In today's business realities, there are circumstances in which traditionally employed information access schemas are incapable of securing information against breaches. Such a class of problems can be identified as sensitive information security related to conflict of interests.
About The Author
Sebastian Konkol
Sebastian Konkol is an enterprise startup and strategy consultant and the owner of the consultancy firm TwisterSolve. Mr. Konkol specializes in strategic IT planning, business technology partnerships from both the technology and organizational perspectives, and fostering new technology management methods supported by social psychology. He provides advisory services to companies in ICT-based and ICT-intensive industries. Mr. Konkol also divides… Read More
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.