Pointers: Recommended reading 10-06-08

Not business as usual
Source: BNet
What do you do with staff members who miss meetings, work odd hours and yet are more productive than more traditional employees?

According to a new work management philosophy — known as Results-Only Work Environment (ROWE) — you let them keep at it.

According to BNet, Best Buy pioneered this approach and has reaped ample rewards. This online feature provides an overview of ROWE, explaining how it works and how it compares with other management methods.


The privacy dilemma
Source: Navy CIO blog
The best way to protect personally identifiable information is to teach people to treat it like it was classified, writes blogger Robert Carey, the Navy’s chief information officer.

“Because of the threat identity theft presents, it is as important as classified information, and it must be treated that way,” he writes. “Accountability is key at all levels of the workforce” and must include leaders and managers, Carey adds.

Agencies already have security manuals and regulations that cover the handling of personally identifiable information. What’s needed is enforcement, Carey says.


Mobile phone security worries
Source: Mercury News
The more mobile phones come to resemble personal computers, the more likely they are to become targets of viruses, spyware and other security threats, security experts say.

Experts have already identified approximately 500 different cases of malware infecting mobile phones. And more are on the way.

One expert predicts that hackers soon could find a way to listen in on conversations, snoop through phone cameras or track users through built-in GPS functionality.


Thought Police Version 2.0
Source: Innovating Government blog
Jeff Vining, vice president of research at Gartner, explores the privacy implications of an emerging homeland security initiative.

The Homeland Security Department is developing mobile laboratories that provide high-tech sensors to screen people for possible harmful intentions. DHS hopes to field these laboratories at border crossings, major events and other potential terrorist targets.

Although potentially useful, this initiative raises numerous legal and privacy concerns, Vining writes. For example, what happens if someone trips the system because of a medical condition? And what will DHS do with individuals deemed to have bad intentions when it doesn’t have any corroborating evidence?

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from Shutterstock.com

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group