Skip to main content
Cutter Consortium Cutter Consortium
  • Search
  • Login
  • Sign up
  • Practices
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Products & Services
    • Amplify
    • Research & Analysis
      • Amplify
      • Leadership
      • Sustainability
      • Technology
      • Industry
    • Join the Cutter Community
    • Subscribe to our Newsletters
  • Experts
    • All Experts
    • Leadership Experts
    • Sustainability Experts
    • Technology Experts
    • Industry Experts
  • Arthur D. Little
  • About
    • Corporate Overview
    • Testimonials
    • Contact Us
    • Privacy Policy & Terms of Use
    • Write for Cutter
  1. Home
  2. Journals
  • Mobile Security: Managing the Madness

    December 2014

    The new mobile freedom is germinating a sense of self-reliance in users. Recent controversies such as high-profile privacy leaks of celebrities' photos and similar stories have gained enormous coverage in the press and loom large in mobile users' minds. They see themselves at risk, personally. This is an opportunity for tutelage that users' employers should seize. Better digital hygiene can reduce risks and let a user rest easier. And it can provide IT security directors with a glimmer of light at the end of a very dark tunnel.

    In this issue:
    • Mobile Security: Managing the Madness — Opening Statement
    • Driving Enterprise Mobile App Usage: Moving from Stuck to Secure, Scalable, Usable -- and Productive
    • Mobile's Biggest Threat? It's Not What You Think
    • Privacy of Mobile Users: Pitfalls and Recommendations
    • Mobile Security from a Practical Perspective
  • The IoT: Technologies, Opportunities, and Solutions

    November 2014

    The IoT should not be viewed as only a technological opportunity. It has the potential to transform how people and business interact in significant ways. Therefore, people must be placed at the center of the IoT conversation.

    In this issue:
    • The IoT: Technologies, Opportunities, and Solutions — Opening Statement
    • The Industrial Internet: The Opportunities ... and the Roadblocks
    • Leveraging the Internet of Things: Emerging Architectures for Digital Business
    • Architecting for New Business Opportunities in the Internet of Things
    • A Comparative Study of Data-Sharing Standards for the Internet of Things
    • Thinking About Making Your Product Smart? Keep These 10 Things in Mind
  • Agile in the Real World

    October 2014

    As a coach, it can be frustrating to hear someone want to stop the conversation, which is what invoking the 'real world' often does. Yet it's also an indication that the person or group has other issues that are causing them to lose sleep.

    Dave Rooney
    Guest Editor

    In this issue:
    • Agile in the Real World — Opening Statement
    • Agile Team 0: The Journey
    • The Best Project Ever
    • Near-Agile Software Development Before Agile
    • Five Process Tweaks That Won’t Prevent You from Being Agile
    • If It’s Broke, Fix It: Inspect and Adapt Is Real Agile
  • Decision Making: Art, Science, or Alchemy?

    September 2014

    Our decision making appears to improve when we increase awareness and communication about decisions and the principles we're using to make them. Establishing a method and criteria and laying out the alternatives allow us to critique and learn -- both from our successes and from our failures.

    Hillel Glazer
    Guest Editor

    In this issue:
    • Decision Making: Art, Science, or Alchemy? — Opening Statement
    • When You Must Make Hard Choices
    • How to Stop Making Decisions in the Dark
    • Decision Making: Logic or Luck of the Draw?
    • The Role of Culture in Decision Making
    • The Science of the Art of Decision Making
  • Data Hacking: No Day at the Breach

    August 2014

    "No matter how large or small our organizations are, we cannot just wash our hands of the data security problem -- there is too much at stake."

    — Ken Orr, Guest Editor

    In this issue:
    • Data Hacking: No Day at the Breach — Opening Statement
    • Leading in the Time of Data Breaches
    • Crafting a Secure and Effective BYOD Policy
    • The Insider Track on Cyber Security
    • The Data Shell Game: The Best Way to Protect Corporate and Institutional Data in the Cloud
    • An Architecture Approach to Corporate Information Security

Pagination

  • Previous page
  • 25
  • Next page

Subscribe to free newsletters

Cutter connects the brightest minds from every field, creating unparalleled collective intelligence and transforming what’s possible.

Subscribe

Contact us

  • Cutter Consortium,
    an Arthur D. Little community
  • 10 High Street, Suite 900
    Boston, MA 02110 USA
    +1 (781) 648-8700
    service@cutter.com

Cutter | An Arthur D Little Company

Cutter | An Arthur D Little Company

Copyright © 2025 Arthur D. Little  |   All Rights Reserved. Privacy Policy | Terms of Service
  • Practices
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Products & Services
    • Amplify
    • Research & Analysis
      • Amplify
      • Leadership
      • Sustainability
      • Technology
      • Industry
    • Join the Cutter Community
    • Subscribe to our Newsletters
  • Experts
    • All Experts
    • Leadership Experts
    • Sustainability Experts
    • Technology Experts
    • Industry Experts
  • Arthur D. Little
  • About
    • Corporate Overview
    • Testimonials
    • Contact Us
    • Privacy Policy & Terms of Use
    • Write for Cutter