Crypto-currencies (or digital currencies) have gained popularity in the recent few years, conside... more Crypto-currencies (or digital currencies) have gained popularity in the recent few years, considering its young existence of six years. Crypto-currencies are simply enabling means to transact in the virtual space globally without the need of intermediaries and third parties. It is built on the “Blockchain” technology, which provides an innovative means of transfer. This paper investigates crypto-currencies, its underlying technology, and the motivation of its development and adoption. It further takes the next step in evaluating consumer’s mindsets around crypto-currencies utilizing the patented IdeaMap® and RDE methods to identify the most influencing characteristics of crypto-currencies. Three distinct segments were identified, where each segment is concerned with discrete elements involving cost, privacy, and accessibility. It concludes that the creation of new services and applications will drive widespread adoption of digital currencies.
The change in IT networks in the recent years has changed the role, definition and the scope of s... more The change in IT networks in the recent years has changed the role, definition and the scope of skills and responsibilities of a CISO. This paper provides an overview of the changing environments and the current state of a CISO. The paper presents the first 90 days plan of a CISO crucial to determine the success of a new CISO at the organization. The 90 days plan consists of five phases: Preparation, Assessment, Planning, Execution and Measurement. Each phase includes multiple steps and recommends a set of actions a CISO may perform. It is recommended that the five phases plan is the minimum requirement to achieve success in the position of a CISO today.
Securing data has become a global challenge. Data breaches have been reported in an increasing ra... more Securing data has become a global challenge. Data breaches have been reported in an increasing rate. The first large-scale credit card attack against TJX Companies Inc. was exposed on 2007. Intruders compromised customers’ personal credit and debit card numbers. In 2013, with advance credit card security practices, Target’s Point of Sale system was compromised, stealing more than 40 million accounts. This paper reviews the growing challenges of retailers to keep up with Payment Card Industry Data Security Standards, and the possible use of practical solution, in today’s times, to secure cardholder data at every point in the transaction life cycle: Data in use, Data in transit, and Data at rest.
In recent years, innovation has been coming from places we least expected of. MNCs headquarters a... more In recent years, innovation has been coming from places we least expected of. MNCs headquarters are no longer the primary source for creating innovation. Globalization has enabled firms to expand their businesses overseas and strategize competitive advance through its global subsidiaries. In the nexus of innovation, valuable knowledge can be generated at any level of the MNCs, in particular at local levels. As firms became global, it has become challenging for MNCs to mobilize knowledge generated at local units. This paper advocates for the role of regional offices as knowledge mobilizers. Regional offices act as “knowledge brokers” for diffusing innovation generated locally to other locations within the MNCs. It outlines a mechanism of local-to-global innovation cycle, which includes: knowledge identification, knowledge extraction, and knowledge diffusion.
Advancement of digital technology allows a rapid communication between the customer and the compa... more Advancement of digital technology allows a rapid communication between the customer and the company, which plays a truly important role in any company’s multi-channel marketing strategy. The increasing human social activities on the web influenced professionals and organizations to implement marketing strategies adopting Social Networking Sites (SNS). In particular, Small and Medium Enterprises (SMEs) utilize social media tools to reach their target audiences. This paper focuses on how Small and Medium Enterprises (SMEs) can benefit from efficiently using Social Networking Sites (SNS) tools to achieve marketing goals and objectives. It aims to point out the benefits and impacts of networking sites on small and medium enterprises (SMEs) along with the challenges some businesses face in adopting SNS strategies.
Crypto-currencies (or digital currencies) have gained popularity in the recent few years, conside... more Crypto-currencies (or digital currencies) have gained popularity in the recent few years, considering its young existence of six years. Crypto-currencies are simply enabling means to transact in the virtual space globally without the need of intermediaries and third parties. It is built on the “Blockchain” technology, which provides an innovative means of transfer. This paper investigates crypto-currencies, its underlying technology, and the motivation of its development and adoption. It further takes the next step in evaluating consumer’s mindsets around crypto-currencies utilizing the patented IdeaMap® and RDE methods to identify the most influencing characteristics of crypto-currencies. Three distinct segments were identified, where each segment is concerned with discrete elements involving cost, privacy, and accessibility. It concludes that the creation of new services and applications will drive widespread adoption of digital currencies.
The change in IT networks in the recent years has changed the role, definition and the scope of s... more The change in IT networks in the recent years has changed the role, definition and the scope of skills and responsibilities of a CISO. This paper provides an overview of the changing environments and the current state of a CISO. The paper presents the first 90 days plan of a CISO crucial to determine the success of a new CISO at the organization. The 90 days plan consists of five phases: Preparation, Assessment, Planning, Execution and Measurement. Each phase includes multiple steps and recommends a set of actions a CISO may perform. It is recommended that the five phases plan is the minimum requirement to achieve success in the position of a CISO today.
Securing data has become a global challenge. Data breaches have been reported in an increasing ra... more Securing data has become a global challenge. Data breaches have been reported in an increasing rate. The first large-scale credit card attack against TJX Companies Inc. was exposed on 2007. Intruders compromised customers’ personal credit and debit card numbers. In 2013, with advance credit card security practices, Target’s Point of Sale system was compromised, stealing more than 40 million accounts. This paper reviews the growing challenges of retailers to keep up with Payment Card Industry Data Security Standards, and the possible use of practical solution, in today’s times, to secure cardholder data at every point in the transaction life cycle: Data in use, Data in transit, and Data at rest.
In recent years, innovation has been coming from places we least expected of. MNCs headquarters a... more In recent years, innovation has been coming from places we least expected of. MNCs headquarters are no longer the primary source for creating innovation. Globalization has enabled firms to expand their businesses overseas and strategize competitive advance through its global subsidiaries. In the nexus of innovation, valuable knowledge can be generated at any level of the MNCs, in particular at local levels. As firms became global, it has become challenging for MNCs to mobilize knowledge generated at local units. This paper advocates for the role of regional offices as knowledge mobilizers. Regional offices act as “knowledge brokers” for diffusing innovation generated locally to other locations within the MNCs. It outlines a mechanism of local-to-global innovation cycle, which includes: knowledge identification, knowledge extraction, and knowledge diffusion.
Advancement of digital technology allows a rapid communication between the customer and the compa... more Advancement of digital technology allows a rapid communication between the customer and the company, which plays a truly important role in any company’s multi-channel marketing strategy. The increasing human social activities on the web influenced professionals and organizations to implement marketing strategies adopting Social Networking Sites (SNS). In particular, Small and Medium Enterprises (SMEs) utilize social media tools to reach their target audiences. This paper focuses on how Small and Medium Enterprises (SMEs) can benefit from efficiently using Social Networking Sites (SNS) tools to achieve marketing goals and objectives. It aims to point out the benefits and impacts of networking sites on small and medium enterprises (SMEs) along with the challenges some businesses face in adopting SNS strategies.
Uploads