Privacy & Security
- Page 1 of 2.
- next »
-
Secure for “Your Own Good!”
Cumbersome Security Measures Create Difficult Customer Experiences
by Ronni MarshakBank of America doesn’t streamline customers’ address changes across BoA product lines. Comcast sets long, arbitrary router passwords and discourages customers from changing them—using “security” as a flimsy excuse. -
The Customer Revolution Is Coming Back!
Customers Are on the Cusp of Retaking Control Over the Big Things that Impact Their Lives
by Patricia SeyboldThe next customer revolution is upon us. We will regain control of things that matter most in our lives: our government, our financial well-being, our health, our jobs, our privacy, and our access to the Internet. -
Where Are Your Clouds? Location Matters!
Why Your Customer Data Belongs in the Cloud and Why You Need to Control Jurisdiction
by Patricia SeyboldCompanies of all sizes are taking advantage of cloud computing. A lot of customer information is hosted in clouds. But personally identifiable information needs to be housed in the customer’s home country. Customer clouds should be country-specific. -
Priorities for Microsoft’s New CEO
Focus on Cross-Platform Mobile Application Development & Customer Clouds
by Patricia SeyboldOpen Letter from Patty Seybold to Satya Nadella, Microsoft’s new CEO, about what Microsoft’s strategy should be to save Microsoft’s bacon. -
Have We Consented to Government Surveillance?
Do Citizens, Residents, and People in Other Countries Have a Right to Privacy in the Digital Age?
by Patricia SeyboldEdward Snowden’s whistle-blowing on the NSA, and Glenn Greenwald’s documentation of the technologies and processes used, are a wake-up call for citizens who believe that their private communications should remain private. -
The Future of Computing
New Wealth Will Conform to Old Patterns
by Scott JordanScott Jordan considers the future of highly personal computing—computing on and around our person--and its relationship to the “new wealth,” in which privacy may be a luxury. -
Are You Tracking Your Customers’ Locations on Their Mobile Phones?
Marketers Beware: Customers Don’t Want Their Locations to Be Tracked and Monitored
by Patricia SeyboldDo you know where you are? Everyone else might! Today’s smartphones are tracking devices that also happen to make phone calls. Your mobile apps are probably tracking your location and sharing that information without your permission. -
How to Think About Privacy and Managing Your Online Identity
Use Your Head and Use Your Manners
by Peter HorneHow should you manage your online identity in an era in which all your communications and activities are being tracked both online and offline? -
Facebook’s Timeline: Seductive and Dangerous?
Applications Integrated into Timeline Track Everything that You and Your Friends Do
by Patricia SeyboldFacebook’s new Timeline is much more than a new user interface. It’s a seductive forced march designed to lead us all into a marketers’ nirvana in which our activities and life events are tracked. -
Unintended Risks of Using Facebook
Pay Attention to What Information, and Whose Information, You Are Sharing with Whom!
by Patricia SeyboldBe a good steward of your privacy and the privacy of your friends and family members on Facebook. Learn how applications are mining and analyzing your and your friends’ Facebook behavior and what you should know about those practices. -
How Does Google’s Privacy Policy Affect You?
It’s Time to Pay Attention to How Google Is Tracking Your Online Behavior
by Patricia SeyboldWhen Google announced a new unified Privacy Policy to go into effect on March 1, 2012, it caused people to stop and think about how much privacy they’re willing to trade for free search, email, YouTube, and other nifty services. -
What's Your Customer Cloud Strategy?
Twelve Customer Requirements to Include as Your Firm Migrates to Cloud Computing
by Patricia SeyboldA “customer cloud” is the virtual project space where your customers can securely access, keep track of, and manage the assets they’ve bought from you as well as any related projects in which they’re engaged. -
WikiLeaks Will Catalyze a Huge Data Security Backlash
Patty's Pioneers' Predictions for 2011
by Peter HorneReactions to WikiLeaks will cause massive capital investment in information security causing a significant stimulus to the IT industry in 2011. 2011 will also herald the beginning of major decline in freedom on the Web -
Facebook Tries to Clean Up Its Privacy Act
Can Facebook Users Really Expect Any Privacy Protections?
by Patricia SeyboldWill Mark Zuckerberg pay attention to customers' desire to control the information they share through applications that connect with the Facebook platform? -
Who "Owns" Your Medical Records
Whose Data Is It?
by Patricia SeyboldAn organization called Health Data Rights has published five principles for the basic human right to access and to understand your own healthcare data and information. -
IBM.com’s New Look: More Than a Face Lift
Using Service-Oriented Architecture to Provide an Adaptive Web Experience
by Patricia SeyboldIn June 2007, IBM launched its next-generation Web site and the framework IBM will use to provide a unified online experience across all IBM’s Web properties. This new site architecture and approach embodies a number of best practices. -
VP of Customer Intelligence
Patty's Dream Team: Roles and Responsibilities You'll Need for Your Customer-Centric Organization
by Patricia SeyboldThe first priority of your VP of customer intelligence should be to act as the custodian for the information that your customers care about. -
Instant Messaging @ Work
Key Policies and Practices for Leveraging IM in Business
by David MarshakIn this report, we discuss the key policies and practices businesses need to address in order to leverage instant messaging effectively. -
Three Steps to Success in Cross-Business Interactions
Coordination and Trust Will Enable You to Seize Web Service and Portal Opportunities, Reaping the Value While Containing the Risks
by Susan AldrichWeb Services and Portals can make it easier to do business, but you’ll need to plan for changes in relationship, trust, and system capabilities in order to take advantage of new opportunities. -
Securing Trading Partner Interactions: Two Approaches Supported by New Standards
Considering Federation or Automated Provisioning Standards? You'll Need Both
by Susan AldrichHow do you prepare for automated interactions with your partners? You’ll need to consider an extended approach to provisioning, an updated security infrastructure, and the implications of federation.
- Page 1 of 2.
- next »