Preview

Student Portal

Powerful Essays
Open Document
Open Document
38201 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Student Portal
Leadership Development Program 2001/2002

Student Portal Project
May 22, 2002

Cecille Cabacungan, Goldman School of Public Policy Lesley Clark, Center for Organizational Effectiveness Rachelle Feldman, Financial Aid Office Paula Flamm, University Health Services Gail Ford, The Library Kati Markowitz, Neuroscience Institute Stacey Shulman, Department of Chemical Engineering Dan Sullivan, Haas School of Business

Imagine a single Website personalized to meet all your cyberneeds – one that would keep you up-to-date on campus events and academic information and would be accessible from any computer.

-- The Daily Californian, April 15, 2002

Table of Contents

Executive Summary

Main Report I. Charge and Methodology II. Findings III. Portal Development, Current Practices IV. Costs and Phased Implementation V. Conclusions and Recommendations; Criteria for Measuring Portal Success VI. Three Portal Interface Options for Look and Feel; Criteria for Evaluating Options VII. Portal Names

Appendices Introduction, Charge, and Methodology Appendix I – Definitions Appendix II – Respondents Appendix III – Student Survey Instrument Appendix IV – Staff, Faculty, Administrator One-on-One Interview Questions Appendix V – Staff Focus Group Questions Appendix VI – Staff, Faculty, and Administrator Survey Instrument Appendix VII – Portal Developer Questionnaire

UCB Student Response Appendix VIII – Undergraduate Affairs Focus Groups, Raw Data, 2001 Appendix IX –



Bibliography: UCB IST Policy: 13) Information Systems & Technology (IST) Administrative Applications and Data Security Policy (revised January 7, 1999)

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    A Human Resources Manager cannot draft an accurate job description without first performing a job analysis. The analysis collects and evaluates information pertaining to a job’s content and human requirements which is then used as a resource for creating the job description (Youssef, 2012). Requirements for the position of project manager are inherently the same for any company no matter the nature of the business. Project managers for a janitorial business perform the same tasks as a project manager for a construction company, just with different end products. A job description for a project manager includes overall direction, coordination, implementation, execution and control of specific projects within the company’s strategy and goals. This paper will describe the tasks, tools and technology, knowledge, skills and abilities, and educational requirements of the project manager as well as recruiting techniques and methods of assessment for recruitment for a qualified project manager.…

    • 894 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Weiss, J. W. (2011). An introduction to leadership. San Diego, CA: Bridgepoint Education, Inc. Retrieved from http://classroom.ashford.edu…

    • 1165 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Unit 5 Assignment 1

    • 1355 Words
    • 6 Pages

    * ensuring awareness of information security threats and concerns, and the necessary steps to mitigate those threats; and…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The SDLC Process

    • 907 Words
    • 4 Pages

    The SDLC process was designed to ensure end-state solutions meet user requirements in support of business strategic goals and objectives. In addition, the SDLC also provides a detailed guide to help Program Managers with ALL aspects of IT system development, regardless of the system size and scope. The SDLC contains a comprehensive checklist of the rules and regulations governing IT systems, and is one way to ensure system developers comply with all applicable Government regulations, because the consequences of not doing so are high and wide ranging. This is especially true in the post 9/11 environment where larger amounts of information are considered sensitive in nature, and are shared among commercial, international, Federal, state, and local partners.…

    • 907 Words
    • 4 Pages
    Good Essays

Related Topics