Download Free Year 2000 Computing Challenge Lessons Learned Can Be Applied To Other Management Challenges Book in PDF and EPUB Free Download. You can read online Year 2000 Computing Challenge Lessons Learned Can Be Applied To Other Management Challenges and write the review.

The Year 2000 (Y2K) challenge was a major test of the nation's ability to protect our computer systems and the critical operations and infrastructures they support. The government successful met the Y2K challenge. However, major mgmt. challenges remain in areas such as computer security and critical infrastructure protection. This report (1) identifies lessons the federal government has learned from Y2K applicable to improving federal information technology (IT) mgmt., (2) identifies lessons that individual agencies can apply to mgmt. of future IT initiatives, and (3) discusses how the momentum generated by the government's Y2K efforts can be sustained.
The inability to produce the data needed to efficiently & effectively manage the day-to-day operations of the fed. gov¿t. & provide accountability to taxpayers historically has been a major weakness at most of the largest fed. agencies. The central challenge in generating such data is overhauling inadequate & outdated accounting & financial-related mgmt. information systems. This annual report addresses: (1) compliance of the Chief Financial Officers (CFO) Act agencies¿ financial systems with the requirements of the Fed. Financial Mgmt. Improvement Act of 1996 (FFMIA); (2) agencies¿ plans to bring their systems into compliance; & (3) other efforts to improve the government¿s financial mgmt. systems. Charts & tables.
I am pleased to be here today to discuss efforts to protect federal agency information systems and our nation's critical computer-dependent infrastructures. Federal agencies, and other public and private entities, rely extensively on computerized systems and electronic data to support their missions. Accordingly, the security of these systems and data is essential to avoiding disruptions in critical operations, data tampering, fraud, and inappropriate disclosure of sensitive information. Further, as the Comptroller General stated in testimony last week, protecting against computer-based attacks on critical infrastructures is an important aspect of homeland security.
This book examines comparatively the US and the UK governments' management of Y2K and considers the extent to which such management can be understood as responses to market pressures, public opinion and organized interests. It concludes by providing valuable lessons to those concerned about managing risk and critical infrastructure today.