1,083 research outputs found

    INFORMATION TECHNOLOGY SECURITY CONCERNS FOR UNIVERSITY WORKFORCE AND SUPPORTING INFRASTRUCTURE DURING A PANDEMIC

    Get PDF
    Faculty and staff working from home during the COVID pandemic were presented with new challenges in adapting to emergency remote teaching, as well as new and expanded cyber security threats. Changes to course delivery, remote access from public locations, and the potential of faculty and staff storing confidential educational records on university-issued devices, and potentially personally owned devices, made faculty and staff prime targets of malicious attackers. Information technology departments were challenged to support and secure the remote workforce from new cyber threats to protect their faculty, staff, and students from cyber-attacks. The focus of this study was to identify faculty and staff perceptions of cyber security, assess their understanding of cybersecurity policies and procedures, and to also identify concerns they viewed that needed to be addressed to be prepared for the future. Using descriptive research methodology, an online survey containing 37 items was created and sent to faculty and staff at a midwestern university to answer three research questions. The study identified that the faculty and staff at the institution surveyed understood the role they and others have at the university to protect the university from cyber threats. It was also identified that they understood the policies and procedures of the university regarding cyber security. Faculty and staff also identified various forms of technology and accessibility issues they feel need to be addressed if they are required to perform emergency remote teaching and support to maintain university operations

    Internet Predictions

    Get PDF
    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section

    Peer-to-Peer Based Trading and File Distribution for Cloud Computing

    Get PDF
    In this dissertation we take a peer-to-peer approach to deal with two specific issues, fair trading and file distribution, arisen from data management for cloud computing. In mobile cloud computing environment cloud providers may collaborate with each other and essentially organize some dedicated resources as a peer to peer sharing system. One well-known problem in such peer to peer systems with exchange of resources is free riding. Providing incentives for peers to contribute to the system is an important issue in peer to peer systems. We design a reputation-based fair trading mechanism that favors peers with higher reputation. Based on the definition of the reputation used in the system, we derive a fair trading policy. We evaluate the performance of reputation-based trading mechanisms and highlight the scenarios in which they can make a difference. Distribution of data to the resources within a cloud or to different collaborating clouds efficiently is another issue in cloud computing. The delivery efficiency is dependent on the characteristics of the network links available among these network nodes and the mechanism that takes advantage of them. Our study is based on the Global Environment for Network Innovations (GENI), a testbed for researchers to build a virtual laboratory at scale to explore future Internets. Our study consists of two parts. First, we characterize the links in the GENI network. Even though GENI has been used in many research and education projects, there is no systematic study about what we can expect from the GENI testbeds from a performance perspective. The goal is to characterize the links of the GENI networks and provide guidance for GENI experiments. Second, we propose a peer to peer approach to file distribution for cloud computing. We develop a mechanism that uses multiple delivery trees as the distribution structure, which takes into consideration the measured performance information in the GENI network. Files are divided into chunks to improve parallelism among different delivery trees. With a strict scheduling mechanism for each chunk, we can reduce the overall time for getting the file to all relevant nodes. We evaluate the proposed mechanism and show that our mechanism can significantly reduce the overall delivery time

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue Strategic Planning in the College and University Ecosystem Outlook 2012: Chickens or Eggs? lT Trends on Campus: 2012 Best Practices in Deploying a Successful University SAN Beyond Convergence: How Advanced Networking Will Erase Campus Boundaries Distributed Computing: The Path to the Power? Cell Phones on the University Campus: Adversary or Ally? lnstitutional Excellence Award Honorable Mention: Wake Forest University Interview President\u27s Message From the Executive Director Here\u27s My Advic

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue lT Market Clock for Enterprise Networking lnfrastructure, 2010 Emerging Technology Trends-Finding the Next Big Thing Money and Mobile Access Challenge Community Colleges A Business Perspective on Hosted Communications FMC: Ready to Fly or Flop? Challenges Facing Broadband Wireless Providers Deploying IEEE 802.11n Data and Security Networks Campuswide While Optimizing Energy Efficiency Interview President\u27s Message. From the Executive Director O&A from the CI

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue The Rollout That Will Never End Unified Communications lmplementation: A People Problem? UNC\u27s VolP Migration: Decommissioning a Legacy Switch Mapping the Plumbing of Unified Communications Technology Primer: Unified Communications Higher Ed, Data Retention\u27 and Federal eDiscovery: The Case for Full e-Mail Archiving Partnerships: Taking the Business Relationship to the Next Level Interview President\u27s Message From the Executive Directo

    Science Information Systems Newsletter, issue 28

    Get PDF
    The purpose of the Information Systems Newsletter is to inform the space science and applications research community about information systems development and to promote coordination and collaboration by providing a forum for communication. This quarterly publication focuses on programs sponsored by the Information Systems Branch in support of NASA's Office of Space Science. Articles of interest for other programs and agencies are presented as well. The April 1993 issue is presented

    Strategically Addressing the Latest Challenges of Workplace Mobility to Meet the Increasing Mobile Usage Demands

    Get PDF
    During this post-PC era, many organizations are embracing the concept of IT consumerization/ Bring-Your-Own Device (BYOD) in their workplace. BYOD is a strategy that enables employees to utilize their personally-owned mobile devices, such as smart phones, tablets, laptops, and netbooks, to connect to the corporate network and access enterprise data. It is estimated that employees will bring two to four Internet-capable devices to work for personal and professional activities. From increased employee satisfaction and productivity to lower IT equipment and operational expenditures, companies have recognized that mobile devices are reasonably essential to their own success. However, many organizations are facing significant challenges with the explosion of mobile devices being used today along with provisioning the appropriate supporting infrastructure due to the unprecedented demands on the wireless and network infrastructures. For example, there is not only a growth in the number of wirelessly connected devices but the amount of bandwidth being consumed on the enterprise networks as well which is furthermore driven by increased usage of video and enterprise applications. Managing mobility and storage along with securing corporate assets have become difficult tasks for IT professionals as many organizations underestimate the potential security and privacy risks of using wireless devices to access organizational resources and data. Therefore, to address the needs and requirements of a new mobile workforce, organizations must involve key members from the Information Technology (IT), Human Resources (HR) and various business units to evaluate the existing and emerging issues and risks posed by BYOD. Then a mobile strategy should be developed by taking into consideration the enterprise objectives to ensure it aligns with the overall organizational strategy. There are various solutions available to address the needs and demands of an organization, such as Distributed Intelligence Architecture, network optimization, monitoring tools, unified management and security platforms, and other security measures. By implementing a suitable mobile strategy, organizations can ensure their particular enterprise network and wireless architecture is designed for highly scalability, performance and reliability. They must also evaluate their existing policies and procedures to ensure appropriate security and privacy measures are in place to address the increasing mobile usage demands and potential liability risks. By taking these factors into consideration, our team has analyzed the current BYOD issues for Educational Testing Service (ETS), which is a non-profit organization based in Princeton, New Jersey. Our findings have revealed a few major technical concerns relating to inadequate network and wireless infrastructure and the lack of a unified management and security platform. Thus, the team has recommended for ETS to implement Distributed Intelligence Architecture, network optimization and Enterprise Mobility Management (EMM) to address and resolve their current issues and risks. In conclusion, companies are beginning to seize this transition in order to become competitive and productive in the workplace; however the unprecedented demands on the corporate network and risk to data security are critical aspects that need to be evaluated on an on-going basis. With this analysis, organizations can review, evaluate and implement the proposed solutions and best practices to address the most common BYOD-related issues that companies are facing these days. However, organizations should continually research the latest technologies that may be available and implement solutions that specifically meet their issues

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue Campus Wireless Needs; DAS lssues to Consider Dead Duck: Don\u27t Let the Next Flap Over Social Media Be Yours New Law Requires Fire Reporting ADVERTORIAL: Centurylink Cloud-Based Services The Never-Ending Conundrum of lllegal Student Downloads Technology and Privacy on the 21st-Century Campus Great Expectations: Cloud Computing Fail to Plan?...Plan to Fail President\u27s Message From the lnterim Executive Director Q&A with the CI

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    This Is Issue Voice over lP: Still Emerging After All These Years Unified Messaging: A Killer App tor lP State-of-the-Art Communications at SUNY Upstate Medical OptlPuter Enables More Powerful Collaborative Research Wireless Technology: A Major Area of Telecommunications Growth Ready for Convergence: lT Management and Technologists Innovation Culture Clashes Speech Recognition Solves Problems Interview President\u27s Message From the Executive Directo
    • …
    corecore