Articles

In most organisations, the records management team and the information security teams are separated, primarily because information security is seen as a technology function, and records management is not. But good records management requires effective security management, and good cybersecurity practice relies on appropriate recordkeeping. By considering the ways in which these two domains intersect, we can make the case for closer collaboration, if not connection, between these roles.

Auckland-based Rental & Property Management company Goode Rentals has solved a headache in data processing for water charges utilising a sophisticated capture solution from PSIGEN.

Remote working can be a blessing. More time with family, less commuting, and meetings from the comfort of your living room. But as millions across the world switch to working from home due to the COVID-19 pandemic, they may be putting the security and privacy of themselves, their families and their employers at risk.

"I can hardly wait for the next access certification review!" said no one—ever. But you can help turn this around with a well-managed identity governance and administration (IGA) program.

Today’s companies put huge efforts into negotiating the best terms with their suppliers. Procurement teams regularly spend weeks or months going back and forth on contract terms and volume discounts to get the most bang for their buck. Too often, these savings aren’t realized.

Is a taxonomy the same as a classification scheme or system? Or, to put it another way, is a classification system, such as the Dewey Decimal System, a kind of taxonomy? Both of these kinds of knowledge organization systems have the feature of arranging topical terms in a hierarchy of multiple levels, without having related-term relationships or necessarily synonyms/nonpreferred terms, which are features of thesauri. So, it appears as if the only difference is that classification systems have some kind of notation or alphanumeric code associated with each term, and taxonomies do not. The differences, however, are greater than that.

When we first attempted to define cognitive computing, we found clear differences between it and AI. We posited that for software to be considered a new type of computing - “cognitive,” it must solve problems that were insoluble today. This new class of problem has no precise answers. Instead, it is open to interpretation - it is ambiguous or has no one right answer that is amenable to computation.

Increasing amounts of data and its ability to support a competitive advantage has changed the way businesses function today. Enterprises can use data to improve operational efficiency, build brand reputation, mitigate risk and fraud, enhance the customer experience, and even boost revenue.

Fifty-eight percent of government CIOs faced organisational disruption during the past four years, according Gartner, Inc.’s 2020 global survey of CIOs. Fifty-two percent of respondents said they had also faced a funding shortfall in that same time frame. These figures are higher than those for all other industries.

Organizations are in a race to understand their risk from regulations for the protection and use of personal data, which are on the rise worldwide. With the GDPR in Europe, the CCPA in California, KVKK in Turkey, and several other regulatory actions being enacted around the world, corporations now face serious fiscal consequences and reputational damage that might follow a potential data breach.

Pages