When Getting Their Attention Isn’t Enough… When You Need Behavioral Change
From Bill Jensen’s decades long research on strategic change and communications he has derived clear actionable components for communicating behavioral change to employees.
From Bill Jensen’s decades long research on strategic change and communications he has derived clear actionable components for communicating behavioral change to employees.
In his article Marc Solomon explores how CI/BI researchers, investigators and law librarians, on a personal level, can identify and come to terms with blindspots in the context of performing complex, time sensitive work.
David Dibble, an expert in systems-based sustainable organizational performance improvement, contrasts contributors to under-performing or failed Six Sigma and Lean programs with the Systems-Based Transformational Leadership Model (STL).
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: 2019 Internet Crime Report Released; The silent threat of the coronavirus: America’s dependence on Chinese pharmaceuticals; Equifax breach: How Chinese army hackers allegedly stole personal info; and How to Share Files Securely Online: Dropbox, Firefox Send, and More.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: DHS Buys Phone Location Data, Skirting Fourth Amendment; Report: DMVs Sell Your Personal Information For Millions Of Dollars; The California Consumer Privacy Act explained; and IRS Launches “Identity Theft Central” Webpage.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Ring Doorbell App Packed with Third-Party Trackers; How Corporate Lawyers Made It Harder to Punish Companies That Destroy Electronic Evidence; Jeff Bezos Phone Hacking – WhatsApp Hack – Is WhatsApp Safe?; and 8 cities that have been crippled by cyberattacks — and what they did to fight them.
Articles and Columns for January 2020 Competitive Intelligence – A Selective Resource Guide – Updated January 2020 – Sabrina I. Pacifici has completely revised and updated her guide, which she first published in 2006 and has updated regularly since that time. A wide range of free and low cost sites with expertly sourced content specific …
This guide by legal tech expert Catherine (Sanders) Reach is a must-read for every Outlook user seeking to implement value added features and functions that are currently underused, or not used at all. Many of us spend a good portion of our day in Outlook, receiving and responding to email, sending and filing attachments, scheduling appointments, responding to meetings, and updating contacts. Sanders Reach identifies key shortcuts, tools and techniques already built into application, as well as third-party add-ins, to help manage your communications much more effectively.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: How Do People Decide Whether to Trust a Photo on Social Media?; Microsoft discloses security breach of customer support database; NIST Releases Privacy Framework; Apple complies with 90% of US government requests for customer data.
The KKR investment firm is buying OverDrive, the biggest library ebook company, providing ebooks and audiobooks to 43,000+ libraries and schools in 75 countries – from Rakuten, also owner of the Kobo ereader, audiobook and ebook business. As the number of e-book publishers and ereaders continues to shrink, David H. Rothman asks, “do we really want to trust digital libraries to KKR on issues ranging from access to reliable digital preservation.”