Skip to main content
Cutter Consortium Cutter Consortium
  • Search
  • Login
  • Sign up
  • Practices
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Products & Services
    • Amplify
    • Research & Analysis
      • Amplify
      • Leadership
      • Sustainability
      • Technology
      • Industry
    • Join the Cutter Community
    • Subscribe to our Newsletters
  • Experts
    • All Experts
    • Leadership Experts
    • Sustainability Experts
    • Technology Experts
    • Industry Experts
  • Arthur D. Little
  • About
    • Corporate Overview
    • Testimonials
    • Contact Us
    • Privacy Policy & Terms of Use
    • Write for Cutter
  1. Home
  2. Journals
  • Green IT Metrics and Measurement: The Complex Side of Environmental Responsibility

    October 2009

    This month's issue focuses on green IT and its measurement. Our objective is to benchmark current practice and offer tangible guidelines on the measurement of green IT and green IS efforts. Our academic contributor is Brian Donnellan, Professor of IS Innovation at the National University of Ireland, Maynooth, and Co-Director of the Innovation Value Institute. Our practicing contributor is Bhuvan Unhelkar, a Cutter Consortium Senior Consultant.

    In this issue:
    • Green IT Metrics and Measurement: The Complex Side of Environmental Responsibility
    • Green IT Metrics: Enhancing Brand Value While Meeting Compliance
    • Creating and Applying Green IT Metrics and Measurement in Practice
    • Measuring Green IT Efforts: Much Work Remains to Be Done
    • Green IT Metrics and Measurement Survey Data
  • The Value of Social Networks in the Enterprise

    October 2009

    Don’t Go There

    Social networks in the enterprise are a security threat and an employee productivity sinkhole. Don’t fall into the “me too” trap — the risks are just too great.

    They’re Good to Go

    The benefits of social networks in the enterprise far outweigh the risks posed by these technologies. Get moving — before your competitors use them to take your market share.

    In this issue:
    • The Value of Social Networks in the Enterprise
    • Finding the Sweet Spot: Balancing the Risks and Rewards of Social Networking Technologies in the Enterprise
    • Can Enterprises Capitalize on Their Social Networks?
    • Applying Workplace Metrics to Measure the Value of Social Networking Technology
    • Crowdsourcing: A Social Networking Approach to Outsourcing
    • Toward Collaborative Business Process Modeling
  • The Rise of the Semantic Enterprise

    September 2009

    Semantic Enterprise Today

    The Semantic Web offers us a compelling architectural framework upon which to build next-generation, Internet-ready applications within the enterprise. Now is the time to embrace the possibilities.

    In this issue:
    • The Rise of the Semantic Enterprise
    • When Semantic Enterprise Means Rethinking Everything
    • Understanding and Adopting Semantic Web Technology
    • Leveraging the Semantic Web for Data Integration
    • Accruing Business Value Through the Adoption of Semantic Web Technologies
    • Intranet Architecture for the Semantic Enterprise
  • IT Governance in 2009: A Thorn in IT's Side

    September 2009

    This month's installment of Cutter Benchmark Review takes an in-depth look at one of the critical issues that typically emerges in our yearly series on IT budgets and the budgeting process: IT governance, which we define as the process of identifying responsibilities and implementing decision-making tools and structures for appropriate oversight of the management and use of IT resources. 

    In this issue:
    • IT Governance in 2009: A Thorn in IT’s Side
    • IT Governance: Size Matters
    • Governance Connected to Better IT Value
    • IT Governance in 2009: Yet Another Communication Challenge
    • IT Governance Survey Data
  • The Convergence of Information Security, Privacy, and Compliance: Part II

    August 2009

    CUTTER IT JOURNAL VOL. 22, NO. 8
    Privacy and Security Are Birds of a Different Feather

    Privacy is a legal issue and should be addressed separately from security, which is an IT area.

    In this issue:
    • The Convergence of Information Security, Privacy, and Compliance: Part II -- Opening Statement
    • Getting Their Act Together: A Retailer Takes a Cross-Organizational Approach to Information Security and Privacy Compliance
    • From Sticks to Carrots: Creating Business Incentives for Security and Privacy Programs
    • Security and Privacy Convergence: A Global Governance Perspective
    • Securing the Information Border: An SDLC Approach to Security and Privacy Protection
    • In Search of Low-Hanging Fruit: Improving Security and Privacy with Penetration Testing

Pagination

  • Previous page
  • 44
  • Next page

Subscribe to free newsletters

Cutter connects the brightest minds from every field, creating unparalleled collective intelligence and transforming what’s possible.

Subscribe

Contact us

  • Cutter Consortium,
    an Arthur D. Little community
  • 10 High Street, Suite 900
    Boston, MA 02110 USA
    +1 (781) 648-8700
    service@cutter.com

Cutter | An Arthur D Little Company

Cutter | An Arthur D Little Company

Copyright © 2025 Arthur D. Little  |   All Rights Reserved. Privacy Policy | Terms of Service
  • Practices
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Products & Services
    • Amplify
    • Research & Analysis
      • Amplify
      • Leadership
      • Sustainability
      • Technology
      • Industry
    • Join the Cutter Community
    • Subscribe to our Newsletters
  • Experts
    • All Experts
    • Leadership Experts
    • Sustainability Experts
    • Technology Experts
    • Industry Experts
  • Arthur D. Little
  • About
    • Corporate Overview
    • Testimonials
    • Contact Us
    • Privacy Policy & Terms of Use
    • Write for Cutter