語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Exploring the role of data forensics...
~
Eaton, Walter L.
FindBook
Google Book
Amazon
博客來
Exploring the role of data forensics in support of legal and regulatory compliance.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Exploring the role of data forensics in support of legal and regulatory compliance./
作者:
Eaton, Walter L.
面頁冊數:
265 p.
附註:
Source: Dissertation Abstracts International, Volume: 71-08, Section: B, page: 4919.
Contained By:
Dissertation Abstracts International71-08B.
標題:
Engineering, Computer. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3417110
ISBN:
9781124133294
Exploring the role of data forensics in support of legal and regulatory compliance.
Eaton, Walter L.
Exploring the role of data forensics in support of legal and regulatory compliance.
- 265 p.
Source: Dissertation Abstracts International, Volume: 71-08, Section: B, page: 4919.
Thesis (Ph.D.)--Northcentral University, 2010.
Rapidly responding to data breaches, performing data audits in a pristine evidentiary manner, and preserving volatile digital evidence are essential in an increasingly litigious society; therefore, data custodians must respond to breaches of organizational information not only in a technically competent manner, but in a legally prudent one as well. The escalation of identity theft and online fraud is of major concern to industry leaders. The legal, regulatory, and privacy mandates of the Health Insurance Portability and Accountability Act, the Family Educational Rights and Privacy Act, the Sarbanes-Oxley Act, and the Gramm-Leach-Bliley Act have resulted in data custodians reevaluating methodologies for maintaining organizational data securely. This qualitative multi-case study was designed to explore the lack of forensically sound incident response procedures employed by disparate organizations experiencing similar regulatory and legal challenges. The purpose of the study was to explore problems that are created by the absence of an in-house data forensics capability and the consequences of delayed investigations, investigational delays that could result in opportunities for digital evidence alteration, spoliation, and destruction. The participants interviewed for this study were 10 managers from five organizational categories: industry, healthcare, financial, municipal, and education. Data distillation and cross-case synthesis of the coded dialogue transcribed verbatim from interview field notes led to the creation of six key categories. Aggregation of the key categories revealed two major themes, motivators for an in-house forensics capability and inhibitors to an in-house forensics capability. Recommendations resulting from this study include: developing a data forensics incident response capability, implementing supportive written policy, training internal Information Technology staff to perform basic digital forensics functions, proactively deepening relationships with third party forensics providers, and leveraging human capital by adopting new enterprise forensics technologies. Analysis of the resultant data from this study can be beneficial in providing foundational information that could be utilized in conducting further research with wider geographical boundaries. Considering the proliferation of national and international regulations concerning data security, a longitudinal study could provide valuable insight and guidance into the changing legal environment and its effect on the role of the Information Technology data custodian.
ISBN: 9781124133294Subjects--Topical Terms:
1669061
Engineering, Computer.
Exploring the role of data forensics in support of legal and regulatory compliance.
LDR
:03525nam 2200301 4500
001
1400814
005
20111015105932.5
008
130515s2010 ||||||||||||||||| ||eng d
020
$a
9781124133294
035
$a
(UMI)AAI3417110
035
$a
AAI3417110
040
$a
UMI
$c
UMI
100
1
$a
Eaton, Walter L.
$3
1679907
245
1 0
$a
Exploring the role of data forensics in support of legal and regulatory compliance.
300
$a
265 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-08, Section: B, page: 4919.
500
$a
Adviser: Efosa Osayamwen.
502
$a
Thesis (Ph.D.)--Northcentral University, 2010.
520
$a
Rapidly responding to data breaches, performing data audits in a pristine evidentiary manner, and preserving volatile digital evidence are essential in an increasingly litigious society; therefore, data custodians must respond to breaches of organizational information not only in a technically competent manner, but in a legally prudent one as well. The escalation of identity theft and online fraud is of major concern to industry leaders. The legal, regulatory, and privacy mandates of the Health Insurance Portability and Accountability Act, the Family Educational Rights and Privacy Act, the Sarbanes-Oxley Act, and the Gramm-Leach-Bliley Act have resulted in data custodians reevaluating methodologies for maintaining organizational data securely. This qualitative multi-case study was designed to explore the lack of forensically sound incident response procedures employed by disparate organizations experiencing similar regulatory and legal challenges. The purpose of the study was to explore problems that are created by the absence of an in-house data forensics capability and the consequences of delayed investigations, investigational delays that could result in opportunities for digital evidence alteration, spoliation, and destruction. The participants interviewed for this study were 10 managers from five organizational categories: industry, healthcare, financial, municipal, and education. Data distillation and cross-case synthesis of the coded dialogue transcribed verbatim from interview field notes led to the creation of six key categories. Aggregation of the key categories revealed two major themes, motivators for an in-house forensics capability and inhibitors to an in-house forensics capability. Recommendations resulting from this study include: developing a data forensics incident response capability, implementing supportive written policy, training internal Information Technology staff to perform basic digital forensics functions, proactively deepening relationships with third party forensics providers, and leveraging human capital by adopting new enterprise forensics technologies. Analysis of the resultant data from this study can be beneficial in providing foundational information that could be utilized in conducting further research with wider geographical boundaries. Considering the proliferation of national and international regulations concerning data security, a longitudinal study could provide valuable insight and guidance into the changing legal environment and its effect on the role of the Information Technology data custodian.
590
$a
School code: 1443.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Intellectual Property.
$3
782112
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0489
690
$a
0513
690
$a
0984
710
2
$a
Northcentral University.
$3
1018547
773
0
$t
Dissertation Abstracts International
$g
71-08B.
790
1 0
$a
Osayamwen, Efosa,
$e
advisor
790
$a
1443
791
$a
Ph.D.
792
$a
2010
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3417110
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9163953
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入