...Paper Case study Nantonia ICT Strategy & Planning Master : ICT in Business Location : University, Leiden Course : ICT Strategy & Planning Assignment : Paper Case study Nantonia Date : 3 June 2011 Name : Suraj Soerdjbali Studentnr : Teacher : ------------------------------------------------- Part 1 The business model: 1. Partners: Natepco is a subsidiary of Natonia Energy Holdings. Which on their turn have a joint venture with Prime Energy Group and Government of Natonia 2. Key activities: The key activities of Natepco are exploration and production 3. Key resources: The key resources of Natepco are sell crude oil to commodity markets and gas (LHG) to power/electricity producers 4. Value Proposition: crude oil and gas (LHG) 5. Relationship: Their Brand, retaining customers 6. Distribution and acquisition channel: Traders, electricity producers 7. Customers: willing market in local industry 8. Cost structure: Manufacturing, exploration, maintenance 9. Revenue streams: The IT systems being used within the business model: * Partners: Prime Energy Group is in consideration of implementing SAP * Key activities: VAX/Compaq systems are used for drilling applications, HP systems are used for running applications for maintenance en procurement. Offshore platforms uses email application and application access * Key resource: IBM systems for finance The business maxims that I found in the case...
Words: 3623 - Pages: 15
...The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia Europe Direct is a service to help you find answers to your questions about the European Union New freephone number * 00 800 6 7 8 9 10 11 Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. In certain cases, these calls may be chargeable from telephone boxes or hotels. «The views expressed are those of the authors and not necessarily those of the European Commission or any of its officials» A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server (http://www.europa.eu). Cataloguing data can be found at the end of this publication. ISBN 978-92-79-08008-1 © European Communities, 2008 Reproduction is authorised provided the source is acknowledged. Printed in Belgium PRINTED ON CHLORE FREE PAPER The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia ••• 2 Preface 5 priorities identified by the Internet Governance Forum: openness, security, access, diversity and critical Internet resources. The use of the Internet in public policies will considerably grow in areas such as education, culture, health and e-government...
Words: 66329 - Pages: 266
...Strategic Planning for eServices1 A Short Tutorial for the Beginners2 Amjad Umar, Ph.D. Senior Technical Advisor, United Nations-GAID Executive Summary Strategic planning of ICT (Information and Communication Technologies)-based services, abbreviated as eServices, is a crucial task for the public as well as private sectors. Given a strategic project (or an initiative), a strategic planning process identifies the main alternatives, the key business/technical issues involved in each alternative, and helps in evaluation and selection of the most viable alternatives before initiating the project. To succeed, the strategic planning process must explore a large number of people, process and technology issues and eliminate surprises. This is not easy because the task of eservices planning in the digital age is considerably complicated due to the changing business and technical landscape and an ever-growing body of knowledge. This short tutorial gives a quick overview of the vast body of knowledge that entails a typical strategic ICT planning process and presents a conceptual framework for further exploration of this important area. 1. An Example – eServices for a City Ms Fran Kuye is mayor of a city with one million inhabitants, located in a developing country.She wants to use the knowledge gained from her MPA (Master of Public Administration) to transform her city to a “Digital City” that heavily relies on eservices to support its citizens. Her overall goal is...
Words: 5384 - Pages: 22
...National ICT Strategy and Plan NICI - 2015 © No part of this document can be reproduced, stored in a retrieval system, or transmitted in any form or by any means - electronic, mechanical, photocopying, recording, or otherwise - without the permission of the Rwanda Ministry in charge of ICT in the Office of the President. List of Acronyms AGAGE AISI AMIS ARTEL BNR BPO CD CERT COMESA CNS-ATM CS CSIRT CTC FWG DCRS EAPP EASSy EDPRS e-GOV EMIS EMR EQMS ERMS FMS FY GDP GIS GNI GNP GoR G2B G2C G2G HIV HLSC HRMS ICT ICT4D IDS IPAR IPS ISP ISPA ITU IXP JICA Advanced Global Atmospheric Gases Experiment African Information Society Initiative Agriculture management Information System Africa Rural Telecommunication Banque National du Rwanda Business Processing Outsourcing Community Development Computer Emergency Response Team Common Market for Eastern and Southern Africa Communication Navigation Surveillance /Air Management Cyber Security Computer Security Incident Response Team Coordination Technical Committee Focus area Working Group Develop a Digital Court Recording System East African Power Pool Eastern Africa Submarine Cable System Economic Development & Poverty Reduction Strategy (2008-2012) e-Government Education Management Information System Electronic Medical Records Electronic Queue Management System Electronic Records Management System Financial Management Systems Fiscal Year Gross Domestic...
Words: 28160 - Pages: 113
...Vol 6. No. 2, June 2013 African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net Design and Implementation of Real-Time Crime Information System for National Drug Law Enforcement Agency (NDLEA) in Nigeria C.H. Ugwuishiwu & K.C. Ugwu Department of Computer Science University of Nigeria Nsukka, Nigeria Chilkodili.ugwuishiwu@unn.edu.ng H.C. Inyiamah Department of Computer Engineering Nnamdi Azikiwe University Awka, Nigeria drhcinyiama@gmail ABSTRACT The problems of narcotic drugs in Nigeria as manifested in the cultivation, trafficking and abuse of drug is of increasing concern to the government, social researchers, and other stakeholders. The impact of illicit drugs continues to threaten the economies and social structures of both producing and consuming countries. This paper presents an implementation framework for a reliable, efficient and mobile real- time crime information system (CIS) that will help to maintain instant flow of information between the general public and NDLEA. This application solved this problem through a just-in-time flow of crime information from an informant who could be an individual, corporate body or any other government agency to the NDLEA office for a necessary action. This kind of information if handled properly will lead to illicit drug supply suppression hence reduce its availability as well as other substances of abuse. It will also help in drug demand reduction which result in a decline...
Words: 4125 - Pages: 17
...features of expected smart grid are: observable, controllable, efficient (energy and economy), incorporating renewable and distributed generation, enable demand side operation and the ability of automated. The technologies support the future smart grid can be divided into three parts: 1. Information and Communication Technologies (ICT) 2. Sensing, Measurement, Control and Automation Technologies 3. Power electronics and energy storage Technologies This article will only introduce the current information and communication technologies for the smart grid because of the length restriction. The reliable and stable communication system is a key factor for the power delivery system. Therefore, a communication system that meets the requirements is the foundation to the successful implementation of Smart Grid in the future. 2. Information and Communication Technology (ICT) for Smart Grid The application of the ICT in the Smart Grid is to establish a high-speed, bi-directional communication network between every components in the grid to realize a dynamic and real time data collecting and exchanging power system. 2.1 Smart Grid Communication Architecture The establishment of an integrated communication system requires several kinds of network topologies:...
Words: 1324 - Pages: 6
...Storage Security in Green Technology Perspective Pallavi Singh MCA Vth Semester SoS in Computer Science & I.T. Pt. Ravi Shankar Shukla University, Raipur (C.G.) pallavisingh.530@gmail.com Surendra Kumar Patel Assistant Professor SoS in Computer Science & I.T. Pt. Ravi Shankar Shukla University, Raipur (C.G.) surendrapatelit2004@gmail.com Anil Kumar Sharma Assistant Professor Department of Mathematics and Information Technology Govt. N.P.G. Science College, Raipur (C.G.) sharmaanil.mail@gmail.com Abstract— Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking technologies and raises issues in the architecture, design, and implementation of existing networks and data centers. In these beliefs, users of cloud storage services no longer physically maintain direct control over their data, which makes data security one of the major concerns of using cloud. This paper investigated the problem of data security in cloud data storage, which is fundamentally a dispersed storage system. Index Terms—Cloud Computing, Data Storage, Security, Green Computing. 1. INTRODUCTION The remarkable development of cloud computing in recent years is increasingly sparking the interest of Internet and IT users seeking to derive the greatest benefit from the services and applications available on line via the web in service-on-demand mode with per-usage billing. Cloud computing offers a new economic model for ICTs – a model...
Words: 2047 - Pages: 9
...Integrating ICT- Based Applications for Sustainable Tourism Development in Algeria BOUTKHIL Guemide Assistant Teacher Department of English Language Faculty of Letters & Languages University of Med Seddik Benyahia. Cité Ouled Aissa B. P. N°98 Jijel (18000) Algeria titanicmaze@hotmail.fr Pr. CHELLALI Benachaiba Assistant Professor Department of Electronics & ICTs Faculty of Electrical Engineering University of Med Tahri B. P. N° 417 Bechar (08000) Algeria. IBTISSAM Bedri Assistant Teacher Department of Political Sciences Faculty of Law & Plitical Sciences University of Med Khaidar 145 RP, BISKRA (07000) Algeria Dr. Salima Maouche Assistant Professor Department of English Language Faculty of Letters & Languages University of Abd Errahmane Mira, Bejaia (06000) Algeria ABSTRACT: Information and Communication Technology (ICT) has inevitable impacts on different industries and their performances. The tourism industry, as the largest and fastest growing industry in the world, cannot be excluded from this technology and its huge impacts. ICT provides information about tourist attractions in different destinations before travelling and improves tourists‘ satisfaction. Although Algeria has great tourism potentials, it still needs to be performed well in promoting its attractions to international tourists via ICT tools yet. This research explores the impact of ICT on foreign tourists‘ satisfaction of the tourism industry and uses...
Words: 9570 - Pages: 39
...Assignment 1 03-26-2012 1. Four main versions of Server 2008 are: Windows Web Server 2008, Windows Server 2008 Standard, Windows Server 2008 Enterprise, and Windows Server 2008 Datacenter. Web Server does not support the Installation of Active Directory to make the server a domain controller. 2. Enterprise has unlimited maximum Routing and Remote Access Services (RRAS) connections, but Standard only has 250 (RRAS) connections. 3. The ram limit of the x86 architecture is 64GB. The x64 architecture ram limit is 2TB. 4. The advantages of installing Server Core is with so much of the operating system scaled down, a computer running Server Core can devote more of it’s resources to it’s server functions. What are missing are no start menu, no desktop explorer shell, no Microsoft Management console, and virtually no graphical applications. 5. You must re-arm or extend the Windows Server 2008 evaluation period without a product key. The grace period is 60 days. 6. ICT stands for Initial Configuration Tasks. Some of the ICT tasks are Set time zone, Configure networking, and Provide Name and Domain. 7. Server Manager Console is used to add a Server Role. 8. Simple, Spanned, Striped, Mirrored, and RAID-5 are the five different volumes supported by Server 2008. RAID-5 features that are provided are additional information known as Parity and a RAID-5 Volume can be created using a minimum of three disks and a maximum of 32 disks. 9. Mount Point is the feature that allows a volume...
Words: 544 - Pages: 3
...Make reasoned recommendation about how particular organisation can take advantage of IT development. As an ICT manager working for full of beans, I have made it clear that the development of ICT is increasing, therefore giving organisations no choice but to adapt to the changes. It’s my duty to explain to the owners and employees of full of beans how the ICT development can have a positive impact on the organisation. For example, fast processing which is essential for banks and vast storage capacity which reduces the amount of paper work. Hardware and software are both being used by organisation to help them accomplish certain tasks e.g. using (MIS) management information system. Hardware and software increased in power, capacity and sophistication, therefore allowing organisation to expand and work more efficiently. I strongly recommend that full of beans make use of this opportunity to adapt to the ICT developments. One great example of a new development full of beans can take advantage of is the recent wireless technology, many organisations responded to this change by adapting to the change. In order for full of beans to take full advantage of the ICT development, obviously the manager first needs a presentation on the capabilities of these development and how it will benefit their organisation. There are many new developments that organisation took advantage of, I will explain some of these development in more detail below. Wireless technology This is a great development...
Words: 1111 - Pages: 5
...sector product and services that are responsive to the needs of citizens and businesses as well as capacity creation. For a variety of reasons (economic and policy), developing countries like Kenya are less equipped to take advantage of the potential in ICT to stimulate growth, and are likely to fall behind advanced economies. The Kenya ICT Master Plan is therefore not designed in isolation, given that there is evidence from developed countries that investment in ICT facilitates economic growth by increasing productivity. As the Kenya Government ensures an enabling ICT environment and regulatory framework, this plan aims at stimulating the setup of ICT-related businesses to enhance employment creation. At the heart of this document is a strategic intent to develop a robust ICT sector that will enhance economic growth through creation of businesses and hence employment. In the execution of this plan, Kenya will become a leading ICT hub for the region, improve the lives of her citizens and see significant ICT-led economic growth in line with Vision 2030. This ICT Master Plan aims at building and promoting an environment where more service sector businesses are created and are able to thrive through leveraging on ICT. ICT offers key benefits that make life simpler and more convenient for citizens and businesses and...
Words: 4766 - Pages: 20
...was local is now global Economic crisis, financial fluctuations, disasters, inventions, politic events, entertainment, sports. Level of globalization impacts National states, organizations, individuals, facilitated by IT What is information technology is? Blurring of boundaries in IT Computer and phone. Computer and digital media Combination of hardware and software. The roles of IT Reduce costs, sources of innovation, improving quality of life, improving services, increasing access to services, increasing access to markets. Effects of IT Usage Individual usage – cohesive society, business usage – business innovation , government usage – effective government Global impacts. Increase in productivity, scalability, security, availability, increased access to resources such as open source software. Impact on sustainability ( green IT) IT History with focus on its global development Start of information processing: to record and communicate data. Over the centuries people...
Words: 1113 - Pages: 5
... Information System Audit Guide VERSION 11.1 January 2012 Table of Contents 1. Introduction to Accreditation 4 2. The Information System Audit – Checklist 7 2.1. What is an Information System Audit? 7 2.2. Why is an Information System Certification needed? 7 2.3. Assessing an Information System’s Security Risks 7 2.4. Selecting an Information System’s Security Controls 7 3. Purpose of the Checklist 8 4. How to Use the Checklist 8 4.1. The Checklist Structure 8 4.2. Security Objectives 9 4.3. Guidance for IRAP Assessors 9 4.4. Information System Compliance 10 5. Guidance for IRAP Assessors 10 6. The Checklist 11 6.1. The Information Security Policy & Risk Management 11 6.2. Information Security Organisation 14 6.3. Information Security Documentation 17 6.4. Information Security Monitoring 20 6.5. Cyber Security Incidents 22 6.6. Physical & Environmental Security 24 6.7. Personnel Security for Information Systems 26 6.8. Product & Media Security 27 6.9. Software, Network & Cryptographic Security 30 6.10. Access Control & Working Off-site Security 33 Appendix A – Accreditation Governance 36 The ISM & Certification 36 Compliance Levels 37 Compliance Report 37 Compliance Comments 37 Audit Documentation Submissions 38 Appendix B – Standards 39 | ...
Words: 6447 - Pages: 26
...search for keywords in the encrypted data and use the encrypted data as an input to computation or comparison operations. Because decrypting data stored at the cloud servers may possibly expose its content to the provider servers at least, so it is advised that it is more secure to decrypt data only on trusted machines which are controlled by the user who is authorized to access the data. Figure 2.2 Basic Architecture for Preserving Data Privacy in the Cloud Figure 2.2 shows the basic architecture of encryption for privacy protection before sending it to the cloud server. The data remain encrypted in the cloud server and only authorized users can get the credential for accessing this encrypted data. The encrypted data can be decrypted only after the data are downloaded to an authorized user device or machine. In such scenario, the privacy of the data doesn’t depend on any implicit assumption of trust of the server or the service level of agreement (SLA). Instead, the protection of privacy or integrity completely depends on the encryption techniques used to protect the data [45ECC]. The other leftover issues are how to allow the authorized users and data owner to search...
Words: 1702 - Pages: 7
...others that have led policy makers to enthusiastically embrace cloud computing: “The medicine needed for our credit squeezed economy”. The scalability of cloud services enables increased productivity and improved responsiveness to changing customer demands and market conditions. It reduces risk for organizations, enabling them to trial new ideas and processes without the need to invest heavily in new technologies. In particular, cloud can facilitate new means of collaborative working practices, reflecting in part models from the open source community, both within and between organizations. One leading concern is data security, the trust, reliability and dependency in moving data and applications to a remote third party. While such concerns are real and need to be adequately addressed, they are in part also cultural, requiring a change in attitude about how to use ICT systems. In 1999,...
Words: 475 - Pages: 2