Parker Influenced The Technology Industry Donn B. Term Paper

PAGES
2
WORDS
444
Cite

¶ … Parker Influenced the Technology Industry Donn B. Parker is a retired senior management consultant at Stanford Research Institute (SRI), who has specialized in Information security and computer crime research for 30 of his 47 years in the computer industry. He has written many books, papers, and reports based on interviews with over 200 computer criminals and audits of the security of various corporations.

Parker received the 1992 Award for Outstanding Individual Achievement from the Information Systems Security Association and the 1994 National Computer System Security Award from U.S. NIST/NCSC, The Aerospace Computer Security Associates 1994 Distinguished Lecturer award, and The MIS Training Institute Infosecurity News 1996 Lifetime...

...

In addition, The Information Security Magazine recently named him one of the five top Infosecurity Pioneers.
Donn Parker started working for SRI in 1969 as director of computer operations after working for 17 years at Control Data Corporation. His career at SRI led him into research and consulting on computer crime and information security -- a field in which many people view him as a founding father.

As a result of extensive research, Parker developed the premier information security consulting program that won him an international reputation as a computer security expert. The program was spun off when he retired in 1997.

In many ways, Donn Parker has influenced the technology industry. He set the stage…

Sources Used in Documents:

Donn's most important single contribution was the creation of the International Information Integrity Institute (I-4), which was started as a multi-client membership program in 1985.

Today, this program is the world's greatest information security membership organization. Member organizations include IBM, GE, HP, Morgan Stanley, and world governments, including the U.S., British, Singapore, Dutch, and Japanese.

Through his leadership and extensive work in computer security, Donn Parker has made significant contributions to the fighting computer crime. Because of his research, corporations and government agencies now have a greater chance of preventing computer crime by improving their security systems.


Cite this Document:

"Parker Influenced The Technology Industry Donn B " (2003, October 02) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/parker-influenced-the-technology-industry-156189

"Parker Influenced The Technology Industry Donn B " 02 October 2003. Web.26 April. 2024. <
https://www.paperdue.com/essay/parker-influenced-the-technology-industry-156189>

"Parker Influenced The Technology Industry Donn B ", 02 October 2003, Accessed.26 April. 2024,
https://www.paperdue.com/essay/parker-influenced-the-technology-industry-156189

Related Documents

Dell The personal computer industry in 1998 was attractive. Using Porter's five forces analysis, the reasons for this attractiveness can be determined (QuickMBA, 2010). Most computer makers have a moderate amount of bargaining power over suppliers. The handful of major computer makers have high volume and the inputs are not sufficiently differentiated, both factors that give some power to the computer maker. There are also low switching costs within the industry.

This represents a shift in corporate strategy. The company for most of its existence operated as a niche player, essentially utilizing a differentiated focus strategy. The current strategy, however, has been to downplay the exclusivity it long sought to cultivate and focus on a broad differentiation strategy instead (Burrows et al., 2007). Apple has continued in recent years with this strategy. The company has continued to release different iPhone version

The core competencies identified for this paper include: (1) data management (2) personnel management (3) strategic planning and (4) the ability to create technological innovation. Realistically speaking, a company must integrate all of its capabilities to assess its position in the market, and to determine which if any of its core competencies it must work on developing further to maintain a stable position in a volatile workplace. The computer

To some users of personal computers, who state, never trust a computer that you cannot lift; the IBM has been viewed, more often than not, as an enemy, and according to Byte, the computer magazine, this was because of the fact that the IBM company rose to fame mainly on the basis of its mainframe computers, that were large and forbidding, and overwhelmingly bulky. This was probably why, when

Subtopic 6: Job management and protection; include a serious discussion of security aspects The most commonly leveled criticism of operating systems is the inherent lack of security they have (Funell, 2010). Defining operating systems to have partitioned memory is just the start, as Microsoft learned with their Windows NT platform. Dedicated memory partitions by user account can be hacked and have been (Funell, 2010). The need for greater levels of user

As with other information technology jobs, outsourcing of software development to other countries may temper somewhat employment growth of computer software engineers. Firms may look to cut costs by shifting operations to foreign countries with lower prevailing wages and highly educated workers. Jobs in software engineering are less prone to being off shored than are jobs in other computer specialties, however, because software engineering requires innovation and intense research