Advertisement
gartner magic quadrant privacy management: Infonomics Douglas B. Laney, 2017-09-05 Many senior executives talk about information as one of their most important assets, but few behave as if it is. They report to the board on the health of their workforce, their financials, their customers, and their partnerships, but rarely the health of their information assets. Corporations typically exhibit greater discipline in tracking and accounting for their office furniture than their data. Infonomics is the theory, study, and discipline of asserting economic significance to information. It strives to apply both economic and asset management principles and practices to the valuation, handling, and deployment of information assets. This book specifically shows: CEOs and business leaders how to more fully wield information as a corporate asset CIOs how to improve the flow and accessibility of information CFOs how to help their organizations measure the actual and latent value in their information assets. More directly, this book is for the burgeoning force of chief data officers (CDOs) and other information and analytics leaders in their valiant struggle to help their organizations become more infosavvy. Author Douglas Laney has spent years researching and developing Infonomics and advising organizations on the infinite opportunities to monetize, manage, and measure information. This book delivers a set of new ideas, frameworks, evidence, and even approaches adapted from other disciplines on how to administer, wield, and understand the value of information. Infonomics can help organizations not only to better develop, sell, and market their offerings, but to transform their organizations altogether. Doug Laney masterfully weaves together a collection of great examples with a solid framework to guide readers on how to gain competitive advantage through what he labels the unruly asset – data. The framework is comprehensive, the advice practical and the success stories global and across industries and applications. Liz Rowe, Chief Data Officer, State of New Jersey A must read for anybody who wants to survive in a data centric world. Shaun Adams, Head of Data Science, Betterbathrooms.com Phenomenal! An absolute must read for data practitioners, business leaders and technology strategists. Doug's lucid style has a set a new standard in providing intelligible material in the field of information economics. His passion and knowledge on the subject exudes thru his literature and inspires individuals like me. Ruchi Rajasekhar, Principal Data Architect, MISO Energy I highly recommend Infonomics to all aspiring analytics leaders. Doug Laney’s work gives readers a deeper understanding of how and why information should be monetized and managed as an enterprise asset. Laney’s assertion that accounting should recognize information as a capital asset is quite convincing and one I agree with. Infonomics enjoyably echoes that sentiment! Matt Green, independent business analytics consultant, Atlanta area If you care about the digital economy, and you should, read this book. Tanya Shuckhart, Analyst Relations Lead, IRI Worldwide |
gartner magic quadrant privacy management: Privacy and Identity Management. Time for a Revolution? David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab, 2016-07-20 This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics. |
gartner magic quadrant privacy management: Data Governance Dimitrios Sargiotis, |
gartner magic quadrant privacy management: Guide to Security Assurance for Cloud Computing Shao Ying Zhu, Richard Hill, Marcello Trovati, 2016-03-09 This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry. Topics and features: · Describes the important general concepts and principles of security assurance in cloud-based environments · Presents applications and approaches to cloud security that illustrate the current state of the art · Reviews pertinent issues in relation to challenges that prevent organizations moving to cloud architectures · Provides relevant theoretical frameworks and the latest empirical research findings · Discusses real-world vulnerabilities of cloud-based software in order to address the challenges of securing distributed software · Highlights the practicalities of cloud security, and how applications can assure and comply with legislation · Includes review questions at the end of each chapter This Guide to Security Assurance for Cloud Computing will be of great benefit to a broad audience covering enterprise architects, business analysts and leaders, IT infrastructure managers, cloud security engineers and consultants, and application developers involved in system design and implementation. The work is also suitable as a textbook for university instructors, with the outline for a possible course structure suggested in the preface. The editors are all members of the Computing and Mathematics Department at the University of Derby, UK, where Dr. Shao Ying Zhu serves as a Senior Lecturer in Computing, Dr. Richard Hill as a Professor and Head of the Computing and Mathematics Department, and Dr. Marcello Trovati as a Senior Lecturer in Mathematics. The other publications of the editors include the Springer titles Big-Data Analytics and Cloud Computing, Guide to Cloud Computing and Cloud Computing for Enterprise Architectures. |
gartner magic quadrant privacy management: Handbook of Research on Emerging Developments in Data Privacy Gupta, Manish, 2014-12-31 Data collection allows todays businesses to cater to each customers individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the legal aspects of identity protection, trust and security, and detection techniques, this comprehensive work is a valuable resource for any business, legal, or technology professional looking to improve information security within their organization. |
gartner magic quadrant privacy management: Trust and Privacy in Digital Business Sokratis Katsikas, Günther Pernul, 2004-11-02 Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for coming to Zaragoza to participate and debate the new emerging advances in this area. The conference program consisted of one invited talk and nine regular technical papers sessions. The invited talk and keynote speech was delivered by Ahmed Patel from the Computer Networks and Distributed Systems Research Group, University College Dublin, Ireland on “Developing Secure, Trusted and Auditable Services for E-Business: An Autonomic Computing Approach”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control - sues to electronic voting, from trust and protocols to digital rights management. The conference attracted close to 100 submissions of which the program committee - cepted 29 papers for presentation and inclusion in the conference proceedings. |
gartner magic quadrant privacy management: Real Business of IT Richard Hunter, George Westerman, 2009-10-20 If you're a general manager or CFO, do you feel you're spending too much on IT or wishing you could get better returns from your IT investments? If so, it's time to examine what's behind this IT-as-cost mind-set. In The Real Business of IT, Richard Hunter and George Westerman reveal that the cost mind-set stems from IT leaders' inability to communicate about the business value they create-so CIOs get stuck discussing budgets rather than their contributions to the organization. The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization: -Value for money when your IT department operates efficiently and effectively -An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability -Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specialization The authors show how to communicate about these forms of value with non-IT leaders-so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is. |
gartner magic quadrant privacy management: The Connector Manager Jaime Roca, Sari Wilde, 2019-09-19 The best managers work smarter, not harder After conducting a unique global study of over 9,000 people, analysts at the world-leading sales research firm Gartner identified four distinct types of manager. Incredibly, they found one type consistently performs far better than the rest, and it wasn’t the one they were expecting. Connector Managers understand that it’s not enough for managers to just encourage and teach employees themselves, and that providing constant coaching to employees can actually be detrimental to their independent development. Instead, by connecting employees to others in the team or organisation, Connector Managers can help their employees develop a range of skills beyond their own areas of expertise. Although the four types of managers are more or less evenly distributed, employees with Connector Managers perform significantly better than others. Employees with Always-on Managers who provide constant feedback and coaching perform significantly worse. Drawing on their ground-breaking data-driven research, as well as in-depth case studies and extensive interviews with thousands of managers, you’ll discover what behaviours define Connector Managers and how you can use them yourself to build brilliant, powerhouse teams. |
gartner magic quadrant privacy management: HCI International 2023 – Late Breaking Papers Helmut Degen, Stavroula Ntoa, Abbas Moallem, 2023-11-25 This seven-volume set LNCS 14054-14060 constitutes the proceedings of the 25th International Conference, HCI International 2023, in Copenhagen, Denmark, in July 2023. For the HCCII 2023 proceedings, a total of 1578 papers and 396 posters was carefully reviewed and selected from 7472 submissions. Additionally, 267 papers and 133 posters are included in the volumes of the proceedings published after the conference, as “Late Breaking Work”. These papers were organized in the following topical sections: HCI Design and User Experience; Cognitive Engineering and Augmented Cognition; Cultural Issues in Design; Technologies for the Aging Population; Accessibility and Design for All; Designing for Health and Wellbeing; Information Design, Visualization, Decision-making and Collaboration; Social Media, Creative Industries and Cultural Digital Experiences; Digital Human Modeling, Ergonomics and Safety; HCI in Automated Vehicles and Intelligent Transportation; Sustainable Green Smart Cities and Smart Industry; eXtended Reality Interactions; Gaming and Gamification Experiences; Interacting with Artificial Intelligence; Security, Privacy, Trust and Ethics; Learning Technologies and Learning Experiences; eCommerce, Digital Marketing and eFinance. |
gartner magic quadrant privacy management: Security and Privacy in Communication Networks Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung, 2021-11-02 This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing. |
gartner magic quadrant privacy management: Data Privacy Nataraj Venkataramanan, Ashwin Shriram, 2016-10-03 The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best practices and reflect on the conflicting relationship between privacy and utility. From a practice standpoint, it provides practitioners and researchers with a definitive guide to approach anonymization of various data formats, including multidimensional, longitudinal, time-series, transaction, and graph data. In addition to helping CIOs protect confidential data, it also offers a guideline as to how this can be implemented for a wide range of data at the enterprise level. |
gartner magic quadrant privacy management: Digital to the Core Mark Raskino, Graham Waller, 2016-09-12 There is no simple strategic method for dealing with the multidimensional nature of digital change. Even the sharpest leaders can become disoriented as change builds on change, leaving almost nothing certain. Yet to stand still is to fail. Enterprises and leaders must re-master themselves to succeed. Leaders must identify the key macro forces, then lead their organizations at three distinct levels: industry, enterprise, and self. By doing this they cannot only survive but clean up. Digital to the Core makes the case that all business leaders must understand the impact the digital revolution will continue to play in their industries, companies, and leadership style and practices. Drawing on interviews with over 30 top C-level executives in some of the world's most powerful companies and government organizations, including GE, Ford, Tory Burch, Babolat, McDonalds, Publicis and UK Government Digital Service, this book delivers practical insights from those on the front lines of major digital upheaval. The authors incorporate Gartner's annual CIO and CEO global survey research and also apply the deep knowledge and qualitative insights they have acquired as practitioners, management researchers, and advisors over decades in the business. Above all else, Raskino and Waller want companies and their top leaders to understand the full impact of digital change and integrate it at the core of their businesses. |
gartner magic quadrant privacy management: ECCWS2016-Proceedings fo the 15th European Conference on Cyber Warfare and Security " Robert Koch, Gabi Rodosek, 2016-06-15 These proceedings represent the work of researchers participating in the 15th European Conference on Cyber Warfare and Security (ECCWS 2016) which is being hosted this year by the Universitat der Bundeswehr, Munich, Germany on the 7-8 July 2016. ECCWS is a recognised event on the International research conferences calendar and provides a valuable plat-form for individuals to present their research findings, display their work in progress and discuss conceptual and empirical advances in the area of Cyberwar and Cyber Security. It provides an important opportunity for researchers and managers to come together with peers to share their experiences of using the varied and ex-panding range of Cyberwar and Cyber Security research available to them. With an initial submission of 110 abstracts, after the double blind, peer review process there are 37 Academic research papers and 11 PhD research papers, 1 Master's research paper, 2 Work In Progress papers and 2 non-academic papers published in these Conference Proceedings. These papers come from many different coun-tries including Austria, Belgium, Canada, Czech Republic, Finland, France, Germany, Greece, Hungary, Ireland, Kenya, Luxembourg, Netherlands, Norway, Portugal, Romania, Russia, Slovenia, South Africa, Sweden, Turkey, UK and USA. This is not only highlighting the international character of the conference, but is also promising very interesting discussions based on the broad treasure trove of experience of our community and partici-pants. |
gartner magic quadrant privacy management: Exploring Cyber Criminals and Data Privacy Measures Mateus-Coelho, Nuno, Cruz-Cunha, Manuela, 2023-09-07 In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students. |
gartner magic quadrant privacy management: Security and Privacy in Communication Networks Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang, 2018-04-24 This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. |
gartner magic quadrant privacy management: Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management Shen, Yushi, 2013-11-30 Cloud computing is becoming the next revolution in the IT industry; providing central storage for internet data and services that have the potential to bring data transmission performance, security and privacy, data deluge, and inefficient architecture to the next level. Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management discusses cloud computing as an emerging technology and its critical role in the IT industry upgrade and economic development in the future. This book is an essential resource for business decision makers, technology investors, architects and engineers, and cloud consumers interested in the cloud computing future. |
gartner magic quadrant privacy management: Data Protection from Insider Threats Elisa Bertino, 2012 The problem of how to protect data from theft and misuse is at the forefront of organisations' minds. Even though data security techniques are available to protect data and computing infrastructures, many such techniques are unable to protect data from attacks posed by those working on an organisation's inside. This book discusses techniques that can provide effective protection against attacks posed by people working on the inside of an organisation. |
gartner magic quadrant privacy management: Information Security and Privacy Research Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou, 2012-06-06 This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation. |
gartner magic quadrant privacy management: ICT Systems Security and Privacy Protection Sabrina De Capitani di Vimercati, Fabio Martinelli, 2017-05-17 This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks. |
gartner magic quadrant privacy management: Effective Cybersecurity William Stallings, 2018-07-20 The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources. Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. • Understand the cybersecurity discipline and the role of standards and best practices • Define security governance, assess risks, and manage strategy and tactics • Safeguard information and privacy, and ensure GDPR compliance • Harden systems across the system development life cycle (SDLC) • Protect servers, virtualized systems, and storage • Secure networks and electronic communications, from email to VoIP • Apply the most appropriate methods for user authentication • Mitigate security risks in supply chains and cloud environments This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable. |
gartner magic quadrant privacy management: Computational Intelligence for Privacy and Security David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste, 2012-01-10 The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security. |
gartner magic quadrant privacy management: Mobile Platform Security N. Asokan, Lucas Davi, Alexandra Dmitrienko, 2022-05-31 Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners. |
gartner magic quadrant privacy management: Advanced Multimedia and Ubiquitous Engineering James J. (Jong Hyuk) Park, Han-Chieh Chao, Hamid Arabnia, Neil Y. Yen, 2015-07-16 This volume brings together contributions representing the state-of-the-art in new multimedia and future technology information research, currently a major topic in computer science and electronic engineering. Researchers aim to interoperate multimedia frameworks, transforming the way people work and interact with multimedia data. This book covers future information technology topics including digital and multimedia convergence, ubiquitous and pervasive computing, intelligent computing and applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, human-centric computing and social networks, adaptive and context-aware computing, security and trust computing and related areas. Representing the combined proceedings of the 9th International Conference on Multimedia and Ubiquitous Engineering (MUE-15) and the 10th International Conference on Future Information Technology (Future Tech 2015), this book aims to provide a complete coverage of the areas outlined and to bring together researchers from academic and industry and other practitioners to share their research ideas, challenges and solutions. |
gartner magic quadrant privacy management: Evidence-Based Cybersecurity Pierre-Luc Pomerleau, David Maimon, 2022-06-23 The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals' and organizations' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies in the wild have been dismissed in the process of encouraging innovation and marketing. Consequently, governmental organizations, public, and private companies allocate a considerable portion of their operations budgets to protecting their computer and internet infrastructures without understanding the effectiveness of various tools and policies in reducing the myriad of risks they face. Unfortunately, this practice may complicate organizational workflows and increase costs for government entities, businesses, and consumers. The success of the evidence-based approach in improving performance in a wide range of professions (for example, medicine, policing, and education) leads us to believe that an evidence-based cybersecurity approach is critical for improving cybersecurity efforts. This book seeks to explain the foundation of the evidence-based cybersecurity approach, review its relevance in the context of existing security tools and policies, and provide concrete examples of how adopting this approach could improve cybersecurity operations and guide policymakers' decision-making process. The evidence-based cybersecurity approach explained aims to support security professionals', policymakers', and individual computer users' decision-making regarding the deployment of security policies and tools by calling for rigorous scientific investigations of the effectiveness of these policies and mechanisms in achieving their goals to protect critical assets. This book illustrates how this approach provides an ideal framework for conceptualizing an interdisciplinary problem like cybersecurity because it stresses moving beyond decision-makers' political, financial, social, and personal experience backgrounds when adopting cybersecurity tools and policies. This approach is also a model in which policy decisions are made based on scientific research findings. |
gartner magic quadrant privacy management: The Handbook of Board Governance Richard Leblanc, 2024-03-20 Explore the practical realities of corporate governance in public, private, and not-for-profit environments In the newly revised third edition of The Handbook of Board Governance: A Comprehensive Guide for Public, Private and Not for Profit Board Members, award-winning professor and lawyer Dr. Richard Leblanc delivers a comprehensive overview of all relevant topics in corporate governance. Each chapter is written by a subject matter expert working in academia or industry and illuminates a different area of board governance: value creation and the strategic role of the Board, risk governance and oversight, board composition and diversity, the role of the board chair, blind spots and trendspotting in the boardroom, audit committee efficacy, and more. This latest edition contains updated coverage of a wide variety of key topics, including: Governing, auditing, and working from home, as well as conducting virtual and hybrid meetings New and necessary skillsets for directors, including contemporary environmental, social, and governance considerations for firms Diversity, equity, and inclusion issues impacting boards and firms, as well as the risks posed by corruption, organized crime, and cyber-crime An essential resource for board members and directors of organizations of all kinds, The Handbook of Board Governance is also an important source of information for managers and executives seeking greater understanding of the role of the board in the day-to-day and long-term management of a modern firm. |
gartner magic quadrant privacy management: Economics of Information Security and Privacy Tyler Moore, David Pym, Christos Ioannidis, 2010-07-20 The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference. |
gartner magic quadrant privacy management: Business Web Strategy: Design, Alignment, and Application Al-Hakim, Latif, 2008-11-30 This book addresses the gap in business Web strategy through a collection of concentrated managerial issues, gathering the latest theoretical frameworks, case studies, and research pertaining to maximizing the power of the Web--Provided by publisher. |
gartner magic quadrant privacy management: Research Anthology on Artificial Intelligence Applications in Security Management Association, Information Resources, 2020-11-27 As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research. |
gartner magic quadrant privacy management: Securing the Virtual Environment Davi Ottenheimer, Matthew Wallace, 2012-04-23 A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations Accompanying DVD includes hands-on examples and code This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats. |
gartner magic quadrant privacy management: Information and Communication Technologies for Agriculture—Theme II: Data Dionysis D. Bochtis, Dimitrios E. Moshou, Giorgos Vasileiadis, Athanasios Balafoutis, Panos M. Pardalos, 2022-03-17 This volume is the second (II) of four under the main themes of Digitizing Agriculture and Information and Communication Technologies (ICT). The four volumes cover rapidly developing processes including Sensors (I), Data (II), Decision (III), and Actions (IV). Volumes are related to ‘digital transformation” within agricultural production and provision systems, and in the context of Smart Farming Technology and Knowledge-based Agriculture. Content spans broadly from data mining and visualization to big data analytics and decision making, alongside with the sustainability aspects stemming from the digital transformation of farming. The four volumes comprise the outcome of the 12th EFITA Congress, also incorporating chapters that originated from select presentations of the Congress. The first part of this book (II) focuses on data technologies in relation to agriculture and presents three key points in data management, namely, data collection, data fusion, and their uses in machine learning and artificial intelligent technologies. Part 2 is devoted to the integration of these technologies in agricultural production processes by presenting specific applications in the domain. Part 3 examines the added value of data management within agricultural products value chain. The book provides an exceptional reference for those researching and working in or adjacent to agricultural production, including engineers in machine learning and AI, operations management, decision analysis, information analysis, to name just a few. Specific advances covered in the volume: Big data management from heterogenous sources Data mining within large data sets Data fusion and visualization IoT based management systems Data Knowledge Management for converting data into valuable information Metadata and data standards for expanding knowledge through different data platforms AI - based image processing for agricultural systems Data - based agricultural business Machine learning application in agricultural products value chain |
gartner magic quadrant privacy management: Product Management in the Digital Era Srinivas Pingali, Shankar Prakash, Kiran Pedada, Jyothi R Korem, 2024-12-02 Consumer and industrial products have evolved significantly over the last century, from physical to virtual products, services, and hybrid products. Product management has had to change and adapt to the rapidly changing business environments. This textbook offers an in-depth look into the role, what the job entails, and what skills it requires. Product managers are required to manage the ideation, development, production, marketing, and distribution of a product. This book: highlights the content and skills required to be an effective product manager including strategy, marketing management, technology, project management, and design; provides frameworks for developing and executing effective strategies throughout the life cycle of a product with the help of case studies and examples; highlights the unique considerations and processes underpinning digital product creation; and explores marketing strategies including various channels for digital marketing and how product managers can use these effectively. Detailed and lucid, this book will be of interest to teachers and students of product management, brand management, management, and business studies. |
gartner magic quadrant privacy management: The Digital Supply Chain Bart L. MacCarthy, Dmitry Ivanov, 2022-06-09 The Digital Supply Chain is a thorough investigation of the underpinning technologies, systems, platforms and models that enable the design, management, and control of digitally connected supply chains. The book examines the origin, emergence and building blocks of the Digital Supply Chain, showing how and where the virtual and physical supply chain worlds interact. It reviews the enabling technologies that underpin digitally controlled supply chains and examines how the discipline of supply chain management is affected by enhanced digital connectivity, discussing purchasing and procurement, supply chain traceability, performance management, and supply chain cyber security. The book provides a rich set of cases on current digital practices and challenges across a range of industrial and business sectors including the retail, textiles and clothing, the automotive industry, food, shipping and international logistics, and SMEs. It concludes with research frontiers, discussing network science for supply chain analysis, challenges in Blockchain applications and in digital supply chain surveillance, as well as the need to re-conceptualize supply chain strategies for digitally transformed supply chains. |
gartner magic quadrant privacy management: Transformational Security Awareness Perry Carpenter, 2019-04-30 Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book. |
gartner magic quadrant privacy management: Integrating a Usable Security Protocol into User Authentication Services Design Process Christina Braz, Ahmed Seffah, Bilal Naqvi, 2018-11-08 There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle. |
gartner magic quadrant privacy management: ISSE 2004 — Securing Electronic Business Processes Sachar Paulus, Norbert Pohlmann, Helmut Reimer, 2013-11-11 This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004. |
gartner magic quadrant privacy management: Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics Khosrow-Pour, D.B.A., Mehdi, 2018-10-19 From cloud computing to data analytics, society stores vast supplies of information through wireless networks and mobile computing. As organizations are becoming increasingly more wireless, ensuring the security and seamless function of electronic gadgets while creating a strong network is imperative. Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data. This book is an important resource for information technology professionals, software developers, data analysts, graduate-level students, researchers, computer engineers, and IT specialists seeking modern information on emerging methods in data mining, information technology, and wireless networks. |
gartner magic quadrant privacy management: Records and Information Management, Second Edition Patricia C. Franks, 2018-10-10 As Information Management put it, On the strength of its currency and coverage alone, Franks' book is poised to take over as the recommended go-to reference for both students and RIM professionals for many years to come.” The new second edition cements this work’s status as an up-to-date classic, its content updated and expanded to address emerging technologies, most notably blockchain, and evolving standards and practices. Inside, Franks presents complete coverage of the records and information lifecycle model, encompassing paper, electronic (databases, office suites, email), and new media records (blogs, chat messages, and software as a service). Informed by an advisory board of experts in the field and with contributions by noted authorities, the text addresses such key topics as the origins and development of records and information;the discipline of information governance and developing a strategic records management plan;creation/capture and classification;retention strategies, inactive records management, archives, and long-term preservation;access, storage, and retrieval;electronic records and electronic records management systems;the latest on rapidly evolving technologies such as web records, social media, and mobile devices;vital records, disaster preparedness and recovery, and business continuity;monitoring, auditing, and risk management; andeducation and training. This book’s authoritative blend of theory and practice makes it a matchless resource for everyone in the archives and records management field. Instructor/trainer extras include a set of ready-to-go, customizable PowerPoint slides to accompany the text. Examination copies are available for instructors who are interested in adopting this title for course use. |
gartner magic quadrant privacy management: AI in Healthcare Robert Shimonski, 2021-01-27 The best source for cutting-edge insights into AI in healthcare operations AI in Healthcare: How Artificial Intelligence Is Changing IT Operations and Infrastructure Services collects, organizes and provides the latest, most up-to-date research on the emerging technology of artificial intelligence as it is applied to healthcare operations. Written by a world-leading technology executive specializing in healthcare IT, this book provides concrete examples and practical advice on how to deploy artificial intelligence solutions in your healthcare environment. AI in Healthcare reveals to readers how they can take advantage of connecting real-time event correlation and response automation to minimize IT disruptions in critical healthcare IT functions. This book provides in-depth coverage of all the most important and central topics in the healthcare applications of artificial intelligence, including: Healthcare IT AI Clinical Operations AI Operational Infrastructure Project Planning Metrics, Reporting, and Service Performance AIOps in Automation AIOps Cloud Operations Future of AI Written in an accessible and straightforward style, this book will be invaluable to IT managers, administrators, and engineers in healthcare settings, as well as anyone with an interest or stake in healthcare technology. |
gartner magic quadrant privacy management: E-Business Applications for Product Development and Competitive Growth: Emerging Technologies Lee, In, 2010-11-30 This book will serve as an integrated e-business knowledge base for those who are interested in the advancement of e-business theory and practice through a variety of research methods including theoretical, experimental, case, and survey research methods--Provided by publisher. |
gartner magic quadrant privacy management: PHealth 2017 B. Blobel, W. Goossen, 2017-05-05 Smart mobile systems such as microsystems, smart textiles, smart implants, sensor-controlled medical devices and innovative sensor techniques have become important enablers for telemedicine and next-generation health services, with social media and gamification adding further to personalized health (pHealth) as an eco-system. This book presents the proceedings of pHealth 2017, the 14th in a series of international conferences for personalized health held in Eindhoven, the Netherlands, in May 2017. The conference series, which began in 2003 as a dissemination activity in the framework of a European project on wearable micro and nano technologies for personalized health, presents advances in wearable or implantable micro-, nano- and bio-technologies for healthcare and wellness, and brings together expertise from medical, technological, political, administrative, and social domains, and even from philosophy and linguistics. The book contains keynotes and invited papers, as well as 16 oral presentations and 8 poster presentations. Encompassing diverse fields such as medical services, public health, prevention, social and elderly care, wellness and personal fitness, the book will be of interest to practitioners from various medical and health disciplines, as well as developers and administrators, provider institutions, and patient and citizens representatives. |
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业中,Gartner发布的IT评 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔力象限”即 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业、友善的社区 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商技术能力评定 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响 …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原因,简单来说是 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据对未知威胁和 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的厂商官网上, …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业、友善的社区 …
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业中,Gartner …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔力 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …