Trusting Records in the Cloud


Book Description

Published in association with the Society of American Archivists Trusting Records in the Cloud presents key findings of InterPARES Trust, an international research project that has investigated issues of trust in, and trustworthiness of records and data online, with respect to privacy, accessibility, portability, metadata and ownership. The project has produced theoretical and methodological frameworks for the development of local, national and international policies, procedures, regulations, standards and legislation, to ensure public trust grounded on evidence of good governance, strong digital economy and persistent digital memory. Topics include: - risks and remedies to the contracts the public must enter into with service providers - implementing retention and disposition schedules in the cloud - understanding the role of metadata in cloud services for chain of custody - rethinking issues of appraisal, arrangement and description - preservation as a series of services implementable by a variety of preservation actors - information governance, risk management, and authentication practices and technologies. This book is essential reading for records and archives managers, information professionals and organizations that are using or intend to use the cloud for the creation, management and preservation of their information; records and archives students and educators; individuals working in the academic, government and private sectors, and members of the public concerned about their personal information in the cloud.




Practical Cloud Security


Book Description

With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotson—an IBM senior technical staff member—shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.




Trust and Records in an Open Digital Environment


Book Description

Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stančić and the contributors address these challenges by taking three themes – state, citizens, and documentary form – and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.




Cloud Security and Privacy


Book Description

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security




ICCSM2014-Proceedings of the International Conference on Cloud Security Management ICCSM-2014


Book Description

These Proceedings are the work of researchers contributing to the 2nd International Conference on Cloud Security Management Security (ICCSM 2014), being held this year at the University of Reading, UK on the 23-24 October 2014, . The conference chair is Dr John McCarthy, Vice President, from the Cyber Security, ServiceTech, UK and the Programme Chair is Dr. Barbara Endicott-Popovsky, from the Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA. As organisations rush to adopt Cloud Computing at a rate faster than originally projected, it is safe to predict that, over the coming years, Cloud Computing will have major impacts, not only on the way we conduct science and research, but also on the quality of our daily human lives. Computation research, education, and business communities have been exploring the potential benefits of Cloud Computing and the changes these imply. Experts have predicted that the move to the cloud will alter significantly the content of IT jobs, with cloud clients needing fewer hands-on skills and more skills that administer and manage information. Bill Gates was recently quoted: "How you gather, manage, and use information will determine whether you win or lose." Cloud Computing impacts will be broad and pervasive, applying to public and private institutions alike.




Searching for Trust


Book Description

Offers a unique archival science perspective on the potential and limitations of blockchain as a means of restoring societal trust.




How to Give Your Users the LIS Services They Want


Book Description

In these turbulent times, with the challenges of a constantly changing job market, shifting information-seeking behaviour and a vast array of new resources continually being produced, library and information services need to constantly keep one step, or more, ahead of their users. The benefits of analysing user behaviour are self-evident: better strategic planning, cost benefits and better use of budgets, better marketing, satisfied customers, satisfied management, and a library or information unit that is central to the needs of your parent organization. However, paradoxically, user needs and levels of expectation, including those of remote users, are often not fully explored. This accessible text goes back to the basics and investigates the following key issues: Why this book? Defining your users Understanding users: the what, why, where, when, how and who What is the current knowledge of user behaviour and needs: is it really predictable? Great expectations: how LIS professionals can manage and train users Using information about past user behaviour Making the most of knowing your users Keeping track of changes in what users want Tracking the future: electronic and social networking Future perfect? Readership: This book will help any library or information professional anywhere to take a fresh look at this important area and to tackle it in their organization, so as to ensure that their users will always obtain exactly what they want. Webmasters and knowledge managers will also find much to interest them.




Recordkeeping in International Organizations


Book Description

Recordkeeping in International Organizations offers an important treatment of international organizations from a recordkeeping perspective, while also illustrating how recordkeeping can play a vital role in our efforts to improve global social conditions. Demonstrating that organizations have both a responsibility and an incentive to effectively manage their records in order to make informed decisions, remain accountable to stakeholders, and preserve institutional history, the book offers practical insights and critical reflections on the effective management, protection, and archiving of records. Through policy advice, surveys, mind mapping, case studies, and strategic reflections, the book provides guidance in the areas of archives, records, and information management for the future. Among the topics addressed are educational requirements for recordkeeping professionals, communication policies, data protection and privacy, cloud computing, classification and declassification policies, artificial intelligence, risk management, enterprise architecture, and the concepts of extraterritoriality and inviolability of archives. The book also offers perspectives on how digital recordkeeping can support the UN’s 2030 Agenda for Sustainable Development, and the accompanying Sustainable Development Goals (SDGs). Recordkeeping in International Organizations will be essential reading for records and archives professionals, information technology, legal, security, management, and leadership staff, including chief information officers. The book should also be of interest to students and scholars engaged in the study of records, archives, and information management, information technology, information security, and law. Chapters 7 and 9 of this book are freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Attribution-NonCommercial-ShareAlike (CC-BY-NC-SA) 4.0 license




Integrity in Government through Records Management


Book Description

As a celebration of Anne Thurston’s pioneering work on records and archives management as an essential basis for demonstrating integrity in government, this excellent volume brings together scholars and practicing archivists to discuss key issues around records as evidence for accountability, transparency and the protection of citizens’ rights. Never before have authors from the developing and developed worlds come together to explore the intersection of records management, public administration and international development. The book covers Thurston’s work, the importance of records management for effective governance and digital records management and preservation in developing countries. Case studies from across Africa enhance the theoretical and practical perspectives taken by the authors. This book is essential reading for scholars and students interested in records management and good governance around the world.




Managing Risk in Information Systems


Book Description

This second edition provides a comprehensive overview of the SSCP Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Written by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. It provides a modern and comprehensive view of information security policies and frameworks; examines the technical knowledge and software skills required for policy implementation; explores the creation of an effective IT security policy framework; discusses the latest governance, regulatory mandates, business drives, legal considerations, and much more. --