JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2006

CYBER-SOCIETY-LIVE 2006

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: E-Government Bulletin, 27 November 2006 - e-voting; criti cal national infrastructure; outsourcing; Google maps.

From:

J Armitage <[log in to unmask]>

Reply-To:

Interdisciplinary academic study of Cyber Society <[log in to unmask]>

Date:

Tue, 28 Nov 2006 08:42:10 -0000

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (630 lines)

From: Dan Jellinek [mailto:[log in to unmask]] 
Sent: 27 November 2006 12:24
To: egb-html
Subject: E-Government Bulletin, 27 November 2006 - e-voting; critical
national infrastructure; outsourcing; Google maps.

Hello all,
Here is the latest issue of E-Government Bulletin, attached as an HTML file.
For a plain text version of the same issue, see below.
Best regards, Dan Jellinek, Editor.


+++E-GOVERNMENT BULLETIN
- ISSUE 227, 27 November 2006.
- Incorporating Future Democracy Bulletin.

IN THIS ISSUE:  e-voting; critical national infrastructure; outsourcing;
Google maps, shared services.

Please forward this free service to others so they can subscribe - full
details at the end.
We never pass on email addresses.


++Special Notice: Mobile and Flexible Working in the Public Sector
- 25 January 2007, RIBA, London
- Early Bird Discount until 30 November
http://www.headstar-events.com/mobile/ .

Flexible working practices can help attain the goals of the Transformational
Government Agenda: mobile working helps staff work in the community, closer
to the citizen; and flexible working practices ensure that services can be
delivered 24-7.

Come along and hear how you can instil flexible working practices in your
organisation, help your management and service improvement goals and hear
tips from speakers who have implemented flexible working programmes.

Attendance normally costs just 295 pounds plus VAT for public sector and 395
plus VAT for private sector delegates. But book before 30 November 2006 and
receive a 100 pound discount by typing 'eb-offer'
after your name. To register see:
http://www.headstar-events.com/mobile/ .

And if your organisation might be interested in exhibiting at the event or
sponsoring it, please contact Claire Clinton on:
[log in to unmask] .

[Special Notice ends].


++Contents: E-Government Bulletin Issue 227.

Section One: News.

01: US E-Voting Machine Glitches 'A Warning To Europe'
- documentary claims to expose holes in security.

02: Brent Adds Google Maps to E-Government Register
- council takes "mash-up" approach to directory.

03: Shared Services Agenda 'Lacks Central Leadership'
- findings of public sector IT managers' report.

04: Under Half of Risky IT Projects Communicated to Auditors
- accountability gap revealed by research.

News In Brief: 05: Please Tony - Downing Street e-petitions; 06:
Confidence Mark - supplier quality standard; 07: Consultation Alert - Have
Your Say.

Section Two: Focus - UK Critical National Infrastructure.
08: Critical Infrastructure Creaks Under The Strain: As more demand is
placed on the UK's communications infrastructure, it is becoming ever-more
vulnerable to accidental or malicious damage. A new briefing from the
Parliamentary IT Committee looks at how a single failure can create a domino
effect.

Section Three: Focus - Outsourcing.
09: Building Strength From The Inside Out: Birmingham City Council
transformation supremo Glyn Evans talks to Mel Poluck about a revolution in
IT services in the city following the outsourcing of its entire IT function
to a joint venture company run by Capita.

[Contents ends].


++Special Notice - E-Access Bulletin
- Email newsletter on access to technologies by the vision impaired.

E-Government Bulletin's free sister publication E-Access Bulletin carries
all the latest news on access to technologies by people who are blind or
have impaired vision.

Published monthly, the bulletin carries news and features on opportunities
offered by mainstream technologies such as mobile phones, portable media
players the web; as well as the barriers they often pose. It also covers the
latest developments in specialist technology, such as screen readers and
speech recognition software.

To subscribe, please send a blank email to:
[log in to unmask]
with 'subscribe eab' in the subject line, or see:
http://www.headstar.com/eab .

[Special notice ends].


++Section One: News.

+01: US E-Voting Machine Glitches 'A Warning To Europe.'

The co-director of a new documentary investigating flaws in the security of
electronic voting machines used in the recent US Presidential mid-term
elections has said the film serves as a warning for European governments
considering introducing e-voting.

The documentary, 'Hacking Democracy', was given its first London airing at a
private screening hosted by E-Government Bulletin at our recent conference,
'E-Democracy '06'
( http://www.headstar-events.com/e-democracy06 ).

It focuses on an attempt to discover how voting machines recorded minus
16,022 votes for Al Gore in Volusia County, Florida in the 2000 presidential
election, and what potential scope there might be for system errors,
malicious damage or corrupt practices.

"What's happening in America is a warning," the film's co-director and
co-producer Russell Michaels told delegates. "This is the opposite of what
is good about e-democracy. It's fascinating to see the tension between what
everyone here [at the conference] is trying to do and what is going on in
the US".

The film shows electronic voting software held on memory cards created by
technology giant Diebold apparently being hacked by a security expert as a
result of software code being accidentally left on a public web server.
According to the film, the numbers of votes for candidates were altered
without leaving a trace of the intervention.

Earlier in the day the Prime Minister's outgoing political strategy advisor
Matthew Taylor delivered a keynote speech challenging the internet
campaigning community to curb "shrill" attacks on those in power and use the
internet to build constructive tools of community engagement and responsible
self-government.

A videoblog of the conference by reporter David Wilcox is live at:
http://digbig.com/4pjrm .

And a report on Taylor's speech has been published by the BBC at:
http://fastlink.headstar.com/mt2 .


+02: Brent Adds Google Maps to E-Government Register.

Brent Council has added a Google Maps
( http://maps.google.co.uk )
interface to E-Government Register
( http://www.egovregister.org ),
the council's comprehensive national directory of local e-government
resources and projects.

Users of the register, which is maintained by Brent with support from the
West London Alliance and London Connects, can now view members of
e-government partnerships, local authority users of particular products and
users of particular suppliers using Google's free geographic interface. The
principal offices for all local authorities have been 'geocoded' with
latitude and longitude and these are displayed as markers on the maps. Users
can click on the markers to obtain more information about individual local
authorities and their work in e-government.

"Google Maps allows users to easily access information about where other
councils are using particular products or are involved in particular
partnerships," says Dane Wright, service development manager in the IT unit
at Brent Council. "This enhances the overall aim of the site, which is to
encourage best practice sharing on e-government between councils."

Now that Brent has experimented with Google Maps on E-Government Register,
it is considering adding the system to its main website (
http://www.brent.gov.uk ) and to BRAIN ( http://www.brentbrain.org.uk ), its
award-winning community site.

For example, residents can already view details of crime incidents in their
local area on BRAIN. Brent is considering representing this information
geographically, although it is aware the results could prove controversial.
"There are practical issues around representing incidents in this way, as it
could highlight high-crime areas and give them a bad reputation," says
Wright.

Meanwhile, the council website currently features a "find your nearest"
function allowing users to search for services by postcode using Multimap (
http://www.multimap.com ), for which the council pays.

The council is also considering setting up a facility to allow people to
upload photos of where they live to an online database. "So if you live on
23 Acacia Avenue, you could see the surrounding area through photos taken by
the public," says Wright. "The idea is that local inhabitants would be able
to see pictures of where they live, those moving into the borough would be
able to check out the surrounding area and we could look back to see what a
particular area looked like at a given point in time, serving as a kind of
local historical archive."

The system would link Google Maps to the council's property gazetteer.


+03: Shared Services Agenda 'Lacks Central Leadership'.

There is a lack of leadership from central government for local authorities
planning to implement shared services, according to a report published this
week by the local government Society of IT Management (Socitm -
http://www.socitm.gov.uk ).

A new requirement to increase sharing of administrative and other services
between public sector bodies to generate cost and other efficiencies was
laid out in the Transformational Government agenda released by the Cabinet
Office's Chief Information Officer Council last year.

However, the government "seems to lack leadership, advice about
implementation, and ideas to take sharing forward in a pragmatic way," the
new report finds.

And although the Department for Communities and Local Government
(DCLG) has issued a number of documents on partnerships and sharing, there
is a lack of information on how to provide leadership and how to begin to
implement shared services, the report says.

The report also offers a range of recent public sector examples of shared
services, to allow councils to assess the potential for sharing; an 'advice'
section for councils to choose from various governance styles and models of
collaboration; and a "maturity grid" to help evaluate organisations'
readiness to share services.

'Modern Public Services: shared services,' is available from Socitm and
costs 150 pounds for Socitm members and 175 pounds for non- members.


+04: Under Half Of Risky IT Projects Communicated To Auditors.

Less than half of all government agencies are communicating the findings of
'Gateway Reviews' of high risk government IT projects to internal and
external auditors, according to a report from the National Audit Office
(NAO) published this month.

There are typically five Office of Government Commerce (OGC) Gateway reviews
during the lifespan of a major project, each undertaken by teams of
independent experts on behalf of the Treasury's OGC.

"The ability of Audit Committees to provide constructive challenge is . . .
weakened in that in only 42 per cent of organisations do internal auditors
get copies of all Gateway Reviews," says the report. Only 26 per cent of
auditors received quarterly briefings, the report says.

The report also finds the government often does not fully and effectively
engage with IT suppliers. It suggests nine key questions organisations can
ask themselves when embarking on an IT project, divided into three
categories: 'ensuring senior level engagement;'
'acting as an intelligent client;' and 'realising the benefits to change.' 
It
also offers case studies of successful IT-enabled programmes from both the
public and private sectors globally.

'Delivering Successful IT Enabled business change'
( http://fastlink.headstar.com/na2 ),
is available from the NAO website.


News In Brief:

+05: Please Tony: A facility for anyone to start or sign an electronic
petition to the Prime Minister has gone live on the 10 Downing Street
website, developed by non-profit organisation MySociety.org. Petitions can
be rejected for a small range of reasons, but will still be listed along
with those reasons. Current examples range from 'repeal the Hunting Act
2004' (signatures: more than 10,000) to 'stop heavy goods vehicles using
Wesham as a shortcut' (signatures: 1):
http://petitions.pm.gov.uk .

+06: Confidence Mark: A quality standard for IT supplier
organisations aiming to improve confidence in the technology supply chain is
to be made available in early 2007. Accredit UK will be launched by The
National Computing Centre with the European Regional Development Fund, and
will seek competence in three core
areas: people, process and performance. Initially, the scheme will run in
the West Midlands region only:
http://www.accredituk.com .

+07: Consultation Alert: An online service designed to help citizens
participate in legislative consultation has been launched by the privatised
former government printer The Stationery Office with the Office of Public
Sector Information. "Have Your Say" includes an email alert service where
people can register interest by topic and be informed when relevant
consultations are launched:
http://www.haveyoursayonline.net .

[Section One ends.]


++Section Two: Focus
- UK Critical National Infrastructure.

+08: Critical Infrastructure Creaks Under The Strain.

Critical National Infrastructure (CNI) is the collective term for those
services that are essential to the economic, social and political wellbeing
of the United Kingdom.

According to the Security Service MI5, our CNI can be categorised into 10
sectors: communications, emergency services, energy, finance, food,
government and public services, health, public safety, transport and water.

In our increasingly networked world, new technologies have a major role to
play within all these sectors. In all parts of modern society, major IT
systems are used to manage people and services and communicate internally
and with the outside world. Problems with these systems can cause services
to fail.

For example all three major emergency services are now using a common
"terrestrial trunked radio network" called Airwave from O2, to help them
co-ordinate their activities in tactical situations. However, there are
major concerns about the duration of its back-up power arrangements where a
major power failure represents part of the emergency.

Problems with IT or telecommunications in one part of society can also have
knock-on effects in others, since there is a complex interrelationship
between many parts of the critical infrastructure. For example, a problem
with a power station could lead to inability of someone to access the
emergency services through a telephone; and a fire in a tunnel carrying
phone lines can knock out the local cash machine network.

There is therefore a web of critical services, all interdependent in complex
ways, and all dependent on ICT in complex ways. There is also a potential
hierarchy of problem areas, such that for example power failures could cause
problems across many other areas like health and the food sector. Thus ICT
problems in some areas can be relatively quickly contained, and have few
serious knock-on effects; but in others, most notably in the power and
telecommunications sectors, could potentially trigger a cascade of other
problems with catastrophic results.

While it is true that the internet was originally designed to be resilient
to attack and route communications around points of damage, the physical
restrictions of the UK's small number of internet peering centres or 'choke
points' regulating traffic to and from other countries or between UK
regions, coupled with the slow development of satellite and wireless
alternatives, mean that our communications systems in general are far more
vulnerable to disruption through accidental or malicious damage than many
people realise.

In March 2004 a fire that broke out in a BT cable tunnel in Manchester, that
put 130,000 landlines out of action, disrupted internet services and
disrupted several parts of the emergency services communications network
including Derbyshire and Cheshire police forces and the Greater Manchester
Ambulance service. Many bank cash machines in the area were also closed,
since they make security checks over phone lines, and local shops could not
use credit and debit card machines for the same reason. The incident
highlights the vulnerability of parts of our communications infrastructure,
and demonstrates how a single failure can cascade across multiple areas and
services.

At the same time some organisations that believed they had back-up
communication routes in place should the BT services go down, found that
these alternative routes actually used duct space in the same cable tunnel,
and so were lost as well.


Some analysts are also concerned that there may not be enough 'standby'
routings for telecommunications, after changes in the business rating
valuation system meant that standby lines capable of immediate switchover
were liable to expensive business rates even if they were not being used at
that time. However it is true that business continuity has been accorded
much higher priority in recent years, and the major telecoms companies now
have standby switches and routing apparatus, truck mounted, ready to deploy
in a matter of hours.

The December 2005 explosion at the Buncefield oil refinery, reportedly the
largest peacetime explosion ever seen in Europe, offers another example of
how the IT portion of the CNI can be damaged.
The adjacent offices of the IT company Northgate Information Solutions were
destroyed, with short-term effects including the disruption of an automated
admission and discharge system for Addenbrooke's Hospital.

The company also runs payroll systems for the employers of one in three
Britons, paying out billions of pounds each month. Significantly however, as
reported later by Northgate CIO John Lockett in a CBI guide 'From IT
strategy to IT reality', good business continuity planning at the company
ensured there was little disruption to these services. This is a key
learning point for other organisations: good contingency plans,
well-rehearsed, are an essential element of CNI protection. Public sector
bodies are required to have a business continuity plan, co-ordinated and
shaped through the Cabinet Office Civil Contingencies Secretariat.

The protection of our CNI is an ever-changing and ever more demanding
proposition, and it is necessary to have properly resourced agencies in
place to enforce them. Previously, keeping track of cybercrime was the work
of the National High Tech Crime Unit (NHTCU), but this role has since been
taken on by the Serious Organised Crime Agency (SOCA -
http://www.soca.gov.uk/ ).

NHTCU was strong on forging international links but a lack of resources
meant its regional coverage was not comprehensive across the UK, creating
weaknesses in defences in some areas, particularly outside major population
centres. It is too soon to gauge how effective SOCA will be in this field,
but it is not clear that it has been allocated enough extra funds to address
these regional vulnerabilities.

All such issues must be watched closely by Parliamentarians in future, to
ensure the safety of the services most critical to the wellbeing of UK
citizens in the digital age.

NOTE: This article is an edited version of 'Critical Connections Under
Strain', the first issue of 'PITComms', written by E-Government Bulletin
journalists in association with the Parliamentary Information Technology
Committee (PITCOM), a new type of briefing for Parliamentarians on the
politics of information technology from PITCOM. For the full report see:
http://fastlink.headstar.com/pitcom1 .

[Section Two ends]


++Section Three: Focus
- Outsourcing.

+09: Building Strength From The Inside Out
by Mel Poluck.

Birmingham City Council, Europe's largest local authority, last year joined
the growing trend of councils choosing to outsource their IT to the private
sector.

After signing a 10-year, multimillion pound deal with professional services
company Capita, Birmingham's 500-strong IT department has moved to a joint
venture company, 'Service Birmingham'
( http://fastlink.headstar.com/bham2 ),
managed by the technology company.

One clue to the resulting change of focus taking place at Birmingham is in
the recent change of moniker for former Head of Business Solutions and IT
Glyn Evans, who now revels in the title: 'Assistant to Chief Executive on
Transformation.'

The council has broken the task of improving its IT down into small,
progressive chunks. "We have a seven-phase approach to Transformation," said
Evans. Each phase, he said, is made up of a set of tasks. "On an overhead
projector it would look like a map of the underground - every station is an
activity." This comprehensive approach is unique in the public sector,
according to Evans.

One of the first key jobs as Service Birmingham has been to toughen up the
council's inner IT structure. "We've made significant progress, particularly
around the reliability of infrastructure," Evans said. One of the initial
priorities has been updating the old mail servers at the council which are
running Lotus Notes software, "some very ageing."

Since the overhaul, Evans said the council has seen no more than one
instance of server downtime in three to four months. Previously, there would
be two to three occurrences of server downtime a month, he said.

As a further indicator of Birmingham's new "transformational"
approach, Evans and his team have installed a more consistent network
infrastructure. In the past, networking of the council's 1,000 buildings has
taken place on an ad-hoc basis.

"Service Birmingham has, since taking over, put a lot of effort into making
it more resilient so that there are alternative routes to all major
buildings," Evans said. "If one link should fail because, for example,
someone has cut through a cable [or] other reasons such as equipment
failure, people in the building can continue to work because there is a
back-up route."

As for Birmingham's public-facing IT, Service Birmingham has again attempted
to break down the massive task of upgrading it in manageable chunks. "We've
established nine programmes with a major transformational remit," he said.
Five are already up and running.

Some of these focus on adult services, for example, and others are
cross-cutting such as the customer services network, one of the aims of
which, he said, will be to live up to its strapline, "Quick Visit."

Of the five operational IT initiatives, Evans cited some astonishing cost
savings: by year four of the 10-year programme, net savings will total some
65 million pounds. By year six, these will rise to 100 million per year.

Evans said the original overall target of one billion pounds savings through
the formation of Service Birmingham over its 10-year contract period is
still a realistic figure. But Evans admits that initially he shared the
scepticism of his colleagues. "I'm more confident than I was about the one
billion pounds."

Currently, the council is gearing up for a major communications campaign to
convey the message of transformational government to staff through posters
and a DVD. "The challenge in the council is we get too much information.
We're almost self-editing." Evans himself is focusing on formulating the
best method to undertake the task of transformation in the council, he said.

"Transformation is not a new initiative. It's a toolkit to help us do the
change we want to do as a council," said Evans, who is also a board member
of the Cabinet Office's Chief Information Officer Council (
http://www.cio.gov.uk ).
"We're transforming services to embed Transformation in the way the Council
operates, rather than being an add-on."

[Section Three ends].


++Sponsored notice: SustainIT
- National eWell-Being Awards: call for entries.

E-Government Bulletin is working in partnership with national charity
SustainIT on the 2006/07 National eWell-Being Awards, the only awards in the
UK that recognise uses of ICT that deliver social and environmental
benefits. The six categories and three special awards for
2006/07 include 'Improving Public Services', co-sponsored by E-Government
Bulletin, 'Digital Inclusion', 'Age and Disability' and 'Better Ways of
Working'.

Simon Hills, Head of SustainIT, says that "the National eWell-Being Awards
are all about rewarding organisations which use technology in an innovative
way to benefit the environment and peoples' lives.
Winning an award can really help put an organisation on the map and can
encourage others to follow examples of good practice."
The deadline for entries is 30 November 2006. Please register your interest
at:
http://www.sustainit.org/ewell-being-awards/index.php .

[Sponsored Notice ends]


++Special Notice: Place Your Advertisement Here
- Reach more than 11,000 in e-government
- Largest opt-in/requested circulation in the sector.

E-Government Bulletin is the logical choice for advertising any e-government
service, product or job. We are the only email newsletter in our sector to
receive a circulation audit from ABC Electronic ( http://www.abce.org.uk ),
part of the Audit Bureau of Circulation. This shows we have the largest
opt-in/requested circulation in the sector:
http://www.abce.org.uk/search/headstar .

To find out more about advertising and sponsorship opportunities, please
email Claire Clinton on [log in to unmask] or phone her on
01273 231291.

[Special Notice ends].


++END NOTES.

+HOW TO RECEIVE E-GOVERNMENT BULLETIN.

To subscribe to this free fortnightly bulletin as an HTML attachment
email:
[log in to unmask]
or for the plain text version email:
[log in to unmask] .

To unsubscribe from the HTML version email:
[log in to unmask]
and to unsubscribe from the text version email:
[log in to unmask] .

For further information on subscription, including how to subscribe or
unsubscribe from an alternative email address and how to find out if a
particular address is subscribed, see:
http://www.headstar.com/egb/subs.html .


+TEN STANDARD: This newsletter conforms to the accessible Text
Email Newsletter (TEN) Standard, developed by our sister newsletter E-Access
Bulletin. For details see:
http://www.headstar.com/ten .


+COPYRIGHT NOTICE.
- Copyright 2006 Headstar Ltd.
Regular circulation or reproduction of the bulletin by third parties is
forbidden. Properly accredited articles (always including source details,
bulletin subscription details and web address) or entire single issues of
the bulletin (including this notice) may be forwarded to individuals or
groups of people as long as it is made clear that to receive a regular copy,
people must subscribe individually. For queries about article reproduction,
syndication or other copyright issues please email [log in to unmask] .

ISSN 1476-6310


+PERSONNEL

To contact us by email, please use our first names and add [log in to unmask]

- EDITORIAL.
Editor - Dan Jellinek
Deputy Editor and E-Democracy Editor - Derek Parkinson Senior Reporter - Mel
Poluck Technical Advisor - Nick Apostolidis Additional reporting - Judith
Pope

- SPONSORSHIP AND ADVERTISING.
Marketing Executive - Claire Clinton
Marketing Assistant - Jo Knell

A searchable archive of our back-issues can be found on our website:
http://www.headstar.com/egb .

[Issue ends].

--
This message has been scanned for viruses and dangerous content by the
NorMAN MailScanner Service and is believed to be clean.

The NorMAN MailScanner Service is operated by Information Systems and
Services, Newcastle University.



====
This e-mail is intended solely for the addressee. It may contain private and
confidential information. If you are not the intended addressee, please take
no action based on it nor show a copy to anyone. Please reply to this e-mail
to highlight the error. You should also be aware that all electronic mail
from, to, or within Northumbria University may be the subject of a request
under the Freedom of Information Act 2000 and related legislation, and
therefore may be required to be disclosed to third parties.
This e-mail and attachments have been scanned for viruses prior to leaving
Northumbria University. Northumbria University will not be liable for any
losses as a result of any viruses being passed on.

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager