Search results

1 – 10 of over 4000
Article
Publication date: 13 July 2022

Salih Tekin, Kemal Bicakci, Ozgur Mersin, Gulnur Neval Erdem, Abdulkerim Canbay and Yusuf Uzunay

With the irresistible growth in digitization, data backup policies become essential more than ever for organizations seeking to improve reliability and availability of…

Abstract

Purpose

With the irresistible growth in digitization, data backup policies become essential more than ever for organizations seeking to improve reliability and availability of organizations' information systems. However, since backup operations do not come free, there is a need for a data-informed policy to decide how often and which type of backups should be taken. In this paper, the authors present a comprehensive mathematical framework to explore the design space for backup policies and to optimize backup type and interval in a given system. In the authors' framework, three separate cost factors related to the backup process are identified: backup cost, recovery cost and data loss cost. The objective function has a multi-criteria structure leading to a backup policy minimizing a weighed function of these factors. To formalize the cost and objective functions, the authors get help from renewal theory in reliability modeling. The authors' optimization framework also formulates mixed policies involving both full and incremental backups. Through numerical examples, the authors show how the authors' optimization framework could facilitate cost-saving backup policies.

Design/methodology/approach

The methodology starts with designing different backup policies based on system parameters. Each constructed policy is optimized in terms of backup period using renewal theory. After selecting the best back-up policy, the results are demonstrated through numerical studies.

Findings

Data backup polices that are tailored to system parameters can result in significant gains for IT (Information Technology) systems. Collecting the necessary parameters to design intelligent backup policies can also help managers understand managers' systems better. Designed policies not only provides the frequency of back up operations, but also the type of backups.

Originality/value

The original contribution of this study is the explicit construction and determination of the best backup policies for IT systems that are prone to failure. By applying renewal theory in reliability, the authors present a mathematical framework for the joint optimization of backup cost factors, i.e. backup cost, recovery time cost and data loss cost.

Details

Journal of Quality in Maintenance Engineering, vol. 29 no. 2
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 15 June 2015

Parul Zaveri

Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is…

2695

Abstract

Purpose

Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is necessary for librarians to understand and apply the ways of protecting digital data and the related equipment from disaster. The purpose of this paper is to address the issues related to digital data protection in libraries in India. It aims to investigate the perceptions of librarians about the probability of digital disasters happening in their libraries, and to assess the level of digital disaster preparedness among libraries.

Design/methodology/approach

A questionnaire based survey of 276 libraries in the Western region of India was conducted to find out the digital data protection measures taken by them. The paper provides an overview and analysis of the general trends in digital data protection in these libraries.

Findings

The research results indicate that due to lack of knowledge about handling of digital data, and inadequate digital infrastructure setup in organizations, the chances of loss of digital data are high. However, common measures like taking backup of data manually are mostly followed by all libraries. The paper has identified the trends in protection of digital data, as well as the lacunae, in Indian libraries. Basic guidelines on digital data preservation are also presented in the paper.

Practical implications

The guidelines provided in the paper will be useful to any libraries to take measures for protection of the digital data. The libraries will be able to prepare their digital data protection plan and train the staff accordingly.

Originality/value

This paper is the first to address the issue of digital disaster management in libraries in India. It provides a detailed analysis of digital data protection measures taken by Indian libraries currently.

Details

Library Hi Tech, vol. 33 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Article
Publication date: 1 January 1995

Howard Falk

One of the most horrifying computer experiences a user can encounter is the destruction of files due to system malfunction or operator error. Even a relatively small computer…

Abstract

One of the most horrifying computer experiences a user can encounter is the destruction of files due to system malfunction or operator error. Even a relatively small computer file, containing only a few thousand bytes, may represent many hours of manual and intellectual labour. Larger files may form the foundation for the daily operations of an individual or of an entire library.

Details

The Electronic Library, vol. 13 no. 1
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 3 March 2023

Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…

Abstract

Purpose

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.

Design/methodology/approach

This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.

Findings

The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.

Originality/value

Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 December 2000

Steve M. Hawkins, David C. Yen and David C. Chou

The migration from centralized mainframe computers to distributed client/server systems has created a concern on data security. If a disaster occurs to the organization that…

7278

Abstract

The migration from centralized mainframe computers to distributed client/server systems has created a concern on data security. If a disaster occurs to the organization that destroys a server or the entire network, a company may not be able to recover from the loss. Developing an effective disaster recovery plan will help an organization protect them from data loss.

Details

Information Management & Computer Security, vol. 8 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 2 January 2020

Qiuhui Xiao, Xiaotong Xu and Panpan Liu

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security…

2855

Abstract

Purpose

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security status of electronic records preservation. Wuhan, the largest city in central China, serves as a case to investigate the preservation security of electronic records. Challenges to security are summarized, and solutions are proposed to support policy-developing and operational guidance. The paper aims to discuss these issues.

Design/methodology/approach

The Delphi method is applied to analyze the advice of nine experts, select survey items and design questionnaires. Data are collected from 34 archives in Wuhan through field surveys, oral interviews and e-mails, which are analyzed and illustrated with three representative cases.

Findings

Main achievements of electronic records preservation are concluded in the electronic records management system, carrier types and storage formats, and data backup. Problems are summarized as a lack of awareness and capability of defending against security risks, disaster recovery capability, and understanding of electronic record characteristics. Solutions are proposed as follows: carrying out regular security risk evaluation, adopting new technologies, implementing application-level backup, strengthening technology-related education and attracting more IT talent to join the archive discipline. In addition, it is critical to promote an understanding of the characteristics of electronic records.

Originality/value

This paper investigates the security status of electronic records in central China by surveys and case studies. Critical problems and corresponding solutions are raised to support policy-developing and operational guidance for the research and practice of all kinds of institutions that implement electronic records preservation.

Details

Library Hi Tech, vol. 39 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 November 2002

Eldad Yechiam, Ernan Haruvy and Ido Erev

Companies incur immense losses due to employee neglect to save and back up data and failure to frequently update anti‐virus protections. This problem appears perplexing as such…

1490

Abstract

Companies incur immense losses due to employee neglect to save and back up data and failure to frequently update anti‐virus protections. This problem appears perplexing as such oversights are clearly neither in the organization’s nor in the employees’ best interest. We review the possible reasons for this phenomenon arising from studies of social dilemmas, unrealistic optimism, and reinforcement learning. We follow with three examples of “under‐saving” behavior. The results reveal that in all three cases computer users, novices and experts, feel that they do not save enough. This feeling is consistent with the reinforcement learning account. People think that they are less careful than they wish to be. The implications of this observation are discussed.

Details

Journal of Managerial Psychology, vol. 17 no. 7
Type: Research Article
ISSN: 0268-3946

Keywords

Article
Publication date: 18 January 2021

Fatimah Jibril Abduldayan, Fasola Petunola Abifarin, Georgina Uchey Oyedum and Jibril Attahiru Alhassan

The purpose of this study was to understand the research data management practices of chemistry researchers in the five specialized federal universities of technology in Nigeria…

Abstract

Purpose

The purpose of this study was to understand the research data management practices of chemistry researchers in the five specialized federal universities of technology in Nigeria. Appropriate research data management practice ensures that research data are available for reuse by secondary users, and research findings can be verified and replicated within the scientific community. A poor research data management practice can lead to irrecoverable data loss, unavailability of data to support research findings and lack of trust in the research process.

Design/methodology/approach

An exploratory research technique involving semi-structured, oral and face-to-face interview is used to gather data on research data management practices of chemistry researchers in Nigeria. Interview questions were divided into four major sections covering chemistry researchers’ understanding of research data, experience with data loss, data storage method and backup techniques, data protection, data preservation and availability of data management plan. Braun and Clarke thematic analysis approach was adapted, and the Provalis Qualitative Data Miner (version 5) software was used for generating themes and subthemes from the coding framework and for presenting the findings.

Findings

Findings revealed that chemistry researchers in Nigeria have a good understanding of the concept of research data and its importance to research findings. Chemistry researchers have had several experiences of irrecoverable loss of data because of poor choice of storage devices, back-up methods and weak data protection systems. Even though the library was agreed as the most preferred place for long-term data preservation, there is the issue of trust and fear of loss of ownership of data to unauthorized persons or party. No formal data management plan is used while conducting their scientific research.

Research limitations/implications

The research focused on research data management practices of chemistry researchers in the five specialized federal universities of technology in Nigeria. Although the findings of the study are similar to perceptions and practices of researchers around the world, it cannot be used as a basis for generalization across other scientific disciplines.

Practical implications

This study concluded that chemistry researchers need further orientation and continuous education on the importance and benefits of appropriate research data management practice. The library should also roll out research data management programs to guide researchers and improve their confidence throughout the research process.

Social implications

Appropriate research data management practice not only ensures that the underlying research data are true and available for reuse and re-validation, but it also encourages data sharing among researchers. Data sharing will help to ensure better collaboration among researchers and increased visibility of the datasets and data owners through the use of standard data citations and acknowledgements.

Originality/value

This is a qualitative and in-depth study of research data management practices and perceptions among researchers in a particular scientific field of study.

Abstract

Details

Enabling Strategic Decision-Making in Organizations Through Dataplex
Type: Book
ISBN: 978-1-80455-051-9

1 – 10 of over 4000