Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Search
Recommendations
ReaderScope
My Account
Help
Simple Search
Advanced Search
Public Library Lists
Public Reader Lists
AcademicReservedBook [CH]
BookLoanBillboard [CH]
BookReservedBillboard [CH]
Classification Browse [CH]
Exhibition [CH]
New books RSS feed [CH]
Personal Details
Saved Searches
Recommendations
Borrow/Reserve record
Reviews
Personal Lists
ETIBS
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Exploring the role of data forensics...
~
Eaton, Walter L.
Linked to FindBook
Google Book
Amazon
博客來
Exploring the role of data forensics in support of legal and regulatory compliance.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Exploring the role of data forensics in support of legal and regulatory compliance./
Author:
Eaton, Walter L.
Description:
265 p.
Notes:
Source: Dissertation Abstracts International, Volume: 71-08, Section: B, page: 4919.
Contained By:
Dissertation Abstracts International71-08B.
Subject:
Engineering, Computer. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3417110
ISBN:
9781124133294
Exploring the role of data forensics in support of legal and regulatory compliance.
Eaton, Walter L.
Exploring the role of data forensics in support of legal and regulatory compliance.
- 265 p.
Source: Dissertation Abstracts International, Volume: 71-08, Section: B, page: 4919.
Thesis (Ph.D.)--Northcentral University, 2010.
Rapidly responding to data breaches, performing data audits in a pristine evidentiary manner, and preserving volatile digital evidence are essential in an increasingly litigious society; therefore, data custodians must respond to breaches of organizational information not only in a technically competent manner, but in a legally prudent one as well. The escalation of identity theft and online fraud is of major concern to industry leaders. The legal, regulatory, and privacy mandates of the Health Insurance Portability and Accountability Act, the Family Educational Rights and Privacy Act, the Sarbanes-Oxley Act, and the Gramm-Leach-Bliley Act have resulted in data custodians reevaluating methodologies for maintaining organizational data securely. This qualitative multi-case study was designed to explore the lack of forensically sound incident response procedures employed by disparate organizations experiencing similar regulatory and legal challenges. The purpose of the study was to explore problems that are created by the absence of an in-house data forensics capability and the consequences of delayed investigations, investigational delays that could result in opportunities for digital evidence alteration, spoliation, and destruction. The participants interviewed for this study were 10 managers from five organizational categories: industry, healthcare, financial, municipal, and education. Data distillation and cross-case synthesis of the coded dialogue transcribed verbatim from interview field notes led to the creation of six key categories. Aggregation of the key categories revealed two major themes, motivators for an in-house forensics capability and inhibitors to an in-house forensics capability. Recommendations resulting from this study include: developing a data forensics incident response capability, implementing supportive written policy, training internal Information Technology staff to perform basic digital forensics functions, proactively deepening relationships with third party forensics providers, and leveraging human capital by adopting new enterprise forensics technologies. Analysis of the resultant data from this study can be beneficial in providing foundational information that could be utilized in conducting further research with wider geographical boundaries. Considering the proliferation of national and international regulations concerning data security, a longitudinal study could provide valuable insight and guidance into the changing legal environment and its effect on the role of the Information Technology data custodian.
ISBN: 9781124133294Subjects--Topical Terms:
1669061
Engineering, Computer.
Exploring the role of data forensics in support of legal and regulatory compliance.
LDR
:03525nam 2200301 4500
001
1400814
005
20111015105932.5
008
130515s2010 ||||||||||||||||| ||eng d
020
$a
9781124133294
035
$a
(UMI)AAI3417110
035
$a
AAI3417110
040
$a
UMI
$c
UMI
100
1
$a
Eaton, Walter L.
$3
1679907
245
1 0
$a
Exploring the role of data forensics in support of legal and regulatory compliance.
300
$a
265 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-08, Section: B, page: 4919.
500
$a
Adviser: Efosa Osayamwen.
502
$a
Thesis (Ph.D.)--Northcentral University, 2010.
520
$a
Rapidly responding to data breaches, performing data audits in a pristine evidentiary manner, and preserving volatile digital evidence are essential in an increasingly litigious society; therefore, data custodians must respond to breaches of organizational information not only in a technically competent manner, but in a legally prudent one as well. The escalation of identity theft and online fraud is of major concern to industry leaders. The legal, regulatory, and privacy mandates of the Health Insurance Portability and Accountability Act, the Family Educational Rights and Privacy Act, the Sarbanes-Oxley Act, and the Gramm-Leach-Bliley Act have resulted in data custodians reevaluating methodologies for maintaining organizational data securely. This qualitative multi-case study was designed to explore the lack of forensically sound incident response procedures employed by disparate organizations experiencing similar regulatory and legal challenges. The purpose of the study was to explore problems that are created by the absence of an in-house data forensics capability and the consequences of delayed investigations, investigational delays that could result in opportunities for digital evidence alteration, spoliation, and destruction. The participants interviewed for this study were 10 managers from five organizational categories: industry, healthcare, financial, municipal, and education. Data distillation and cross-case synthesis of the coded dialogue transcribed verbatim from interview field notes led to the creation of six key categories. Aggregation of the key categories revealed two major themes, motivators for an in-house forensics capability and inhibitors to an in-house forensics capability. Recommendations resulting from this study include: developing a data forensics incident response capability, implementing supportive written policy, training internal Information Technology staff to perform basic digital forensics functions, proactively deepening relationships with third party forensics providers, and leveraging human capital by adopting new enterprise forensics technologies. Analysis of the resultant data from this study can be beneficial in providing foundational information that could be utilized in conducting further research with wider geographical boundaries. Considering the proliferation of national and international regulations concerning data security, a longitudinal study could provide valuable insight and guidance into the changing legal environment and its effect on the role of the Information Technology data custodian.
590
$a
School code: 1443.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Intellectual Property.
$3
782112
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0489
690
$a
0513
690
$a
0984
710
2
$a
Northcentral University.
$3
1018547
773
0
$t
Dissertation Abstracts International
$g
71-08B.
790
1 0
$a
Osayamwen, Efosa,
$e
advisor
790
$a
1443
791
$a
Ph.D.
792
$a
2010
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3417110
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9163953
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login