William Maconachy | Capitol Technology University (original) (raw)
Uploads
Papers by William Maconachy
Implementing and maintaining a high-quality information assurance program requires constant busin... more Implementing and maintaining a high-quality information assurance program requires constant business process engineering and reinvention. All organizations use Business Process Reengineering (BPR) techniques to meet the challenges of a dynamic organizational environment. The rightsizing and downsizing place an emphasis on organizational quality. One of the basic precepts of organizational quality is ‘Do the Right Job — Right.’ To do this in information assurance, both the right job and the process to do it the right way must be identified. This paper describes an automated technology to support the process.
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, Jun 5, 2001
Abstract--The model presented in this paper is an extension of work reported in 1991 by John McCu... more Abstract--The model presented in this paper is an extension of work reported in 1991 by John McCumber. His model provided an abstract research and pedagogic framework for the profession. In the decade since McCumber prepared his model, Information Systems Security (INFOSEC) has evolved into Information Assurance (IA). Although the framework remains sound, the growth of the profession has suggested that changes are needed. This extension of the model accommodates the expanded needs of the IA discipline and ...
IEEE Engineering in Medicine and Biology Magazine, 2004
Abstract The DHS recognizes that the progression from data to information to knowledge and subseq... more Abstract The DHS recognizes that the progression from data to information to knowledge and subsequently to wisdom is a key to robust, reliable, and resilient biomedical informatics systems. The systems that enable this progression are increasingly complex. Frequently ...
Sensors, C3I, Information, and Training Technologies for Law Enforcement, 1999
ABSTRACT The National Colloquium for Information Systems Security Education (the Colloquium) was ... more ABSTRACT The National Colloquium for Information Systems Security Education (the Colloquium) was established in 1997 to serve as a living body to bring government, industry, and academia together to meet the challenges of information security. All aspects of our lives and all aspects of our social, economic and political system are becoming increasingly dependent on our information and communications infrastructure. The security and assurance of our information and communications infrastructure should be a national priority. To address this, our nation needs an information-literate work force that is aware of its vulnerability, as well as a cadre of information professionals that are knowledgeable of the recognized 'best practices available in information security and information assurance, as called for in Presidential Decision Directive 63, May 22, 1998. It is the task of American higher education to provide that information- literate work force and to prepare information professions. To meet this priority, higher education must be informed of the knowledge, skills, and attitudes to be taught in the general curricula and in the information curricula of its colleges and universities. Industry and government must under their role in supporting higher education, not simply expecting higher education to be responsive and informed about information security and assurance.
Proceedings of the 1995 ACM SIGCPR conference on Supporting teams, groups, and learning inside and outside the IS function reinventing IS - SIGCPR '95, 1995
... Elliott Masie President, The Masie Center, Cambridge, MA ... Computer Supported Cooperative W... more ... Elliott Masie President, The Masie Center, Cambridge, MA ... Computer Supported Cooperative Work '94, Chapel Hill, NC. Jessup, Leonard M, and Valacich, Joseph S., Group Sumort Swtems - New Perspectives, Macmillan Publishing Company. Moore, Carl, Group ~, Sage ...
Perceptual and Motor Skills, 1970
APA PsycNET Our Apologies! - The following features are not available with your current Browser c... more APA PsycNET Our Apologies! - The following features are not available with your current Browser configuration. - alerts user that their session is about to expire - display, print, save, export, and email selected records - get My ...
Research Advances in Database and Information Systems Security, 2000
Page 121. SELECTED TOPICS IN INFRASTRUCTURE AND INFORMATION ASSURANCE William V. Maconachy, Thoma... more Page 121. SELECTED TOPICS IN INFRASTRUCTURE AND INFORMATION ASSURANCE William V. Maconachy, Thomas Harper, Donald G. Marks and Terry Mayfield, Chair Abstract Since 1994 and the explosive growth of ...
Proceedings of the IFIP TC11, …, 1993
... top of page ABSTRACT. An abstract is not available. top of page AUTHORS. Corey D. Schou No co... more ... top of page ABSTRACT. An abstract is not available. top of page AUTHORS. Corey D. Schou No contact information provided yet. Bibliometrics: publication histor.
The United States is at target. For those of us who grew up curing the cold war this is not news;... more The United States is at target. For those of us who grew up curing the cold war this is not news; however, the threat is different than it has been in the past. Now it may be another super power or it may be a teenage child with a personal computer. Both government and civilian entities are potential targets. The
Implementing and maintaining a high-quality information assurance program requires constant busin... more Implementing and maintaining a high-quality information assurance program requires constant business process engineering and reinvention. All organizations use Business Process Reengineering (BPR) techniques to meet the challenges of a dynamic organizational environment. The rightsizing and downsizing place an emphasis on organizational quality. One of the basic precepts of organizational quality is ‘Do the Right Job — Right.’ To do this in information assurance, both the right job and the process to do it the right way must be identified. This paper describes an automated technology to support the process.
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, Jun 5, 2001
Abstract--The model presented in this paper is an extension of work reported in 1991 by John McCu... more Abstract--The model presented in this paper is an extension of work reported in 1991 by John McCumber. His model provided an abstract research and pedagogic framework for the profession. In the decade since McCumber prepared his model, Information Systems Security (INFOSEC) has evolved into Information Assurance (IA). Although the framework remains sound, the growth of the profession has suggested that changes are needed. This extension of the model accommodates the expanded needs of the IA discipline and ...
IEEE Engineering in Medicine and Biology Magazine, 2004
Abstract The DHS recognizes that the progression from data to information to knowledge and subseq... more Abstract The DHS recognizes that the progression from data to information to knowledge and subsequently to wisdom is a key to robust, reliable, and resilient biomedical informatics systems. The systems that enable this progression are increasingly complex. Frequently ...
Sensors, C3I, Information, and Training Technologies for Law Enforcement, 1999
ABSTRACT The National Colloquium for Information Systems Security Education (the Colloquium) was ... more ABSTRACT The National Colloquium for Information Systems Security Education (the Colloquium) was established in 1997 to serve as a living body to bring government, industry, and academia together to meet the challenges of information security. All aspects of our lives and all aspects of our social, economic and political system are becoming increasingly dependent on our information and communications infrastructure. The security and assurance of our information and communications infrastructure should be a national priority. To address this, our nation needs an information-literate work force that is aware of its vulnerability, as well as a cadre of information professionals that are knowledgeable of the recognized 'best practices available in information security and information assurance, as called for in Presidential Decision Directive 63, May 22, 1998. It is the task of American higher education to provide that information- literate work force and to prepare information professions. To meet this priority, higher education must be informed of the knowledge, skills, and attitudes to be taught in the general curricula and in the information curricula of its colleges and universities. Industry and government must under their role in supporting higher education, not simply expecting higher education to be responsive and informed about information security and assurance.
Proceedings of the 1995 ACM SIGCPR conference on Supporting teams, groups, and learning inside and outside the IS function reinventing IS - SIGCPR '95, 1995
... Elliott Masie President, The Masie Center, Cambridge, MA ... Computer Supported Cooperative W... more ... Elliott Masie President, The Masie Center, Cambridge, MA ... Computer Supported Cooperative Work '94, Chapel Hill, NC. Jessup, Leonard M, and Valacich, Joseph S., Group Sumort Swtems - New Perspectives, Macmillan Publishing Company. Moore, Carl, Group ~, Sage ...
Perceptual and Motor Skills, 1970
APA PsycNET Our Apologies! - The following features are not available with your current Browser c... more APA PsycNET Our Apologies! - The following features are not available with your current Browser configuration. - alerts user that their session is about to expire - display, print, save, export, and email selected records - get My ...
Research Advances in Database and Information Systems Security, 2000
Page 121. SELECTED TOPICS IN INFRASTRUCTURE AND INFORMATION ASSURANCE William V. Maconachy, Thoma... more Page 121. SELECTED TOPICS IN INFRASTRUCTURE AND INFORMATION ASSURANCE William V. Maconachy, Thomas Harper, Donald G. Marks and Terry Mayfield, Chair Abstract Since 1994 and the explosive growth of ...
Proceedings of the IFIP TC11, …, 1993
... top of page ABSTRACT. An abstract is not available. top of page AUTHORS. Corey D. Schou No co... more ... top of page ABSTRACT. An abstract is not available. top of page AUTHORS. Corey D. Schou No contact information provided yet. Bibliometrics: publication histor.
The United States is at target. For those of us who grew up curing the cold war this is not news;... more The United States is at target. For those of us who grew up curing the cold war this is not news; however, the threat is different than it has been in the past. Now it may be another super power or it may be a teenage child with a personal computer. Both government and civilian entities are potential targets. The