If we lived in a perfect Internet world, an e-commerce1 site would meet the needs of its customers in terms of providing an effective user
Showing 1121 - 1140 of 1374
Opening Statement by Jim Highsmith
June 30, 2004 | Authored By: David Anderson
There has been much talk recently regarding a convergence of information security and privacy. Not that this is anything particularly new - convergence has been happening ever since privacy became a concern. After all, privacy requires the implementation of robust information security controls and appropriate safeguards. There are at least 46 privacy breach notice laws in the US alone; understanding and complying with their multiple requirements (to say nothing of the growing number of other national and international privacy laws) will require privacy and information security areas to work together for effective enterprise-wide management.
Gone are those days when monolithic IT systems were developed and maintained by exclusive communities of IT professionals confined to technology-savvy regions of the world.
September 21, 2011 | Authored By: Raja Bavani
Many organizations have developed models to explain the introduction of a new technology in the marketplace.
August 26, 2012 | Authored By: Claude Baudoin
AN EFFECTIVE STRATEGY FOR MANAGING OUTSOURCING WITH MEASUREMENT by Howard A.
September 30, 1999 | Authored By: Howard Rubin
If your fiscal year begins January 1, you probably had already begun creating your IT plans and budgets before September 11.
October 31, 2001 | Authored By: Cutter Business Technology Council
How do we ensure that we are getting the most from big data, cognitive computing, and whatever lies beyond, to improve the probability of making the right decisions, in the right context, and for the right reasons? We believe that lessons learned in over five decades of Lean Thinking can help guide us forward in this journey, and we will use examples from the financial services industry to illustrate them.
July 7, 2016 | Authored By: Karen Whitley Bell, Steve Bell
Abstract What works for corporate environmental and energy stra
June 30, 2008 | Authored By: William Dalessandro
APPLYING KNOWLEDGE MANAGEMENT TO APPLICATION DELIVERY by Jim Highsmith Is knowle
February 28, 1999 | Authored By: Jim Highsmith
Abstract Barriers to the continual refinement of today'
September 30, 2009 | Authored By: Mitchell Ummel
Business continuity management (BCM) is no longer a luxury but an essential element of an organization's risk management program.
December 31, 2007 | Authored By: Ken Doughty
Awareness is only one piece of an effective technology adoption plan; even the best technology is useless unless applied. -- Jim Skinner, Leading Edge Forum [20]
December 31, 2006 | Authored By: San Murugesan
Gone are those days when monolithic IT systems were developed and maintained by exclusive communities of IT professionals confined to technology-savvy regions of the world.
September 21, 2011 | Authored By: Raja Bavani
Opening Statement by Robert N. Charette
August 31, 2005 | Authored By: Dwayne Melancon, Daniel Langin
BRINGING OO PROJECTS UNDER QUANTITATIVE CONTROL: AN OUTPUT-, CASH-, AND TIME-DRIVEN APPROACH
October 31, 1997 | Authored By: Philip Henderson-sellers
LIVING IN A NETWORKED WORLD by John Boudreaux
November 30, 1997 | Authored By: John Boudreaux
In a global setting, culture is an important facet of the decision-making process. To become a great decision maker, it behooves an individual to become educated about practices, values, and beliefs that are dominant in a culture and to understand others' frames of mind before making a decision. This recommendation inevitably suggests adopting an interdependent mindset.
September 30, 2014 | Authored By: Sharon Glazer, Tamas Karpati
Over the last decade, the growing adoption of personal devices has led to many people having their first and only computer experience on a phone or tablet. Over the coming decade, these devices will drop in price and proliferate, with a large percentage of the earth's population having more than one personal computer device (phone, tablet, watch, glasses, etc.). Unfortunately, the very devices that are designed to help us communicate and work better together are causing us challenges with in-person engagement. Human face-to-face contact has already been altered as a result of the constant distractions from our personal devices, breaking the social contract we have when we are engaged in a conversation with someone.
August 1, 2015 | Authored By: Neil Roodyn

