- wireless applications & uses
- wireless technology options
- wireless standards
- wireless security
- wireless network management & performance
- wireless installation & maintenance
PUBLICATIONS | ARCHIVE
We Need to Talk: Governance Models to Advance Communications InteroperabilityNovember 2005
This research brief provides an overview of the challenges states face in developing communications interoperability initiatives and also attempts to answer questions such as, "What needs to be addressed when contemplating a communications interoperability initiative; and what is being done at the state and federal levels to develop communications interoperability governance models?" It includes other factors that are impacting governance in interoperability and offers references to models that have been successfully completed by other states.
Discipline Succeeds: Findings from the NASCIO State IT PM AssessmentNovember 2005
The National Association of State Chief Information Officers (NASCIO) surveyed state IT project managers concerning their approaches to IT project management in August-September of 2005. The trends discovered in responses from 34 state project management offices reveal a baseline regarding perceived success of project management as an overarching discipline in state government.
Best Practices in the Use of Information Technology in State GovernmentOctober 2005
Released in conjunction with NASCIO's 2005 Best Practices in the Use of Information Technology in State Government Awards, this booklet contains summaries of innovative state government programs in the following eight areas: Communications Infrastructure, Digital Government – G to B, Digital Government – G to C, Digital Government – G to G, Enterprise Information Architecture, Innovative Use of Technology, Security & Business Continuity, and State IT Management Initiatives.
IT Procurement and Enterprise Architecture: Recognizing the Mutual BenefitsOctober 2005
This brief highlights the benefits of a closer alignment between IT Procurement and Enterprise Architecture (EA), which includes improving and streamlining IT investment decisions in a way that supports the state’s overall strategic goals and intent. It also identifies “touchpoints” at which these two disciplines can establish stronger ties and concludes with recommendations on how states can start down the path to greater EA-IT Procurement alignment.
NASCIO Enterprise Architecture Business Case SummaryOctober 2005
NASCIO has collected success stories from a variety of sources including its various awards programs. NASCIO members have found that success stories provide an invaluable dimension of the underlying analysis when presenting the business case for EA related projects. These are now being made available to the greater NASCIO community to provide anecdotal information for developing a strong business case for EA. Much can be learned from these experiences and the reader is encouraged to contact the original source for any additional information or comment regarding those success stories that are most relevant.
The States and Enterprise Architecture: How Far Have We Come? Findings from the NASCIO 2005 EA AssessmentOctober 2005
NASCIO conducted a survey or "census" of the U.S. states to assess the level of enterprise architecture (EA) adoption and the experience with the NASCIO EA portfolio of products. NASCIO and the U.S. Department of Justice are interested to know the progress made in building awareness and EA capabilities at the state level. This survey effort and report supports the NASCIO program management function, which is responsible for measuring ongoing progress and effectiveness of NASCIO programs and initiatives.
The Year of Working Dangerously: The Privacy Implications of Wireless in the State Workplace—Part IISeptember 2005
The Year of Working Dangerously: The Privacy Implications of Wireless in the State Workplace—Part IAugust 2005
Part I identifies the privacy implications of wireless technologies in the state workplace, including the privacy implications of mobile technologies such as laptop computers, PDAs and other similar devices.
Enterprise Repositories Issue BriefAugust 2005
NASCIO has identified the need for a repository for sharing a variety of enterprise artifacts, presentations, and white papers across the NASCIO community. CORE.gov is the preferred repository for meeting the needs of state and territorial government. This research brief describes the issues, constraints, options and recommendations.
IT Management Frameworks: A Foundation for SuccessAugust 2005
NASCIO’s IT Governance & Service Reform Committee is proud to present IT Management Frameworks: A Foundation for Success. This research brief provides an overview of four successful IT Management frameworks that can improve investment decisions, accountability, and management of IT organizations. These successful frameworks represent a variety of management approaches that emphasize the different disciplines of investment management, service oriented management, and line of business or process management. They include the North Carolina Framework for Managing IT Investments; the Government Accountability Office IT Investment Management Framework; the IT Infrastructure Library; and, the Federal Business Reference Model.
Connecting the Silos: Using Governance Models to Achieve Data IntegrationJune 2005
NASCIO’s Interoperability & Integration Committee is proud to present Connecting the Silos: Using Governance Models to Achieve Data Integration. This research brief attempts to answer questions such as, “What needs to be addressed when contemplating an information integration initiative, and what is being done in the states and at the federal level to develop information integration governance models?” It also includes other factors that are impacting governance in integration and offers references to models that have been successfully completed by other states and links to resources on information sharing. The committee is currently exploring the following topics for future briefs: Interoperability Governance; Legal Ownership of Shared Data; Data Standards; Master name Indices; and Integration Maturity Models.
TLK2UL8R: The Privacy Implications of Instant and Text Messaging Technologies in State GovernmentMay 2005
This brief explores the privacy implications of Instant Messaging (IM) applications—both consumer and enterprise-grade—in the context of the state workplace. It also addresses the privacy implications of text messaging and chat technologies.
Getting What You Need on the Way to the Win-Win! Leveraging the RFP in State Technology ProcurementsMay 2005
This publication was co-produced by NASCIO and NASPO (National Association of State Procurement Officials). This brief provides a broad view of how a variety of stakeholders can use the RFP (Request for Proposal) process to the state’s and the citizens’ benefit.
2004-05 NASCIO Compendium of Digital Government in the StatesMay 2005
The Most Complete Compilation of Objective Data on Digital Government in the States
NASCIO is proud to announce the release of the 2004-05 Compendium of Digital Government in the States, a great reference source for government decision makers, IT solutions providers, consultants, and academic researchers as well as the nation's emerging digital citizenry. The Compendium is your source for up-to-the-minute information on digital government initiatives in the states, including:
- Executive IT Authority
- Enterprise IT Management
- IT Financial Management and Funding
- Access, Usability, and Visibility
- Privacy, Security, and Reliability
- Application Development, E-Commerce, and Internal Automation
Complimentary copies of this publication are available to government and academic organizations. Contact Shawn Karrick at email@example.com.
VoIP and IP Telephony: Planning for Convergence in State GovernmentMay 2005
The keen interest in Voice over Internet Protocol (VoIP) and Internet Protocol (IP) Telephony and its accelerated adoption rate has led to the realization that the long-established Public Switched Telephone Network (PSTN) voice business model will be facing its end of life in the next 10 to 15 years. This report, a product of NASCIO's Infrastructure Subcommittee, is intended to provide an understanding of the fundamental issues facing organizations as they assess VoIP and IP Telephony. It contains a description of the operation and functionality of the legacy PSTN, an explanation of voice transport over the Internet and IP Telephony, and a discussion of the issues and drivers associated with the migration from the PSTN to converged voice and data networks.
PERSPECTIVES - Government Information Sharing: Calls to ActionMarch 2005
NASCIO is pleased to announce the release of a new publication on the subject of information sharing. NASCIO has pulled together interviews and articles from a variety of contributors from integrated justice, homeland security, environmental protection, transportation, public health and economic development. Perspectives includes discussions from federal, state and county government. Not so surprisingly, according to the contributors to this first issue of Perspectives, technology is not the major barrier. This report presents barriers to information sharing and the “Calls to Action” to overcome these barriers.
Negotiating IP on the Way to the Win-Win: NASCIO’s Intellectual Property RecommendationsMarch 2005
These recommendations seek to identify state and contractor interests regarding the ownership of IP and suggest realistic considerations to help make the negotiation of IP rights easier and more successful for all involved.
Welcome to the Jungle: The State Privacy Implications of Spam, Phishing and SpywareFebruary 2005
This brief explores the privacy implications for state government created by the threats of spam, phishing and spyware and potential ways of preventing and mitigating this triple threat to state IT systems.
The Real Phantom Menace: Spyware and its State ImplicationsJanuary 2005
This brief addresses the security, privacy, citizen trust and business process-related implications of spyware and other forms of malware for state government IT systems and suggests some potential technical, legal and awareness-raising solutions for the menace of malware.
Who Are You? I Really Wanna Know: E-Authentication and its Privacy ImplicationsDecember 2004
This brief explores the business drivers behind e-authentication and the privacy implications that states and others should consider in pursuing e-authentication efforts.
Enterprise Architecture Development Tool-Kit v3.0October 2004
The enhancements in the third version of the Tool-Kit result from the expertise and continued dedication of enterprise architecture practitioners from all levels of government and the private sector. Version 3.0 incorporates an updated governance architecture framework with added roles and responsibilities and a focus on multi-level communication. Process models with explanatory narrative are included for governance and the architecture lifecycle. The Tool-Kit also includes fully populated security domain and application domain blueprints.
In Hot Pursuit: Achieving Interoperability Through XMLOctober 2004
CD version is higher quality than the streaming version.
Enterprise Architecture Assessment Tour ReportOctober 2004
2004 Best Practices in the Use of Information Technology in State GovernmentSeptember 2004
Released in honor of NASCIO's 2004 Best Practices in the Use of Information Technology in State Government Awards, this booklet contains summaries of eight innovative government programs in the areas of Communications Infrastructure, Digital Government, Enterprise Information Architecture, Innovative Use of Technology, Security and Business Continuity, and State IT Management Initiatives.
Bowling for Broadband: The Role of the State CIO in Promoting High-Speed Internet AccessSeptember 2004
Think Before You Dig: The Privacy Implications of Data Mining & AggregationSeptember 2004
This brief examines the business benefits and privacy issues related to government’s use of data-mining technologies. It also takes a look at high-profile government data-mining programs and suggests ways to infuse privacy protections and transparency into government’s use of data-mining technologies.
Walking the Road to the Win-Win: NASCIO Procurement Subcommittee’s Recommendations on Liability Limitations for State IT ContractingSeptember 2004
These recommendations are intended to elucidate the various state and vendor interests that are involved in negotiating liability limitations and to help states and vendors negotiate better IT contract liability limitations that are “win-win” for both sides.
Wireless in the Workplace: A Guide for Government EnterprisesApril 2004
The use of wireless technology in our personal lives has become almost commonplace with the proliferation of cell phones, personal digital assistants and wireless PC modems. Our demand for anytime, anywhere communications and access to information is quickly spreading to the workplace. Wireless local area networks (WLANs) and Wi-Fi “hot spots” are sprouting up everywhere, yet many individuals and organizations fail to fully understand the security risks of this inherently open technology and expose their systems unnecessarily.
This publication is intended to help government enterprises make informed decisions about wireless technology and guide IT professionals through the opportunities and challenges of working in the wireless world. It highlights key issues such as:
HAVA (the Help America Vote Act 2002)—A Briefing PaperApril 2004
This briefing paper provides an overview of the Help America Vote Act of 2002 (HAVA) and explores its IT-related challenges as well as NASCIO’s role in helping states to implement the Act.
Information Privacy: A Spotlight on Key IssuesFebruary 2004
NASCIO is pleased to announce the release of its newest publication, Information Privacy: A Spotlight on Key Issues. This publication, produced by the Privacy committee, serves as a resource for states developing privacy policies that protect citizen information and are compliant with federal and state legal requirements. This publication highlights key issues in the following areas of privacy: Children’s Information, Drivers’ Information, Health Information, Financial Information, Education Information, Social Security Numbers, Homeland Security-Related Information, Website Privacy Policies, and Government Data Matching Activities and Agreements.
In addition, the publication includes state examples for many of these areas of information privacy, an overview of recent privacy events at the federal level and a glossary of privacy related terms.
Digital GovernmentJanuary 2004
Architecture: A Blueprint for Better GovernmentJanuary 2004
Enterprise Architecture – Government Leader PerspectiveJanuary 2004
Enterprise Architecture – Information Technology Professional PerspectiveJanuary 2004
Enterprise Architecture Maturity ModelDecember 2003
An adaptive, dynamic enterprise architecture enables the enterprise to change and manage the complexities inherent in large government enterprise. Enterprise architecture brings an operating discipline to the organization and prescribes the necessary traceability from strategic intent to the capabilities that enable that intent. These capabilities include both business and technology components. Enterprise architecture doesn’t happen at once. It is an iterative, maturing discipline that provides management the operating discipline for organizing and engaging business and technology components to fulfill the mission of the organization. This maturity model provides a scale or metric for understanding where the organization is in its evolving discipline, and what steps are required to take it to the next level of maturity.
The NASCIO Enterprise Architecture Maturity Model provides a path for architecture and procedural improvements within an organization. As the architecture matures, predictability, process controls and effectiveness also increase. Development of the enterprise architecture is critical because it provides the rules and definition necessary for the integration of information and services at the design level across agency boundaries. Enterprise architecture includes business processes and representations, and supportive technology components. At its fullest maturity, enterprise architecture becomes an inter-enterprise concept and prescribes the infrastructure for inter-enterprise business processes and provides the design for allowing data to flow from agency to agency, just as water flows through the pipes and electricity flows through the wiring of a well planned home.
Enterprise Architecture Maturity Model Validation ReportDecember 2003
Innovative Funding for Innovative State ITNovember 2003
During the past several years, many states have found it increasingly difficult to obtain funding for state IT projects through traditional means, such as via appropriations from the state general fund. In spite of these tight economic times, citizens’ demand for improved ways of doing business with state government and 24 x 7 access to government services has remained strong. The purpose of Innovative Funding for Innovative State IT: New Trends and Approaches for State IT Funding is to provide states with innovative avenues of funding so that they can provide citizens with the government services they demand. This publication details eleven innovative funding models and provides case studies on how each model has been implemented by a state. Innovative Funding for Innovative State IT also includes a study conducted by NASCIO’s Corporate Leadership Council (CLC) that surveyed the states on the types of funding models they are currently using. The survey results from the twenty-three states that responded are included in this publication.
Innovative Funding for Innovative State IT is divided into three main sections, the first of which describes eleven innovative funding models as well as baseline requirements for implementing each model and the benefits each model may bring. The second section includes the compiled results of the CLC’s survey regarding states’ current use of innovative funding models. This section also details trends in state IT funding identified from the CLC’s survey. The third section includes case studies from nine states that exemplify how each innovative funding model has been implemented. The states that provided case studies for this publication are: Massachusetts, Texas, Minnesota, Tennessee, Ohio, Missouri, Delaware, Arizona and Hawaii. The appendices include checklists to give states a starting point for implementing each funding model as well as a chart of the CLC’s survey results and a list of other innovative funding resources.
Concept for Operations for Integrated Justice Information Sharing Version 1.0July 2003
ConOps provides a discipline-specific focus for justice information sharing, which in turn can be used to identify and expose broader IT architectural and infrastructure issues that must be addressed by CIOs. While this ConOps focuses primarily on information sharing in the justice arena, the concepts are applicable to any business domain.
ConOps defines the discipline-specific, business functions for integrated justice and explores the architectural implications for state CIOs, who are responsible for planning the IT enterprise architecture. Additionally, ConOps defines fundamental concepts, principles, functions and operational requirements for integrated justice information sharing, presents a scenario of integrated justice information sharing and a general methodology for states to use in validating their IT architecture for information sharing characteristics. Finally, this document articulates an action plan for the validation, implementation and expansion of this ConOps to other disciplines.
Concept for Operations for Integrated Justice Information Sharing Validation ReportJuly 2003
Federal Privacy Law Compendium, Version 1.0April 2003
To help states identify and assess federal laws that may have privacy implications for their information systems and policies, the NASCIO Privacy Committee has developed the Federal Privacy Law Compendium, Version 1.0. It is intended to serve as a resource for summaries of federal laws that may have an impact on the privacy of citizens’ information that is entrusted to state government. The Federal Privacy Law Compendium provides a starting point for states in their assessment of whether the summarized federal privacy laws will impact state information system operations and/or policies.
The Federal Privacy Law Compendium summarizes ten federal laws that deal with the privacy of information and highlights instances of potential impact on state government. The federal privacy laws summarized are:
- The Children’s Online Privacy Protection Act of 1998
- The Computer Fraud and Abuse Act of 1984
- The Computer Matching & Privacy Protection Act of 1988 & Amendments of 1990
- The Driver’s Privacy Protection Act of 1994
- The Electronic Communications Privacy Act of 1986
- The Fair Credit Reporting Act of 1970
- The Family Educational Rights and Privacy Act of 1974
- The Gramm-Leach-Bliley Financial Services Modernization Act of 1999
- The Health Insurance Portability and Accountability Act of 1996
- The Privacy Act of 1974
Business Case Basics and Beyond: A Primer on State Government IT Business CasesMarch 2003
This primer provides tools, concepts and a framework for addressing a number of critical challenges facing state Governors, CIOs and enterprise information technology (IT) organizations. These include leadership transitions in the offices of many Governors and in state legislatures, increasing budget deficits, the departure and replacement of state CIOs and a number of other long term concerns. These challenges will likely impact state government's ability to maintain the momentum of e-government implementation and meet the policy and service goals of the Governors in areas such as education, economic and workforce development, public safety, healthcare and the environment. Most importantly, these challenges may impact states' ability to deliver services to citizens and customers.
Transition HandbookDecember 2002
Governors, cabinet members and legislatures across the country are increasingly turning to the state CIOs to provide the leadership needed to modernize state operations and bring the latest electronic services to citizens and businesses. The 21st Century state CIO can serve as a key advisor to the Governor and often becomes the chief architect of state IT policies.
The NASCIO Transition Handbook can aid governors and incoming CIOs in determining and achieving their IT-related preferences and priorities.
The Transition Handbook PDF document includes both the Governor's Transition Team IT Assessment Template and the Chief Information Officer Transition Handbook. The Governor's Transition Team IT Assessment Template [Word 185 kb] is also available in Microsoft Word format designed to aid Governor transition teams.
Proposed GSA Rule: New Policy on the .gov DomainMay 2002
This brief provides an overview of the Proposed Rule promulgated by the U.S. General Services Administration (GSA) that made the .gov Top-Level Internet domain available for states, local governments and Native Sovereign Nations to register domain names for their official government websites.
NASCIO Justice Report - Toward National Sharing of Governmental InformationFebruary 2000