Skip to main content
Cutter Consortium Cutter Consortium
  • Search
  • Login
  • Sign up
  • Research
    • Amplify
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Experts
  • About
    • Corporate Overview
    • Contact Us
    • Privacy Policy & Terms of Use
  • Arthur D. Little
  1. Home
  2. Journals
  • IT's Promise for Emerging Markets

    July 2010

    Bound for Failure

    Getting ready to venture into an emerging market? Good luck. Emerging markets lack sound infrastructure, present legal and regulatory constraints, and pose security and business continuity concerns. Add in the fact that their consumers have low purchasing power, and the chances of success get very slim.

    In this issue:
    • IT's Promise for Emerging Markets
    • Generating IT Innovations for Emerging Markets
    • Using Crowdsourcing to Meet the Needs of the Bottom of the Pyramid
    • Mobile Learning, Mobile Healthcare Support, and Mobile Job Opportunities: The Case of MXit, MYMsta, and Mobenzi in South Africa
    • Egypt: A Growing ICT Hub in the Middle East-North Africa (MENA) Region
    • The Secure Mobile Wallet: Anytime, Anywhere Financial Transactions
  • Business Intelligence 2010: Delivering the Goods or Standing Us Up?

    June 2010

    BI Is Delivering the Goods

    BI has been successfully implemented and institutionalized in many organizations. KPIs for many areas are predefined and can easily be used to manage important aspects of the enterprise.

    In this issue:
    • Business Intelligence 2010: Delivering the Goods or Standing Us Up?
    • A Convergence in Business Intelligence
    • Collaborative Intelligence
    • Half a Century of BI: From Inception to BI 2.0
    • BI in the Transportation Industry
    • DIY Business Intelligence: Caution, Danger Ahead
  • Mobile Privacy and Security: The Next Frontier of IT Risk Management

    June 2010

    In this issue of Cutter Benchmark Review, we focus at the intersection of three topics discussed previously: mobile technology (Vol. 9, No. 3) on the one hand and privacy (Vol. 6, No. 1) and security (Vol. 5, No. 12) on the other. We do so because we feel that these topics, interesting each on its own, take on renewed relevance when combined.

    In this issue:
    • Mobile Privacy and Security: The Next Frontier of IT Risk Management
    • Can I Please Get My Data Back? A Look at Mobile Technologies and Privacy Protection
    • Mobile Device Privacy and Security: A 21st-Century Challenge
    • Mobile Privacy and Security: Still Far from Mission Accomplished
  • E-Learning Platforms: Using the Past to Proceed to the Future

    May 2010

    This month, we have tapped into the expertise and knowledge of two contributors with significant backgrounds in e-learning. On the academic side is Aurelio Ravarini, Senior Assistant Professor of IS at Università Carlo Cattaneo (LIUC, Italy) and Director with LIUC's CETIC, Research Center on Information Systems. Many of you will recall Aurelio as a past contributor to CBR; he was our academic expert on the issues on content management systems (Vol. 6, No. 4) and software as a service (Vol. 9, No. 4 ). Our practitioner author is Gianni Maria Strada, a former HR executive of several US corporations and current Managing Partner of PeoplePoint, a boutique HR consulting firm focused on major organizational change processes. Both contributors have considerable experience with the organizational implementation of software applications and their consequential organizational change processes.

    In this issue:
    • E-Learning Platforms: Using the Past to Proceed to the Future
    • Misunderstanding IT Solutions for Change Management: The Case for E-Learning
    • A New Renaissance for Job Development
    • E-Learning: Predicated on Individualized Approaches
  • Business Process Management: Alternative Views

    May 2010

    It's Just Modeling Workflows, Stupid!

    BPM is the new buzzword for what we have known for a while as business process modeling and business process reengineering. We can get pragmatic results from BPM as long as the consultants don't make the problem so large we can't handle it anymore.

    In this issue:
    • Business Process Management: Alternative Views
    • BPM: It's About Managing Change
    • Transformation in an Enterprise: A Case Study
    • Case Management: Automation of Ad Hoc Processes
    • Exploring the Synergy Between Business Process Management and Personal Knowledge Management
    • Reading the Same Score

Pagination

  • Previous page
  • 41
  • Next page

Subscribe to free newsletters

Elevate your perspective with thought-provoking insights, expert opinions, and in-depth analyses on people, technology, and strategy from Arthur D. Little.

Subscribe

Contact us

  • Cutter Consortium,
    an Arthur D. Little community
  • 10 High Street, Suite 900
    Boston, MA 02110 USA
    +1 (781) 648-8700
    service@cutter.com

Cutter | An Arthur D Little Company

Cutter | An Arthur D Little Company

Copyright © 2025 Arthur D. Little  |   All Rights Reserved. Privacy Policy | Terms of Service
  • Research
    • Amplify
    • Leadership
    • Sustainability
    • Technology
    • Industry
  • Experts
  • About
    • Corporate Overview
    • Contact Us
    • Privacy Policy & Terms of Use
  • Arthur D. Little