Security Status Across Higher Ed? http://www.privacyrights.org
800,000 in November, 2006: Hacker(s) gained access to a database containing personal information on current and former students, current and former faculty and staff, parents of financial aid applicants, and student applicants.
5,800 in August, 2007: Computer with the SSNs of students was discarded before its hard drive was erased, forcing the school to warn students about potential identify theft.
4,375 on September, 2007: Former students at risk for identity fraud after an instructor's laptop computer was stolen.
3,100 on September, 2007: A technical problem in the way student bills are printed possibly allowed student SSNs to be sent to another student's address.
“ An ontology describes the concepts and relationships that are important in a particular domain, providing a vocabulary for that domain as well as a computerized specification of the meaning of terms used in the vocabulary. In recent years, ontologies have been adopted in many business and scientific communities as a way to share, reuse and process domain knowledge . Ontologies are now central to many applications such as scientific knowledge portals, information management systems, and electronic commerce. “
Supports inheritable properties (is-a)
Attributes of an object can be complex objects themselves (rich). Nestable…
Writing Short Story Historical Novel Classic Medieval Modern Book Ontology
Replicate exactly and replace former spreadsheets with the same functionality
Created canned reports for specific views on knowledge
XSLT is used to transform XML export of entire knowledge base to report specific “simple” XML
Then again from the “simple” XML to multiple HTML views for each report
XSL and CSS are flexible and can be modified to customize presentation of data
Report Generation Process Outline Protégé Java - edu.uci.adcom.ProjectXMLExport XSLT – Massage to Domain Specific Data XSLT – Generate Individual Reports (For Web Reports) CSS – To Customize the Display