Workshop on Security Procedures for the Interchange of Electronic Documents


Book Description

Presents the findings of a workshop held on Nov. 12-13, 1992. Focuses on the need to devise rules for the use of security procedures for the electronic transmission of documents between organizations. Discusses whether the true source of a received document could be ascertained and if there could be confidence that a document has not been altered in transit. Reports in whether confidentiality in transit could be assured if required and whether the originator could obtain assurance that the document was received by the intended recipient and if so, whether it was received prior to a specific deadline. The purpose of these papers is to address the fore mentioned security concerns.




Making Government Work


Book Description

This report, published in its entirety (OTA-TCT-578) and in a summary form (OTA-TCT-579) containing only the first chapter of the complete report, focuses on key topics and issues that are central to the successful use of electronic delivery by government. The review conducted by the Office of Technology Assessment concludes that the movement toward electronic delivery of government services is accelerating, but that many factors must be considered. The greatest risks of electronic delivery are overlooking the human element and users' needs, which would further widen the gap between the technologically literate and the technologically illiterate, and failing to capitalize on all the opportunities that partnerships among government agencies and the private sector could provide. Changes that will be required in federal management are outlined, and options for successful implementation of electronic delivery are sketched. Many rely on the amplification of existing structures. Five appendixes complement the complete report, including a list of the 11 boxes, 5 figures, and 22 tables that illustrate the discussion; and lists of acronyms and terms, contributors, field study participants, and contractor reports. The summary volume contains four tables and two boxes. (SLD)










Making Government Work


Book Description




Improving Voting Technologies


Book Description




National Computer Security Conference, 1993 (16th) Proceedings


Book Description

Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.




Managing Social and Economic Change with Information Technology


Book Description

Many experts believe that through the utilization of information technology, organizations can better manage social and economic change. This book investigates the challenges involved in the use of information technologies in managing these changes.