1,312 research outputs found
ACUTA Journal of Telecommunications in Higher Education
In This Issue
Strategic Planning in the College and University Ecosystem
Outlook 2012: Chickens or Eggs?
lT Trends on Campus: 2012
Best Practices in Deploying a Successful University SAN
Beyond Convergence: How Advanced Networking Will Erase Campus Boundaries
Distributed Computing: The Path to the Power?
Cell Phones on the University Campus: Adversary or Ally?
lnstitutional Excellence Award Honorable Mention: Wake Forest University
Interview
President\u27s Message
From the Executive Director
Here\u27s My Advic
ACUTA Journal of Telecommunications in Higher Education
In This Issue
Technology Advances: The View from 10,000 Feet
WAP: Are You Ready for a Wireless World?
Virtual Private Networks: How They Can Work for Colleges and Universities
Network Security: How\u27s Your Posture?
Software for Rent: Contact ASP
Voicing My IPinion
Institutional Excellence Award: Colorado Christian University
Columns
Interview
Book Revie
Electronic security - risk mitigation in financial transactions : public policy issues
This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators
Factors shaping the evolution of electronic documentation systems
The main goal is to prepare the space station technical and managerial structure for likely changes in the creation, capture, transfer, and utilization of knowledge. By anticipating advances, the design of Space Station Project (SSP) information systems can be tailored to facilitate a progression of increasingly sophisticated strategies as the space station evolves. Future generations of advanced information systems will use increases in power to deliver environmentally meaningful, contextually targeted, interconnected data (knowledge). The concept of a Knowledge Base Management System is emerging when the problem is focused on how information systems can perform such a conversion of raw data. Such a system would include traditional management functions for large space databases. Added artificial intelligence features might encompass co-existing knowledge representation schemes; effective control structures for deductive, plausible, and inductive reasoning; means for knowledge acquisition, refinement, and validation; explanation facilities; and dynamic human intervention. The major areas covered include: alternative knowledge representation approaches; advanced user interface capabilities; computer-supported cooperative work; the evolution of information system hardware; standardization, compatibility, and connectivity; and organizational impacts of information intensive environments
ACUTA Journal of Telecommunications in Higher Education
In This Issue
CRM Solutions Let Clients Help Themselves
It\u27s a Win-Win for MoBull Messenger
Assistive Technologies Meet Students\u27Needs
Autoattendant: Boon or Bane?
Hot Spots: A Hot New ldea for Serving Customers and Generating Revenue?
lnstitutional Excellence Award: Bridgewater State College
A Primer on Optical Networking
The Right Way to Make a Name for Yourself
Interview
Column
Automating Hospitality Information: Network Technology and Systems Management
The local area network (LAN) interconnecting computer systems and soft- ware can make a significant contribution to the hospitality industry. The author discusses the advantages and disadvantages of such systems
Level 3 Communications, LLC v. Utah Public Service Commission, Qwest Corporation : Reply Brief
Petition for Review of the Ruling of the Utah Public Service Commissio
ACUTA Journal of Telecommunications in Higher Education
In This Issue
The Buzz on E-Biz
Eliminating the Paper Trail
SAM Comes to UMC
B2B and Directory Services: Opportunities and Challenges
Telecommunications and the Digital Campus
Managing E-Business at UCSB
Binghamton lnstalls a High- Speed Optical Fiber Network
Amherst Takes to the Air
Columns
Intervie
- …