World Leading Hi-Tech Research Defining World Leading Risk Management & Risk Analytics Practices
Global Risk Management Network, LLC, 757 Warren Road, Cornell Business and Technology Park, Ithaca, NY 14852-4892, U.S.A.

*Projects *Goldman Sachs *JP Morgan *Wall Street Hedge Funds *Princeton Quant Trading Talk *Model Risk Management *SR11-7 & OCC2011-12
*Research *Future of Finance *Bayesian vs. VaR *Markov Chain Monte Carlo Models *Cyber Finance *Future of Risk *Cyber Risk *Bitcoin Protocol
*
@brint.com e-Business and Business Technology Management Best Practices Research Center
"Contemporary Business Management Technology Issues..." - Wall Street Journal
300 Latest Articles on e-Business & BizTech Management
1,400 e-Business & BizTech Management Concepts
*
Business Technology Management Best Practices
This Site is Continuously Updated, Latest Update: Saturday, 05-Nov-2016 22:28:25 EDT
Working Knowledge: Think! Apply!
"The gambling known as business looks with austere disfavor upon the business known as gambling."
- Ambrose Bierce, The Devil's Dictionary
CIO.com - Security
  • Egypt's Tech Workers Stay Home As Turmoil Spreads
  • Europe Undertakes Privacy and Security Research
  • Conficker Working Group Says Worm is Stopped, but Not Gone
  • 5 Ways to Get Live Info About Egypt Protests Online
  • Former Salesforce.Com Execs Form New Security Company
  • Telecom Infrastructure Faces Daunting Risks, TATA CSO Says
  • Stuxnet Could have Caused "New Chernobyl," Russian Ambassador Says
  • IPhone-As-Wallet: What You Should Know Before Taking the Plunge
  • Expo Notes: the Biggest Trends on the 2011 Show Floor
  • 40 Search Warrants Executed As FBI Goes After 'Anonymous'
  • Technology news - CNNMoney.com
  • Ship relies on drone to avoid ice in Arctic waters
  • How Mark Zuckerberg lost $3 billion in one day
  • Emoji fans meet up to celebrate the tiny icons
  • Nintendo's tiny classic console is worth the hype
  • Google Capital is now an investor in Snapchat
  • Apple cuts prices on dongles after complaints
  • Good news, internet: web is getting more secure
  • Alaskan tribe uses gaming to keep culture alive
  • Musk gives clues to cause of SpaceX rocket blast
  • A history of presidential lies
  • Forbes - Personal Finance
  • How To Shift Your IRA Into A Roth IRA, And Save On Taxes
  • Can You Put a Price On Anthony Rizzo's Cubs 2016 World Series Last Out Baseball?
  • Have A New Baby? Here's How To Sign Up For Health Care Coverage
  • Leaving U.S. Over Election? Hiding Assets On Exit Is Criminal, Draws $100 Million Fine
  • What The Stock Market Wants This Election, And What You Should Do In Your Portfolio
  • Study Shows Public Help Racial Bias On The Right -- And Left
  • This Week In Credit Card News: Consumers Missing More Card Payments; Mobile Increasing Card Usage
  • Expecting The Worst On Election Day? Blame Evolution, Research Says
  • Study Shows Youth Isn't The Key To Making A Mark
  • 10 Smart Money Moves From Superstar Savers
  • CNET News
  • The 2018 Audi A5 Cabriolet drops the top on the tech-heavy A5 coupe - Roadshow
  • Elon Musk: Trump doesn't reflect well on the US - CNET
  • The American Dream: A VR game where you have guns for hands - CNET
  • Do online high schools make the grade? - CNET
  • ​Pining for VR video? Adobe's Project Clover could help - CNET
  • Is Tim Cook really Steve Ballmer 2.0? (Apple Byte Extra Crunchy, Ep. 62) - CNET
  • Tsunami of stars and gas keeps an 'eye' on the universe - CNET
  • Newly fashionable hardware controls aim to speed up Lightroom - CNET
  • Samsung to hobble Galaxy Note 7 charging in US with software - CNET
  • Uber settles 'Jane Doe' suit over alleged sexual assaults - CNET
  • CSOONLINE.com - Data Protection
  • Social engineering stories: The sequel
  • Symantec readies Norton for Android, IPhone
  • 44 million stolen gaming credentials found
  • Facebook announces new, simpler privacy controls
  • Code Security: A survival guide
  • McAfee to acquire Trust Digital
  • 'Tabnapping' Phishing Tactic Surfaces
  • A Daily Dashboard for security and business continuity
  • Social stupidity: Am I too social to be saved?
  • Arrogant lawyers: the greatest threat to your organization
  • CSOONLINE.com - Business Continuity
  • A Daily Dashboard for security and business continuity
  • Business continuity, not data breaches, a top concern for tech firms
  • What if the smart grid has stupid security?
  • Offshore banking more secure? You're dreaming
  • Super Duper Tabletop Disaster Scenarios
  • Travel Security: What to Pack to Survive a Natural Disaster
  • Massive Storms Don't Halt D.C. IT Ops
  • Disaster in Haiti: Advice for Employees and Operations on the Ground
  • SLIDESHOW: Chemical Safety Training
  • Chemical Spill Response: How Dow is Training Small Town America to Handle Hazmat Emergencies
  • CSOONLINE.com - Security Leadership
  • CSO Compass Award: Bruce Schneier
  • CSO Compass Award: Erin Jacobs
  • CSO Compass Awards 2010: Alan Nutes
  • The HacKid Conference: A kid-friendly idea whose time has come
  • CSO Compass Awards 2010: Richard Gunthner
  • CSO Compass Awards 2010: Leslie Lambert
  • Compass Awards 2010: The Art and Science of Security Leadership
  • CSO Compass Awards 2010: Roland Cloutier
  • Measuring the health of corporate security
  • Some states get it; some don't
  • CSOONLINE.com - Identity & Access
  • Data Mapping: Domesticating the Wild Rabbit
  • Biometrics: What, Where and Why
  • Free Lunch 2010: Why Public Algorithms Beat the Alternative
  • Take a Walking Tour of Your Company's Security
  • Groundhog Day: The Gartner IAM 2009 Event in Review
  • Top Microsoft Security Architect: Windows 7 Will Slash Malware
  • 6 Ways We Gave Up Our Privacy
  • Where Defense in Depth Falls Short
  • Defining Cloud Security: Six Perspectives
  • News Flash: Data Debauchery That Happens in Vegas Doesn't Stay There
  • Business Technology Management Best Practices
    Business Technology Management is the branch of management with focus on accelerating business performance through holistic and dynamic understanding of business management, business innovation, and business transformation. It is facilitated by creative use of new information and communication technologies.

    Organizational Learning and Knowledge Management
    Related Subject Portals: The KMNetwork   Knowledge Management Think Tank   Knowledge Management Tools and Technologies   Change Management   Knowledge Management   Intellectual Capital   Organizational Learning   Learning Organizations   Inquiring Organizations   Systems Thinking   Epistemology   Ontology   Philosophy and Technology   Philosophy of Science   Thomas Kuhn

    Business Process Reengineering and Business Process Innovation
    Related Subject Portals: BPR   Business Processes   Process Innovation   Reengineering   Balanced Scorecard   ERP   Enterprise Resource Planning   Enterprise Application Integration   Supply Chains   Value Chains   Workflows   Benchmarking   Best Practices   Process Improvement   Process Thinking   Six Sigma Quality   Quality Management   Total Quality Management   ISO 9000   Activity Based Costing   Continuous Quality Improvement   Kaizen

    Complexity Theory and Complex Systems
    Related Subject Portals: Complex Systems   Systems Thinking   Chaos Theory   Systems Dynamics   Adaptive Systems   Self Organization   Self Control   Autopoiesis   Autonomic Systems   Holonomic Systems   Nonlinear Dynamics   Complexity   Emergence   Fractals   Genetic Algorithms   Artificial Life   Complex Systems   Systems Thinking

    Electronic Commerce and Electronic Markets
    Related Subject Portals: e-Business   Electronic Commerce   Web Services   Small Business   Electronic Business   Electronic Markets   Electronic Payments   Process Reengineering   Knowledge Management   Customer Relationship Management   Supply Chain Management   Enterprise Resource Planning   Enterprise Application Integration   Internet   Intranets   Extranets   Enterprise Portals   Knowledge Portal   Application Service Providers   Managed Service Providers   Web Marketing   Internet Advertising   Online Services   Intellectual Property   Internet Security   Internet Privacy   Internet Law   Information Systems   Information Infrastructure   Wireless Internet   Data Management   Data Warehousing   Data Storage   Data Communications   RFID   ERP   CRM   EAI   OLTP   OLAP   WAP   Linux   XML   UDDI   P2P   B2B   B2C

    Intellectual Property, Law and Technology
    Related Subject Portals: Intellectual Property   Copyrights   Patents   Software Patents   Internet Patents   Trade Marks   Software Piracy   Copyright Infringement   Copyright Law   Patent Law   Trademark Law   Cyberspace Law   Internet Law   Computer Law   Trade Secrets  Fair Use   Digital Rights   Digital Assets   Digital Asset Management   Computer Fraud   Internet Fraud   Internet Abuse   Internet Scams   Internet Spam   Denial Of Service Attacks   Napster Law   File Sharing   Peer-to-Peer (P2P)

    Information Infrastructure: Policy, Security, and Privacy
    Related Subject Portals: Information Infrastructure   National Information Infrastructure   Global Information Infrastructure   e-Governance   Digital Governance  Internet Governance  e-Government  Digital Government  Information Policy   Internet Policy   Privacy Policy   Information Privacy   Internet Privacy   Internet Cookies   Information Security   Computer Security   Internet Security   Information Ethics   Computer Ethics   Internet Ethics   Internet Etiquette   Internet Trust   Internet Abuse   Internet Scams   Internet Economics   Internet Metering   Telecommunications Policy   Internet Regulation   Universal Access   Internet Law   Computer and Technology Law   Internet Crime   Computer Crime   Information Warfare   Internet Warfare   Cyber-Terrorism   Internet Terrorism   Intellectual Property   Virtual Communities

    Virtual Corporations, Virtual Communities, and, Outsourcing
    Related Subject Portals: Virtual Organization   Virtual Corporation   Virtual Enterprise   Virtual Office   Virtual Teams   Business Ecosystem   Virtual Communities   Communities of Practice   Telework   Telecommuting  Collaborative Learning   Collaborative Communication   Strategic Sourcing  Outsourcing   Insourcing   Application Service Provider (ASP)   Service Level Agreement (SLA)   Interorganizational Networks   Coopetition   Emergent Organization   Electronic Markets   Electronic Hierarchies   Electronic Brokerage   Electronic Auctions   Knowledge Exchanges   Transaction Costs   Coordination Costs

    Intranets, Extranets, and Enterprise Information Portals
    Related Subject Portals: Intranets   Extranets   Portals   Enterprise Portals   Enterprise Information Portals   Computer Supported Cooperative Work   Groupware   Collaborative Learning   Collaborative Communication   Collaborative Communication   Virtual Communities   Communities of Practice

    Medical Informatics, Information Technology, and, Healthcare
    Related Subject Portals: Healthcare   Healthcare Reform   Managed Care   HMO   Health Policy   Health Systems   Medical Informatics   Electronic Medical Record   Medical Records   Telemedicine   Medical Imaging   Healthcare Information Systems   Health Administration   Virtual Hospitals   Data Mining   Healthcare Industry   Healthcare Ethics   Patient Care   Healthcare Outcomes   Healthcare Quality   Ob-Gyn   Pediatrics   Trauma   Surgery   Neuroscience   Virology   Cancer   HIV-AIDS   Geriatrics   Disabilities

    Research Methods, Pedagogy, and Education
    Related Subject Portals: Knowledge Management   Education   Educational Technology   Distance Education   e-Learning   Training   Teaching   Teaching Portfolio   Testing   Classroom   Problem Solving   Learning   Thinking   Pedagogy   Andragogy   Constructivism   Constructionism   Peer Review   Scientific Writing   Technical Writing   Business Writing   Citation Styles   Research Journals   Scientific Journals   Digital Journals   Electronic Publishing   Copyrights   Fair Use   Plagiarism   Patents   Trade Marks   Trade Secrets   Theory   Scientific Inquiry   Research Methods   Research Design   Reliability and Validity   Game Theory   Information Theory   Grounded Theory   Delphi Method   Econometrics   Quantitative Research   Qualitative Research   Interpretive Research   Survey Research   Case Study Research   Action Research   Action Learning   Objectivism   Postmodernism   Hermeneutics   Humanism   Existentialism   Phenomenology   Transhumanism   Nihilism   Stoicism   Transdisciplinarity   Business Statistics   Statistical Methods   Decision Models   Psychometrics   Measurement Research   ANOVA   Regression Analysis   Nonparametric Statistics   Multivariate Statistics   Multidimensional Scaling   Data Mining   Structural Equation Modeling   Meta-Analysis

    Internet Web Strategy & Design
    Related Subject Portals: Information Infrastructure: Policy, Security, and Privacy   Intellectual Property, Law and Technology   History of Computers   History of Internet   Computing Glossaries   Webmaster Resources   Web Usability   Web Standards   Open Source Software   Web Scripts   Market Research   Internet User Surveys   Web Privacy   Domain Name Disputes   Internet Ethics   Internet Policy   Internet Privacy   Internet Security   Internet Etiquette   Internet Trust   Internet Abuse   Internet Scams

    International Business & Technology
    Related Subject Portals: World Research Portals On Frequently Asked Questions   Subject Portals on World Regions   Alphabetic Index of Countries   World Research Portals On Frequently Asked Questions   U.S. Newspapers   World Newspapers

    Business Technology Jobs & Careers
    Related Subject Portals: Chief Information Officer   Chief Technology Officer   Chief Knowledge Officer   Technology Careers   IT Careers   IT Salaries   IT Jobs   Labor Statistics   Salary Surveys   Relocation   Expatriates   Resumes   Job Interviews   Etiquette   Netiquette   Certifications   Associations   Societies   Education   Management   Strategy   Leadership   Human Resources   Business Technology   Knowledge Management   Information Systems   Organizational Learning   Learning Organizations   Systems Thinking

    Information Systems Research
    Related Subject Portals: Business Technology Research   e-Business Research   Knowledge Management Research   Information Systems   Operations Research   Decision Sciences   Management Science   Information Systems Research   Information Systems Theory   Information Systems Journals   Enterprise Architecture   IT Architecture   Data Architecture   Information Systems Evaluation   Capability Maturity Model   IT Spending   IS Quality   Information Systems Acceptance   IT Acceptance   IT Adoption   IT Diffusion   IT Productivity   IS Productivity   Information Technology ROI   Strategic Information Systems   Executive Information Systems   Decision Support Systems   Group Decision Support Systems   Management Information Systems   Transaction Processing Systems   Human Computer Interaction   Computer-Mediated Communication   Computer Supported Cooperative Work   Collaborative Computing   Information Resource Management   Data Management   Data Warehousing   Data Mining   Data Communications   Systems Theory   Information Theory   Systems Analysis   Systems Design   Object-Oriented Design   Object-Oriented Computing   Object-Oriented Systems   Joint Application Design   Rapid Application Development   Extreme Programming   Computer-Aided Software Engineering   Software Engineering   End User Computing   Informatics   Cybernetics   Artificial Intelligence   Expert Systems   Hypermedia   Multimedia   Other Topics in Computers and Information Technology

    Philosophy of Science, Society, and Technology
    Related Subject Portals: Aristotle   Francis Bacon   Auguste Comte   Confucius   René Descartes   John Dewey   Desiderius Erasmus   Paul K. Feyerabend   Michel Foucault   Georg Hegel   Martin Heidegger   Thomas Hobbes   David Hume   Edmund Husserl   William James   Immanuel Kant   Thomas Kuhn   Gottfried Leibniz   John Locke   Niccolo Machiavelli   Karl Marx   John Stuart Mill   Friedrich Nietzsche   Charles S. Peirce   Plato   Karl Popper   Jean Jacques Rousseau   Bertrand Russell   George Santayana   Jean Paul Sartre   John Searle   Adam Smith   Socrates   Spinoza   Wittgenstein

    Human Computer Interaction
    Related Subject Portals: Human Factors   Usability   Human Information Processing  Ergonomics   Repetitive Strain Injury   Cumulative Trauma Disorder   Repetitive Motion Injury   Graphical User Interface   Personal Information Management   Human Interaction Management   Computer Supported Cooperative Work   User-Centered Design   Ubiquitous Computing  

    e-Business and Electronic Commerce
    Concepts Applications and Industry Practices

    Key Concepts
    *
    e-Business * Electronic Commerce * Small Business
    * Electronic Business * Electronic Markets * Electronic Payments
    * Information Systems * Information Infrastructure * Wireless Internet
    * WAP * Linux * XML * UDDI * P2P

    Enterprise Applications
    * Process Reengineering * Knowledge Management
    * Customer Relationship Management * Supply Chain Management
    * Enterprise Resource Planning * Enterprise Application Integration
    * Sales Force Automation * Point-of-Sale Software
    * ERP * CRM * EAI
    * Transaction Processing * Analytical Processing

    Intranets, Extranets, Portals
    * Internet * Intranets * Extranets * Enterprise Portals * Knowledge Portal

    Service Providers
    * Application Service Providers * Managed Service Providers * Online Services

    Marketing and Advertising
    * Web Marketing * Internet Advertising * Interactive Marketing

    Law and Technology
    * Intellectual Property * Internet Security * Internet Privacy * Internet Law

    Data Storage and Data Communication
    * Data Management * Data Warehousing * Data Storage * Data Communications
    * Storage Area Networks * OLTP * OLAP

    Business Models and Business Strategy
    * Business Model * B2B * B2C * Business Ecosystem
    * Value Chain * Information Value Chain * Knowledge Chain
    * Virtual Corporation * Virtual Organization * Virtual Teams
    * Competitive Advantage * Business Strategy * Competitive Strategy

    Communication, Collaboration, and, Coordination
    * Enterprise Collaboration Management * Collaborative Learning
    * Calendaring and Scheduling * Chat Software * Chat Systems
    * Electronic Mail * Voice Mail * Faxing * Instant Messaging
    * Video Conferencing * Teleconferencing * Voice Conferencing * Data Conferencing
    * Electronic Meetings * Project Management * Workflow System

    Technology Architecture
    * Enterprise Architecture * Information Architecture * Data Architecture
    * Network Architecture * Electronic Commerce Architecture

    Authenticaion, Encryption,and, Personalization
    * Access Control * Authentication * Online Security * Encryption
    * Encryption Key * Digital Certificate * Digital Signature
    * Profiling * Cookies * Personalization * Clickstream Data * Online Behavior

    E-Commerce Store Management
    * Search Engines * Search Technologies * Content Management
    * Catalog Management * Configuration Management * Workflow Software
    * Workflow Management * Document Management * Event Notification
    * Content Routing * Transaction Messaging

    e-Market Exchanges and Brokerages
    * Internet Auctions * Internet Exchanges * Online Mediation
    * Online Negotiation * Internet Bidding
    * Collaborative Buying * Collaborative Manufacturing
    * Online Community * e-Procurement * Online Trading

    Electronic Payment Mechanisms and Means
    * Online Payments * Electronic Payments * Shopping Cart
    * Smart Card * Microtransactions * Electronic Funds Transfer
    * Digital Cash * Cashless Transactions * Micropayments
    * Secure Socket Layer (SSL) * Secure Electronic Transactions (SET)

    Other Key Concepts and Applications
    Related to E-Commerce and E-Business

    Many of the key concepts, practices, and technologies related to Electronic Commerce and e-Business are listed below. Please click on the respective hyperlinks to do in-depth research using our 'Portal-on-Demand' public service. To read a short summary related to any of the items listed below, we recommend that you review many of the items listed here in Computerworld Quickstudies.

    3G Wireless   64 bit computing   Accrual Accounting   Active Server Pages   ActiveX   Activity Based Costing   Advanced Encryption Standard   Affinity Marketing   After Hours Trading   Agent technology   Aggregators   Agile Manufacturing   Agile Programming   Applets   Application Programming Interface   Application Servers   Application Service Providers   Artificial Neural Networks   Aspect Oriented Programming   Asynchronous Transfer Mode   Authentication   Automated Clearing House   Balance Sheet   Balanced Scorecard   Bandwidth   Bankruptcy   Benchmarking   Binary Compatibility   Biometrics   BIOS   Blogs   Bluetooth   Bridge Financing   Buffer Overflow   Business Continuity Planning   Business Intelligence   Business Metrics   Business Process Outsourcing   Cable Modems   Cache Memory   Capability Maturity Model   Capital Assets   Cash Accounting   Change Management   Channel Conflicts   Checkpoint and Restart   Chip Multiprocessing   Customer Churn   Clustering   Collaborative Commerce   Common Gateway Interface   Common Information Model   Competitive Intelligence   Compilers   Convergence   Cookies   Copyright   CORBA   Corporate Barter   Corporate portals   Cost Center   Cost of Capital   Customer Acquisition Costs   Customer Profiling   Customer Relationship Management   Cycle Time   Data Compression   Data Mining   Data Models   Data Scrubbing   Data Visualization   Data Warehousing   Decision Support Systems   Demographic Segmentation   Denying Network Service   Depreciation and Amortization   Desktop Management Interface   Desktop videoconferencing resources   Digital Certificates   Digital Rights Management   Digital Signal Processor   Digital Signatures   Digital Subscriber Line   Digital versatile disc   Digital wallets   Digital Wrappers   Direct Access File System   Directory Services Markup Language   Discounted Cash Flow   Disintermediation   Distributed Component Object Model   DMCA   Document management   Domain Naming   DSML   Due Diligence   Dynamic HTML   Dynamic Link Libraries   EBITDA   E Business Models   E Commerce Benchmarking   E Commerce Distribution   E Commerce Patents   E Commerce Strategies   Economic Value Added   Electronic Government   E Marketplaces   Embedded Microprocessors   e Metrics   Emoticons and Internet Shorthand   Employee Stock Options   Encryption   Enterprise Application Integration   ERP   Extract Transform Load   Event Correlation   Extreme Programming   Fault Tolerant Computing   Fibre Channel   Fiduciary   Fighting Spam   File Transfer Protocol   Firewalls   Flow Manufacturing   Frame relay   GAAP   Generally Accepted Accounting Principles   Geographic information systems   Gigabit Ethernet   Globalization   GPS   Grid Computing   Handheld PCs   High Speed Serial Ports   Image Compression   IMAP   InfiniBand   Infomediary   Instant Messaging   Intangible Assets   Intellectual Capital   Intellectual Property   International frame relay   Internet Application Integration   Internet Protocol Security   Internet Protocol Version   Internet Service Providers   Interpreter   Intrusion Detection   Inventory Allocation   Inventory Turns   IP Multicasting   ISDN   Java   Java Applets   Java Database Connectivity   JavaBeans   Jini   Joint Application Development   Just in Time Learning   Just in Time Manufacturing   Kerberos   Kernel technology   Knowledge Management   LDAP   Leading Economic Indicators   Legal Entity   Linux   Load Balancing   Maintenance, Repair And Operations   Management Service Providers   Manufacturing Execution Systems   Market Capitalization   Market Valuation   Mass Customization   Massively Parallel Processing   Measuring Web Site Traffic   Memory Management   Message oriented middleware   Metadata   Micropayments   Microprocessor   Microsegmentation   Middleware   Mobile Commerce   MP3   MPEG Standards   Net Present Value   Netiquette   Network Address Translation   Network Appliances   Network Sniffers   Networking Hardware   Object enabled databases   OLAP   Online Profiling   OpenGL   Open Source Licensing   Optical Character Recognition   Optical Networking   P3P   Peer Group Analysis   Peer to Peer Network   Perl   Phishing   PHP   Point to point tunneling protocol   Policy based Networking   Presence Technology   Price to Earnings Ratio   Processes and Threads   Profit Center   Profit Multiples   Programming Languages   Project Portfolio Management   Proxy Servers   Public key encryption   Quality of Service   Quick Response   Radio Frequency Identification   Random Numbers   Random Access Memory   Rapid Development   Real Time Operating Systems   Real Time Reporting   Redundant Arrays of Independent Disks   Reintermediation   Relational Databases   Return on investment   Revenue Optimization Software   Reverse Mergers   Reverse Engineering   Risk Management   Rmon analysis   RosettaNet   SAML   Scalability   Scale Free Networks   Search Engines   Secure Electronic Transaction   Secure Sockets Layer   Server Partitioning   Service Level Agreements   Servlets   Session Initiation Protocol   Shared Services   Signal to Noise Ratio   Simple Network Management Protocol   Simple Object Access Protocol   Six Sigma   Smart cards   Smart phones   Spam   Speech Recognition   SPML   Spooling   Statement of Income   Steganography   Storage Resource Management   Storage Virtualization   Storage Area Networks   Strategic Management   Streaming technology   Structured Financing   Structured Query Language   Subordinated Debt   Supply Chain applications   Supply Chain Management   Sustainable Growth   SWOT Analysis   Symmetrical Multiprocessing   System Development Life Cycle   TCP/IP   The Learning Curve   Thin clients   Tool Command Language   Total Cost of Ownership   Transaction Processing   Transaction Servers   UCITA   UDDI   Universal Serial Bus   Value Based Pricing   Value Chain Management   Vendor Managed Inventory   Venture Capital   Video compression   Virtual Corporation   Virtual private networks   Viruses   VLIW Microprocessors   Voice over data networks   VRML   WAP   Web Caching   Web Content Management   Web Crawler   Web hosting   Web Personalization   Web Services   Web Site Globalization   WebDAV   WikiWikiWeb   WiMax   Wireless data technology   Wireless LANs   Wireless Markup Language   Wireless Security   Wireless Web Access   Writable DVD   XACML   xDSL   XHTML   XML  


    Digital Transformation & Advanced Analytics Projects Leading Global Firms & National Economies
    line


    Princeton University Invited FinTech Research Presentations on Model Risk Management
    Pioneering 'Open Systems Finance', 'Model Risk Arbitrage', and, 'Cyber Finance'

    2015 Princeton Quant Trading Conference
    'Knight Reconsidered':
    Future of Finance Beyond 'Flash Boys': Risk Modeling for Managing Uncertainty in an Increasingly Non-Deterministic Cyber World

    (Global Risk Management Network, LLC, 2015).

    2016 Princeton Quant Trading Conference
    Knight Reconsidered Again: Risk, Uncertainty, & Profit Beyond ZIRP & NIRP:
    Beyond Model Risk Management to Model Risk Arbitrage for Fintech Era:
    How to Navigate 'Uncertainty'... When 'Models' are 'Wrong'... And 'Knowledge'... 'Imperfect'!

    (Global Risk Management Network, LLC, 2016).

    '"It is this "true" uncertainty, and not risk, as has been argued, which forms the basis of a valid theory of profit and accounts for the divergence between actual and theoretical competition... It is a world of change in which we live, and a world of uncertainty...If we are to understand the workings of the economic system we must examine the meaning and significance of uncertainty; and to this end some inquiry into the nature and function of knowledge itself is necessary."
    -- Frank H. Knight
    in
    Risk, Uncertainty, and Profit

    (Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co), 1921.

    Risk, Uncertainty, and Profit: Frank Knight
    (Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co), 1921.

    2015 Princeton Quant Trading Conference
    'Knight Reconsidered':
    Risk, Uncertainty, and, Profit for the Cyber Era: Model Risk Management of Cyber Insurance Models using Quantitative Finance and Advanced Analytics

    (Global Risk Management Network, LLC, 2015).

    2015 New York Cyber Security and Engineering Technology Association Conference
    Toward Integrated Enterprise Risk Management, Model Risk Management, & Cyber-Finance Risk Management:
    Bridging Networks, Systems, and, Controls

    (Global Risk Management Network, LLC, 2015).

    2016 New York State Cyber Security Conference
    Advancing Beyond 'Predictive' to 'Anticipatory' Risk Analytics:
    CyberFinance: Why Cybersecurity Risk Analytics must Evolve to Survive 90% of Emerging Cyber Financial Threats, and, What You Can Do About It?

    (Global Risk Management Network, LLC, 2016).




    FinTech Enterprise Risk-Model Risk Management meet Penetration Testing-Ethical Hacking

    2015 National CSO-CxO Cybersecurity Conference

    Cybersecurity & Cyber-Finance Risk Management: Strategies, Tactics, Operations, &, Intelligence: Enterprise Risk Management to Model Risk Management: Understanding Vulnerabilities, Threats, & Risk Mitigation

    CSO-CxO Plenary Keynote, National Cybersecurity Summit, Altria Group Inc. Headquarters, VA, 2015

    New York Cyber Security and Engineering Technology Association (NYSETA) Conference
    A Framework for Pen Testing Network Protocols for Global Banking & Finance Call Centers: Bridging Networks, Systems, and, Controls Frameworks for Cybersecurity Curricula & Standards Development
    (Innovative Design and Development Practices)

    New York Cyber Security and Engineering Technology Association (NYSETA) Conference, 2015.




    35 SSRN Top-10 Research Rankings in FinTech Quant Risk Analytics-Model Risk Management
    1. SSRN Top-10 Research: Risk Management eJournal: May 2016.
    2. SSRN Top-10 Research: Risk Management & Analysis in Financial Institutions eJournal: May 2016.
    3. SSRN Top-10 Research: Econometrics: Econometric & Statistical Methods - Special Topics eJournal: May 2016.
    4. SSRN Top-10 Research: ERN: Other Econometrics: Econometric & Statistical Methods - Special Topics: May 2016.
    5. SSRN Top-10 Research: Corporate Governance: Disclosure, Internal Control, Risk-Management eJournal: Feb. 2016.
    6. SSRN Top-10 Research: ISN: Property Protection: January 2016.
    7. SSRN Top-10 Research: CGN: Risk Management Practice: January 2016.
    8. SSRN Top-10 Research: CGN: Risk Management, Including Hedging & Derivatives: January 2016.
    9. SSRN Top-10 Research: Corporate Governance Practice Series eJournal: January 2016.
    10. SSRN Top-10 Research: IRPN: Innovation & Cyberlaw & Policy: January 2016.
    11. SSRN Top-10 Research: Econometrics: Mathematical Methods & Programming eJournal: May 2015.
    12. SSRN Top-10 Research: Computational Techniques: May 2015.
    13. SSRN Top-10 Research: Information Systems & Economics eJournal: May 2015.
    14. SSRN Top-10 Research: Econometrics: Mathematical Methods & Programming eJournal: April 2015.
    15. SSRN Top-10 Research: ERN: Computational Techniques (Topic): April 2015.
    16. SSRN Top-10 Research: Econometric Modeling: Risk Management eJournal: March 2015.
    17. SSRN Top-10 Research: Econometric Modeling: Capital Markets - Risk eJournal: March 2015.
    18. SSRN Top-10 Researchr: Econometric Modeling: Capital Markets - Risk eJournal: March 2015.
    19. SSRN Top-10 Research: MRN Operations Research Network eJournal: March 2015.
    20. SSRN Top-10 Research: OPER Subject Matter eJournal: March 2015.
    21. SSRN Top-10 Research: Systemic Risk (Topic): March 2015.
    22. SSRN Top-10 Research: Econometrics: Mathematical Methods & Programming eJournal: March 2015.
    23. SSRN Top-10 Research: Econometric & Statistical Methods - Special Topics eJournal: February 2015.
    24. SSRN Top-10 Research: Microeconomics: Decision-Making under Risk & Uncertainty eJournal: February 2015.
    25. SSRN Top-10 Research: VaR Value-at-Risk (Topic): February 2015.
    26. SSRN Top-10 Research: ERN: Uncertainty & Risk Modeling (Topic): February 2015.
    27. SSRN Top-10 Research: ERN: Econometric & Statistical Methods (Topic): February 2015.
    28. SSRN Top-10 Research: Computational Techniques (Topic): February 2015.
    29. SSRN Top-10 Research: OPER: Analytical (Topic): February 2015.
    30. SSRN Top-10 Research: ERN: Mathematical Methods & Programming (Topic): February 2015.
    31. SSRN Top-10 Research: Stochastic Models eJournal: February 2015
    32. SSRN Top-10 Research: Econometric Modeling: Capital Markets - Risk eJournal: January 2015.
    33. SSRN Top-10 Research: Microeconomics: Decision-Making under Risk & Uncertainty eJournal: January 2015.
    34. SSRN Top-10 Research: Uncertainty & Risk Modeling (Topic): January 2015.
    35. SSRN Top-10 Research: VaR Value-at-Risk (Topic): January 2015.



    Top Wall Street Banks' Model Risk Management Beyond VaR for Extreme Risks
    FinTech Technical Expert to Top MDs Team for World's Largest Investment Bank


    Cryptanalytic Algorithms and Quantum ComputingBeyond 'Bayesian vs. VaR' Dilemma to Empirical Model Risk Management: How to Manage Risk (After Risk Management Has Failed).
    (Global Risk Management Network, LLC, 2012, 2014)

    Cryptanalytic Algorithms and Quantum Computing

    Measuring & Managing Financial Risks with Improved Alternatives Beyond Value-At-Risk (VaR)
    (Global Risk Management Network, LLC, 2012).


    FinTech Markov Chain Monte Carlo Models and Bitcoin Block Chain Encryption Protocols

    Markov Chain Monte Carlo Models, Gibbs Sampling, and, Metropolis-Hastings Algorithms

    Markov Chain Monte Carlo Models,
    Gibbs Sampling, and, Metropolis-Hastings Algorithms

    (Global Risk Management Network, LLC, 2013).
    Complex Stochastics Hi-Dimensional Statistical Analysis

    Bitcoin Protocol: Model of ‘Cryptographic Proof’ Based Global Crypto-Currency & Electronic Payments System
    Bitcoin Protocol: Model of 'Cryptographic Proof' Based Global Crypto-Currency & Electronic Payments System
    (Global Risk Management Network, LLC, 2013).
    First Report on the Bitcoin Cryptographic-Proof-of-Work


    Griffiss CyberspaceTM Cybersecurity Venture Spans Wall Street & Cyber Research


    Cryptanalytic Algorithms and Quantum ComputingQuantitative Modeling of Trust and Trust Management Protocols in Next Generation Social Networks Based Wireless Mobile Ad Hoc Networks
    (Global Risk Management Network, LLC,
    December 18, 2014.)

    Future of Cyber Risk
    Griffiss Cyberspace Cybersecurity Venture Aims to Span Wall Street and Hi-Tech Research,
    Cybersecurity, Financial Protocols & Networks Protocols Analysis, and, Penetration Testing
    (Global Risk Management Network, LLC,
    Summer 2013.)


    FinTech Computational Quantitative Cryptanalytic Algorithms for Cyber-Quantum Era


    Cryptanalytic Algorithms and Quantum ComputingFuture of Bitcoin & Statistical Probabilistic Quantitative Methods: Interview by Hong Kong Institute of Certified Public Accountants
    (Global Risk Management Network, LLC, January 20, 2014.)

    Cryptanalytic Algorithms and Quantum Computing
    Cryptology beyond Shannon’s Information Theory: Preparing for when the ‘Enemy Knows the System’: Beyond NSF Cryptanalytic Algorithms
    (Global Risk Management Network, LLC, 2013.)


    AACSB Recognizes Real Impact among Nobel Laureates such as Black-Scholes
    Pioneered Anticipatory Risk Analytics Frameworks Applied by Top Investment Banks 

    “There are many examples illustrating that advances in basic research have had a substantial impact on practice. Exemplars of this phenomenon can be seen in finance through academic publications on the theories of portfolio selection (Markowitz, 1952), irrelevance of capital structure (Modigliani and Miller, 1958), capital asset pricing (Sharpe, 1964), efficient markets (Fama, 1965 and 1970), option pricing (Black and Scholes, 1973), and agency theory (Jensen and Meckling, 1976). All are well-known for their substantial impact on both theory and practice. In information systems, the research of Malhotra (Malhotra, 2004) has helped companies to understand why knowledge management systems fail...

    AACSB logoAACSB

    MORE...

    Cryptanalytic Algorithms and Quantum Computing

    “The new business model of the Information Age, however, is marked by fundamental, not incremental, change. Businesses can't plan long-term; instead, they must shift to a more flexible "anticipation-of-surprise" model.”
    -- Yogesh Malhotra in CIO Magazine interview, Sep. 15, 1999.


     

    Leading Global Enterprise Risk Management and Model Risk Management Practices

    "The future is moving so quickly that you can’t anticipate it… We have put a tremendous emphasis on quick response instead of planning. We will continue to be surprised, but we won't be surprised that we are surprised. We will anticipate the surprise."
    *
    20-Years of the Model Risk Management Program
      “The new business model of the Information Age, however, is marked by fundamental, not incremental, change. Businesses can't plan long-term; instead, they must shift to a more flexible "anticipation-of-surprise" model.”
    -- Yogesh Malhotra in CIO Magazine interview, Sep. 15, 1999.
    [A Decade Later... Wall Street CEO, CFOs, & CROs know so... ]
    Model Risk Management Program

     

    Global-National Expert Panels of Computer Scientists & Quantitative Economists
    Global-National Thought Leader for UN, NSF, US & World Governments & Parliaments

    National Science Foundation  IBM

      USA Federal Government
    US Dept. of Veteran Affairs

    Government and Cabinet Of Mexico

    United Nations

    Government and Cabinet Of Netherlands

    Nation of South Korea
    Maeil Business TV

    ACM  IEEE HP
    TiE Silicon Valley  Accenture
    Intel  Philips
    British Telecom  Institute for Supply Management
    The Conference Board

    MORE...

    Digital Transformation Research in Global Business & Technology Press

    CIO Magazine
    CIO Insight
    Inc.
    Fortune
    Wall Street Journal
    MORE...


    Digital Transformation Ventures in Global Business & Technology Press

    Media Coverage Media Coverage
    MORE...


    Digital Transformation Venture Clients, Patrons, & Subscribers

    A sample of our corporate and organizational clients, patrons, and users is listed below:

    FinTech Firms: Goldman Sachs, Google, HP, IBM, Intel, Microsoft, Ogilvy, Wells Fargo

    Consulting Firms: Accenture, Ernst & Young, McKinsey, PricewaterhouseCoopers

    World Governments: Australia, Canada, European Union, United Kingdom, United States

    U.S. Defense: AFRL, Air Force, Army, CCRP, Comptroller, DISA, DoD, NASA, Navy, RAND

    World Defense: Australia (Air Force), Canada (Defence R&D), UK (Ministry of Defence)

    Business Schools: Harvard, MIT, Princeton, Stanford, UC Berkeley, Wharton

    Associations
    : AACSB, ABA, ACM, AICPA, AOM, APICS, ASTD, ISACA, IEEE, INFORMS

    "Founder Yogesh Malhotra says his vision is to fill the gaps between business and technology, data and knowledge, and, theory and practice..."
    -
    Dr. Yogesh Malhotra in Fortune
    Interview

    MORE...


    Cyber Transformation Practices Guiding US DoD Commanders & CxOs
    ("Obsolete what you know before others obsolete it..."
    - Dr. Yogesh Malhotra in Inc. Interview)

    United States Army United States Navy United States Air Force United States Marine Corps AFRL
    "If you spend some time at [the digital research lab] founded by Dr. Malhotra youwill be blessed by some of the world's most astute thinking on the nature of knowledge and its value." 
    - U.S. Army Knowledge Symposium, Theme: "Knowledge Dominance: Transforming the Army...from Tooth to Tail", US Department of Defense, United States Army.

    "There are many definitions of knowledge management. It has been described as "a systematic process for capturing and communicating knowledge people can use." Others have said it is "understanding what your knowledge assets are and how to profit from them." Or the flip side of that: "to obsolete what you know before others obsolete it." (Malhotra) "
    - U.S. Department of Defense, Office of the Under Secretary of Defense (Comptroller)

    "KM is obsoleting what you know before others obsolete it and profit by creating the challenges and opportunities others haven't even thought about -- Dr. Yogesh Malhotra, in Inc. Technology Interview"
    - U.S. Defense Information Systems Agency Interoperability Directorate

    MORE...

    Top-3 Most Influential Scholars-Practitioners
    in Knowledge Management
    (Ranked in Drexel University Global Survey of IS Practice)

    Vision Korea Campaign Keynotes
    Dr. Yogesh Malhotra among other 'Vision Korea' National Campaign Keynote Speakers in Vision Korea National Campaign (2000): Dr.Charles Lucier of Booz Allen Hamilton, Dr.David Snowden of IBM, Dr.Robert H. Buckman of Buckman Labs, Dr.Hubert Saint-Onge of Canadian Imperial Bank of Commerce, Professor Dr.Ikujiro Nonaka of Hitotsubashi University

    MORE...

    Pioneered Knowledge Management Digital Transformation Practices
    Led Global Virtual Team of 200-PhD Experts & CxOs to Publish Pioneering Research

    CyberspaceOrganizations
    Published in 2000
    CyberspaceBusinessModels
    Published in 2001

    CyberspaceBusinessModels
    Journal Articles & Reports 1993-Present

    Published independent Study paper on computer graphics image compression standards for hypermedia computing technologies, the precursor of WWW, on MBA graduate research fellowship with B2B pioneer and full tuition scholarship in 1993.

    MORE...



    Developed Top Digital Research Site, Search Engine, & Social Network

    Top-Ranked Digital Research Site: Computerworld Best Web Site Award


    Top-3 Search Engine: Carnegie Mellon University Industry.Net National Awards


    Top-10 Social Network: Popular Rankings after LinkedIn

    Led Global Virtual Community of Practice of 130,000+ to Pioneer Digital Transformation Practices
    Millions of worldwide users included Global-2000 Corporations and G-20 World Governments.

    Top3SearchEngineBRINT

    Top-3 Search Engines Ranked in the Carnegie Mellon University: National Industry.Net Awards


    Top of Page

    Global Risk Management Network: 'Your Survival Network for The Brave New World Of Business'tm

    Global RISK Management Network | Help & FAQs

    Terms of Use | Privacy | © Copyrights 2012
    Global Risk Management Network, LLC, Cornell Business and Technology Park, Ithaca, NY 14852-4892, U.S.A.