Must Reads
There is so much to read, so much to know, so many sources to follow. And the volume of news and information just keeps growing exponentially. How to keep up? Even more, how to rediscover the serendipity of learning something new and interesting for its own sake?
Here, for your enjoyment and interest, are the articles Temin and Company considers “must reads.” They are primarily on the topics of reputation and crisis management, the media, leadership and strategy, perception and psychology, self-presentation, science, girls and women, organizational behavior and other articles of interest.
They are listed below with the most recent articles first, and to the side, by category.
We hope you enjoy them and would appreciate your comments. And whenever you have any favorite articles for us to add, please let us know so that we might include them for other readers to enjoy.
There is so much to read, so much to know, so many sources to follow. And the volume of news and information just keeps growing exponentially. How to keep up? Even more, how to rediscover the serendipity of learning something new and interesting for its own sake?
Here, for your enjoyment and interest, are the articles Temin and Company considers “must reads.” They are primarily on the topics of reputation and crisis management, the media, leadership and strategy, perception and psychology, self-presentation, science, girls and women, organizational behavior and other articles of interest.
They are listed below with the most recent articles first, and to the side, by category.
We hope you enjoy them and would appreciate your comments. And whenever you have any favorite articles for us to add, please let us know so that we might include them for other readers to enjoy.
Large-Scale IT Projects: From Nightmare to Value Creation
Jon Brock, Tamim Saleh, and Sesh Iyer, BCG Perspectives, May 20, 2015
For business leaders, the decision to embark on a large-scale IT initiative (that is, one with an investment of more than $10 million) is often fraught with angst. Their worries are justified. According to one large study, the chances of delivering such a project successfully—on time, on budget, and with the desired technical objectives met—are roughly one in ten. […read more]
General Electric’s biggest challenge: staying relevant in a digital age
Kia Kokalitcheva, Fortune, June, 2015
In an interview for Fortune’s new series, The Chat, GE CEO Jeff Immelt discusses the big shifts in his company and the quest to attract young talent, and reveals that what keeps him up at night is “staying relevant.” […read more]
Netflix says its promos for other shows won’t devolve into actual advertising
Brian Fung, The Washington Post, June 2, 2015
You may have noticed that Netflix has been putting bits of promotional material in your programming for its other shows. It’s a small test so far, but it already has some wondering if real, third-party advertising is coming down the pipe. Netflix chief executive Reed Hastings is trying to shoot down that speculation. In a post on Facebook Monday, Hastings promised that the streaming video service won’t be getting ads anytime soon. […read more]
Regulators Say Firms Need ‘Reasonable’ Data Safeguards
Megan Leonhardt, WealthManagement.com, June 2, 2015
If your firm isn’t taking reasonable precautions to protect client data, you could face enforcement action. While there are not specific regulations around cybersecurity standards, the Securities and Exchange Commission and the Financial Industry Regulatory Authority are on the lookout for firms not operating under a “reasonable standard.” […read more]
In Praise of the Humble, Misunderstood Hashtag: Sree Sreenivasan at TEDxPoynterInstitute
Sree Sreenivasan, Tedx Talks, June 13, 2012
Sree Sreenivasan reveals the dirty secret of social media – that almost everyone will miss almost everything you do on social media – during his talk on “In Praise of the Humble, Misunderstood Hashtag” at the Poynter Institute for Media Studies in St. Petersburg, Florida.
{source}
<iframe width=”420″ height=”236″ src=”https://www.youtube.com/embed/kn9981SL_8k?list=PLpcj64uXCCR_xuSP0ugXWK_XdQMDaSrf7″ frameborder=”0″ allowfullscreen></iframe>
{/source}
Vanity Fair used heavy security to protect Caitlyn Jenner’s exclusive
Jason Abbruzzese, Mashable, June 1, 2015
Who knew the gossipy, overexposed, selfie-taking Kardashians could be so good at keeping a secret? Vanity Fair unleashed one of the biggest cultural stories of the year on Monday with Caitlyn Jenner’s first public interview and photo shoot. In order to keep the story from leaking, the magazine hired security for the shoot and forced people to give up their cell phones. […read more]
Revolution in the Driver’s Seat: The Road to Autonomous Vehicles
Xavier Mosquet, Thomas Dauner, Nikolaus Lang, Michael Rüßmann, Antonella Mei-Pochtler, Rakshita Agrawal, and Florian Schmieg, BCG Perspectives, April 21, 2015
It is no longer a question of if but when autonomous vehicles (AVs) will hit the road. In the auto industry’s most significant inflection in 100 years, vehicles with varying levels of self-driving capability—ranging from single-lane highway driving to autonomous valet parking to traffic jam autopilot—will start to become available to consumers as soon as mid-2015 or early 2016. […read more]
Crisis of the Week: Kiss-and-Tell Fears After Adult Friend Finder Breach
Ben DiPietro, The Wall Street Journal’s Risk & Compliance Journal, June 1, 2015
The crisis this week is the one involving Adult Friend Finder, the hookup dating site that suffered a data breach that exposed its users’ sexual secrets. Among the data allegedly stolen were details about the sexual preferences of the site’s members, including whether they were married. The U.K. television station that broke the story said it found a database of 3.9 million site members on a hacker forum.
The company that runs the site, FriendFinder Networks Inc., last week issued a statement saying it was investigating the reports, taking steps to protect members’ information, had hired a data security firm and was working with law enforcement agencies. It wouldn’t confirm the full scope of the breach until its investigation was completed, but said there was no evidence of financial information or passwords being compromised.
Looking at the company’s statement and its actions to date, how well has it responded to this crisis? Where is its response falling short? What more can the company do at this point?
Davia Temin, president and CEO, Temin and Co.: “This is crisis management at the shadow fringe of commerce. While pornography, and other businesses involved in sex trade such as Adult Friend Finder, have always been the ‘early adopters’ of new Internet and social media technologies, they are woefully late to the game of crisis management.
“For a site that one tech expert calls ‘one of the most heavily-trafficked websites in the world,’ and that collects some of the most private and potentially embarrassing data in the world, the owners of the site have made every crisis management mistake in the book regarding cyber data breaches. They never announced the breach themselves, only responding when someone else found it. When forced into it, their statement is formulaic, unspecific, hard-to-find, ineffectual, and unbelievable; they give no advice to members whose data has been breached, and no contact information to follow up; they promise no further communication.
“But who is going to complain? Clearly the members of this club do not want to go public to complain to law enforcement, the media, or one another. When people are involved in activities that are either illegal or that they are ashamed of, they have little recourse.
“And FriendFinder Networks seems to be counting on that. You get the feeling they just want their members to go back to the shadows–pay their fees, hook up and then take the breach silently, as penance for using the site at all.”
To read the full article, CLICK HERE.
10 Facts About the New Cyber Threat Intelligence Center
Nicole Blake Johnson, FedTech, March 2, 2015
The new Cyber Threat Intelligence Integration Center (CTIIC), established in February under the purview of the director of national intelligence (DNI), is expected to be fully operational by the end of fiscal year 2016. While there are many unknowns about the center’s specific roles and responsibilities and staffing structure, this article shares 10 takeaways from the White House that provide more details about the CTIIC. […read more]
“Crisis of the Week: Kiss-and-Tell Fears After Adult Friend Finder Breach”
Experts were asked to weigh in on how well FriendFinder Networks has responded to the crisis, where its response has fallen short, and what the company can do at this point. “[T]he owners of the site have made every crisis management mistake in the book regarding cyber data breaches,” says Davia Temin. — The Wall Street Journal’s Risk and Compliance Journal […read more]