TITLE

Whitehall urged to learn from Northern Ireland

AUTHOR(S)
Thomson, Rebecca
PUB. DATE
November 2007
SOURCE
Computer Weekly;11/13/2007, p10
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on an information technology (IT) change programme which is underway in Northern Ireland. It is informed that the £800million programme will consolidate IT systems and services across 11 government departments. While Northern Ireland has been quietly working towards shared services and the efficiency gains they can deliver, the civil service in the rest of Great Britain has been accused of suffering from inertia when it comes to forcing through change. Reasons given for resisting system integration and consolidation include the size of Whitehall departments, system complexity and the security of sharing sensitive data.
ACCESSION #
27820786

 

Related Articles

  • Scapegoat or Superstar. Macleod, Calum // Manager: British Journal of Administrative Management;Oct/Nov2006, Issue 55, p24 

    This article discusses the importance of effective management especially for those managers responsible for information technology (IT). Investor confidence relies on the accuracy and timeliness of financial reporting and, since most businesses are automated, this function relies on IT. If those...

  • Know The Nature Of Your Problem. Sevcik, Peter // Business Communications Review;Mar2007, Vol. 37 Issue 3, p8 

    The article presents a method of categorizing information technology questions within enterprises in order to define the correct approach for the questions' solutions. Steps include determining whether the question is a puzzle, which has a clear answer but requires more data than a person...

  • Security priorities.  // Communications News;Sep2006, Vol. 43 Issue 9, p10 

    The article reports on an international data security survey conducted by Utimaco which reveals that securing mobile end devices and central IT security administration are the major challenges in protecting company data. The study discovered that 42% of interviewees will increase their budget by...

  • The Cloud Steps Up to The Plate. Kontzer, Tony // CIO Insight;Aug2008, Issue 96, p44 

    The article focuses on the emergence and widespread adoption of cloud computing technology by firms to meet corporate information technology (IT) needs. It says that the concept of renting applications, development platforms, processing power, storage or any other cloud-enabled services has...

  • The Burden of SaaS. Schwartz, Ephraim // InfoWorld;12/11/2006, Vol. 28 Issue 50, p10 

    The article presents information about software as a service (SaaS) in December 2006. The critical challenge of access and how to manage it must be addressed as SaaS enters the mainstream. Information technology companies like Aladdin Knowledge Systems, are working behind closed doors to address...

  • The SANS 2007 Log Management Market Report. Shenk, Jerry // Database & Network Journal;Aug2007, Vol. 37 Issue 4, p3 

    The article highlights the results of the System Administration, Networking and Security (SANS) 2007 survey of information technology (IT) professionals on log data management. Respondents ranked Information Asset Protection as the most important types of log-related activities to their...

  • Security today means playing 'defense-in-depth' Johnson, Johna Till // Network World;8/16/2004, Vol. 21 Issue 33, p24 

    Anyone who bases a security strategy on perimeter hardening these days is headed for trouble. Most large organizations are taking an information-protection strategy known as "defense-in-depth" that is more comprehensive than previous approaches. Defense-in-depth lets IT executives more...

  • A Fresh Take on ISO 1799, BS7799. Mimoso, Michael S. // Information Security;Aug2005, Vol. 8 Issue 8, p18 

    Reports on the revision of the ISO 17799 and BS7799 standards for enterprise information security programs and systems, as of August 2005. Changes made to the standards; Description of the previous versions; Purpose of the revisions.

  • Log Wild. Strom, David // Information Security;Oct2007, Vol. 10 Issue 9, p44 

    The article presents information on log management tools. A log management tool is seen as the first step in the analytical chain. Log management can provide security and compliance benefits that have become essential. The market of available tools may become clearer as vendors hone their...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics