Pointers: Recommended reading 10-06-08
Not business as usual; The privacy dilemma; Mobile phone security worries; Thought Police Version 2.0
Source: What do you do with staff members who miss meetings, work odd hours and yet are more productive than more traditional employees? According to a new work management philosophy — known as Results-Only Work Environment (ROWE) — you let them keep at it., Best Buy pioneered this approach and has reaped ample rewards. This online feature provides an overview of ROWE, explaining how it works and how it compares with other management methods.Source: The best way to protect personally identifiable information is to teach people to treat it like it was classified, writes , the Navy’s chief information officer.“Because of the threat identity theft presents, it is as important as classified information, and it must be treated that way,” he writes. “Accountability is key at all levels of the workforce” and must include leaders and managers, Carey adds.Agencies already have security manuals and regulations that cover the handling of personally identifiable information. What’s needed is enforcement, Carey says.Source: The more mobile phones come to resemble personal computers, the more likely they are to become targets of viruses, spyware and other security threats, .Experts have already identified approximately 500 different cases of malware infecting mobile phones. And more are on the way.One expert predicts that hackers soon could find a way to listen in on conversations, snoop through phone cameras or track users through built-in GPS functionality.Source: Jeff Vining, vice president of research at Gartner, of an emerging homeland security initiative.The Homeland Security Department is developing mobile laboratories that provide high-tech sensors to screen people for possible harmful intentions. DHS hopes to field these laboratories at border crossings, major events and other potential terrorist targets.Although potentially useful, this initiative raises numerous legal and privacy concerns, Vining writes. For example, what happens if someone trips the system because of a medical condition? And what will DHS do with individuals deemed to have bad intentions when it doesn’t have any corroborating evidence?
Not business as usual
BNet
According to BNet
The privacy dilemma
Navy CIO blog
blogger Robert Carey
Mobile phone security worries
Mercury News
security experts say
Thought Police Version 2.0
Innovating Government blog
explores the privacy implications
BNet
According to BNet
The privacy dilemma
Navy CIO blog
blogger Robert Carey
Mobile phone security worries
Mercury News
security experts say
Thought Police Version 2.0
Innovating Government blog
explores the privacy implications
NEXT STORY: N-Dex: Strong growth potential in info-sharing