Organizations that strategically select, manage, and deploy digital business models prosper in the global economy.

Week 12 Assignment

Case:

CareGroup (Last case)

Articles:

Eisenmann, C. (October 2009). When Hackers Turn to Blackmail. Harvard Business Review. WhenHackersBlackmail(Eisenmann)

Olavsrud, T. (August 15, 2012). How to Secure Data by Addressing the Human Element. CIO. http://www.cio.com/article/713753/How_to_Secure_Data_by_Addressing_the_Human_Element

Chuvakin, A. (May 16, 2007). Incident Management in the Age of Compliance. Computerworld. http://www.computerworld.com/s/article/print/9019559/Incident_management_in_the_age_of_compliance?taxonomyName=Security&taxonomyId=17

Chuvakin, A. (July 16, 2007). Log Management in the Age of Compliance. Computerworld. http://www.computerworld.com/s/article/9027080/Log_management_in_the_age_of_compliance

Leave a Reply

Recent Comments
Calendar
November 2014
M T W T F S S
 12
3456789
10111213141516
17181920212223
24252627282930