Skip to main content
Cutter Consortium Cutter Consortium
  • Search
  • Login
  • Sign up
  • Research
    • Amplify
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Experts
  • About
    • Corporate Overview
    • Contact Us
    • Privacy Policy & Terms of Use
  • Arthur D. Little
  1. Home
  2. Journals
  • The Role of Strategy, Planning, and Budgeting in an Agile Organization

    February 2006

    "Development is about delivering value through the proper management of projects; governance is about managing portfolio resources and funding the right projects at the right time."

    - William B. Walton, Guest Editor

    In this issue:
    • The Role of Strategy, Planning, and Budgeting in an Agile Organization
    • The Role of Strategy, Planning, and Budgeting in an Agile Organization: Opening Statement
    • Investing in Agile: Aligning Agile Initiatives with Enterprise Goals
    • Agile Strategies for a Dynamic Environment
    • Get Real with Strategic Budgeting
    • Agile Strategies for a Dynamic Environment
    • Coping with the Unexpected: Integrating HRO and Agile
  • Securing Cyberspace: Is It Time to Rethink Our Strategy?

    January 2006

    "Since it is private industry that owns and operates the vast majority of what constitutes the Internet, it is therefore industry's responsibility to demonstrate leadership in the fight to secure cyberspace."

    In this issue:
    • Securing Cyberspace: Is It Time to Rethink Our Strategy?
    • Cutter IT Journal: Securing Cyberspace: Is It Time to Rethink Our Strategy? - Opening Statement
    • Cyber Risk Management: The Need for Effective Public and Private Partnership
    • Investing in Cyber Security: The Path to Good Practice
    • Securely Sustaining Software-Intensive Systems
    • Authentication Mechanisms You Can Bank On
    • Contribution: Security and Identity Management at Tata Consultancy Services
    • Are We Ready to Face Next-Generation Spam?
  • Doing Privacy Right Using Data and Preserving Trust

    January 2006

    In the last issue of CBR, we focused on an important and timely topic: security and IT risk management.There I made the case for why the "uninitiated public" has a strong incentive to care about security: "The increasing prevalence of computer systems as well as the growing amount of our personal data that is stored by business firms, nonprofit organizations, and governmental entities (and can therefore be compromised) suggests that even the uninitiated public should pay attention." But, as we learn from our experts in this installment of CBR, our personal data being compr

    In this issue:
    • Doing Privacy Right Using Data and Preserving Trust
    • Privacy in Search of Governance
    • Who's Accountable for Privacy? Data Governance in a World of ID Theft
    • Corporate Privacy Governance: Not Free, But Can You Do Without It?
    • Trends in Corporate Privacy Governance Survey Data
  • Security and Risk Management: The Never-Ending Game of Chess

    December 2005

    Viruses, Trojan horses, worms, time bombs, adware, spyware, keystroke tracking tools, spoofing, snooping, sniffers -- these are some of the most popular examples of malicious code and techniques that modern organizations find themselves fighting. Couple this seemingly unabated tide of new releases and new forms of harmful software with human threats like crackers, thieves, industrial espionage contractors, and your own disgruntled or ill-intentioned employees, and what do you get? You get a complex cocktail of potential security headaches. How big a headache?

    In this issue:
    • Security and Risk Management: The Never-Ending Game of Chess
    • Best Practices in IT Risk Management: Buying Safeguards, Designing Security Architecture, or Managing Information Risk?
    • Information Security -- A Difficult Game: Things to Think About When Planning Your Next Move
    • Security: A Game Worth Playing
    • IT Risk Management/Security Survey Data Collected by Cutter Consortium
  • Agile Data Techniques

    December 2005

    "I believe that we're starting to see a trend away from the serial, and often bureaucratic, methods that pervade many data groups toward an evolutionary/agile approach that reflects modern software development practices."

    In this issue:
    • Agile Data Techniques
    • Agile Data Techniques: Opening Statement
    • Evolutionary Database Development Techniques
    • Agile Database Testing
    • Enabling Agile Database Development: A Case Study
    • Agile Applications as Open-Vocabulary English Business Rules over SQL
    • Data and Agile Methods

Pagination

  • Previous page
  • 62
  • Next page

Subscribe to free newsletters

Elevate your perspective with thought-provoking insights, expert opinions, and in-depth analyses on people, technology, and strategy from Arthur D. Little.

Subscribe

Contact us

  • Cutter Consortium,
    an Arthur D. Little community
  • 10 High Street, Suite 900
    Boston, MA 02110 USA
    +1 (781) 648-8700
    service@cutter.com

Cutter | An Arthur D Little Company

Cutter | An Arthur D Little Company

Copyright © 2025 Arthur D. Little  |   All Rights Reserved. Privacy Policy | Terms of Service
  • Research
    • Amplify
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Experts
  • About
    • Corporate Overview
    • Contact Us
    • Privacy Policy & Terms of Use
  • Arthur D. Little