Preview

Record Keeping System

Better Essays
Open Document
Open Document
11188 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Record Keeping System
Building Record-Keeping Systems: Archivists Are Not Alone on the Wild Frontier
MARGARET HEDSTROM*
RBSUMB Des recherches rCcentes dans le domaine des documents Clectroniquesont mis de I'avant des propositions et Ctabli des modkles en vue d'inclure des fonctions et des procCdures de contr6le de I'information au sein de systkmes informatiques pour s'assurer de I'authenticitC et de I'intCgritC des documents. Cet article passe en revue plusieurs projets de gestion des documents informatiques men& par des archivistes et examine ensuite des progrks rCcents en matikre de sCcuritC des rCseaux et d'authentification sur la base des recherches rCalisCes h I'extCrieur de la communautt5 archivistique. Mettant I'accent principalement sur le dCveloppement de a systkmes sCcurisCs n (trusted systems) destints h soutenir le commerce Clectronique et la publication numCrique, I'article Cvalue diverses mCthodologies alternatives offrant des solutions partielles aux prCoccupations en matikre de gestion des documents informatiques. I1 montre en quoi les mCthodologies employCes pour le dCveloppement de systkmes sCcurisCs sont compatibles avec les objectifs archivistiques et soulkve certaines prCoccupations en matitre de prkservation et d'accessibilitC h long terme.
ABSTRACT Recent research on electronic records has produced proposals and models for adding functionality and procedural controls to information systems so that systems can protect the authenticity and integrity of records. This article reviews several electronic records management projects led by archivists and then explores recent developments in network security and authentication based on research outside the archival community. Focusing primarily on the development of "trusted systems" to support electronic commerce and digital publishing, the article evaluates alternative methodologies which offer partial solutions to electronic record-keeping concerns. It suggests ways in which methodologies for trusted systems are

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Labour Problem at James Town

    • 10027 Words
    • 41 Pages

    content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms…

    • 10027 Words
    • 41 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms…

    • 13057 Words
    • 53 Pages
    Powerful Essays
  • Powerful Essays

    2901288

    • 2635 Words
    • 9 Pages

    content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms…

    • 2635 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Hip Hop in History

    • 3436 Words
    • 53 Pages

    content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms…

    • 3436 Words
    • 53 Pages
    Powerful Essays
  • Good Essays

    One very important task in defining the needed security for a system of data is first to understand the nature of that data and how it is used in a given system. Within any given organization there is a myriad of data that can all be categorized in a different way. We can use this opportunity to discuss the sensitivity of data within our organization and then break it into appropriate classifications to be used when implementing security measures. Additionally, this process will help the organization to conform to the ISO standards the company may be subjected to, in this case, ISO/IEC code 18028. This also directly relates to certain laws that also pertain to the security of information and finally how the organization will be able to test and measure how well these security practices are implemented and followed. Lastly, we can outline here how controls can be created and implemented to enforce these requirements as well as how auditing can validate the effectiveness of these implemented controls.…

    • 1069 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In the office, information is stored on files or computer system and this information form the basis of administrative decisions. Information plays a vital role in organizational decision making; it becomes pertinent that organizations take the necessary care to protect its information. Recently, there are many threats to information in the business world, especially when such information stands to put the…

    • 815 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: 1-Welzer,T., Hölbl,M., Habjanič.A., Brumen,B.,and Družovec,M.,2007,in IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds.Venter,H.,Eloff,M.,Labuschagne,L.,Eloff,j.,von Solms,R.,(Bosten:Springer),pp 479-484…

    • 1300 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    With the increase in human population, digital information is also increasing exponentially. In 2007, 97 percent of assessment showed that approximately 93 percent of information was stored digitally as opposed to less than 1% in 1986. With the amount of information stored digitally, there is an increasing need to share and allow access to the appropriate individuals [1]. As user populations of information system have expanded, the challenge of controlling access to resources using security policies has grown. Access Control is the process for proving authority to access the specific resources, applications and system.…

    • 1572 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    WB/CS/05 Evidence-Based Governance in the Electronic Age Case Study Legal and Judicial Records and Information Systems in South Africa This case study has been prepared by the International Records Management Trust and does not reflect the views of the World Bank nor the Government of South Africa. A World Bank/International Records Management Trust Partnership Project July 2002 CONTENTS Introduction 1 Executive Summary 2 Judicial System and Institutions 5 Records Management in the Courts 10 Integrated Justice System (IJS) and E-Justice 12 Court Processes and Record Keeping Systems 16 Court Process Project 29 Role of the National Archives and Records Service 35 E-Government and Electronic Records Management 37 Records and Information Management: Key Issues 38 Appendix A: List of People Consulted Appendix B:…

    • 19078 Words
    • 110 Pages
    Powerful Essays
  • Powerful Essays

    Sample Study

    • 13910 Words
    • 58 Pages

    Encryption Standard and PKI Infrastructure for the Department of Education in the Province of Cavite is an online…

    • 13910 Words
    • 58 Pages
    Powerful Essays
  • Satisfactory Essays

    Record Management

    • 467 Words
    • 3 Pages

    Proper records management is more important than ever, not only because it promotes organizational efficiency, but because it is required by law! When records are not properly maintained, the institution is at risk of legal and financial penalties.…

    • 467 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Records Management

    • 1125 Words
    • 5 Pages

    According to Beastall in the Journal article Records management meets knowledge gathering, one of the most prevalent problems in the management of information is finding ways to store information and yet ensure that it is readily available for use. "Tying the two sets of information together and getting the "soft" information incorporated, is the challenge for records managers today." (Beastall, 1998, p. 94) In this article, Records management meets knowledge gathering, Beastall brings to the fore front the problems of merging records management and knowledge gathering. Beastall proposes a three stage method "for managing records and knowledge in the current and likely future, technological environment." (Beastall, 1998, abstract)…

    • 1125 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Content is the feeder mechanism for all business processes. And always has been (Moore, 2001). The purpose of a web site is to display and/process content in order to transmit the organisation’s information to the world wide audiences. These days the websites content volumes are increasing rapidly. So, to deliver the content to the audiences in an understandable way, it is necessary to manage the content of the web site. Therefore, content management refers to the process of collecting, managing and publishing content for the audiences and these jobs are done by Content Management Systems (CMS). Theses systems help the organisation to organise information, create and manage an enterprise’s knowledge.…

    • 2596 Words
    • 11 Pages
    Best Essays