Www.stat.gov.lt Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

27-29 May Global Event on Measuring the Information Society, Geneva EUROSTAT ICT usage surveys Albrecht Wirthmann – Information society statistics.
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
26 June 2003Aarno Airaksinen DEVELOPING A SURVEY TOOL ON IMPACTS OF ICT USAGE IN ENTERPRISES NESIS WORK PACKAGE 5.4 NESIS workshop.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Internet, Intranet and Extranets
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
FIT3105 Security and Identity Management Lecture 1.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
12 th XBRL International Conference National Tax Agency JAPAN.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Electronic reporting in Poland 27th Voorburg Group Meeting Warsaw, Poland October 1st to October 5th, 2012 Central Statistical Office of Poland.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
1.1 System Performance Security Module 1 Version 5.
Internet Security for Small & Medium Business Week 6
1 1 “MEASURING THE INFORMATION SOCIETY” Geneva, February METHODOLOGIES AND MODEL QUESTIONS: BUSINESS CORE ICT INDICATORS Sheridan Roberts OECD.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Statistisches Bundesamt eSTATISTIK.core: AN XML-BASED APPROACH TO DATA COLLECTION FROM ERP SYSTEMS Joint ECE/Eurostat/OECD Meeting on the Management of.
Population Census carried out in Armenia in 2011 as an example of the Generic Statistical Business Process Model Anahit Safyan Member of the State Council.
3rd NRC Meeting, 9-12 June 2008, Windsor ICCS 2009 Main Survey Field Operations.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
May 2012 ESSnet DWH - Workshop III BUSINESS REGISTER IN STATISTICS LITHUANIA Jurga Rukšėnaitė Chief specialist.
Georgia: business register data and gender-disaggregated indicators Tengiz Tsekvava Technical Meeting on Measuring Entrepreneurship from Gender Perspective.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
NEW SOLUTIONS IN LAND CADASTRE AND REGISTER: LITHUANIAN EXPERIENCE Kestutis Sabaliauskas, Director General, State Enterprise Centre of Registers
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Electronic data collection System in CSB of Latvia By Karlis Zeila, Vice President, CSB of Latvia IT DG meeting, October , Eurostat.
The Intranet.
Small Business Security Keith Slagle April 24, 2007.
Network Security & Accounting
ROLE OF TECHNOLOGY IN CENSUS DISSEMINATION AND UTILIZATION United Nations Regional Seminar on Promotion & utilization of Census Results and on revision.
G041: Lecture 08 ICT Infrastructure Used By Organisations Mr C Johnston ICT Teacher
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction to Networking. What is a Network? Discuss in groups.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
Development of ICT Statistics - The Experience of Hong Kong, China Census and Statistics Department (C&SD)
Introduction to ICT statistics in Denmark Armenia Twinning 2011 Component F – Information Society, 2 – 6 May Statistics Denmark Martin Lundo
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Dissemination working Group 1 Point 6 Follow-up of the Sponsorship on Communication Dissemination.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Component D: Activity D.3: Surveys Department EU Twinning Project.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA Statistics.
Regional Capacity-Building Workshop on Information Society Measurements: Household and Business Surveys Cairo, June 2007 ICT Business Statistics:
Chapter 40 Internet Security.
BUILD SECURE PRODUCTS AND SERVICES
The Intranet.
Working at a Small-to-Medium Business or ISP – Chapter 8
Internet, Intranet and Extranets
Internet, Intranet and Extranets
Internet, Intranet and Extranets
Operating Systems Security
السلوك التنظيمى المعاصر
AbbottLink™ - IP Address Overview
2005 Transition Facility Programme
USE OF ELECTRONIC DATA COLLECTION TECHNOLOGIES: MAIN DRIVERS AND
Presentation transcript:

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON ICT USAGE IN PUBLIC ADMINISTRATION INSTITUTIONS Gediminas SAMUOLIS Statistics Lithuania Gedimino av. 29, Lithuania

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May Survey on ICT usage in Lithuanian public administration institution  Annual survey from 2003 until 2005  Since 2006 – biannual survey Traditional Timeline  Preparing questionnaire: November – December  Information about inclusion in survey: end of December  Send out and reminders: February - March  Dataset/editing, analysis: March  Publication: first - end of April, main tables – May, yearly publication - October

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May Survey design:  Electronic questionnaire with possibility print and fill paper version  Addressed to the ICT managers  Mandatory  Response rate: 96-97%  Census survey: directly – about 400 institutions and almost 700 institutions (institution subunits, urban and district subdivisions of institutions) – indirectly (data included in reports of responding institutions).  Coverage: institutions with 10+ employees, NACE Rev. 2 economic activity – section O)  Design principles: modular structure allowing features to be updated most questions based on YES/NO, some - percentage (employees using PC, internet) respondent burden minimized by use of filter questions

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May The questionnaire:  Modules based on Eurostat model questionnaire: A: Use of computers and computer networks B: Access and use of the Internet  National additions: Employees working with PC, the Internet; The methods of implementation of administrative services Information presented on institutions’ websites; Availability e-government services; E-security.

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May National additions - 1 Questions on ICT availability: Number of computers in institution Number of employees using PC Number of computers with internet connections Number of employees using internet Number of ICT specialist ICT systems (based on previous enterprise surveys): Internal computer network (e.g. LAN - Local Area Network) Internal home page (e.g. Intranet) Document Management System ERP software package Application for managing information about clients (so called CRM)

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May National additions - 2  The methods of implementation of administrative services: Direct communication By post Through a call center By phone By mobile phone By Internet telephony (e.g. Skype) By Via a website Via Internet social networks (e.g. Facebook)  Information on institutions’ websites (what can be found on the website) Structure and contacts Information about the institution’s activity Relevant news related to the institution’s activity Information about services Consulting services via website

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May National additions - 3  Level of e-government services provided via the Internet 1 level: provide information on services offered 2 level: offer a possibility to download forms 3 level: offer a possibility to return filled out forms 4 level: offer a possibility to perform administrative procedures electronically, without additional paperwork 5 level: e-services using previous registration of the user (without repeated data entry, automatically using the information already available)

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May Potential questions (2 part) E-security module  Internal security facilities a) Virus checking or protection software b) Firewalls (software or hardware) c) Secure servers (support secured protocols such as https) d) Off-site data backup 2. Communication with institution using the following security facilities a) Electronic digital signature as customer's authentication mechanism b) Other authentication mechanism (e.g. PIN code) c) Data encryption for confidentiality 3. Time of update any of its security facilities (include automatic updates). 4. Encountered ICT related security problems in the last 12 months: a) Computer virus, worm or trojan attack resulting in loss of information or working time b) Unauthorised access to enterprise computer systems or data c) Blackmail or threats to the enterprise data or software

Armenia Twinning 2011 Component F – Information Society, 2 – 6 May THANK YOU FOR ATTENTION ! Gediminas Samuolis Statistics Lithuania Gedimino av. 29, Lithuania