Monthly Archives: August 2013

“Theft of Trading Code Is Alleged”

Proposed criminal indictment for theft of computer source code by employees from their employer. Wall Street Journal, August 26, 2013 C1. http://on.wsj.com/17ZoYl3 Criminal v. civil?

Leave a comment

Filed under Security, Uncategorized, Use, Value

“Colleges Set To Offer Exit Tests”

College seniors to be tested on their learning coming out of college.  Wall Street Journal, August 26, 2013 A1. http://on.wsj.com/1aJsjdp Will this be on the final exam?

Leave a comment

Filed under Knowledge Management, Privacy, Use, Value

“Emotion-recognition could be education’s future”

Software that recognizes moods based on facial recognition.  Houston Chronicle, August 26, 2013 B8. http://bit.ly/16G4ADe  Is monitoring student attention the highest and best use?

Leave a comment

Filed under Data quality, New Implications, Privacy, Use, Value

“Chemical accident data very skimpy”

Impossible to tell from government data how many serious chemical accidents similar to the explosion in West, TX, happened last year. Houston Chronicle, August 26, 2013 B3. http://bit.ly/18WwKNX  Why?

Leave a comment

Filed under Data quality, Knowledge Management, Records Management, Risk, Use, Value

“Thais rush to play down oil spill”

Oil from a burst pipeline flowed into the sea near Ko Samet, Thailand on July 27. Three weeks after tourism officials say everything okay, spill crews still active.  Houston Chronicle, August 25, 2013, A10. Information immediately after a crisis can be unreliable; consider the source.

Leave a comment

Filed under Business Continuity, Data quality, Risk

“Online university gaining popularity with working adults”

Houston Chronicle, August 24, 2013 http://bit.ly/14PiJ13

Leave a comment

Filed under IT, New Implications

“What Won’t the Hackers of the Future Do?”

A listing, some tongue-in-cheek, of what might be hacked.  Grandma’s photos? Wall Street Journal, August 24-25, 2013 C11. http://on.wsj.com/157M5xS  What else?  What controls are in place?

Leave a comment

Filed under Risk, Security

“Privacy Board Wants Data-Policy Revamp”

Privacy and Civil Liberties Oversight Board notes that NSA “hasn’t had attorney-general-approved guidelines [for collection techniques] since 1982.” Wall Street Journal, August 24-25, 2013, A2 http://on.wsj.com/13Zg5Wq  Would new policies and procedures fix this?

Leave a comment

Filed under Privacy, Requirements

“For Privacy, Firms Push Phone Texts”

Security-conscious companies prefer texting over encrypted email.  Wall Street Journal, August 23, 2013 B6.  Is the medium for message delivery the right one for the message content?  Does the medium have the right message permanence?

1 Comment

Filed under Risk, Security, Use

“Travelocity Teams Up With Expedia to Power Searches”

Two bitter rivals join forces to focus on their individual strengths.  Wall Street Journal, August 23, 2013, B5.  Macy’s and Gimbels sharing Santa Claus and HR?

Leave a comment

Filed under IT, New Implications, Ownership, Use