzzy statistics and membership function fitting and an application to human resources. Fuzzy Sets and Systems. vol.112, pp.511-520, 2000.

    Article  Google Scholar 

  4. ELOFF, J. H. P., ELOFF, M. Integrated Information security Architecture. Computer Fraud and security. Vol.11,pp.10-16, 2005.

    Article  Google Scholar 

  5. GARG, A., CURTIS, J., & HALPER, H. Quantifying the financial impact of information security breaches. Information Management and Computer Security. Vol.77, No.2, pp.74-83, 2003.

    Google Scholar 

  6. GLAZER, R. Measuring the value of information: The information intensive organization. IBM Systems Journa. Vol.32, No1, pp.99-110, 1993.

    Google Scholar 

  7. HINDE, S. Security surveys spring crop. Computers and Security. Vol.27, No.4, pp.310-321, 2002.

    Google Scholar 

  8. ISO/IEC 17799. BS 7799-1. (2005). Information technology/security techniques/Code of practice for information security management. Britain.

    Google Scholar 

  9. LINDENMAYER, G. Information security standards: The 10 Keys to protecting your network. Risk Management. Vol. 54, No. 12, pp11, 2007.

    Google Scholar 

  10. McCARTHY, M. P. and Campbell, S. (2001). Security transformation. McGraw-Hill: New York.

    Google Scholar 

  11. Ovum research(2007). http://www.ovum.com/expertise/itservices/

    Google Scholar 

  12. STRAUB, D.W. & WELKE, RJ. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, Vol.22, No.4, pp.441-470, 1998.

    Google Scholar 

  13. VEIGA, A. D. and Eloff, J.H.P. An Information Security Governance Framework. Information Systems Management, Boston: Fall, Vol.24, No.4, pp. 361-73, 2007.

    Google Scholar 

  14. von SOLMS, B. & von SOLMS, R. The ten deadly sins of information security management. Computers & Security. Vol.25, pp.371-376. 2004.

    Google Scholar 

  15. YIN, R.K. (1994). Case Study Research: Design and Methods, California: SAGE Publications.

    Google Scholar 

  16. ZADEH, L.A., Fuzzy Sets. Information Control, 8, 338–353, 1965.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shih-Ching Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer London

About this paper

Cite this paper

Chen, M., Wang, SC. (2009). The Business Data Integrity Risk Management Model: A Benchmark Data Center Case of IT Service Firm. In: Chou, SY., Trappey, A., Pokojski, J., Smith, S. (eds) Global Perspective for Competitive Enterprise, Economy and Ecology. Advanced Concurrent Engineering. Springer, London. https://doi.org/10.1007/978-1-84882-762-2_67

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-762-2_67

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-761-5

  • Online ISBN: 978-1-84882-762-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics