Commentary--As the CIO of a flourishing business, you are happy to report that current information projects are going well. The new call center is up and running, the new data warehouse is online, and ...
The DoD defines the information environment as the “aggregate of social, cultural, linguistic, psychological, technical, and physical factors that affect how humans and automated systems derive ...
Small-business owners use their personal ideas to launch their businesses. Then, they use their judgment and input from people they trust to grow their companies. However, as businesses grow, owners ...
In last month’s column, I introduced the concept of intelligent information — the intelligent management of information as a critical (although intangible) corporate asset. With intelligent ...
Bloomfire reports on 6 key knowledge management trends for 2026, emphasizing dynamic collective intelligence as a strategic asset.
The tools, industry-specific data models and blueprints are designed to help businesses take the first step toward developing a unified approach to identifying, accessing and using information as a ...
Approval and sponsorship for an information security strategy is only the beginning. Implementation of the strategy is when risk is truly mitigated, and applying these five principles is vital to ...
Objective 1.1: Enhance organizational structures and resources through IT unification, talent investment, and planning. Strategy 1.1.1: Define and secure the proper organizational alignment of IT to ...
Continual innovation of digital products and platforms requires strategic alignment of information technology to ensure a firm's success. Today, successful organizations rely on leadership from ...
A version of this article appeared in the Autumn 2019 issue of strategy+business. The entire ethos of the Spanish hotel chain Ilunion is built on innovation, and its most powerful tool for solving ...
Goal 1: Cyber risk from threats is reduced. Goal 2: Campus is aligned on risk tolerance and risk treatment. Goal 3: Campus IT users understand and fulfill their information security responsibilities.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results