Blueprint 2020: Key Interface Requirements to Develop a Knowledge Sharing Infrastructure for the Public Service Workplace
|
|
- Gilbert Gabriel Dixon
- 8 years ago
- Views:
Transcription
1 December Blueprint 2020: Key Interface Requirements to Develop a Knowledge Sharing Infrastructure for the Public Service Workplace Main Text Word Count: 2,327 Matthew Fallon, Sanwara Bilkis, Connor Macdonald, PADM5117: Public Management Carleton University
2 Executive Summary Modern workplaces require effective methods for sharing knowledge and information, both within and outside of the organization. The Government of Canada should take steps to modernize its information and communication technology, and develop a cloud-based storage and file sharing system. Furthermore, simple guidelines on data secrecy and employee accessibility must be developed to ensure the benefits of cloud based solutions are used responsibility and to their fullest potential. Primary risks include maintaining data security, effectively training employees, and encouraging or enforcing employee adoption. These risks are easily manageable and a number of solutions are proposed. II
3 Contents Executive Summary... II 1. Introduction Issue Option Analysis Recommended Solution Guidance for Security Accessibility Usability... 6 A. File Sharing... 6 B. Discussion Forum... 6 C. Project Tracking Risk Assessment Summary... 7 Bibliography... 8 III
4 1. Introduction In an increasingly interconnected world, quick access to digital information is considered paramount for the successful functioning of large organizations. This includes cloud based networking solutions to provide public servants with on-demand access to a centralized pool of computer resources, on which to collaborate, develop, and share information products, in real time, and across hardware platforms. While the Government of Canada is taking several initiatives to modernize its networking infrastructure, (ITAC 2015) such as the creation of GCconnex and GCpedia, these tools have not been universally adopted, and much work remains to utilize the technology to its fullest potential (Treasury Board of Canada, 2010). One of the four key visions for Blueprint 2020 is A modern workplace that makes smart use of new technologies to improve networking, access to data and customer service; (Clerk of the Privy Council 2015). Therefore, the objective of this paper is to define the key requirements for an effective knowledge sharing infrastructure, to define accessibility and usability requirements, and finally to provide a user guide to educate public service employees on proper file sharing guidelines. Without modernizing public service communication tools, our government cannot remain on the forefront of organizational efficiency, productivity, and effectiveness. The rest of the paper is organized as follows: Section two illustrates the current issues and challenges in the public workplace related to knowledge sharing, section three analyzes available options and what other jurisdictions are doing, section four describes the recommended solutions, section five highlights the risks, and finally, section six concludes the paper. 2. Issue One of the essential issues in the public service is file sharing among employees and groups, both within and outside of the organization. Currently, file sharing is usually conducted via attachments (owncloud 2015) or by leaving large files in a shared network drive with highly restricted access. However, this method is difficult to control and comes with an inherent risk of data breaches, making based file sharing methods undesirable to most IT (information technology) departments. In response, IT experts tend to impose constraints on attached file sizes (owncloud 2015). Furthermore, access to vital file directories is frequently a concern due to ambiguity surrounding the level of data secrecy and privacy requirements. In most Federal organizations the definition of secrecy levels for 1
5 internal vs. external sharing tends to be confusing, and employees are often unclear or misinformed on what data, research, and documents are allowed to be shared, and exactly whom can be given access. In some federal organizations, initiatives were previously taken to encourage employees to inter-connect with each other via social media tools, or to develop discussion framework among employees using web-based tools such as wiki (Wallace 2008), GCconnex, and GCpedia. However, these initiatives remain underutilized, largely due to a lack of guidance, effective employee training, adequate tools which met the organizational context, and most importantly, confusion surrounding the classification of data secrecy. In the 21 st century, knowledge sharing is considered one of the most essential instruments to develop a learning infrastructure within an organization. Efficient generation, preservation and distribution of internal knowledge as well as learning opportunities from outside sources are considered a prerequisite for succeeding in innovations and in the evolution of organizations to overcome the new challenges (Gressgård, et al. 2014). Knowledge sharing also plays an important role in increasing employee job satisfaction by contributing to performance improvements, employee motivation, and workplace skills, translating into many organizational rewards and significantly reducing employee retention problems (Kim and Lee 2005, Wei, et al. 2013, Reychav and Weisberg 2009). While employees in private organizations are using state-of-the-art tools for knowledge collaborating and leveraging the benefits of modern technology, the absence of fully adopted tools is hurting the performance of public service employees at all levels. As a result, completed research works are frequently remaining locked within specific groups or individuals, preventing other employees within the organization from taking advantage of pre-existing work. In this sense, valuable human resources and time are getting wasted. Similarly, external researchers, students, and academia could have potentially benefited from many of the internal research work, and other projects completed by federal employees, that could have presented a wide range of public-private collaboration opportunities. 3. Option Analysis To overcome the existing knowledge sharing constraints, the Federal Government should invest resources in developing and improving current file sharing and management systems for public service employees. In terms of implementing such a concept, cloud-computing based file sharing methods appear to be one of the latest technologies that many other countries such as the United Stated have implemented. (King 2015). According to the National Institute of Standards and Technology (NIST), cloud 2
6 computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (ITAC 2015). Cloud-computing is considered as one of the most agile, flexible, and cost-effective options by the technology experts in this field (owncloud 2015, ITAC 2015), where every file can be saved and indexed, and puts IT experts back in control of data and services. Such data can be shared and accessed by any person with approved credentials, from any location around the world, and from any set of network accessible devices (such as Smartphones or computers). However, this does not mean that cloud systems always have to be global or public. Such file sharing clouds can be constrained within an organization with restricted access (private cloud), with the general public with open user access (public cloud), or can take the form of a hybrid model with a mix of content that is shared between private and public cloud infrastructures (ITAC 2015). In the United Kingdom, the government employs a highly fragmented internal communications system with most Central and Local government departments choosing their own method of interaction. However, they do have access to a service called Knowledge-Hub that is an online, cloud based, social networking and collaboration platform, which offers many of the advanced features required in a modern workspace (Capacitygrid 2015). Unfortunately, adoption of this service has been slow, and its effectiveness has been questioned (Marsh 2013). This is not a system Canada should emulate. The Australian government has taken much more successful steps to enable and promote online knowledge sharing initiatives for public servants and government contractors. Their primary web application tool is called Govdex, which provides online, centrally hosted, cloud based solutions such as collaborative spaces, discussion forums, task trackers and resource banks (Govdex 2015). Govdex also updates and integrates traditional communication methods such as and provides flexible and adaptable security options to keep sensitive data safe, with restricted access if necessary. This feature allows external contractors to integrate Govdex into their existing ICT frameworks without compromising the security of the database as a whole and ensuring administration permissions are maintained by the relevant government organization (Govdex 2015). 3
7 4. Recommended Solution Since the Government of Canada is interested in a quick and cost effective data sharing system, improving and upgrading the existing private cloud solution, GCconnex, is considered the best option. By simplifying the user interface, clarifying data secrecy, improving functionality, and insuring employee adoption, this modern technology can be used to its greatest potential. Initially, the government should implement this solution within departments with reduced or relatively minor security concerns. Once the private cloud infrastructure is successfully integrated and adopted, the recommendation will be to move forward on enhancing the infrastructure and developing a hybrid model to start sharing data with other communities and organizations, rather then keeping the entire database and social networking tool private. While the government is paying more attention to upgrading the underlying computing technology to aid public servants in an efficient way, it is equally important to clearly define the requirements for applications (apps) that employees will use in their daily jobs to access the data, files, and services. More importantly, these applications will have to be designed to keep the organizational context and needs in focus, or risk wasting or under-utilizing any investment on upgrading underlying computing technologies. Keeping knowledge sharing as the key focus, the requirements proposed in this paper are primarily divided into three main categories: (1) recommendations for security, (2) accessibility, and (3) usability, which are further illustrated below (in Figure 1). Security Guidance PRIVATE File Sharing PUBLIC Usability Discussion Forum Accessibility Project Tracking Organizational Context Matters! Without proper interface, investment on computing would not sustain Figure 1: Knowledge sharing interface requirements 4
8 4.1. Security Recommendations The definition of secrecy levels for available information and documents needs to be clarified so that employees can quickly determine which documents can be shared internally vs. externally. For example, based on the information content, the level of secrecy can be assigned as (a) high, (b) medium, (c) low, or (d) open. An example of such data content is highlighted in Table 1. While employees will be uploading files using the new computing technology, the requirement has to be in place to allow the user to define the type of the document and its secrecy level so that the file can be automatically saved, and indexed at the proper cloud-level. Without clear and easy-to-use guidance, employees will remain confused and the advantage of a knowledge sharing infrastructure cannot be properly realized. Table 1: Data Sharing Guidance Level High Medium Low Open Content Data or information involving national security, info related to citizens or organizations or so on. Background research materials, high level project progress updates Applicable To Cloudcomputing model 4.2. Accessibility Restricted to approved employees only in specific organizations Private with restricted access; maintained either federally or by the organization Project works, business reports, research works containing confidential data points, contents from different surveys. Organizational level Private and maintained by the organization Federal level Private and maintained in federal level Research papers, results from surveys and pilot experiments (without disclosing confidential contents), policy updates, white papers etc. Open to Public Public-Private partnership Secure and simplified accessibility is one of the key requirements that the Government has to satisfy while looking for new technologies. Such requirements should include: 1. Local and remote accessibility to all services, with minimum steps of authentication for security. 2. Minimal or automated approval process to reduce employees access time. 5
9 4.3. Usability Simple, well-organized and innovative must be the focus behind the usability requirements for any knowledge sharing tools interface. Without a usable and simplistic interface, most employees will find the tools too complicated and will avoid using them in daily work settings. Based on potential use cases, the usability requirements are split into three key categories: A. File Sharing Internally sharing data amongst employees within an organization is one of the primary starting points for developing a knowledge sharing base. To comply with such demands 1. There must be simple instructions, tutorials for uploading documents and files, and unlimited file sizes. 2. Structured, organized, and intuitive file directories for departments, groups, or projects. 3. Google-like searching capabilities based on keywords with enhanced filtering options. 4. User tags with each file so that they can be contacted by other employees if necessary. B. Discussion Forum A dedicated interface for an employee based discussion forum can be a useful way of sharing knowledge and files among public servants. Over time, information on different topics can develop into an internal self-learning infrastructure. Such information can potentially include any social, political, technical, or public issue, including new project ideas, research topics, feedback on any organizational issues, general complains about tools and services etc. C. Project Tracking Many departments run several projects, pilot experiments, and research papers on wide variety of ideas that employees within that same organization remain relatively unaware of. It often appears that multiple groups are using the same policy instrument (e.g. nudge) to solve issues without sharing their experiences with each other. Such issues could have been explicitly avoided if employees could see what other groups are doing. In addition, having a dedicated interface to track project progress can be very useful to high level management. To highlight some key requirements, such interface should support: defining project frameworks, important dates, deadlines, groups/people involved, their associated tasks; defining project requirements and tracking the progress; simplified digital approval process for documents, proposals, budgets; evaluation over the time, highlighting risks and so on. 6
10 5. Risk Assessment Although cloud computing comes with tremendous benefits, there are risks and considerations which must be addressed in order to get the most out of this new way of organizing information. One major concern is that of data security. This concern is mitigated by having private networks where sensitive information is concerned. By having a private cloud, only those within the specific department have the ability to access files in that cloud (Lord 2015). Another security concern is that of mobile devices. If devices such as laptops, tablets, and smartphones can connect to a private cloud, it is paramount that those devices remain in the hands of the owners. If these devices were to be stolen, non-authorized personnel could potentially access the private cloud network. A proper channel must be put in place for employees to report lost or stolen devices that have access to the cloud network. As well, there must also be a proper way to dispose of these mobile devices when new ones are acquired. Furthermore, to make the most out of the cloud network, employees must be trained on how to thoroughly use the network and all related tools. This can include the creation of online video tutorials to be used by employees to train themselves on accessing, using and editing files as necessary. Clearly communicating the benefits of file sharing via the cloud must also be integral to the training process in order for public servants to be motivated to use the new system. Moreover, there has to be organizational mandate to adapt the new solutions in employee work settings. Overall, training employees to use the cloud will certainly take time, but it is the only way to make sure the cloud is fully utilized. 6. Summary In conclusion, the government should improve the existing data sharing and networking tool, GCconnex, by clarifying data secrecy requirements, improving functionality, insuring employee adoption, and opening select non-secret information for public use. This will be beneficial for the Government of Canada, as it allows for greater collaboration, organizational efficiency, productivity, and effectiveness in the public service. The focus should be kept on making sure the cloud networking tool remains secure while remaining relatively simple and easy-to-use. Overall, a properly implemented cloud based system would keep Canada at the forefront of innovation and ensure a modern workplace with the ease of smart technologies. 7
11 Bibliography Capacitygrid. "Knowledge Hub Data Sheet." Capacitygrid. n.d (accessed Nov 26, 2015). Clerk of the Privy Council. "Destination 2020." Clerk of the Privy Council. Mar 05, (accessed Nov 22, 2015). Govdex. "Govdex: Features." Government of Australia. n.d (accessed Nov 27, 2015). Gressgård, L. J., O. Amundsen, T. Merethe, and A. Hansen. "Use of information and communication technology to support employee-driven innovation in organizations: a knowledge management perspective." Journal of Knowledge Management, 2014: January, Volume18 (Issue4); pp ITAC. "Cloud Computing: Transforming the Government of Canada for the Digital Economy." ITAC Enterprise Working Group Position Paper. Aug Transforming-the-Government-of-Canada-for-the-Digital-Economy.pdf (accessed Nov 22, 2015). Kim, S., and H. Lee. "Employee Knowledge Sharing Capabilities in Public & Private Organizations: Does Organizational Context Matter?" Proceedings of the 38th Annual Hawaii International Conference on System Sciences, HICSS '05.. Hawaii, January 2005, pp.249a - 249a. King, R. "U.S. Department of Justice taps Box for cloud services." ZDNET. May 27, (accessed Nov 27, 2015). Lord, N. Communicating the Data Security Risks of File Sharing & Cloud Storage. Sep 28, (accessed Nov 22, 2015). Marsh, S. "What you re saying about the future of the Knowledge Hub." The Guardian. 30 May, (accessed Nov 26, 2015). owncloud. owncloud for Government and Public Sector. Nov 22, (accessed Nov 22, 2015). Reychav, I., and J. Weisberg. "Good for workers, good for companies: How knowledge sharing benefits individual employees." Knowledge and Process Management, 2009: October, Volume16 (Issue4) pp Treasury Board of Canada. "Government of Canada Web 2.0 and Social Media", National Executive Forum of Public Property. May 14, (accessed January 21, 2015). Wallace, J. "Using Wikis for Internal Documentation." Mar (accessed Nov 22, 2015). Wei, Y.(Susan), H. O Neill, R. P. Lee, and N. Zhou. "The Impact of Innovative Culture on Individual Employees: The Moderating Role of Market Information Sharing." Journal of Product Innovation Management, 2013: Sep, Vol. 30 Issue 5, pp Wouters, W. Blueprint Jun 24, (accessed Nov 22, 2015). 8
How cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
More informationWhen Enterprise Content Goes Mobile
When Enterprise Content Goes Mobile How OpenText Tempo Reinforces Information Governance in the Cloud Geoffrey E. Bock, Principal April 2012 How OpenText Tempo Reinforces Information Governance in the
More informationSCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationHow cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
More informationData Management Session: Privacy, the Cloud and Data Breaches
Data Management Session: Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, IIS President, iappanz IACCM APAC Australia Sydney, 1 August 2012 Overview Changing privacy regulation
More informationCloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
More informationHow To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
More informationADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
More informationBYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS
BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS Damian Bach AirWatch Session ID: SPO-T038 Session Classification: Intermediate Current & Future Mobile Landscape Number of mobile
More informationSECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security
More informationBRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
More informationData Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
More informationIt s a Brave New Virtual World. Cloud Computing 101: Brought to you by:
It s a Brave New Virtual World Cloud Computing 101: Brought to you by: Table of Contents Introduction What is Cloud Computing? Types of Cloud Computing Why Cloud Computing for Small Business Data Security
More informationSome Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
More informationPrivacy, the Cloud and Data Breaches
Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, Information Integrity Solutions Legalwise Seminars Sydney, 20 March 2013 About IIS Building trust and privacy through global
More informationGuideline 1. Cloud Computing Decision Making. Public Record Office Victoria Cloud Computing Policy. Version Number: 1.0. Issue Date: 26/06/2013
Public Record Office Victoria Cloud Computing Policy Guideline 1 Cloud Computing Decision Making Version Number: 1.0 Issue Date: 26/06/2013 Expiry Date: 26/06/2018 State of Victoria 2013 Version 1.0 Table
More informationCatalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
More informationBring-Your-Own-Device Freedom
Bring-Your-Own-Device Freedom Solutions for federal, state, and local governments Increasingly, IT organizations in federal, state, and local agencies are embracing consumerization with the understanding
More informationCloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
More informationCloud Based E-Government: Benefits and Challenges
Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North
More informationAGIMO and whole-of-government ICT Policy
AGIMO and whole-of-government ICT Policy Overview DAMA Canberra July 2013 Meeting Brian Catto Andrew McGalliard James Woods ICT Policy Team AGIMO 1 Agenda Who are AGIMO? What is AGIMOs role? APS ICT Strategy
More informationCLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
More informationThe Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
More informationMobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
More informationSession 2. The economics of Cloud Computing
Session 2. The economics of Cloud Computing Cloud computing is the next step in the on-going evolution of Information Technology. From a technical standpoint, very little that currently is done on cloud
More informationA VIRTUAL DIGITAL FORENSICS LABORATORY
Chapter 8 A VIRTUAL DIGITAL FORENSICS LABORATORY Philip Craiger, Paul Burke, Chris Marberry and Mark Pollitt Abstract This paper discusses the concept of a virtual digital forensic laboratory, which incorporates
More informationFederal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
More informationData Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
More informationHow Nokia deployed AirWatch MDM for Nokia Lumia
How Nokia deployed AirWatch MDM for Nokia Lumia Case Study 2 Contents 1 Challenge...3 1.1 AirWatch MDM pilot...3 1.2 Challenge of full MDM deployment...4 2 Preparing for deployment...6 2.1 Lessons learned
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationWhitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
More informationMatchPoint Benefits with SharePoint 2013
MatchPoint Benefits with SharePoint 2013 MatchPoint Fact Sheet 25.01.2013 Colygon AG Version 2.0 Disclaimer The complete content of this document is subject to the general terms and conditions of Colygon
More informationDesigning Enterprise Mobility
Designing Enterprise Mobility Cortado Corporate Server M Work beyond your desk, simply & efficiently Productivity: Work on the go just as easily as from a desktop PC Usability: Mobile access to corporate
More informationMobile multifactor security
Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,
More informationBYOD BEST PRACTICES GUIDE
BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create
More informationCCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS
CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS CCBE guidelines on the use of cloud computing services by lawyers TABLE OF CONTENTS I. INTRODUCTION... 3 1. Scope of the guidelines...
More informationCloud Services. More agility. More freedom. More choice.
Cloud Services More agility. More freedom. More choice. What is cloud computing? No longer on the horizon: the cloud has come to business computing. Why consider moving to a cloud model? Why now? Cloud
More informationUnified Device Management Allows Centralized Governance of Corporate Network Devices
Unified Device Management Allows Centralized Governance of Corporate Network Devices Published July 2013 The recent bring your own device trend that allows employees to use devices they own for business
More informationCloud Computing Policy 1.0 INTRODUCTION 2.0 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Policy Effective Date: July 28, 2015 1.0 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More informationSecurity and Employee Monitoring Security and
Security and Employee Monitoring 2 Security & Employee Monitoring Firewalls and anti- virus solutions are fine for protecting your perimeter, but they won t help if your Employees let your business get
More informationConsiderations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
More informationBYOD: Moving toward a More Mobile and Productive Workforce
Montana Tech Library Digital Commons @ Montana Tech Business & Information Technology Faculty Scholarship 2013 BYOD: Moving toward a More Mobile and Productive Workforce D. Lance Revenaugh, Ph.D. Montana
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationManaging PHI in the Cloud Best Practices
Managing PHI in the Cloud Best Practices Executive Whitepaper Recent advances in both Cloud services and Data Loss Prevention (DLP) technology have substantially improved the ability of healthcare organizations
More informationEnabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission
Enabling the University CIO Strategic Plan 2013-2018 NDU will create exceptional and innovative solutions and services that enable advanced joint education, leadership and scholarship (NDU Strategic Plan
More informationITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationCLOUD TECHNOLOGY IMPLEMENTATION/SECURITY
1 CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY Torrell Griffin 2 Cloud Technology Implementation/Risk Mitigation The purpose of this report, in essence, is to define cloud technology as well as describe some
More informationMobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
More informationF5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
More informationEnterprise 2.0 Knowledge Management Development Trends
2012 International Conference on Economics, Business Innovation IPEDR vol.38 (2012) (2012) IACSIT Press, Singapore Enterprise 2.0 Knowledge Management Development Trends Dimiter Velev 1 + and Plamena Zlateva
More informationSoftware as a Service Flexible Service Delivery for Your Health Insurance Exchange
Software as a Service Flexible Service Delivery for Your Health Insurance Exchange SaaS Health Insurance Exchanges Improving Services through More Cost-Efficient Delivery States are charged with making
More informationFlexible Workforce Management System for Call Center: A case study of public sector
Asia Pacific Management Review (2007) 12(6), 338-346 Flexible Workforce Management System for Call Center: A case study of public sector Jun Woo Kim a, Sang Chan Park a,* a Department of Industrial Engineering,
More informationCARTES 2012 Demo presentation. Secure Cloud Storage
CARTES 2012 Demo presentation Cloud Computing: NIST Framework Public Private Hybrid Deployment model Infrastructure as a service (IaaS Platform as a service (PaaS) Software as a service (SaaS) Service
More informationCity of Des Moines Brings CRM to the Public Sector
Case Studies, W. Janowski Research Note 20 November 2002 City of Des Moines Brings CRM to the Public Sector Implementing customer relationship management in the public sector reflects a unique challenge.
More informationImplementing SharePoint 2010 as a Compliant Information Management Platform
Implementing SharePoint 2010 as a Compliant Information Management Platform Changing the Paradigm with a Business Oriented Approach to Records Management Introduction This document sets out the results
More informationCost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA
Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional
More informationInvestigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
More informationTuesday, June 5, 12. Mobile Device Usage
Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.
More informationEXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 Keynote by Vivek Kundra Federal Chief Information Officer The Economic Gains of Cloud Computing Good morning and
More informationAcronis 2002-2014 BRING YOUR OWN DEVICE
Acronis 2002-2014 BRING YOUR OWN DEVICE Introduction With over a billion smartphones and tablets at arms length, a majority of your global workforce already possesses the technology needed to better connect
More informationFOR THE FUTURE OF DATA CENTERS?
WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a
More informationSee Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
More informationESS, LLC Cloud Sync White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync
ESS, LLC Cloud Sync White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync July 2015 Copyright 2015 Eagle Secure Solutions, LLC Introduction The rapid adoption of consumer-grade
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationGovernment of Canada (GC) Cloud Computing: Information Technology Shared Services (ITSS) Roadmap
EDRM 1102023 v6 Government of Canada (GC) Cloud Computing: Information Technology Shared (ITSS) Roadmap Jirka Danek, Chief Technology Officer Information Technology Branch Public Works and Government Canada
More informationCloud Computing Overview
Cloud Computing Overview Mark Troester CIO/IT Product Marketing 1 WHY CLOUD COMPUTING? The cloud computing model can significantly help agencies grappling with the need to provide highly reliable, innovative
More informationInformation Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University.
Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University P a g e 1 P a g e 2 Table of Contents Abstract... 3 Introduction... 3 Previous
More informationCloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
More informationOffice of the Chief Information Officer
Office of the Chief Information Officer Online File Storage BACKGROUND Online file storage services offer powerful and convenient methods to share files among collaborators, various computers, and mobile
More informationPRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT
The Define/Align/Approve Reference Series PRIORITIES AND POLICIES FOR IT ASSET MANAGEMENT Value added IT depends on accurate information regarding the use, location and configuration of every asset, from
More informationInsert Partner logo here. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.
More informationIntroduction. Save time. Develop Talent Pools. increase candidate care
Introduction Most professionals agree that employees are an organisation s greatest asset. It therefore stands to reason that the business of attracting, screening and appointing these people (i.e. recruitment)
More information2014. All Rights Reserved. Information and Communications Technology
Defense-in-Depth has Become Extinct or Information Security in the Post-Enterprise World BSides Ottawa 2014 Dr. Lawrence G Dobranski P.Eng. Director ICT Security University of Saskatchewan 1 The University
More informationCloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems
eenviper White Paper #4 Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems 1 Executive Summary Cloud computing could revolutionise public services
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationManage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
More informationNew Mexico Utility Modernizes Communication and Collaboration with Cloud Services
Microsoft Office 365 Customer Solution Case Study New Mexico Utility Modernizes Communication and Collaboration with Cloud Services Overview Country or Region: United States Industry: Government Customer
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationEndpoint Virtualization for Healthcare Providers
WHITE PAPER: xxxxxx BEST PRACTICES [00-Cover_Bar] FOR HEALTHCARE Endpoint Virtualization for Healthcare Providers Confidence in a connected world. White Paper: Best Practices for Healthcare Endpoint Virtualization
More informationA guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
More informationPutting the cloud to work for your organization. A buyers guide to cloud solutions.
Putting the cloud to work for your organization. A buyers guide to cloud solutions. What s in this guide for you? If you re thinking about bringing the cloud into your business but aren t sure where to
More informationSamsung School 2.0 Taps the Cloud to Enhance its Classroom Technology Solution
WHITE PAPER Samsung School 2.0 Taps the Cloud to Enhance its Classroom Technology Solution Lowers Cost, Embraces Parents, Administrators via The Cloud During the past 30 years, computing and communications
More informationHow Cloud Computing Will Change The Aviation Maintenance Operation
White Paper How Cloud Computing Will Change The Aviation Maintenance Operation Building Safer Operations and Increasing Productivity with Cloud-Based Information Services CONTENTS Introduction: What is
More informationRecordkeeping Policy
Public Record Office Victoria Standards and Policy Recordkeeping Policy Cloud Computing: Implications for Records Management Version Number: 1.0 Issue date: 04/04/2012 Closing for comments: 31/05/2012
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationSupporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationwww.coremedia.com CoreMedia 6
COREMEDIA 6 PRODUCT BROCHURE www.coremedia.com CoreMedia 6 COREMEDIA 6 PRODUCT BROCHURE CoreMedia 6: Because contextualization is about people CoreMedia 6 empowers your Marketing, Business and IT teams,
More informationHow To Get The Most Out Of Vdi
A GUIDE TO IMPLEMENTING VDI AS A SERVICE CREATIVE-ITC.COM OVERVIEW After years of promise, Virtual Desktop Infrastructure (VDI) is finally hitting the mainstream as a desktop management solution suitable
More informationEMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations
EMAIL ARCHIVING What it is, what it isn t, and how it can improve your business operations OVERVIEW: Why businesses are turning to email archiving As your business grows, communication between you and
More informationShaping Your IT. Cloud
Shaping Your IT Cloud Hybrid Cloud Models Enable Organizations to Leverage Existing Resources and Augment IT Services As dynamic business demands continue to place unprecedented burden on technology infrastructure,
More informationPotential of Cloud Storage Application as Knowledge Management System
Potential of Cloud Storage Application as Management System T. Gunadham Abstract This study discusses the results of analysis on cloud storage application in the term of facilitating knowledge management.
More informationITAC Enterprise Working Group Position Paper. Cloud Computing: Transforming the Government of Canada for the Digital Economy
ITAC Enterprise Working Group Position Paper Transforming the Government of Canada for the Digital Economy Release Date: August 2015 As Canada s national ICT business association, the Information Technology
More informationPolicy Outsourcing and Cloud Based File Sharing
Policy Outsourcing and Cloud Based File Sharing Version 3.1 TABLE OF CONTENTS Outsourcing Policy... 2 Outsourcing Management Standard... 2 Overview... 2 Standard... 2 Outsourcing Policy... 3 Policy Statement...
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationLaserfiche for Federal Government MEET YOUR AGENCY S MISSION
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas
More informationKent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
More information