Search results

1 – 10 of 405
Article
Publication date: 13 July 2022

Salih Tekin, Kemal Bicakci, Ozgur Mersin, Gulnur Neval Erdem, Abdulkerim Canbay and Yusuf Uzunay

With the irresistible growth in digitization, data backup policies become essential more than ever for organizations seeking to improve reliability and availability of…

Abstract

Purpose

With the irresistible growth in digitization, data backup policies become essential more than ever for organizations seeking to improve reliability and availability of organizations' information systems. However, since backup operations do not come free, there is a need for a data-informed policy to decide how often and which type of backups should be taken. In this paper, the authors present a comprehensive mathematical framework to explore the design space for backup policies and to optimize backup type and interval in a given system. In the authors' framework, three separate cost factors related to the backup process are identified: backup cost, recovery cost and data loss cost. The objective function has a multi-criteria structure leading to a backup policy minimizing a weighed function of these factors. To formalize the cost and objective functions, the authors get help from renewal theory in reliability modeling. The authors' optimization framework also formulates mixed policies involving both full and incremental backups. Through numerical examples, the authors show how the authors' optimization framework could facilitate cost-saving backup policies.

Design/methodology/approach

The methodology starts with designing different backup policies based on system parameters. Each constructed policy is optimized in terms of backup period using renewal theory. After selecting the best back-up policy, the results are demonstrated through numerical studies.

Findings

Data backup polices that are tailored to system parameters can result in significant gains for IT (Information Technology) systems. Collecting the necessary parameters to design intelligent backup policies can also help managers understand managers' systems better. Designed policies not only provides the frequency of back up operations, but also the type of backups.

Originality/value

The original contribution of this study is the explicit construction and determination of the best backup policies for IT systems that are prone to failure. By applying renewal theory in reliability, the authors present a mathematical framework for the joint optimization of backup cost factors, i.e. backup cost, recovery time cost and data loss cost.

Details

Journal of Quality in Maintenance Engineering, vol. 29 no. 2
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 1 January 1995

Howard Falk

One of the most horrifying computer experiences a user can encounter is the destruction of files due to system malfunction or operator error. Even a relatively small computer…

Abstract

One of the most horrifying computer experiences a user can encounter is the destruction of files due to system malfunction or operator error. Even a relatively small computer file, containing only a few thousand bytes, may represent many hours of manual and intellectual labour. Larger files may form the foundation for the daily operations of an individual or of an entire library.

Details

The Electronic Library, vol. 13 no. 1
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 24 May 2013

Yan Han

The purpose of this article is to provide an overview of current uses of cloud computing (CC) services in libraries, address a gap identified in integrating cloud storage in IaaS…

3477

Abstract

Purpose

The purpose of this article is to provide an overview of current uses of cloud computing (CC) services in libraries, address a gap identified in integrating cloud storage in IaaS level, and show how to use EC2 tools for easy backup and resource monitoring.

Design/methodology/approach

The article begins a literature review of CC uses in libraries, organized at the SaaS, PaaS and IaaS levels. The author presents his experience of integrating cloud storage services S3 and GCS. In addition, he also shows how to use virtual machine EC2 tools for backup and monitoring resources.

Findings

The article describes a case study of integrating cloud storage using S3 and GCS. S3 can be integrated with any program whether the program runs on cloud or locally, while GCS is only good for applications running on GAE. The limitation of the current GCS approach makes it hard to use for a stand‐alone cloud storage. The author also discusses virtual machines using EC2 and its related tools for backup, increase storage, and monitoring service. These services make system administration easier as compared to the traditional approach.

Research limitations/implications

The article presents current CC uses in libraries at the SaaS, PaaS, and IaaS levels. CC services are changing quickly. For example, Google has stated that its APIs are experimental. Readers should be aware of this.

Practical implications

The author shows his experience of integrating cloud storage services. Readers can understand the similarities and differences between S3 and GCS. In addition, readers can learn the advantages and concerns associated with implementing cloud computing. Readers are encouraged to consider questions such as content, skills, costs, and security.

Originality/value

There are many uses of CC services in libraries. However, gaps are identified: in IaaS cloud storage, a few libraries used Amazon S3 and Microsoft Azure, but none explored using Google Cloud Storage (GCS); none provided implementation details, difficulties, and comparisons of S3 and GCS; and a few articles have briefly discussed implementations on Amazon EC2, but have not provided specific details about upgrade and backup. This article addresses those gaps.

Details

OCLC Systems & Services: International digital library perspectives, vol. 29 no. 2
Type: Research Article
ISSN: 1065-075X

Keywords

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Article
Publication date: 2 January 2020

Qiuhui Xiao, Xiaotong Xu and Panpan Liu

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security…

2866

Abstract

Purpose

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security status of electronic records preservation. Wuhan, the largest city in central China, serves as a case to investigate the preservation security of electronic records. Challenges to security are summarized, and solutions are proposed to support policy-developing and operational guidance. The paper aims to discuss these issues.

Design/methodology/approach

The Delphi method is applied to analyze the advice of nine experts, select survey items and design questionnaires. Data are collected from 34 archives in Wuhan through field surveys, oral interviews and e-mails, which are analyzed and illustrated with three representative cases.

Findings

Main achievements of electronic records preservation are concluded in the electronic records management system, carrier types and storage formats, and data backup. Problems are summarized as a lack of awareness and capability of defending against security risks, disaster recovery capability, and understanding of electronic record characteristics. Solutions are proposed as follows: carrying out regular security risk evaluation, adopting new technologies, implementing application-level backup, strengthening technology-related education and attracting more IT talent to join the archive discipline. In addition, it is critical to promote an understanding of the characteristics of electronic records.

Originality/value

This paper investigates the security status of electronic records in central China by surveys and case studies. Critical problems and corresponding solutions are raised to support policy-developing and operational guidance for the research and practice of all kinds of institutions that implement electronic records preservation.

Details

Library Hi Tech, vol. 39 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 December 2005

Yan Han

To recommend an integrated server platform and demonstrate a real‐world example that provides high availability (HA) and better data management to meet various systems' computing…

Abstract

Purpose

To recommend an integrated server platform and demonstrate a real‐world example that provides high availability (HA) and better data management to meet various systems' computing needs.

Design/methodology/approach

The paper overviews theoretical background and real‐world implementations for HA and Storage Area Networks (SANs). A systems analysis process is described and a platform was built to integrate the HA and the SAN for an academic library's critical web server and its content management system. Recommendations for selection and implementation are suggested for people adapting this approach.

Findings

The integrated platform is a generic approach to provide the HA and better data management for servers, consisting of Linux/Windows clustering technologies and SANs. Its theoretical background and real‐world implementations proved its ability to meet library's various computing needs.

Practical implications

The integrated platform provides HA for various computing services such as web servers, file servers, databases, and DNS. A systems analysis is recommended for using this platform.

Originality/value

The paper suggests an approach to achieve better server management. It provides an opportunity for IT managers to consider and achieve better server management in order to meet users' raising expectations.

Details

The Electronic Library, vol. 23 no. 6
Type: Research Article
ISSN: 0264-0473

Keywords

Open Access
Article
Publication date: 5 August 2019

Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour

This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…

6373

Abstract

Purpose

This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.

Design/methodology/approach

The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.

Findings

The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).

Research limitations/implications

This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.

Practical implications

The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.

Originality/value

The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.

Details

International Journal of Accounting & Information Management, vol. 27 no. 3
Type: Research Article
ISSN: 1834-7649

Keywords

Article
Publication date: 1 April 1988

Justine Roberts

Quiksave is a backup utility which copies files from a hard disk onto floppy disks, does a total or partial restoration of the floppy files to the hard disk, and provides…

Abstract

Quiksave is a backup utility which copies files from a hard disk onto floppy disks, does a total or partial restoration of the floppy files to the hard disk, and provides automatic reminders to support a user‐determined backup schedule. QuickSave runs on IBM/PC/AT computers and sells for $99 from Micro Interfaces Corp., 16359 N.W. 57th Avenue, Hialeah, FL 33014, USA. (800) 637–7226; (305)623–9262.

Details

The Electronic Library, vol. 6 no. 4
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 February 1990

Walt Crawford

Your second PC will certainly have a high‐capacity hard disk—as will your first, if you're buying it today and intend to do any serious work with it. The author has some (possibly…

Abstract

Your second PC will certainly have a high‐capacity hard disk—as will your first, if you're buying it today and intend to do any serious work with it. The author has some (possibly surprising) advice as to the First program or set of programs you should install and use on that hard disk, after DOS. It makes sense to organize and control the environment; that means working with a good set of disk utilities. The author discusses uses for disk utilities and an economical package that combines good disk utilities with some other useful software to help you make sense of your personal computing environment. Citations from the PC literature that arrived October‐December 1989 omit the year‐end predictions and awards, but include some interesting reviews and other articles.

Details

Library Hi Tech, vol. 8 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 29 March 2013

Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber and Edgar Weippl

Today's database management systems implement sophisticated access control mechanisms to prevent unauthorized access and modifications. For instance, this is an important basic…

Abstract

Purpose

Today's database management systems implement sophisticated access control mechanisms to prevent unauthorized access and modifications. For instance, this is an important basic requirement for SOX (Sarbanes‐Oxley Act) compliance, whereby every past transaction has to be traceable at any time. However, malicious database administrators may still be able to bypass the security mechanisms in order to make hidden modifications to the database. This paper aims to address these issues.

Design/methodology/approach

In this paper the authors define a novel signature of a B+‐tree, a widely‐used storage structure in database management systems, and propose its utilization for supporting the logging in databases. This additional logging mechanism is especially useful in conjunction with forensic techniques that directly target the underlying tree‐structure of an index. Several techniques for applying this signature in the context of digital forensics on B+‐trees are proposed in the course of this paper. Furthermore, the authors' signature can be used to generate exact copies of an index for backup purposes, thereby enabling the owner to completely restore data, even on the structural level.

Findings

For database systems in enterprise environments, compliance to regulatory standards such as SOX (Sarbanes‐Oxley Act), whereby every past transaction has to be traceable at any time, is a fundamental requirement. Today's database management systems usually implement sophisticated access control mechanisms to prevent unauthorized access and modifications. Nonetheless malicious database administrators would be able to bypass the security mechanisms in order to make modifications to the database, while covering their tracks.

Originality/value

In this paper, the authors demonstrate how the tree structure of the underlying store engine can be used to enhance forensic logging mechanisms of the database. They define a novel signature for B+‐trees, which are used by the InnoDB storage engine. This signature stores the structure of database storage files and can help in reconstructing previous versions of the file for forensic purposes. Furthermore, the authors' signature can be used to generate exact copies of an index for backup purposes, thus enabling the owner to completely restore data, even on the structural level. The authors applied their concept to four real‐life scenarios in order to evaluate its effectiveness.

Details

International Journal of Web Information Systems, vol. 9 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of 405