TITLE

Speech self-service system security breaches: Are you protected?

PUB. DATE
June 2006
SOURCE
CRM Magazine;Jun2006, Vol. 10 Issue 6, Special section p16
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Emphasizes the importance of securing and protecting speech-enabled customer care systems. Parameters within the context of speech security which are necessary in implementing and maintaining a secure speech installation in order to avoid online security breaches; Categories to consider in securing data within speech system; Components of successfully hosted speech applications.
ACCESSION #
21102805

 

Related Articles

  • New Products.  // Chain Store Age;May2006, Vol. 82 Issue 5, p36A 

    The article offers information on several information technology solutions launched by technology providers in 2006. NCR has partnered with WineMiner LLC to launch stand-alone self-service kiosk that enables supermarket retailers to promote the pairing of wines with their gourmet food...

  • 11 Tips to Improve IVR Effectiveness. Fluss, Donna // Speech Technology Magazine;Sep/Oct2006, Vol. 11 Issue 5, p26 

    The article provides tips on how to improve the effectiveness of speech-enabled interactive voice response (IVR) systems. There are many IVR best practices that improve customer satisfaction and increase the IVR utilization rate. However, they are not widely used due to corporate short...

  • Voiceprint.  // Network Dictionary;2007, p519 

    An encyclopedia entry for "Voiceprint" in information security is presented. It refers to a set of measurable characteristics of a human voice that uniquely identifies an individual. Voiceprint can be expressed as a mathematical formula and it can be applied to a vocal sample recorded for the...

  • System Hardening.  // Network Dictionary;2007, p473 

    A definition of the term "System Hardening" is presented. It is the process to address system security weaknesses by implementing the latest software paches, hot-fixes and updates, by using the latest and secured versions of protocols and following procedures and policies to reduce attacks and...

  • System High Security Mode.  // Network Dictionary;2007, p473 

    A definition of the term "System High Security Mode" is presented. It is a mode of operation of an information system, wherein all users having access to the system possess a security clearance or authorization, but not necessarily a need-to-know, for all data handled by the system.

  • Microsoft Strategic Technology Protection Program.  // Network Dictionary;2007, p311 

    AN encyclopedia entry for "Microsoft Strategic Technology Protection Program" (STPP) is presented. It refers to an initiative launched by Microsoft Corp. to protect its customers from Internet threats.

  • Microsoft Security Update.  // Network Dictionary;2007, p311 

    An encyclopedia entry for "Microsoft Security Update" is presented. It refers to a service provided by Microsoft that alerts home and small business users about threats to the company's products and platforms.

  • Career central: Surfing ills.  // eWeek;5/22/2006, Vol. 23 Issue 21, p26 

    The article discusses various issues affecting the IT industry in the U.S. According to security vendor Websense' survey released on May 15, 2006, almost 17 percent organizations has had an employee launch a hacking tool or keylogger within his or her network. The Government Accountability...

  • A Foolish Consistency in User Interfaces. HURA, SUSAN // Speech Technology Magazine;Spring2014, Vol. 19 Issue 1, p5 

    The article focuses on the author's views about consistencies in the design of user interfaces for speech technologies. The author offers several situations wherein consistencies are necessary and acceptable. According to the author, designing the most effective interactions for each situation...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics