|Total results: 250||
|Organizational, Legal, and Technological Dimensions of Information System Administration
Irene Maria Portela, Fernando Almeida.
In addition to capital infrastructure and consumers, digital information created by individual and corporate consumers of information technology is quickly being recognized as a key economic resource and an extremely valuable asset to a company.
Organizational, Legal, and Technological Dimensions of...
The Role and Responsibilities of the System’s Administrator
Filipe Moreira, Joel Luz.
In this chapter, the authors present an overview of the role and responsibilities of the system’s administrator. They start with giving a background description on how this activity has been changing within the last decades considering not only the roles but also how the educational background changed...
Trust Management and Delegation for the Administration of Web Services
The availability and adoption of open protocols allow applications to integrate Web services offered by different providers. Moreover, simple services can be dynamically composed to accomplish more complex tasks. This implies the delegation of both tasks and permissions. In fact, delegation is...
Due Diligence in Cyberspace
Within the chapter, the author discusses the possibility of introducing an international due diligence standard for Internet Service Providers (ISPs). She analyzes the due diligence standard in public international law as the common element of two accountability regimes binding upon states: the regime...
Criminal Liability of Organizations, Corporations, Legal Persons, and Similar Entities on Law of Portuguese Cybercrime: A Brief Discussion on the Issue of Crimes of “False Information,” the “Damage on Other Programs or Computer Data,” the “Computer-Software Sabotage,” the “Illegitimate Access,” the “Unlawful Interception,” and “Illegitimate Reproduction of the Protected Program”
Gonçalo S. de Melo Bandeira.
In Portugal, and in much of the legal systems of Europe, “legal persons” are likely to be criminally responsibilities for cybercrimes, for example, “false information,” “damage on other programs or computer data,” “computer-software sabotage,” “illegitimate access,” “unlawful interception,” and...
Redressing Violations of Privacy: The Case of Portuguese “E-Invoice”
Irene Maria Portela.
The chapter discusses the role of CNPD (Comissão Nacional de Proteção de Dados) in case of violation of privacy, like dissemination or revelation of personal data by a public/private organization or entity. About this subject, the CNPD can issue a recommendation to the Portuguese Treasury to take some...
Role of Cloud Systems as Enabler of Global Competitive Advantages
The goal of cloud systems is to provide easy, scalable access to computing resources and IT services. However, the ability of the cloud system to transfer knowledge to assist the innovator should also be a key objective of cloud system deployment. This chapter presents an approach for assessment of...
Cloud Computing: IT Governance, Legal, and Public Policy Aspects
Carlos Juiz, Victor Alexander de Pous.
Cloud computing evolved as a key delivery model for Information Technology (IT) and data provision for both the private and public sectors. Addressing its governance, legal, and public policy aspects is a condition sine qua non for successful deployment, whether done by the in-house IT department or...
A Conceptual Framework for Big Data Analysis
Fernando Almeida, Mário Santos.
Big data is a term that has risen to prominence describing data that exceeds the processing capacity of conventional database systems. Big data is a disruptive force that will affect organizations across industries, sectors, and economies. Hidden in the immense volume, variety, and velocity of data...
The Role of Security Culture
This chapter provides a discussion of the importance of the wider organisational context that the network administrator needs to deal with by describing how the organisational culture can impact on the degree to which security can be successfully maintained. It starts with an acknowledgement of the...
The 2011 Survey of Information Security and Information Assurance Professionals: Findings
Yulia Cherdantseva, Jeremy Hilton.
Information Assurance (IA) is an intensively discussed discipline. Perhaps the most striking feature of IA is that everyone has a different opinion about what it actually is. The literature analysis enables us to distinguish three different approaches to Information Assurance: 1) Technical approach...
Mitigation of Security Concerns of VoIP in the Corporate Environment
Fernando Almeida, José Cruz.
The convergence of the voice and data worlds is introducing exciting opportunities to companies. As a consequence, Voice over IP (VoIP) technology is attracting increasing attention and interest in the industry. Flexibility and cost efficiency are the key factors luring enterprises to transition to...
Practical Approach for Data Breach Cases in ERP Systems
Pedro Sousa, José Costa, Vitor Manso.
This chapter is based on a case study scenario where a major data breach happens in one institution of public sector, a municipality, in Portugal. The focus of this chapter is to explain the gap between software development and security specialists because these are two fields of information and...
Approaches and Processes for Managing the Economics of Information Systems
Theodosios Tsiakis, Theodoros Kargidis, Panagiotis Katsaros.
Advancements of information systems are rapidly altering both the economy and society. This progression of information creates operational and strategic advantages which is important to the success of organizations and firms.
Approaches and Processes for Managing the Economics of Information Systems...
Measuring and Managing the Economics of Information Storage
The chapter addresses the problem of measuring and managing the economics of information storage. By resorting to actual measurements rather than rules of thumb, one can objectively substantiate spending on information storage infrastructure and implementation of specific storage management policies....
Improving the Business Value of IS
This review surveys recent study on the business value of Information Systems (IS). The topics covered include theoretical and empirical evidence on the business value of IS, the productivity using Information Technology (IT), the firm value with IT, IT and firm boundaries, IT outsourcing, and supply...
ICT Investments and Management for Organizations
Georgios N. Angelou, Anastasios A. Economides.
Developing the Information and Communication Technologies (ICT) strategy that supports the overall organization’s business strategy is critical for generating business value. Recognizing the inadequacy of traditional quantitative cost-benefits analysis for evaluating and managing ICT investments...
Valuation of Technology-Based Companies: The Case of Activision Blizzard
João Zambujal-Oliveira, César Serradas.
The cash flows of technology-based companies show high degrees of uncertainty. As traditional valuation methods can hardly capture these characteristics, they are insufficient for valuing these kinds of companies. On the contrary, real options theory can quantify the value associated with management...
ICT Management in Non-Profit Organizations
Jose Antonio Ariza-Montes, Ana Maria Lucia-Casademunt.
The instability of today’s economic climate calls for non-profit organizations to approach social problems in new and interesting ways, and Information and Communication Technologies may serve as an answer to this call.
ICT Management in Non-Profit Organizations aims to explore the effective and...