week 13 lbsc 690 information technology information management
TRANSCRIPT
![Page 1: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/1.jpg)
Week 13
LBSC 690
Information Technology
Information Management
![Page 2: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/2.jpg)
What Goes Wrong?
• Consider the Risks Digest articles you read– http://catless.ncl.ac.uk/Risks
• Focus on unexpected consequences
• Try to articulate the root cause– Not just the direct cause
![Page 3: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/3.jpg)
Managing Complex Systems
• Critical system availability– Why can’t we live without these systems?
• Understandability– Why can’t we predict what systems will do?
• Nature of bugs– Why can’t we get rid of them?
• Auditability– How can we learn to do better in the future?
![Page 4: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/4.jpg)
Agenda
• Questions
• Ownership
• Identity
• Privacy
• Integrity
![Page 5: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/5.jpg)
Equitable Access
• Computing facilities– Hardware, software
• Networks– Speed, continuity, access points
• Information sources– Per-use fee vs. subscription vs. advertising– Language
• Skills– System, access strategies, information use
![Page 6: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/6.jpg)
Ownership
• Who has the right to use a computer?– Who has a right to use the Internet?
• Who establishes this policy? How?– What equity considerations are raised?
• Can someone else deny access?– Denial of service attacks
• How can denial of service be prevented?– Who can gain access and what can they do?
![Page 7: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/7.jpg)
Justifications for Limiting Use
• Parental control– Web browsing software, time limits
• Intellectual property protection– Copyright, trade secrets, privilege
• National security– Classified material
• Censorship
![Page 8: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/8.jpg)
Techniques for Limiting Use
• Access control– Monolithic, multilevel
• Copy protection– Hardware, software
• Licensing– Shrinkwrap, shareware, GPL, creative commons
• Digital watermarks– Provide a basis for prosecution
![Page 9: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/9.jpg)
Fair Use Doctrine
• Balance two desirable characteristics– Financial incentives to produce content– Desirable uses of existing information
• Safe harbor agreement– Book chapter, magazine article, picture, …
• Developed in an era of physical documents– Perfect copies/instant delivery alter the balance
![Page 10: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/10.jpg)
Recent Copyright Laws
• Copyright Term Extension Act (CTEA)– Ruled constitutional (Jan 2003, Supreme Court)
• Digital Millennium Copyright Act (DMCA)– Prohibits circumvention of technical measures– Implements WIPO treaty database protection
![Page 11: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/11.jpg)
The Pornography Debate
• Communications Decency Act (CDA)– Ruled unconstitutional (1997, Supreme Court)
• Child Online Protection Act (COPA)– Enforcement blocked (March 2007, 3rd Circuit)
• Children’s Internet Protection Act (CIPA)– Ruled constitutional (June 2003, Supreme Court) – Applies only to E-Rate and LSTA funds
![Page 12: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/12.jpg)
Filtering Technology• Any individual approach is imperfect
• Term-based techniques– Recall/precision tradeoff
• Image-based techniques
• Behavior-based techniques– Clickstreams
• Manual whitelists and blacklists– Expensive, time lag
![Page 13: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/13.jpg)
Denial of Service Attacks
• Viruses– Platform dependent– Typically binary
• Flooding– Worms– Zombies– Chain letters
![Page 14: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/14.jpg)
Viruses
• Computer programs able to attach to files
• Replicates repeatedly– Typically without user knowledge or
permission
• Sometimes performs malicious acts
![Page 15: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/15.jpg)
Viruses
• 1988: Less than 10 known viruses
• 1990: New virus found every day
• 1993: 10-30 new viruses per week
• 1999: 45,000 viruses and variants
![Page 16: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/16.jpg)
Worms
• Self-reproducing program that sends itself across a network– Virus is dependent upon the transfer of files – Worm spreads itself
• SQL slammer worm (January 25, 2003) claimed 75,000 victims within 10 minutes
![Page 17: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/17.jpg)
![Page 18: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/18.jpg)
Identity
• Establishing identity permits access control
• What is identity in cyberspace?– Attribution
• When is it desirable?
– Impersonation• How can it be prevented?
• Forgery is remarkably easy– Just set up your mailer with bogus name and email
![Page 19: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/19.jpg)
Authentication
• Used to establish identity• Two types
– Physical (Keys, badges, cardkeys, thumbprints)
– Electronic (Passwords, digital signatures)
• Protected with social structures– Report lost keys
– Don’t tell anyone your password
• Use SSH to defeat password sniffers
![Page 20: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/20.jpg)
Good Passwords• Long enough not to be guessed
– Programs can try every combination of 5 letters
• Not in the dictionary– Programs can try every word in a dictionary– every proper name, pair of words, date, every …
• Mix upper case, lower case, numbers
• Change it often
• Reuse creates risks– Abuse, multiple compromise
![Page 21: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/21.jpg)
Authentication Attacks
• Guessing
• Brute force
• Impersonation
• “Phishing”
• Theft
![Page 22: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/22.jpg)
Access Control Issues
• Protect system administrator access– Greater potential for damaging acts– What about nefarious system administrators?
• Firewalls– Prevent unfamiliar packets from passing through– Makes it harder for hackers to hurt your system
![Page 23: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/23.jpg)
We Already Knew a Lot About You• Governments have information about life events
– Birth and death
– Marriage and divorce
– Licenses (e.g., drivers)
– Property and taxes
• Business exchange information about transactions– How you commute to work
– What cereal you eat
– Where you like to go for vacation
– What hobbies you have
![Page 24: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/24.jpg)
We Can See Even More Online
• Web tracking– Browser data, clickthrough, cookies, …
• Packet sniffers– Detect passwords, reconstruct packets, …
• Law enforcement– Carnivore (US), RIP (UK), …
• National security– Echelon (US), SORM (Russia), …
![Page 25: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/25.jpg)
Tracking Internet Activity
ISP logsIP addressFirewallsCookiesBrowser historySpywarePacket sniffingIntercepting e-mails Monitoring news groupsMonitoring chat roomsSpoofed web sitesWiretaps
![Page 26: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/26.jpg)
The Tracking Ecosystem
http://wsj.com/wtk
![Page 27: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/27.jpg)
Privacy vs. Anonymity
![Page 28: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/28.jpg)
Anonymity
• Serves several purposes– Sensitive issues on discussion groups– Brainstorming– Whistleblowers– Marketing (“Spam”)
• Common techniques– Anonymous remailers– Pseudonyms
![Page 29: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/29.jpg)
Practical Obscurity
• A lot of government-collected information is public record
• Previously shielded by “practical obscurity”– Records were hard to access
• Not so with the Internet
![Page 30: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/30.jpg)
Ideals in Tension
• Establishing identity permits access control
• Yet people don’t want to be tracked
• How do you provide accountability?– People’s behavior change when no one is
watching
Whenever a conflict arises between privacy and accountability, people demand the former for themselves and the latter for everybody else.
The Transparent Society by David Brin
![Page 31: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/31.jpg)
Privacy
• What privacy rights do computer users have?– On email?– When using computers at work? At school?– What about your home computer?
• What about data about you?– In government computers?– Collected by companies and organizations?
• Does obscurity offer any privacy?
![Page 32: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/32.jpg)
Privacy Protection
• Privacy Act of 1974– Applies only to government records
• TrustE certification guidelines– Site-specific privacy policies– Federal Trade Commission enforcement
• Organizational monitoring
![Page 33: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/33.jpg)
Symmetric Key Encryption
Alice Bob
Plain text EncryptCipher text
Decrypt Plain textInsecure channel
eavesdroppereavesdroppereavesdropper
key key
Same key used both for encryption and decryption
![Page 34: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/34.jpg)
Asymmetric Key Encryption
Alice Bob
Plain text EncryptCipher text
Decrypt Plain textInsecure channel
eavesdroppereavesdroppereavesdropper
Bob’s public key Bob’s private key
Different keys used for encryption and decryption
![Page 35: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/35.jpg)
Asymmetric Key Encryption• Key = a large number (> 1024 bits)
– Public key: known by all authorized encoders
– Private key: known only by decoder
• One-way mathematical functions – “Trapdoor functions”
• Like mixing paint (easy to do, hard to undo)
– Large numbers are easy to multiply, hard to factor
• Importance of longer keys– Keys < 256 bits can be cracked in a few hours
– Keys > 1024 bits presently effectively unbreakable
![Page 36: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/36.jpg)
The Dark Side of Encryption
• Encryption is a double-edged sword– The ability to keep secrets facilitates secure
commercial transactions– But bad guys can use encryption to keep secrets…
• Can be cracked by “authorized parties”?– How should that ability controlled?
encryption
![Page 37: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/37.jpg)
RSA “Public Key” Encryption
print pack"C*", split/\D+/,`echo "16iII*o\U@{$/=$z; [(pop,pop,unpack"H*",<>)]} \EsMsKsN0[lN*1lK[d2%Sa2/d0 <X+d*lMLa^*lN%0]dsXx++lMlN /dsM0<J]dsJxp"|dc`
Until 1997 – Illegal to show
this slide to non-US citizens!
![Page 38: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/38.jpg)
Trojan Horse
• Malicious program with undesired capabilities– Log key strokes and sends them somewhere– Create a “back door” administrator logon
• Spyware: reports information about your activity without your knowledge
• Doesn’t (necessarily) replicate
![Page 39: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/39.jpg)
Privacy in a Post 9/11 World
The Professional Association of Diving Instructors (PADI), which certifies about 65 percent of the nation's divers, gave the FBI a computer file containing the names of more than 2 million certified divers in May 2002.
Airlines have handed large amounts of passenger data over to the government (most voluntarily).
![Page 40: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/40.jpg)
Surveillance Law
• USA PATRIOT Act– Access to business records– Internet traffic analysis (with a court order)
• Foreign Intelligence Surveillance Act (FISA)– Secret court for monitoring foreign communications– Special protections for citizens/permanent residents
![Page 41: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/41.jpg)
Real-Time Local Surveillance
• Built-in features of standard software– Browser history, outgoing email folders, etc.
• “Parental control” logging software– ChatNANNY, Cyber Snoop, FamilyCAM, …
• Personal firewall software– ZoneAlarm, BlackIce, …
![Page 42: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/42.jpg)
Real-Time Centralized Surveillance
• Proxy server– Set up a Web server and enable proxy function– Configure all browsers to use the proxy server– Store and analyze Web server log files
• Firewall– Can monitor all applications, not just the Web
![Page 43: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/43.jpg)
Forensic Examination
• Scan for files in obscure locations– Find-by-content for text, ACDSee for pictures, …
• Examine “deleted” disk files– Norton DiskDoctor, …
• Decode encrypted files– Possible for many older schemes
![Page 44: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/44.jpg)
Integrity
• How do you know what’s there is correct?– Attribution is invalid if the contents can change
• Access control would be one solution
• Encryption offers an alternative
![Page 45: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/45.jpg)
Digital Signatures• Alice “signs” (encrypts) with her private key
– Bob checks (decrypts) with her public key
• Bob knows it was from Alice– Since only Alice knows Alice’s private key
• Non-repudiation: Alice can’t deny signing message– Except by claiming her private key was stolen!
• Integrity: Bob can’t change message– Doesn’t know Alice’s Private Key
![Page 46: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/46.jpg)
Key Management
• Pubic announcement of public key– e.g., append public key to the end of each email– But I can forge the announcement
• Establish a trusted “certificate authority”– Leverage “web of trust” to authenticate authority– Register public key with certificate authority
![Page 47: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/47.jpg)
Certificate Authority
Alice Bob
Plain text EncryptCipher text
Decrypt Plain textInsecure channel
eavesdroppereavesdroppereavesdropper
Bob’s public key Bob’s private key
Bob’s public key
Certificate Authority
![Page 48: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/48.jpg)
Certificates: Example
![Page 49: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/49.jpg)
Acceptable Use Policies
• Establish policies
• Authenticate
• Authorize
• Audit
• Supervise
![Page 50: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/50.jpg)
Practical Tips
• Keep anti-virus software current
• Keep software “patches” current
• Change default settings
• Be wary of anything free
![Page 51: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/51.jpg)
Total Cost of Ownership
• Planning
• Installation– Facilities, hardware, software, integration, migration,
disruption
• Training– System staff, operations staff, end users
• Operations– System staff, support contracts, outages, recovery, …
![Page 52: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/52.jpg)
Total Cost of Ownership
![Page 53: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/53.jpg)
Some Examples
Proprietary Open Source
Operating system Windows XP Linux
Office suite Microsoft Office OpenOffice
Image editor Photoshop GIMP
Web browser Internet Explorer Mozilla
Web server IIS Apache
Database Oracle MySQL
![Page 54: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/54.jpg)
Some Opinions
• Bill Gates on Linux (March, 1999): – “I don’t really think in the commercial market,
we’ll see it in any significant way.”
• Microsoft SEC filing (January, 2004): – “The popularization of the open source
movement continues to pose a significant challenge to the company’s business model”
![Page 55: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/55.jpg)
Open Source “Pros”
• More eyes fewer bugs
• Iterative releases rapid bug fixes
• Rich community more ideas– Coders, testers, debuggers, users
• Distributed by developers truth in advertising
• Open data formats Easier integration
• Standardized licenses
![Page 56: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/56.jpg)
Open Source “Cons”• Communities require incentives
– Much open source development is underwritten
• Developers are calling the shots– Can result in feature explosion
• Proliferation of “orphans”
• Diffused accountability– Who would you sue?
• Fragmentation– “Forking” may lead to competing versions
• Little control over schedule
![Page 57: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/57.jpg)
Iron Rule of Project Management
• You can control any two of:– Capability– Cost– Schedule
• Open source software takes this to an extreme
![Page 58: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/58.jpg)
Open Source Business Models
• Support Sellers
• Loss Leader
• Widget Frosting
• Accessorizing
Sell distribution, branding, and after-sale services.
Give away the software to make a market for proprietary software.
If you’re in the hardware business, giving away software doesn’t hurt.
Sell accessories: books, compatible hardware, complete systems with pre-installed software
![Page 59: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/59.jpg)
Critical Infrastructure Protection
• Telecommunications
• Banking and finance
• Energy
• Transportation
• Emergency services
• Food and agriculture
• Water
• Public health
• Postal and shipping
• Defense industrial base
• Hazardous materials
SCADA: Supervisory Control and Data Acquisition
![Page 60: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/60.jpg)
National Cyberspace Strategy
• Response system– Analysis, warning, response, recovery
• Threat and vulnerability reduction
• Awareness and training program– Return on investment, best practices
• Securing government systems
• International cooperation
![Page 61: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/61.jpg)
Summary
• Systems analysis– Required for complex multi-person tasks
• User-centered design– Multiple stakeholders complicate the process
• Implementation– Architecture, open standards, …
• Management– Typically the biggest cost driver
![Page 62: Week 13 LBSC 690 Information Technology Information Management](https://reader036.vdocuments.us/reader036/viewer/2022070407/56649e2a5503460f94b1808d/html5/thumbnails/62.jpg)
The Grand Plan
Computers, Networks
Web, XML, Social Software
Multimedia Databases Programming Search
Building and Deploying Systems
Policy