Showing posts with label Risk. Show all posts
Showing posts with label Risk. Show all posts

Monday, 26 November 2007

Security v Sharing

Any data packet sent across the network is vulnerable to a hacker, and even if encrypted can be decrypted relatively easily. Absolute security of information and access to information, e.g. via emails for sharing or for records management, are mutually excusive. You can't maximise both security and access; maximising one will minimise the other and vice versa. One Witness Seminar participant stated that if an email contains business critical information then it must have a security policy applied to and should not be shared; as soon as you start sharing information you have leakage. This statement caused immediate responses from other participants. One said that if you take away the point of sharing email you have no email. Another said that if you don’t share you have no business. In a construction project for example, sharing of information has to occur across organisational and often national boundaries. So how can we square this circle?

Friday, 30 March 2007

Subject categorisation of posts

Posts made to the blog will be given one or more labels (keywords). Copies of the posts are organised under these labels on the side panel so readers can look for posts on given themes.

The labels we will be using comprise, in A/Z order:

  • AC+erm project – project management and development specific information
  • Approaches – e.g. lifecycle; continuum; integration; embedded
  • Architecture – e.g. definition of ‘architecture; infrastructure (policies, standards and practices, systems and technologies, human resources)
  • Business Processes – e.g. understanding of business processes; business process mapping and record keeping requirements; functional analysis; role of business classification schemes and taxonomies
  • ERM – covering items of broader interest and/or wider scope
  • Methodology – discussion of the methodologies we’re using on this project; other researchers’ methodological approaches to studying ERM
  • Partnerships – e.g. building partnerships for effective ERM: between stakeholder groups, transdisciplinary
  • Progress – e.g. transition from theory to practice; where are we with the development of ERM?; drivers, barriers and culture; change management; accelerating the pace of change; implementation of / innovation in system and service development
  • Risk – what are the risks? risk management related to ERM
  • Technology – e.g. principles of design underpinning effective RM technology and systems; impact of new technology e.g. mobile communications
  • Vision – e.g. philosophy; paradigms; theory; principles

Sue

 
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License