Skip to main content

Home/ IMT122 OUA Group/ Group items matching ""Week 05"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Joanne S

Metadata schema in the cultural heritage sector - 1 views

  • The sheer number of metadata standards in the cultural heritage sector is overwhelming, and their inter-relationships further complicate the situation. This visual map of the metadata landscape is intended to assist planners with the selection and implementation of metadata standards.
  • 05 standards listed here is evaluated on its strength of application to defined categories in each of four axes: community, domain, function, and purpose.
  •  
    Metadata schema in the cultural heritage sector Riley, J. (2010). Seeing Standards: a visualisation of the metadata universe. Retrieved January 13, 2011, from http://www.dlib.indiana.edu/~jenlrile/metadatamap/
Joanne S

xkcd: Password Strength - 0 views

  •  
    Cartoon/Picture
Joanne S

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
Joanne S

Full Report - Information Systems Audit Report: Full Report (No. 4). Perth, Western Australia - 0 views

  •  
    ( Full report at Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Full Report (No. 4). Perth, Western Australia. Retrieved from http://www.audit.wa.gov.au/reports/pdfreports/report2011_04.pdf )
Joanne S

Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Summary. Perth, Western Australia - 0 views

  •  
    Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Summary. Perth, Western Australia. Retrieved from http://www.audit.wa.gov.au/reports/pdfreports/insert2011_04.pdf
Joanne S

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
Joanne S

Anderson, C. (2006). Ethics and digital preservation. In Ethical decision making for digital libraries (Curtin Library) - 0 views

  •  
    Anderson, C. (2006). Ethics and digital preservation. In Ethical decision making for digital libraries (pp. 81-90). Oxford: Chandos Publishing. Retrieved from http://eres.lis.curtin.edu.au/cgi-bin/gw?url=DC60260496
Joanne S

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
Joanne S

How Secure is a Secure Web Page? | Richard Farrar's Blog - 0 views

  • To help improve security on the web, the standard HTTP protocol was enhanced with an additional security layer called the Secure Socket Layer (SSL) to produce a new protocol called HTTPS (HTTP over a Secure socket layer).
Joanne S

Go To Hellman: Ten Evil Uses for URL Shortening Services - 0 views

  • Today, we cover URL shortening services:  Bit.ly, TinyURL, Ow.ly and friends.
  • Here are ten link shortening menaces for you to nibble on.
  • cross-site scripting vulnerability
  • ...7 more annotations...
  • Phishing attacks
  • SQL injection
  • Spam blocking
  • avoid the porn filter
  • Shortened links are free, so you can use a new one for every recipient.
  • PURL. If one of your machines gets taken out, you can edit the PURL to keep your link working, and shorten it for good measure.
  • As I've described here, there are lots of ways to abuse a link redirection service
Joanne S

Backup Overview | dpBestflow - 0 views

  •  
    Krogh, P. (n.d.). Backup Overview. American Society of Media Photographers. Retrieved October 28, 2010, from http://www.dpbestflow.org/node/262
Joanne S

Digital Armageddon for flood victims - 0 views

  •  
    Moses, A., & Grubb, B. (2011, January 12). Digital Armageddon for flood victims. Sydney Morning Herald. Retrieved from http://www.smh.com.au/technology/technology-news/digital-armageddon-for-flood-victims-20110112-19nfy.html
Joanne S

Pixar studio stories - The movie vanishes (full) - YouTube - 0 views

  •  
    Pixar studio stories - The movie vanishes (full). (2011). Retrieved from http://youtu.be/EL_g0tyaIeE
Joanne S

Librarians rewrite the book on disaster recovery - Storage - Technology - News - iTnews.com.au - 0 views

  •  
    Cochrane, N. (2011, January 18). Librarians rewrite the book on disaster recovery. itnews for Australian Business. Retrieved from http://www.itnews.com.au/News/245107,librarians-rewrite-the-book-on-disaster-recovery.aspx
Joanne S

When the next flood comes will you grab your life raft or keyboard? - 0 views

  •  
    Birmingham, J. (2011, January 24). When the next flood comes will you grab your life raft or keyboard? Brisbane Times. Retrieved from http://www.brisbanetimes.com.au/technology/blogs/the-geek/when-the-next-flood-comes-will-you-grab-your-life-raft-or-keyboard-20110124-1a1uq.html
1 - 17 of 17
Showing 20 items per page