1,349 Hits in 13.7 sec

Quantifying the yield of risk-bearing IT-portfolios

R.J. Peters, C. Verhoef
2008 Science of Computer Programming  
We argued that these information-rich characterizations support decision makers in taking calculated risks, and provided insight in how to address IT-specific risks and what such risk mitigation may cost  ...  We proposed a method to quantify the yield of an IT-investment portfolio in an environment of uncertainty and risk.  ...  Furthermore, we like to thank a number of organizations that will remain anonymous for discussions on the value of their IT-investment portfolios.  ... 
doi:10.1016/j.scico.2007.11.001 fatcat:eokwc76g7bfptmjpmfzorc4nwe

Reading Between the Lines: Ben Morea on Anarchy, Radicalism, and Revolution

Breanne Fahs
1969 Left history  
There are people who thought it was a failure, but it was not a failure. It's just that they're a failure because they can't see how to go forward and what to do next.  ...  We should be embracing it. Instead, we don't know what to do with it. We're confused. "Who really controls it?," they keep saying. The truth is, nobody controls it, and that's the beauty of it.  ... 
doi:10.25071/1913-9632.38497 fatcat:eutfgykxs5b4ndk7gubyaqqg6m

Embedding Strategic Agility

Yves L. Doz, Mikko Kosonen
2010 Long range planning  
To organize our argument we borrow the three main dimensions of the strategic agility framework presented in our earlier work, and develop corresponding vectors of leadership actions, each of which can  ...  We propose a repertoire of concrete leadership actions enabling the meta-capabilities needed to accelerate the renewal and transformation of business models.  ...  Acknowledgements We thank the editors Charles Baden-Fuller and Ian C. MacMillan for their invitation to contribute to this Special Issue and for their advice and encouragement during the process.  ... 
doi:10.1016/j.lrp.2009.07.006 fatcat:uxs3jbqnrbcw5m6p2fjfubhgeu

Reconciling Multiple Objectives – Politics or Markets? [chapter]

Ross Anderson, Khaled Baqer
2017 Lecture Notes in Computer Science  
At the deepest level, security protocols determine the power structure of a system: who can do what with whom.  ...  They play a key role in innovation: early movers may use protocols to establish a strategic advantage and lock competitors out. How can we understand such complex behaviour?  ...  Acknowledgements We are grateful to Johannes Bauer, Thomas Maillart, Barbara Kordy, Gabriele Lenzini and Sebastian Pape for the discussions at Schloss Dagstuhl referred to in section 2, and to workshop  ... 
doi:10.1007/978-3-319-71075-4_17 fatcat:n6z75b34ufbkhdfckp6pey4r6y

The Other Hand: High Bandwidth Development Policy

Ricardo Hausmann
2008 Social Science Research Network  
Much of development policy has been based on the search for a short to do list that would get countries moving.  ...  In the latter case, economists agree that this process cannot be achieved through central planning and that the invisible hand of the market is the right approach, because it allows decisions to be made  ...  Do we also need to have a New Zealand that the rest can copy?  ... 
doi:10.2139/ssrn.1314799 fatcat:llj7ofy5zjagdmjv5nqvntsdf4

Through a PRISM Darkly: Surveillance and Speech Suppression in the 'Post-Democracy Electronic State'

David Barnhizer
2013 Social Science Research Network  
We can certainly do the data gathering and snooping on everyone and everything. We can "collect". We can "store". We can do some interpretation.  ...  One need only and "What can YOU do for ME?" The system is not amusing but it is a joke.  ... 
doi:10.2139/ssrn.2328744 fatcat:ybzxi7bdpndglimvwbgzvmqwsa

Taming Pandemics in International Relations

Beatrice de Graaf
2020 Journal of Applied History  
The question at stake is: under what conditions did leaders (and their governments) engage in international cooperation to deal with the transboundary crisis at hand, and how did this cooperation impact  ...  the current obstacles to international cooperation in Covid-19 times.  ...  I would also like to express thanks for the inspiration that I drew (and still am drawing) from the cooperation with Lotte Jensen, Rina Knoeff and Catrien Santing on the Applied History Manifesto.  ... 
doi:10.1163/25895893-bja10011 fatcat:bxzpaynu7fbnfecxg33oftabji

Net neutrality - How relevant is it to Australia?

James Endres
2009 Telecommunications Journal of Australia  
ACKNOWLEDGEMENTS Portions of this essay come from earlier testimony before the U.S. Congress. I would like to thank Derek Slater, Carolyn Dalton, and Rick Whitt at Google for their assistance.  ...  ACKNOWLEDGEMENTS The authors benefited from generous assistance from colleagues and interns including Alana Maurushat, Reg Leones, Adam Arnold and Joanna Chow.  ...  We have them. Now what they would like to do is use my pipes free, but I ain't going to let them do that because we have spent this capital and we have to have a return on it.  ... 
doi:10.2104/tja09022 fatcat:iyhfeahrmverdoaskclswtokx4

Freedom to Hack

Ido Kilovaty
2017 Social Science Research Network  
These threats are manifestations of externalities primarily resulting from a market failure in the Internet of Things industry, in which vendors do not have an incentive to implement reasonable security  ...  The proliferation of Internet-connected smart devices (the "Internet of Things") has become a major threat to privacy, user security, Internet security, and even national security.  ...  For an illustration of how white hats are improving the security of the broader Internet infrastructure, we can look to Mike Lynn, a security researcher then affiliated with Internet Security Systems,  ... 
doi:10.2139/ssrn.3035518 fatcat:ehta5rnuzfdl5o376vt6y2gb6a

Lessons from the Air Campaigns over Libya, Syria, and Yemen

Ben Nimmo
2016 Parameters  
As such, it is vital for the military to factor them into planning and to communicate them to political leaders. The five key lessons are: 1.  ...  Planners and politicians must acknowledge hostile targets will evolve over time, and it is impossible to prevent civilian casualties entirely.  ...  However, one factor can, and should, immediately be brought into the military planning process, and that is the question of how, and to what extent, combat camera footage should be made public.  ... 
doi:10.55540/0031-1723.2826 fatcat:2ctj27isgrfmdkyywdd2ediq54

Ambiguity, Children, Representation, and Sexuality

Catharine Lumby
2010 CLCWeb  
At times like these, the child-molesting monster can be counted on to creep from the rubble" (29).  ...  is much more regularity, much more constraint, in what we can see than we suppose" (391).  ... 
doi:10.7771/1481-4374.1673 fatcat:7tvvu5iedba67bbqw3ljqdqcfu

A Disinformation-Misinformation Ecology: The Case of Trump [chapter]

Thomas J. Froehlich
2020 Fake News Is Bad News - Hoaxes, Half-truths and the Nature of Today's Journalism [Working Title]  
It then explains how these factors sustain the variety and motivations of Trump supporters' commitment to Trump.  ...  This paper looks at the conflation of knowledge and beliefs in partisan minds, how beliefs lead to self-deception and social self-deception and how they reinforce one another.  ...  we can do.  ... 
doi:10.5772/intechopen.95000 fatcat:cvwhwajgkbgvvlxm435ytp5tiu

Two bits: the cultural significance of free software

2008 ChoiceReviews  
I asked Sean what he meant. We can do as we damn well please, and we're so big that you can't stop us. So I view it as Evil in that way. I mean they obviously have the talent to do it.  ...  to room after room of Netscape employees and managers how free software worked, and what we had to do to make it work." 10 For Zawinski, the decision was both a chance for Netscape to return to its glory  ...  What they mean by 'open systems' is that you can mix and match components, so you can decide to have, say, a Sun chain on your right leg and some other company's chain on your left leg, and maybe some  ... 
doi:10.5860/choice.46-2158 fatcat:jtxrurovzvexbm7lslgffroqem

The Failure of Project Eyeball: A Case of Product Overpricing or Market Overcrowding?

Marc Edge
2004 JMM - The International Journal on Media Management  
The experiment obviously failed, but according to Tham it was deemed a necessary gamble by SPH. We took a chance. We just had to do it, because there was also competition.  ...  ) According to the Business Times, however, the talks broke down because of MTG's failure, as a foreign firm, to secure a newspaper license (Ong, 2000) .  ... 
doi:10.1207/s14241250ijmm0601&2_13 fatcat:ubj2l5xoyfd67e7phecizo2z2y

The public domain: enclosing the commons of the mind

2009 ChoiceReviews  
I can hope to in a single chapter.  ...  The new incarnation of the project, at UCLA, has removed the word "plagiarism" from its title. The People and the Music A brief biography of Will Lamartine Thompson can be found in C. B.  ...  If there were "fixes," it is important to know if they can be replicated. So were there mistakes? If so, have they been fixed, and how?  ... 
doi:10.5860/choice.46-6473 fatcat:xnktaofvfvb3fhdngfjgq2ph74
« Previous Showing results 1 — 15 out of 1,349 results