|
|
Issue
46 - December 2005
|
Features
|
Implementation
of Information Services Strategic Plan 2005-2010
The
Information Services Strategic Plan 2005-2010 (ISSP) was approved
by the Committee on Information Services and Technology (CIST),
and then was formally endorsed by the Senate in May 2005. A retreat
was held on July 20, 2005, to consider the implementation of the
Plan. The retreat was attended by most of the senior staff members
from the offices that are closely involved...
|
The Joint ERP Development Centre Project
The
joint ERP Development Centre Project is funded by the UGC under
the Restructuring and Collaboration Fund. It is a joint project
of City University of Hong Kong (CityU), Hong Kong Institute of
Education (HKIED) and Lingnan University (LU)...
|
New and Improved
|
Policy
on the Registration and Use of University Domain Names
An Internet
domain name (e.g., cityu.edu.hk) including all its sub-domain names
under it (e.g., cs.cityu.edu.hk) resemble in many ways a trademark,
a brand name, or a logo of a company. Thus, like the name of the
University...
|
Provision
of Email Service to Alumni and Former Staff
Currently,
University email service to a student or staff will be stopped when
the student/staff leaves the University. For students properly graduated
from the University, they will be provided...
|
Security
Assessment Service: Analyze Network Security Performance
You
may be aware of the heightened alerts for computer security measures
from recent press reports. Hackers are using all sorts of sophisticated
means in order to illegally gain access to computer systems, to
capture electronic ID and passwords, to steal electronic data, and/or
launch denial of service attacks on a particular system. In our
University, extensive services and information are now available
electronically...
|
User Education
|
Protect
Yourself Against Phishing and Identity Theft
The
sophistication of IT crime increases as technology advances. Widespread
of scams are rampaged through the popular use of the Internet and
email. Among all IT crimes, they are dominated by phishing and identity
theft activities. Phishing is a high-tech scam that uses spam email
or fake web pages to deceive consumers into disclosing their credit
card numbers... |
A
Brief Introduction to Microsoft Outlook
Microsoft
Outlook is a versatile component of the
Microsoft Office 2003 for users to manage personal information
and to communicate with others. It helps you in managing your email
messages, appointments, contacts, and tasks, as well as making reminders
and tracking activities...
|
|
|
|