1,083 research outputs found
INFORMATION TECHNOLOGY SECURITY CONCERNS FOR UNIVERSITY WORKFORCE AND SUPPORTING INFRASTRUCTURE DURING A PANDEMIC
Faculty and staff working from home during the COVID pandemic were presented with new challenges in adapting to emergency remote teaching, as well as new and expanded cyber security threats. Changes to course delivery, remote access from public locations, and the potential of faculty and staff storing confidential educational records on university-issued devices, and potentially personally owned devices, made faculty and staff prime targets of malicious attackers. Information technology departments were challenged to support and secure the remote workforce from new cyber threats to protect their faculty, staff, and students from cyber-attacks. The focus of this study was to identify faculty and staff perceptions of cyber security, assess their understanding of cybersecurity policies and procedures, and to also identify concerns they viewed that needed to be addressed to be prepared for the future. Using descriptive research methodology, an online survey containing 37 items was created and sent to faculty and staff at a midwestern university to answer three research questions. The study identified that the faculty and staff at the institution surveyed understood the role they and others have at the university to protect the university from cyber threats. It was also identified that they understood the policies and procedures of the university regarding cyber security. Faculty and staff also identified various forms of technology and accessibility issues they feel need to be addressed if they are required to perform emergency remote teaching and support to maintain university operations
Internet Predictions
More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section
Peer-to-Peer Based Trading and File Distribution for Cloud Computing
In this dissertation we take a peer-to-peer approach to deal with two specific issues, fair trading and file distribution, arisen from data management for cloud computing.
In mobile cloud computing environment cloud providers may collaborate with each other and essentially organize some dedicated resources as a peer to peer sharing system. One well-known problem in such peer to peer systems with exchange of resources is free riding. Providing incentives for peers to contribute to the system is an important issue in peer to peer systems. We design a reputation-based fair trading mechanism that favors peers with higher reputation. Based on the definition of the reputation used in the system, we derive a fair trading policy. We evaluate the performance of reputation-based trading mechanisms and highlight the scenarios in which they can make a difference.
Distribution of data to the resources within a cloud or to different collaborating clouds efficiently is another issue in cloud computing. The delivery efficiency is dependent on the characteristics of the network links available among these network nodes and the mechanism that takes advantage of them. Our study is based on the Global Environment for Network Innovations (GENI), a testbed for researchers to build a virtual laboratory at scale to explore future Internets.
Our study consists of two parts. First, we characterize the links in the GENI network. Even though GENI has been used in many research and education projects, there is no systematic study about what we can expect from the GENI testbeds from a performance perspective. The goal is to characterize the links of the GENI networks and provide guidance for GENI experiments.
Second, we propose a peer to peer approach to file distribution for cloud computing. We develop a mechanism that uses multiple delivery trees as the distribution structure, which takes into consideration the measured performance information in the GENI network. Files are divided into chunks to improve parallelism among different delivery trees. With a strict scheduling mechanism for each chunk, we can reduce the overall time for getting the file to all relevant nodes. We evaluate the proposed mechanism and show that our mechanism can significantly reduce the overall delivery time
ACUTA Journal of Telecommunications in Higher Education
In This Issue
Strategic Planning in the College and University Ecosystem
Outlook 2012: Chickens or Eggs?
lT Trends on Campus: 2012
Best Practices in Deploying a Successful University SAN
Beyond Convergence: How Advanced Networking Will Erase Campus Boundaries
Distributed Computing: The Path to the Power?
Cell Phones on the University Campus: Adversary or Ally?
lnstitutional Excellence Award Honorable Mention: Wake Forest University
Interview
President\u27s Message
From the Executive Director
Here\u27s My Advic
ACUTA Journal of Telecommunications in Higher Education
In This Issue
lT Market Clock for Enterprise Networking lnfrastructure, 2010
Emerging Technology Trends-Finding the Next Big Thing
Money and Mobile Access Challenge Community Colleges
A Business Perspective on Hosted Communications
FMC: Ready to Fly or Flop?
Challenges Facing Broadband Wireless Providers
Deploying IEEE 802.11n Data and Security Networks Campuswide While Optimizing Energy Efficiency
Interview
President\u27s Message.
From the Executive Director
O&A from the CI
ACUTA Journal of Telecommunications in Higher Education
In This Issue
The Rollout That Will Never End
Unified Communications lmplementation: A People Problem?
UNC\u27s VolP Migration: Decommissioning a Legacy Switch
Mapping the Plumbing of Unified Communications
Technology Primer: Unified Communications
Higher Ed, Data Retention\u27 and Federal eDiscovery: The Case for Full e-Mail Archiving
Partnerships: Taking the Business Relationship to the Next Level
Interview
President\u27s Message
From the Executive Directo
Science Information Systems Newsletter, issue 28
The purpose of the Information Systems Newsletter is to inform the space science and applications research community about information systems development and to promote coordination and collaboration by providing a forum for communication. This quarterly publication focuses on programs sponsored by the Information Systems Branch in support of NASA's Office of Space Science. Articles of interest for other programs and agencies are presented as well. The April 1993 issue is presented
Strategically Addressing the Latest Challenges of Workplace Mobility to Meet the Increasing Mobile Usage Demands
During this post-PC era, many organizations are embracing the concept of IT consumerization/ Bring-Your-Own Device (BYOD) in their workplace. BYOD is a strategy that enables employees to utilize their personally-owned mobile devices, such as smart phones, tablets, laptops, and netbooks, to connect to the corporate network and access enterprise data. It is estimated that employees will bring two to four Internet-capable devices to work for personal and professional activities. From increased employee satisfaction and productivity to lower IT equipment and operational expenditures, companies have recognized that mobile devices are reasonably essential to their own success.
However, many organizations are facing significant challenges with the explosion of mobile devices being used today along with provisioning the appropriate supporting infrastructure due to the unprecedented demands on the wireless and network infrastructures. For example, there is not only a growth in the number of wirelessly connected devices but the amount of bandwidth being consumed on the enterprise networks as well which is furthermore driven by increased usage of video and enterprise applications.
Managing mobility and storage along with securing corporate assets have become difficult tasks for IT professionals as many organizations underestimate the potential security and privacy risks of using wireless devices to access organizational resources and data. Therefore, to address the needs and requirements of a new mobile workforce, organizations must involve key members from the Information Technology (IT), Human Resources (HR) and various business units to evaluate the existing and emerging issues and risks posed by BYOD. Then a mobile strategy should be developed by taking into consideration the enterprise objectives to ensure it aligns with the overall organizational strategy.
There are various solutions available to address the needs and demands of an organization, such as Distributed Intelligence Architecture, network optimization, monitoring tools, unified management and security platforms, and other security measures. By implementing a suitable mobile strategy, organizations can ensure their particular enterprise network and wireless architecture is designed for highly scalability, performance and reliability.
They must also evaluate their existing policies and procedures to ensure appropriate security and privacy measures are in place to address the increasing mobile usage demands and potential liability risks.
By taking these factors into consideration, our team has analyzed the current BYOD issues for Educational Testing Service (ETS), which is a non-profit organization based in Princeton, New Jersey. Our findings have revealed a few major technical concerns relating to inadequate network and wireless infrastructure and the lack of a unified management and security platform. Thus, the team has recommended for ETS to implement Distributed Intelligence Architecture, network optimization and Enterprise Mobility Management (EMM) to address and resolve their current issues and risks.
In conclusion, companies are beginning to seize this transition in order to become competitive and productive in the workplace; however the unprecedented demands on the corporate network and risk to data security are critical aspects that need to be evaluated on an on-going basis. With this analysis, organizations can review, evaluate and implement the proposed solutions and best practices to address the most common BYOD-related issues that companies are facing these days. However, organizations should continually research the latest technologies that may be available and implement solutions that specifically meet their issues
ACUTA Journal of Telecommunications in Higher Education
In This Issue
Campus Wireless Needs; DAS lssues to Consider
Dead Duck: Don\u27t Let the Next Flap Over Social Media Be Yours
New Law Requires Fire Reporting
ADVERTORIAL: Centurylink Cloud-Based Services
The Never-Ending Conundrum of lllegal Student Downloads
Technology and Privacy on the 21st-Century Campus
Great Expectations: Cloud Computing
Fail to Plan?...Plan to Fail
President\u27s Message
From the lnterim Executive Director
Q&A with the CI
ACUTA Journal of Telecommunications in Higher Education
This Is Issue
Voice over lP: Still Emerging After All These Years
Unified Messaging: A Killer App tor lP
State-of-the-Art Communications at SUNY Upstate Medical
OptlPuter Enables More Powerful Collaborative Research
Wireless Technology: A Major Area of Telecommunications Growth
Ready for Convergence: lT Management and Technologists
Innovation Culture Clashes
Speech Recognition Solves Problems
Interview
President\u27s Message
From the Executive Directo
- …