The Year of Working Dangerously: The Privacy Implications of Wireless in the State Workplace—Part I

Part I identifies the privacy implications of wireless technologies in the state workplace, including the privacy implications of mobile technologies such as laptop computers, PDAs and other similar devices.

 

Download

Connecting the Silos: Using Governance Models to Achieve Data Integration

NASCIO’s Interoperability & Integration Committee is proud to present Connecting the Silos: Using Governance Models to Achieve Data Integration. This research brief attempts to answer questions such as, “What needs to be addressed when contemplating an information integration initiative, and what is being done in the states and at the federal level to develop information integration governance models?” It also includes other factors that are impacting governance in integration and offers references to models that have been successfully completed by other states and links to resources on information sharing. The committee is currently exploring the following topics for future briefs: Interoperability Governance; Legal Ownership of Shared Data; Data Standards; Master name Indices; and Integration Maturity Models.

 

Download

VoIP and IP Telephony: Planning for Convergence in State Government

The keen interest in Voice over Internet Protocol (VoIP) and Internet Protocol (IP) Telephony and its accelerated adoption rate has led to the realization that the long-established Public Switched Telephone Network (PSTN) voice business model will be facing its end of life in the next 10 to 15 years. This report, a product of NASCIO’s Infrastructure Subcommittee, is intended to provide an understanding of the fundamental issues facing organizations as they assess VoIP and IP Telephony. It contains a description of the operation and functionality of the legacy PSTN, an explanation of voice transport over the Internet and IP Telephony, and a discussion of the issues and drivers associated with the migration from the PSTN to converged voice and data networks.

 

Download

Getting What You Need on the Way to the Win-Win! Leveraging the RFP in State Technology Procurements

This publication was co-produced by NASCIO and NASPO (National Association of State Procurement Officials). This brief provides a broad view of how a variety of stakeholders can use the RFP (Request for Proposal) process to the state’s and the citizens’ benefit.

 

Download

TLK2UL8R: The Privacy Implications of Instant and Text Messaging Technologies in State Government

This brief explores the privacy implications of Instant Messaging (IM) applications—both consumer and enterprise-grade—in the context of the state workplace. It also addresses the privacy implications of text messaging and chat technologies.

 

Download

PERSPECTIVES – Government Information Sharing: Calls to Action

NASCIO is pleased to announce the release of a new publication on the subject of information sharing. NASCIO has pulled together interviews and articles from a variety of contributors from integrated justice, homeland security, environmental protection, transportation, public health and economic development. Perspectives includes discussions from federal, state and county government. Not so surprisingly, according to the contributors to this first issue of Perspectives, technology is not the major barrier. This report presents barriers to information sharing and the “Calls to Action” to overcome these barriers.

 

Download

Negotiating IP on the Way to the Win-Win: NASCIO’s Intellectual Property Recommendations

These recommendations seek to identify state and contractor interests regarding the ownership of IP and suggest realistic considerations to help make the negotiation of IP rights easier and more successful for all involved.

 

Download

Welcome to the Jungle: The State Privacy Implications of Spam, Phishing and Spyware

This brief explores the privacy implications for state government created by the threats of spam, phishing and spyware and potential ways of preventing and mitigating this triple threat to state IT systems.

 

Download

The Real Phantom Menace: Spyware and its State Implications

This brief addresses the security, privacy, citizen trust and business process-related implications of spyware and other forms of malware for state government IT systems and suggests some potential technical, legal and awareness-raising solutions for the menace of malware.

 

Download

Who Are You? I Really Wanna Know: E-Authentication and its Privacy Implications

This brief explores the business drivers behind e-authentication and the privacy implications that states and others should consider in pursuing e-authentication efforts.

 

Download