Rules for the Knowledge Organization

Paola Di Maio

An understanding of the basic concepts of business rules and how a rule-based system (RBS) works is becoming essential knowledge as the impact of RBSs on our daily lives is continuously increasing.


Rules for the Knowledge Organization

Paola Di Maio

Grasping the basic concepts of business rules and how a rule-based system (RBS) works offers benefits for every citizen of the information society, as the impact of RBSs on our daily lives is becoming greater by the day.


Planning for Success in Content Management

Martin Bauer

A content management implementation is similar to a normal Web application development project with one significant difference -- the need for content. With Web applications or traditional software development, there is little content -- it is usually about data that already exists or will be entered by the users of the application.


Opening Statement: Securing Cyberspace: What Exactly Should We Be Doing?

Larry Clinton

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Opening Statement: Securing Cyberspace: What Exactly Should We Be Doing?

Larry Clinton

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


How to Stop Talking About - and Start Fixing - Cyber Security Problems

Bill Hancock

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Moving Beyond Security: The Resilience Imperative

Debra van Opstal

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Contracting for Information Security in Commercial Transactions: A New Tool for Managing Risk

Jeffrey Ritter

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Contracting for Information Security in Commercial Transactions: A New Tool for Managing Risk

Jeffrey Ritter

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Contracting for Information Security in Commercial Transactions: A New Tool for Managing Risk

Jeffrey Ritter

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


The Role of Cyber Insurance in Fighting the War on Terror

Ty Sagalow

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


The Role of Cyber Insurance in Fighting the War on Terror

Ty Sagalow

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Payments System Security: No Longer Just a "Company Issue"

Steve Ruwe

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Payments System Security: No Longer Just a "Company Issue"

Steve Ruwe

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Payments System Security: No Longer Just a "Company Issue"

Steve Ruwe

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Forging a Public-Private Partnership: The "Wonk-Free" Approach to Cyber Security

Greg Garcia

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Forging a Public-Private Partnership: The "Wonk-Free" Approach to Cyber Security

Greg Garcia

In the first installment of "Securing Cyberspace," we asked, "Is it time to rethink our strategy?" The answer was a resounding "yes." In next month's issue, our authors discuss a bevy of innovative ways we can protect our cyber infrastructure, from managing cyber risk through cyber insurance to reengineering the base protocols of TCP/IP.


Collaboration and Collaborative Leadership: Innovation in the Agile Enterprise

Pollyanna Pixton

It's no longer enough to respond to change; today organizations must lead change or be left behind.


Collaboration and Collaborative Leadership: Innovation in the Agile Enterprise

Pollyanna Pixton

How can companies survive in our globally changing and demanding marketplace? Is it possible to reach target windows with the right products and services while meeting quality standards in a fluid and shifting environment? Can you truly embrace change without devolving into chaos? Is it possible to welcome change? The answer to all these questions is a resounding yes, but only if you can lead change rather than react to it after the need to change has become painfully obvious.


Leadership and Agile Methods

Mike Griffiths
INTRODUCTION

Agile project management is more aligned to leadership best practice than to traditional project management best practice. This Executive Update illustrates this link and highlights some useful leadership additions for agile project managers. By recognizing this relationship, project managers can tap into a rich source of practical guidelines, case studies, and tools.


Risk Management 2006: A Comprehensive Survey (Part II)

Robert Charette
More in this series Risk Management 2006: A Comprehensive Survey Part I Part II

In 2002, Cutter Consortium conducted its first comprehensive survey of the state of risk management practice in the IT community [5].


Risk Management 2006: A Comprehensive Survey (Part II)

Robert Charette
 

In 2002, Cutter Consortium conducted its first comprehensive survey of the state of risk management practice in the IT community [1]. The survey found that some 86% of organizations responding claimed they were practicing risk management, and 51% of those were practicing it in a disciplined, formal manner. From reports in general software literature, surveys on risk management and its relationship to capturing lessons learned, anecdotal experience, and so on, the practice of risk management seems to have grown both generally and in formality over the past four years.


Mapping CobiT to COSO and PCAOB

Gregg Henzel, Richard Marti
INTRODUCTION

Public companies subject to the requirements of the US Sarbanes-Oxley Act of 2002 (SOX) have widely adopted two internal control frameworks over financial reporting: CobiT and COSO. CobiT is used for IT controls, while COSO is used for business processes and entity-level controls. These two frameworks, along with guidelines from the PCAOB (Public Company Accounting Oversight Board), can be mapped and integrated with one another to provide an overall plan for SOX and global compliance.


Mapping CobiT to COSO and PCAOB

Gregg Henzel, Richard Marti
INTRODUCTION

Public companies subject to the requirements of the US Sarbanes-Oxley Act of 2002 (SOX) have widely adopted two internal control frameworks over financial reporting: CobiT and COSO. CobiT is used for IT controls, while COSO is used for business processes and entity-level controls. These two frameworks, along with guidelines from the PCAOB (Public Company Accounting Oversight Board), can be mapped and integrated with one another to provide an overall plan for SOX and global compliance.


Service-Level Agreements: Articulating What Will Make a Successful Deal

Sara Cullen

The service-level agreement (SLA) is a critical element in the suite of contractual and governing documents that surround any outsourcing engagement. This Executive Report provides an overview of SLAs including their purpose and key elements. It then discusses the necessary preparations as you make the decision to create an SLA, before detailing the seven sections of this document. The report concludes with suggestions for drafting an SLA.