Enterprise Architecture Program: Publications, Resources & Toolkit

Welcome to the Jungle: The State Privacy Implications of Spam, Phishing and Spyware

  • 1 February 2005
  • Author: Mike Cooke
  • Number of views: 4940
  • 0 Comments
Welcome to the Jungle: The State Privacy Implications of Spam, Phishing and Spyware
This brief explores the privacy implications for state government created by the threats of spam, phishing and spyware and potential ways of preventing and mitigating this triple threat to state IT systems.

The Real Phantom Menace: Spyware and its State Implications

  • 1 January 2005
  • Author: Mike Cooke
  • Number of views: 5492
  • 0 Comments
The Real Phantom Menace: Spyware and its State Implications
This brief addresses the security, privacy, citizen trust and business process-related implications of spyware and other forms of malware for state government IT systems and suggests some potential technical, legal and awareness-raising solutions for the menace of malware.

Who Are You? I Really Wanna Know: E-Authentication and its Privacy Implications

  • 1 December 2004
  • Author: Mike Cooke
  • Number of views: 5778
  • 0 Comments
Who Are You? I Really Wanna Know: E-Authentication and its Privacy Implications
This brief explores the business drivers behind e-authentication and the privacy implications that states and others should consider in pursuing e-authentication efforts.

Enterprise Architecture Assessment Tour Report

  • 1 October 2004
  • Author: Mike Cooke
  • Number of views: 6635
  • 0 Comments
Enterprise Architecture Assessment Tour Report
Enterprise Architecture Assessment Tour Report

Walking the Road to the Win-Win: NASCIO Procurement Subcommittee’s Recommendations on Liability Limitations for State IT Contracting

  • 1 September 2004
  • Author: Mike Cooke
  • Number of views: 13515
  • 0 Comments
Walking the Road to the Win-Win: NASCIO Procurement Subcommittee’s Recommendations on Liability Limitations for State IT Contracting
These recommendations are intended to elucidate the various state and vendor interests that are involved in negotiating liability limitations and to help states and vendors negotiate better IT contract liability limitations that are “win-win” for both sides.

Think Before You Dig: The Privacy Implications of Data Mining & Aggregation

  • 1 September 2004
  • Author: Mike Cooke
  • Number of views: 6908
  • 0 Comments
Think Before You Dig: The Privacy Implications of Data Mining & Aggregation
This brief examines the business benefits and privacy issues related to government’s use of data-mining technologies. It also takes a look at high-profile government data-mining programs and suggests ways to infuse privacy protections and transparency into government’s use of data-mining technologies.

Bowling for Broadband: The Role of the State CIO in Promoting High-Speed Internet Access

  • 1 September 2004
  • Author: Mike Cooke
  • Number of views: 5565
  • 0 Comments
Bowling for Broadband: The Role of the State CIO in Promoting High-Speed Internet Access
Bowling for Broadband: The Role of the State CIO in Promoting High-Speed Internet Access

2004 Best Practices in the Use of Information Technology in State Government

  • 1 September 2004
  • Author: Mike Cooke
  • Number of views: 5976
  • 0 Comments
2004 Best Practices in the Use of Information Technology in State Government
Released in honor of NASCIO's 2004 Best Practices in the Use of Information Technology in State Government Awards, this booklet contains summaries of eight innovative government programs in the areas of Communications Infrastructure, Digital Government, Enterprise Information Architecture, Innovative Use of Technology, Security and Business Continuity, and State IT Management Initiatives.

HAVA (the Help America Vote Act 2002)—A Briefing Paper

  • 1 April 2004
  • Author: Mike Cooke
  • Number of views: 14358
  • 0 Comments
HAVA (the Help America Vote Act 2002)—A Briefing Paper
This briefing paper provides an overview of the Help America Vote Act of 2002 (HAVA) and explores its IT-related challenges as well as NASCIO’s role in helping states to implement the Act.

Wireless in the Workplace: A Guide for Government Enterprises

  • 1 April 2004
  • Author: Mike Cooke
  • Number of views: 6352
  • 0 Comments
Wireless in the Workplace: A Guide for Government Enterprises
The use of wireless technology in our personal lives has become almost commonplace with the proliferation of cell phones, personal digital assistants and wireless PC modems. Our demand for anytime, anywhere communications and access to information is quickly spreading to the workplace. Wireless local area networks (WLANs) and Wi-Fi “hot spots” are sprouting up everywhere, yet many individuals and organizations fail to fully understand the security risks of this inherently open technology and expose their systems unnecessarily.
RSS
First15161718192021222324

About The Enterprise Architecture Program

The NASCIO Enterprise Architecture program was developed to enable the mission of state and local government. Government must continually reinvent itself to remain relevant by effectively and efficiently providing services to the citizens of this country. The path to this continual transformation must embrace leadership, management, coordination, communication and technology throughout government. Enterprise architecture is the discipline to appropriately define and leverage these capabilities within the complexities of government.

Funding to support the NASCIO EA Program and information sharing initiative is provided by a grant from the U.S. Department of Justice, the Bureau of Justice Assistance, Office of Justice Programs.

Enterprise Architecture Development Tool-Kit v3.0

October 2004

The enhancements in the third version of the Tool-Kit result from the expertise and continued dedication of enterprise architecture practitioners from all levels of government and the private sector. Version 3.0 incorporates an updated governance architecture framework with added roles and responsibilities and a focus on multi-level communication. Process models with explanatory narrative are included for governance and the architecture lifecycle. The Tool-Kit also includes fully populated security domain and application domain blueprints.