8 research outputs found
Volume 46 - Issue 01 - Friday, September 10, 2010
The Rose Thorn, Rose-Hulman\u27s independent student newspaper.https://scholar.rose-hulman.edu/rosethorn/1075/thumbnail.jp
Factors That Affect The Adoption Of Cloud Computing For An Enterprise: A Case Study Of Cloud Adoption Within Intel Corporation
With so much hype about cloud computing, it’s easy to lose sight of why it’s such an important trend.
Cloud Computing (CC) has the potential to offer enterprise IT management and their employee’s
tremendous opportunities to solve critical challenges to better serve business. This research explores the
current barriers to entries that are preventing wide scale enterprise adoption of Cloud services for
critical business services and what is required to overcome such challenges and uses a case study
approach to examine the actual adoption of Cloud Computing in Intel Corporation. The results of the
study indicates the key factors that IT organisations and business leaders alike across an enterprise will
need to consider when making Cloud Computing adoption more pervasive across their enterprise. Intel
identified barriers to Cloud Adoption such as (i) the need to work closely with suppliers to commit to a
timeline of when they will be in a position to support their applications in the cloud (ii) the presence of
redundant configurations that are not fully proven in such highly virtual multi-tenant virtual
environments that require load balanced highly available web front ends, and (iii) application security
validation which is a big concern for enterprise IT organisation such as Intel in their private cloud, and
(iv) having a complete understanding of application workloads and behaviours
Technologically Competent: Ethical Practice for 21st Century Lawyering
The impact of technology and social media on litigation and the infiltration of technology into the U.S. and world markets are undeniable. Currently, ABA Model Rule 1.1 and its Comment include a broad requirement of technological competence for ethical practice. This Article will identify the obligations of technological competence embodied in Model Rule 1.1 and examine the current cases and ethical decisions that reveal the evolving national and state-specific technological competence standards. After reviewing the timeline of cases and current scholarly literature, this Article proposes a more specific ethical standard for baseline knowledge of various technologies according to current practice and use of ever-expanding technologies by today’s lawyers. The landscape is constantly changing in the field of legal technologies, and attorneys must follow the new professional norms of technological competence for their ethical practice. Overall, this goal may be achieved by more specific rules or guidelines, CLE requirements, and state ethical mandates or guidance that will create clarity for digital lawyering and boundaries for the ethical practice of law for a digital age. More robust technological guidelines and areas of ethical competence will prepare attorneys to practice law effectively and ethically in the ever-expanding digitized landscape of the 21st century
Are backdoor mandates ethical? A position paper
Over the past several years, several governments have, at times, pushed for the idea that commercial software should be required to include a 'backdoor,' a deliberate vulnerability whose existence and exploitation mechanism are disclosed only to the appropriate authorities. This would enable the authorities to obtain access to the information contained in any device running this software when needed to react to criminal activity
Mitigating the Risk of Knowledge Leakage in Knowledge Intensive Organizations: a Mobile Device Perspective
In the current knowledge economy, knowledge represents the most strategically
significant resource of organizations. Knowledge-intensive activities advance
innovation and create and sustain economic rent and competitive advantage. In
order to sustain competitive advantage, organizations must protect knowledge
from leakage to third parties, particularly competitors. However, the number
and scale of leakage incidents reported in news media as well as industry
whitepapers suggests that modern organizations struggle with the protection of
sensitive data and organizational knowledge. The increasing use of mobile
devices and technologies by knowledge workers across the organizational
perimeter has dramatically increased the attack surface of organizations, and
the corresponding level of risk exposure. While much of the literature has
focused on technology risks that lead to information leakage, human risks that
lead to knowledge leakage are relatively understudied. Further, not much is
known about strategies to mitigate the risk of knowledge leakage using mobile
devices, especially considering the human aspect. Specifically, this research
study identified three gaps in the current literature (1) lack of in-depth
studies that provide specific strategies for knowledge-intensive organizations
based on their varied risk levels. Most of the analysed studies provide
high-level strategies that are presented in a generalised manner and fail to
identify specific strategies for different organizations and risk levels. (2)
lack of research into management of knowledge in the context of mobile devices.
And (3) lack of research into the tacit dimension of knowledge as the majority
of the literature focuses on formal and informal strategies to protect explicit
(codified) knowledge.Comment: The University of Melbourne PhD Thesi