Secure Teleconferencing Assessing The Security Essay

It has been seen that employees will resist using Web Ex-systems as they are afraid it makes the transfer of their knowledge too easy, and therefore is a risk to their status in the organization (Hu, Hafsi, 2010). Studies of change management indicate that when the Chief Executive Officer (CEO) or comparable leader within a business supports and provides pragmatic, honest feedback about how the Web conferencing system will be used, resistance is minimized and broader adoption occurs. Conclusion

The rapid growth of Web conferencing systems has been accelerated by the growing reliance on more advanced security technologies and features in these platforms (Pearce, 2009). In conjunction with this development has been the rapid growth of multimedia support on Web conference platforms as well (Suduc, Bizoi, Filip, 2009). When any technology gains such rapid market share and adoption however, there is often strong resistance to change from employees who see their jobs and status being threatened over time (Hu, Hafsi, 2010). Despite these limitations, however Web conferencing continues to flourish as a communication and collaboration platform.

References

...

(2010). Application-aware scheduling for VoIP in Wireless Mesh Networks. Computer Networks, 54(2), 257.
Burrows, P.. (2010, November). Cisco Scales Back Forecasts. Business Week,1.

Hu, H., & Hafsi, T.. (2010). Strategic Change in a Shifting Institutional Context. Journal of Change Management, 10(3), 293.

John Lund. (2006). Web Conferences and Labor Education: An After-Action Report. Labor Studies Journal, 31(2), 93-100.

Ilene Manahan. (2008, October). Videoconferencing: 21st Century Show and Tell. New Jersey Business, 54(10), 83.

Musico, C.. (2009, February). RE: TOOLING: Web Conferencing: Calling Your Conference to Order. Customer Relationship Management, 13(2), 47.

Pearce, J.. (2009). Successful Corporate Telecommuting with Technology Considerations for Late Adopters. Organizational Dynamics, 38(1), 16.

Suduc, a., Bizoi, M., & Filip, F.. (2009). Exploring Multimedia Web Conferencing. Informatica Economica, 13(3), 5-17.

Amy Tierney (2009). Economic Downturn Poses No Problems for Web Conferencing Market:…

Sources Used in Documents:

References

Bayer, N., Xu, B., Rakocevic, V., & Habermann, J.. (2010). Application-aware scheduling for VoIP in Wireless Mesh Networks. Computer Networks, 54(2), 257.

Burrows, P.. (2010, November). Cisco Scales Back Forecasts. Business Week,1.

Hu, H., & Hafsi, T.. (2010). Strategic Change in a Shifting Institutional Context. Journal of Change Management, 10(3), 293.

John Lund. (2006). Web Conferences and Labor Education: An After-Action Report. Labor Studies Journal, 31(2), 93-100.


Cite this Document:

"Secure Teleconferencing Assessing The Security" (2011, January 22) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/secure-teleconferencing-assessing-the-security-5340

"Secure Teleconferencing Assessing The Security" 22 January 2011. Web.23 April. 2024. <
https://www.paperdue.com/essay/secure-teleconferencing-assessing-the-security-5340>

"Secure Teleconferencing Assessing The Security", 22 January 2011, Accessed.23 April. 2024,
https://www.paperdue.com/essay/secure-teleconferencing-assessing-the-security-5340

Related Documents

The U.S. Department of Defense was instrumental in the definition of this technology and also has led in tis adoption globally (Xirasagar, Mojtahed, 2010). Figure 1: Comparing Tunneling Configurations in IPSec vs. SSL VPN Configurations Source: (Opus Consulting, 2007) Figure 1 illustrates how both VPN and IPSec work in secured Web conferencing configurations. Both of these approaches can drastically reduce the level of risk associated with video conferencing today. Increasingly these technologies are

Insecurity Managing Issues of Information Insecurity The field of Information Technology is unique among professional disciplines due to its high-paced atmosphere. The quick change of technology, particularly within the context of systems design and electronic information data-basing means that management in this field must be prepared to acclimate to security demands, practice obstacles and end-user needs all while implementing a system that conforms to the particular needs of the firm in

Examining Online Therapy
PAGES 4 WORDS 1338

Online Therapy Services The first online therapy site that this paper will examine is the site known as Betterhelp.com. This site assists people in dealing with some of the obstacles and challenges that life presents them with. This site asserts that these issues can be tough for any individual to face alone, and offers support from professional counselors as a means of helping one create bigger changes. One of the ways

Nursing Education
PAGES 40 WORDS 10931

Cross-Sectional Study to Determine Factors in the Educational Advancement of the Licensed Practical Nurse to the Registered Nurse in the State of North Carolina According to the Harvard Nursing Research Institute, United States nursing school enrollments dropped by 20.9% from 1995 to 1998 (Healthcare Review, 2000). Behind headlines such as this one are the overwhelming issues which threaten the nursing workforce: 1) staffing cuts, 2) mandatory overtime, and 3) the

Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison

4, Privacy Information, Limits of Confidentiality 16. Does the site have a waiver that clients must electronically sign or mail in before beginning counseling that specifically states the limits of ensuring confidentiality over the Internet? Confidentiality: a.4., Limits of Confidentiality; Confidentiality: c., Client Waiver Source: Shaw & Shaw, 2006, p. 42 Other changes that will undoubtedly influence the types of codes of ethical conduct mandated for counselor in the future will be the enormous