MANAGING TECHNOLOGY 2008
Information technology spending slows because of a costly war. Personal information and sensitive data leaks become floods. Congress probes one procurement scandal after another. IT project failures mount. Expect more of the same in 2008, plus new challenges, too. IT managers, consultants, contracto...
Gespeichert in:
Veröffentlicht in: | Government Executive 2007-12, Vol.39 (21), p.32 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 21 |
container_start_page | 32 |
container_title | Government Executive |
container_volume | 39 |
creator | Aitoro, Jill R |
description | Information technology spending slows because of a costly war. Personal information and sensitive data leaks become floods. Congress probes one procurement scandal after another. IT project failures mount. Expect more of the same in 2008, plus new challenges, too. IT managers, consultants, contractors and researchers said privacy and information security will remain high priorities. Congress will continue scrutinizing procurement practices. Health care automation will pick up steam. Deadlines will continue to shape IT agendas. Meeting deadlines and complying with guidelines and rules is one thing. Making IT work to improve service and performance is another. If 2007 is any indication, 2008 could find agencies straining to deliver results. Experts offer suggestions to improve the chances that new initiatives will pay off. These include: 1. Protect personal data. 2. Update the net. 3. Contract with care. 4. Watch your health. 5. Meet security standards. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_reports_204320521</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1401697531</sourcerecordid><originalsourceid>FETCH-proquest_reports_2043205213</originalsourceid><addsrcrecordid>eNpjYuA0MjQ10jUzNzBiYeA0MDA01zUyMzLjYOAqLs4Ccg2MjUw5GSR8Hf0c3T393BVCXJ09_Px9_N0jFYwMDCx4GFjTEnOKU3mhNDeDoptriLOHbkFRfmFpanFJfFFqQX5RSXG8kYGJsZGBqZGhMTFqAEY3JxU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>204320521</pqid></control><display><type>article</type><title>MANAGING TECHNOLOGY 2008</title><source>ProQuest Central UK/Ireland</source><source>Free E- Journals</source><creator>Aitoro, Jill R</creator><creatorcontrib>Aitoro, Jill R</creatorcontrib><description>Information technology spending slows because of a costly war. Personal information and sensitive data leaks become floods. Congress probes one procurement scandal after another. IT project failures mount. Expect more of the same in 2008, plus new challenges, too. IT managers, consultants, contractors and researchers said privacy and information security will remain high priorities. Congress will continue scrutinizing procurement practices. Health care automation will pick up steam. Deadlines will continue to shape IT agendas. Meeting deadlines and complying with guidelines and rules is one thing. Making IT work to improve service and performance is another. If 2007 is any indication, 2008 could find agencies straining to deliver results. Experts offer suggestions to improve the chances that new initiatives will pay off. These include: 1. Protect personal data. 2. Update the net. 3. Contract with care. 4. Watch your health. 5. Meet security standards.</description><identifier>ISSN: 0017-2626</identifier><identifier>EISSN: 2152-6702</identifier><identifier>CODEN: GVEXAW</identifier><language>eng</language><publisher>Washington: Atlantic Media, Inc</publisher><subject>Compliance ; Data integrity ; Deadlines ; Government agencies ; Guidelines ; Information technology ; Internet ; Personal information ; Privacy ; Scandals</subject><ispartof>Government Executive, 2007-12, Vol.39 (21), p.32</ispartof><rights>Copyright National Journal Group, Inc. Dec 2007</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/204320521?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>312,776,780,787,64365,64370,72216</link.rule.ids></links><search><creatorcontrib>Aitoro, Jill R</creatorcontrib><title>MANAGING TECHNOLOGY 2008</title><title>Government Executive</title><description>Information technology spending slows because of a costly war. Personal information and sensitive data leaks become floods. Congress probes one procurement scandal after another. IT project failures mount. Expect more of the same in 2008, plus new challenges, too. IT managers, consultants, contractors and researchers said privacy and information security will remain high priorities. Congress will continue scrutinizing procurement practices. Health care automation will pick up steam. Deadlines will continue to shape IT agendas. Meeting deadlines and complying with guidelines and rules is one thing. Making IT work to improve service and performance is another. If 2007 is any indication, 2008 could find agencies straining to deliver results. Experts offer suggestions to improve the chances that new initiatives will pay off. These include: 1. Protect personal data. 2. Update the net. 3. Contract with care. 4. Watch your health. 5. Meet security standards.</description><subject>Compliance</subject><subject>Data integrity</subject><subject>Deadlines</subject><subject>Government agencies</subject><subject>Guidelines</subject><subject>Information technology</subject><subject>Internet</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Scandals</subject><issn>0017-2626</issn><issn>2152-6702</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNpjYuA0MjQ10jUzNzBiYeA0MDA01zUyMzLjYOAqLs4Ccg2MjUw5GSR8Hf0c3T393BVCXJ09_Px9_N0jFYwMDCx4GFjTEnOKU3mhNDeDoptriLOHbkFRfmFpanFJfFFqQX5RSXG8kYGJsZGBqZGhMTFqAEY3JxU</recordid><startdate>20071201</startdate><enddate>20071201</enddate><creator>Aitoro, Jill R</creator><general>Atlantic Media, Inc</general><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>883</scope><scope>88F</scope><scope>8AO</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L.0</scope><scope>M0C</scope><scope>M0F</scope><scope>M1Q</scope><scope>M2O</scope><scope>MBDVC</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20071201</creationdate><title>MANAGING TECHNOLOGY 2008</title><author>Aitoro, Jill R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_2043205213</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Compliance</topic><topic>Data integrity</topic><topic>Deadlines</topic><topic>Government agencies</topic><topic>Guidelines</topic><topic>Information technology</topic><topic>Internet</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Scandals</topic><toplevel>online_resources</toplevel><creatorcontrib>Aitoro, Jill R</creatorcontrib><collection>Global News & ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Collection</collection><collection>Military Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>eLibrary</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>ABI/INFORM Global</collection><collection>ABI/INFORM Trade & Industry</collection><collection>Military Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Government Executive</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aitoro, Jill R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>MANAGING TECHNOLOGY 2008</atitle><jtitle>Government Executive</jtitle><date>2007-12-01</date><risdate>2007</risdate><volume>39</volume><issue>21</issue><spage>32</spage><pages>32-</pages><issn>0017-2626</issn><eissn>2152-6702</eissn><coden>GVEXAW</coden><abstract>Information technology spending slows because of a costly war. Personal information and sensitive data leaks become floods. Congress probes one procurement scandal after another. IT project failures mount. Expect more of the same in 2008, plus new challenges, too. IT managers, consultants, contractors and researchers said privacy and information security will remain high priorities. Congress will continue scrutinizing procurement practices. Health care automation will pick up steam. Deadlines will continue to shape IT agendas. Meeting deadlines and complying with guidelines and rules is one thing. Making IT work to improve service and performance is another. If 2007 is any indication, 2008 could find agencies straining to deliver results. Experts offer suggestions to improve the chances that new initiatives will pay off. These include: 1. Protect personal data. 2. Update the net. 3. Contract with care. 4. Watch your health. 5. Meet security standards.</abstract><cop>Washington</cop><pub>Atlantic Media, Inc</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0017-2626 |
ispartof | Government Executive, 2007-12, Vol.39 (21), p.32 |
issn | 0017-2626 2152-6702 |
language | eng |
recordid | cdi_proquest_reports_204320521 |
source | ProQuest Central UK/Ireland; Free E- Journals |
subjects | Compliance Data integrity Deadlines Government agencies Guidelines Information technology Internet Personal information Privacy Scandals |
title | MANAGING TECHNOLOGY 2008 |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T16%3A05%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=MANAGING%20TECHNOLOGY%202008&rft.jtitle=Government%20Executive&rft.au=Aitoro,%20Jill%20R&rft.date=2007-12-01&rft.volume=39&rft.issue=21&rft.spage=32&rft.pages=32-&rft.issn=0017-2626&rft.eissn=2152-6702&rft.coden=GVEXAW&rft_id=info:doi/&rft_dat=%3Cproquest%3E1401697531%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=204320521&rft_id=info:pmid/&rfr_iscdi=true |