Online and in person: How the medium shapes the message

Size: px
Start display at page:

Download "Online and in person: How the medium shapes the message"

Transcription

1 Online and in person: How the medium shapes the message FROM THE ECONOMIST INTELLIGENCE UNIT Commissioned by

2 Online and in person: How the medium shapes the message WRITTEN BY THE ECONOMIST INTELLIGENCE UNIT In the business world, is the primary means of communication, with over 124 messages either sent or received by each user each day. As companies expand their operations to new markets and geographies, s appear to have become the entire foundation upon which organisational communication takes place. It is unfortunate, then, that is a format to which human beings are so poorly suited. Humans aren t evolved to read text and interact in cyberspace, says Dr. Rachael Jack, a lecturer at the University of Glasgow s Institute of Neuroscience and Psychology. She explains that when we interact via , we lose a lot of rich information that we would otherwise receive when speaking face-to-face. The presence of this contextual information - be it gestures with the face or hands, or the tone of voice used (which, says Dr. Jack, is more important than the content of the message itself) - is in a sense reassuring to us, as it allows us to ascertain exactly what the other person means. In its absence, she says, we feel anxiety, which will tend to make [us] interpret things negatively. This is probably the reason why, when people send s, they can be interpreted as aggressive or critical. This problem is exacerbated by what, in a 2005 paper published by the Journal of Personality and Social Psychology, has been described as egocentrism over - that is to say, the routine overconfidence that the recipient of our has clearly understood our meaning, based 2

3 on the fact that we cannot easily imagine a perspective different from our own. We see this contrast of perspectives at its sharpest when business is conducted across borders, between people from very different backgrounds and cultures. In 1976, Edward T.Hall, an anthropologist, drew a distinction between high-context and low-context cultures. In low-context cultures - typically those countries with Western European roots, such as Australia, Canada, New Zealand, and the United States - written messages tend to be far more direct and to the point, often without lengthy salutations. In high-context cultures - that is to say, most of the rest of the world - the sender of the written message tends to include more context and more personalised background content. For example, Americans might not give much thought to how they start and finish their s, whereas for Japanese people such salutations - and even the subject line - are extremely important. Bhaskar Pant, the managing director of professional education at the Massachusetts Institute of Technology, considers that these nuances are all the more crucial when people are not working face-to-face. You need to be particularly careful as to whether you are being terse, or brusque, or obtuse, he says. Yet the unfortunate trend, in Pant s view, is that people are becoming more careless in their written communications, not less so. This obliviousness, says Pant, takes on even bigger meaning when it comes to mergers and acquisitions, where joint ventures have actually fallen apart due to cross-cultural misunderstandings. 3

4 Pant points to the merger of Germany s Daimler and America s Chrysler as the leading example of this. He calls for far greater investment in training in this area, and recommends that companies with subsidiaries in different regions draft separate versions of the same messages for each group of recipients that is customised to resonate more effectively with their cultural sensitivities. Professor Frank Farley, a past president of the American Psychological Association, describes our era as the age of disinhibition : a time when, separated from the recipients of our messages by a computer screen, we are able to be more candid than we would normally be. There s an incredible amount of toxic communication going on throughout the world, he says, and so we shouldn t expect that business communications...are going to be immune to this. To reduce this toxicity in the business context, Farley suggests that, instead of , colleagues should use a mixture of video and text messaging to contact each other - a method analogous to Snapchat, the smartphone application that is particularly popular among young adults. Farley s sentiments are similar to those expressed by Dave Bowie, the founder and director of strategy at 1VirtualWorld. Bowie, whose company trains people to work effectively with each other even though they may live thousands of miles apart, believes that young people may have a large role to play in changing the way businesses communicate today. For one thing, he says, they are entirely comfortable with working remotely and having very limited personal interaction with their friend, family and colleagues. Another is that they are more needy than previous generations, in that - judging by the way they interact on social media - they require the visual affirmation of photographs and videos alongside written messages. Collectively, these components make them highly adept at using virtual tools to set contexts and personify the messages they are communicating, far more so than the generations before them. In 2020, 70 per cent of the workforce is going to be millenials, says Bowie, [and] 50 per cent are going to be freelancers. The landscape of how we communicate may thus be shifting, and more rapidly than we think, from the written word to the video chat. In the business world, the may still be king for some time to come, but it appears that there is much life in the faceto-face conversation yet. 4

5 Economist Intelligence Unit The Economist Intelligence Unit (EIU) is the world s leading resource for economic and business research, forecasting, and analysis. It provides accurate and impartial intelligence to companies, government agencies, financial institutions and academic organizations around the globe, inspiring business leaders to act with confidence since While every effort has been taken to verify the accuracy of this information, The Economist Intelligence Unit Ltd. cannot accept any responsibility or liability for reliance by any person on this report or any of the information, opinions or conclusions set out in this report. Copyright 2016 The Economist Intelligence Unit Limited. All rights reserved. Neither this publication nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of the Economist Group. Whilst every effort has been taken to verify the accuracy of information presented in this document, neither The Economist Group nor its affliates can accept any responsibility or liability for reliance by any person on this information. LONDON 20 Cabot Square London E14 4QW United Kingdom Tel: (44.20) Fax: (44.20) london@eiu.com NEW YORK 750 Third Avenue 5th Floor New York, NY 10017, US Tel: (1.212) Fax: (1.212) newyork@eiu.com HONG KONG 1301 Cityplaza Four 12 Taikoo Wan Road Taikoo Shing Hong Kong Tel: (852) Fax: (852) hongkong@eiu.com GENEVA Rue de l Athenee Geneva Switzerland Tel: (41) Fax: (41) geneva@eiu.com 5

Ascending cloud: The adoption of cloud computing in five industries Executive summary

Ascending cloud: The adoption of cloud computing in five industries Executive summary A report from The Economist Intelligence Unit Ascending cloud: The adoption of cloud computing in five industries Sponsored by Contents Introduction 2 Cloud computing findings for all industries 3 Manufacturing

More information

Safe and Secure Software. Ada An Invitation to. Conclusion. Courtesy of. John Barnes. The GNAT Pro Company

Safe and Secure Software. Ada An Invitation to. Conclusion. Courtesy of. John Barnes. The GNAT Pro Company Safe and Secure Software An Invitation to Ada 2005 Conclusion Courtesy of The GNAT Pro Company John Barnes It is hoped that this booklet will have proved interesting. It has covered a number of aspects

More information

Outside of Working Hours Not a Burden to US Workers

Outside of Working Hours Not a Burden to US Workers Email Outside of Working Hours Not a Burden to US Workers May 10, 2017 by Frank Newport Story Highlights 91% who email outside of working hours say amount is reasonable Most say after-hours emailing doesn't

More information

National Dedicated Ethernet Service

National Dedicated Ethernet Service National Dedicated Ethernet Service Flexible, reliable service to over 120 PoPs in India, and access to the global network www.tatacommunications.com 1 Connecting througout India Or, Reaching to the world

More information

South Korea EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST MAY Dan Thompson, Senior Analyst, Multi-Tenant Datacenters

South Korea EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST MAY Dan Thompson, Senior Analyst, Multi-Tenant Datacenters MARKET FORECAST MAY 2017 South Korea Multi-Tenant Datacenter Market Dan Thompson, Senior Analyst, Multi-Tenant Datacenters This report provides an overview of the competitive dynamics in the South Korea

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

UTILIZE YOUR YEAR-END MOMENTUM. Kick-Start 2013 Fundraising

UTILIZE YOUR YEAR-END MOMENTUM. Kick-Start 2013 Fundraising UTILIZE YOUR YEAR-END MOMENTUM Kick-Start 2013 Fundraising Turn your year-end fundraising into sustained growth in the new year. Did you know that most organizations receive half of their annual online

More information

CONSUMERS USE MESSAGING

CONSUMERS USE MESSAGING Every night, President Obama reads 10 letters that were sent to him by UNDERSTAND HOW ordinary citizens. This is a Presidential tradition going back to Thomas Jefferson. Recently, the White House announced

More information

Intranet Benchmarking Forum 2013 Research Programme Over 20% live intranet tours

Intranet Benchmarking Forum 2013 Research Programme Over 20% live intranet tours Intranet Benchmarking Forum IBF transforms intranets and the teams behind them 2013 Research Programme Of the world s top companies... are IBF members Over 200 live intranet tours 20% 500 intranet sites

More information

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives, Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as

More information

2017 Trends in Datacenter and Critical Infrastructure

2017 Trends in Datacenter and Critical Infrastructure PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter

More information

Data Loss Prevention - Global Market Outlook ( )

Data Loss Prevention - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report

More information

Data - a crucial consideration in your cloud migration

Data - a crucial consideration in your cloud migration OPINION PIECE Johannesburg, South Africa, 3 November, 2016 Data - a crucial consideration in your cloud migration By AJ Hartenberg, Portfolio Manager: Data Centre Services for T-Systems, South Africa The

More information

Chapter 3: Google Penguin, Panda, & Hummingbird

Chapter 3: Google Penguin, Panda, & Hummingbird Chapter 3: Google Penguin, Panda, & Hummingbird Search engine algorithms are based on a simple premise: searchers want an answer to their queries. For any search, there are hundreds or thousands of sites

More information

Pink Elephant. ITIL V3 The Value of Education

Pink Elephant. ITIL V3 The Value of Education Pink Elephant ITIL V3 The Value of Education How does ITIL V3 help improve IT Services? The ITIL V3 revised guidance was published on May 30th 2007, with updated content including new concepts, revised

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

WHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology

WHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology WHAT YOU NEED TO KNOW ABOUT THE EVOLVING WORKPLACE Adapting to new, advanced communications technology Your workforce, customers, partners and suppliers are distributed across locations and they re mobile.

More information

Global Trends in Payment Systems

Global Trends in Payment Systems Global Trends in Payment Systems Summary of 2010 Survey Findings May 2011 Global Payment Trends Survey Overview For the 3 rd year running, Edgar, Dunn & Company has conducted a survey of payments professionals

More information

Build confidence in the cloud Best practice frameworks for cloud security

Build confidence in the cloud Best practice frameworks for cloud security Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending

More information

TRUSTED MOBILITY INDEX

TRUSTED MOBILITY INDEX TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile

More information

The Business Communications Landscape Is Ripe for Massive Disruption

The Business Communications Landscape Is Ripe for Massive Disruption THOUGHT LEADERSHIP The Business Communications Landscape Is Ripe for Massive Disruption MAY 2017 Raul Castanon-Martinez, Senior Analyst, Workforce Collaboration and Communications Business communications

More information

International Auditing and Assurance Standards Board (IAASB) International Federation of Accountants 545 Fifth Avenue, 14 th Floor New York, NY 10017

International Auditing and Assurance Standards Board (IAASB) International Federation of Accountants 545 Fifth Avenue, 14 th Floor New York, NY 10017 3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 25 April 2008 International Auditing and Assurance

More information

31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation

31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation 31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation Manage Email Campaigns In-House 1. Quickly Design Emails Save time creating marketing emails using drag and drop template

More information

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online. A leader in online learning since 1998 To learn more about programs in Enterprise Architecture, visit: worldcampus.psu.edu/psueabt Programs in Enterprise Architecture a PennState ~ World Campus A world

More information

M&A Cyber Security Due Diligence

M&A Cyber Security Due Diligence M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security

More information

Electronic Payment Market in ASEAN Prepared by: Reciprocus International Date: February 2017

Electronic Payment Market in ASEAN Prepared by: Reciprocus International Date: February 2017 RECIPROCUS RESEARCH BRIEF Electronic Payment Market in ASEAN Prepared by: Reciprocus International Date: February 217 Table of Contents Executive Summary 2 The Asia Pacific Macroeconomic Outlook 3 Global

More information

State of Report

State of  Report State of Email Report Overview The following Edison State of Email report offers an in depth analysis of national consumer behaviors and sentiments associated with using email. The research demonstrates

More information

Please note: Only the original curriculum in Danish language has legal validity in matters of discrepancy. CURRICULUM

Please note: Only the original curriculum in Danish language has legal validity in matters of discrepancy. CURRICULUM Please note: Only the original curriculum in Danish language has legal validity in matters of discrepancy. CURRICULUM CURRICULUM OF 1 SEPTEMBER 2008 FOR THE BACHELOR OF ARTS IN INTERNATIONAL BUSINESS COMMUNICATION:

More information

Defining Traffic with N2X Application Note

Defining Traffic with N2X Application Note Agilent N2X Defining Traffic with N2X Application Note Preface The Agilent N2X helps you build up real-world network traffic scenarios in just a few simple steps. Defining traffic is an essential part

More information

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY

More information

Challenges and games to inspire the next generation of cyber security professionals

Challenges and games to inspire the next generation of cyber security professionals Challenges and games to inspire the next generation of cyber security professionals What is CyberStart? CyberStart: a suite of challenges, tools and games designed to introduce young people to the field

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management systems Overview and vocabulary

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management systems Overview and vocabulary INTERNATIONAL STANDARD ISO/IEC 27000 Second edition 2012-12-01 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l'information Techniques

More information

Veeam demonstrates its ambitions and capabilities

Veeam demonstrates its ambitions and capabilities Veeam demonstrates its ambitions and capabilities Publication Date: 14 Jul 2016 Product code: IT0022-000730 Roy Illsley Ovum view Summary The market for data protection and availability is undergoing a

More information

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference

More information

Netiquette. To begin with, just ponder over the following quote:

Netiquette. To begin with, just ponder over the following quote: Communication Skills: Lecture No.29 Module 9 Lecture 1 Netiquette To begin with, just ponder over the following quote: The real danger is not that computers will begin to think like men, but that men will

More information

UK Mobile Devices. Market Profile. Reference Code: Publication Date: 01/01/2002

UK Mobile Devices.  Market Profile. Reference Code: Publication Date: 01/01/2002 UK Mobile Devices Market Profile Reference Code: 183-0396 Publication Date: 01/01/2002 www.datamonitor.com Datamonitor USA 1 Park Avenue 14th Floor New York, NY 10016-5802 USA Datamonitor Europe Charles

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Chief Executive Officer

Chief Executive Officer Chief Executive Officer Role Overview Reporting to: Package: Location: Jeremy Coller and the Trustees of the Foundation Six-figures (depending on experience) 116 Park Street, London, W1K 6AF Main Purpose

More information

Chapter 7: Communication. Organizational Behaviour 5 th Canadian Edition 7-1. Langton / Robbins / Judge Copyright 2010 Pearson Education Canada

Chapter 7: Communication. Organizational Behaviour 5 th Canadian Edition 7-1. Langton / Robbins / Judge Copyright 2010 Pearson Education Canada Chapter 7: Communication Organizational Behaviour 5 th Canadian Edition Langton / Robbins / Judge Copyright 2010 Pearson Education Canada 7-1 Chapter Outline The Communication Process Barriers to Effective

More information

E-readiness rankings 2007

E-readiness rankings 2007 E-readiness rankings 2007 Countries digital development elopment in global context The Economist Intelligence Unit Prepared for The State of Telecom at Columbia University it 19 October 2007 A 1 About

More information

FILED: NEW YORK COUNTY CLERK 05/18/ :37 PM INDEX NO /2017 NYSCEF DOC. NO. 20 RECEIVED NYSCEF: 05/18/2017 EXHIBIT F

FILED: NEW YORK COUNTY CLERK 05/18/ :37 PM INDEX NO /2017 NYSCEF DOC. NO. 20 RECEIVED NYSCEF: 05/18/2017 EXHIBIT F EXHIBIT F From: Seth Schumer [mailto:sschumer@quadrumglobal.com] Sent: Monday, May 11, 2015 12:49 PM To: Matthew Baron Cc: bcarrier@credevelopment.com; Jonathan Simon; Jared White Subject: RE: Vernon Boulevard

More information

How App Ratings and Reviews Impact Rank on Google Play and the App Store

How App Ratings and Reviews Impact Rank on Google Play and the App Store APP STORE OPTIMIZATION MASTERCLASS How App Ratings and Reviews Impact Rank on Google Play and the App Store BIG APPS GET BIG RATINGS 13,927 AVERAGE NUMBER OF RATINGS FOR TOP-RATED IOS APPS 196,833 AVERAGE

More information

SOLUTION BROCHURE. Mobility Changes Everything

SOLUTION BROCHURE. Mobility Changes Everything SOLUTION BROCHURE Simply Connected The New Campus Network Mobility Changes Everything Simply Connected Vision The challenge of the new business network is expectations: Expectations of solving long-standing

More information

L2TP Conformance Test Suite E7865A Technical Datasheet

L2TP Conformance Test Suite E7865A Technical Datasheet Agilent RouterTester Type the sys config for TOC here THEN MAKE WHITE Type the sys config sub head for TOC here THEN MAKE WHITE L2TP Conformance Test Suite E7865A Technical Datasheet Agilent Technologies

More information

Oracle bakes security into its DNA

Oracle bakes security into its DNA Publication Date: 16 Nov 2018 Product code: INT003-000287 Maxine Holt Ovum view Summary At the inaugural Oracle Security Summit held at the company s stunning Santa Clara campus in September 2018, analysts

More information

Business Success Through Embedded Communication Technology

Business Success Through Embedded Communication Technology Business Success Through Embedded Communication Technology How WebRTC Delivers Value To Organizations Today GET STARTED Released May 2016 1 2 Introduction More and more activities in our day-to-day lives

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

NORTON WI-FI RISK REPORT: U.S. Results

NORTON WI-FI RISK REPORT: U.S. Results NORTON WI-FI RISK REPORT: U.S. Results Research Objective Norton by Symantec commissioned its second annual online survey, this year expanded to 15 global markets, in order to better understand consumers

More information

COMMUNICATION. Boomers & Millennials

COMMUNICATION. Boomers & Millennials COMMUNICATION Boomers & Millennials Millennials (born between 1980 and 2000) use the Web for entertainment (music and movies), socializing, and gathering information. The Internet has entertained, socialized,

More information

T he Inbox Report REVEAL MORE CONSUMER PERCEPTIONS OF . Fluent LLC Inbox. Sent. Drafts. Spam. Trash. Click here to Reply

T he Inbox Report REVEAL MORE CONSUMER PERCEPTIONS OF  . Fluent LLC Inbox. Sent. Drafts. Spam. Trash. Click here to Reply Inbox 1 Fluent LLC Sent Drafts Spam Trash T he Inbox Report CONSUMER PERCEPTIONS OF EMAIL loading... REVEAL MORE Click here to Reply Inbox Report 2018 Americans are addicted to email.

More information

E-Seminar. Voice over IP. Internet Technical Solution Seminar

E-Seminar. Voice over IP. Internet Technical Solution Seminar E-Seminar Voice over IP Internet Technical Solution Seminar Voice over IP Internet Technical Solution Seminar 3 Welcome 4 Objectives 5 Telephony in Business 6 VoIP and IP Telephony 7 Traditional Telephony

More information

5G outlook for Asia Pacific: market impact and standardisation programmes

5G outlook for Asia Pacific: market impact and standardisation programmes 5G worldwide outlook: standardisation programmes and technology developments Research Report 5G outlook for Asia Pacific: market impact and standardisation programmes March 2015 Chris Nicoll and Sherrie

More information

COMMUNICATION SERVICES IN DEVELOPED ASIA PACIFIC: TRENDS AND FORECASTS

COMMUNICATION SERVICES IN DEVELOPED ASIA PACIFIC: TRENDS AND FORECASTS RESEARCH FORECAST REPORT COMMUNICATION SERVICES IN DEVELOPED ASIA PACIFIC: TRENDS AND FORECASTS 2016 2021 STEPHEN SALE AND HARSH UPADHYAY analysysmason.com About this report This report provides an outlook

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

Hey You! Or To Whom It May Concern

Hey You! Or To Whom It May Concern Paper PD03 Hey You! Or To Whom It May Concern Kathryn Wright, Cmed, Horsham, UK ABSTRACT In the past most formal communication took place in the format of a letter. Many of us will have received training

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

TECHNOLOGY HACKS. Financial Professionals Should Be Using

TECHNOLOGY HACKS. Financial Professionals Should Be Using TECHNOLOGY HACKS Financial Professionals Should Be Using 7 TECHNOLOGY TRICKS FINANCIAL PROFESSIONALS SHOULD BE USING By Brad Johnson Today, we can call our clients as we drive down the road and email them

More information

3.4.3 Bachelor of Technology (Electronics Engineering)

3.4.3 Bachelor of Technology (Electronics Engineering) 3.4.3 Bachelor of Technology (Electronics Engineering) The BTech (Electronics Engineering) is offered in partnership with the Department of Electrical & Computer Engineering. The programme aims to graduate

More information

JUNOS SPACE ROUTE INSIGHT

JUNOS SPACE ROUTE INSIGHT DATASHEET JUNOS SPACE ROUTE INSIGHT Product Overview Junos Space Route Insight is designed for network engineers and operators who manage today s complex, mission critical enterprise and service provider

More information

Highlights from the TV & video. consumer. trend report 2011

Highlights from the TV & video. consumer. trend report 2011 Highlights from the TV & video consumer trend report 2011 About this report TV has been an integral part of people s lives since the 1940s, providing consumers with news, information and entertainment.

More information

Only the original curriculum in Danish language has legal validity in matters of discrepancy

Only the original curriculum in Danish language has legal validity in matters of discrepancy CURRICULUM Only the original curriculum in Danish language has legal validity in matters of discrepancy CURRICULUM OF 1 SEPTEMBER 2007 FOR THE BACHELOR OF ARTS IN INTERNATIONAL BUSINESS COMMUNICATION (BA

More information

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018 Effective Date: July 2, 2018 PRIVACY COMMITMENT Protecting your privacy is very important to Prosci and this privacy policy is our way of providing you with details about the types of information we collect

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC/ IEEE 26515 First edition 2011-12-01 Corrected version 2012-03-15 Systems and software engineering Developing user documentation in an agile environment Ingénierie du logiciel

More information

Agilent N2X. The industry s most comprehensive multiservices test solution for converging network infrastructures.

Agilent N2X. The industry s most comprehensive multiservices test solution for converging network infrastructures. Agilent N2X The industry s most comprehensive multiservices test solution for converging network infrastructures. Agilent N2X Best-in Class multiservices testing The Agilent N2X provides the ultimate solution

More information

About BCI Pipeline Report. Work Entering the Pipeline: Concept + Design Stage Projects Q Disclaimer. BCI Economics Services

About BCI Pipeline Report. Work Entering the Pipeline: Concept + Design Stage Projects Q Disclaimer. BCI Economics Services QUEENSLAND Q2 216 About BCI Pipeline Report 3 Work Entering the Pipeline: 4 Concept + Design Stage Projects Q2 216 5 Overall Picture By Category Disclaimer 1 BCI Economics Services 11 BCI PIPELINE REPORT

More information

CPA culture toolkit. Building your CPA liaison program

CPA culture toolkit. Building your CPA liaison program CPA culture toolkit Building your CPA liaison program Laying the foundation Sometimes the best support a CPA candidate needs is just that support. With all that your staff juggles day-to-day work, family,

More information

10/12/17 VISION MISSION

10/12/17 VISION MISSION Update on CPA Alberta & the CPA Profession in Alberta 34 th Annual CPA Small Practitioners Forum October 19 th, 2017 Banff, Alberta Larry Brownoff, CPA, CA Director, Professional & Career Services Topics

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

To respond to your inquiries and fulfill your requests, such as to send you newsletters or publications that you request.

To respond to your inquiries and fulfill your requests, such as to send you newsletters or publications that you request. Last updated: May 5, 2017 SJL Attorney Search, LLC is committed to protecting your privacy. This Privacy Policy describes our practices in connection with information that we collect through our website

More information

EUROPEAN COMPUTER DRIVING LICENCE / INTERNATIONAL COMPUTER DRIVING LICENCE SYLLABUS VERSION 5.0 M5 Using Databases

EUROPEAN COMPUTER DRIVING LICENCE / INTERNATIONAL COMPUTER DRIVING LICENCE SYLLABUS VERSION 5.0 M5 Using Databases 1 EUROPEAN COMPUTER DRIVING LICENCE / INTERNATIONAL COMPUTER DRIVING LICENCE SYLLABUS VERSION 5.0 M5 Using Databases The European Computer Driving Licence Foundation Ltd. Third Floor, Portview House Thorncastle

More information

Emerging Market connectivity

Emerging Market connectivity Emerging Market connectivity The key to capturing new FX trading opportunities Reaching natural liquidity when trading EM currency pairs requires a connectivity provider that has the resilience and reach

More information

The Economist rate card 2017 (GBP)

The Economist rate card 2017 (GBP) The Economist rate card 2017 (GBP) The Economist newspaper, Digital Editions app, Snapchat, and Global Business Review The Economist allows you to reach our influential audience through print and our award

More information

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY ACHIEVE SUCCESS with ICE ICE has given me a real edge in knowing more about the intricacies of credentialing and connecting with others in the

More information

Customers are Texting You

Customers are Texting You Customers are Texting You A Consumer Survey April 2016 Customers are Texting You A Consumer Survey, April 2016 About this Document Businesses that rely exclusively on voice calls and voicemails are out

More information

TRANSFORMING DATA INTO ACTION: THE BUSINESS OUTLOOK FOR DATA GOVERNANCE TRANSFORMING DATA INTO ACTION: THE BUSINESS OUTLOOK FOR DATA GOVERNANCE

TRANSFORMING DATA INTO ACTION: THE BUSINESS OUTLOOK FOR DATA GOVERNANCE TRANSFORMING DATA INTO ACTION: THE BUSINESS OUTLOOK FOR DATA GOVERNANCE TRANSFORMING DATA INTO ACTION: THE BUSINESS OUTLOOK FOR DATA GOVERNANCE Sponsored by: 1 Contents About this report 2 Transforming data into action: The business outlook for data governance 3 Today s approach

More information

More information from: https://www.wiseguyreports.com/reports/ dry-cleaning-and-laundry-services-global-marketreport-2018-including

More information from: https://www.wiseguyreports.com/reports/ dry-cleaning-and-laundry-services-global-marketreport-2018-including Report Information More information from: https://www.wiseguyreports.com/reports/2947663-dry-cleaning-and-laundry-services-global-marketreport-2018-including Dry-Cleaning And Laundry Services Global Market

More information

Mobile App Development Market Research Report- Global Forecast to 2022

Mobile App Development Market Research Report- Global Forecast to 2022 Report Information More information from: https://www.marketresearchfuture.com/reports/1752 Mobile App Development Market Research Report- Global Forecast to 2022 Report / Search Code: MRFR/ICT/1220-HCRR

More information

Security in Today s Insecure World for SecureTokyo

Security in Today s Insecure World for SecureTokyo Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation

More information

6 Significant reasons to embark and establish a mobile VoIP business

6 Significant reasons to embark and establish a mobile VoIP business 6 Significant reasons to embark and establish a mobile VoIP business Whether you plan to enhance your current telecom infrastructure or start a completely new enterprise, enter the world of mobile VoIP

More information

Generate growth in Asia Pacific with Intelligent Connectivity. Edward Zhou Huawei Technologizes

Generate growth in Asia Pacific with Intelligent Connectivity. Edward Zhou Huawei Technologizes Generate growth in Asia Pacific with Intelligent Connectivity Edward Zhou Huawei Technologizes A revolutionary shift is happening in the way the world works, with economies across the planet going digital

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Overview of the latest trends in FDI & focus on Balkan countries. Hugues de Cibon OCO Global, Paris Belgrade March 2015

Overview of the latest trends in FDI & focus on Balkan countries. Hugues de Cibon OCO Global, Paris Belgrade March 2015 Overview of the latest trends in FDI & focus on Balkan countries Hugues de Cibon OCO Global, Paris Belgrade March 2015 Summary Introduction: OCO FDI? FDI trends World trends Focus on Balkan countries 2

More information

Financial Information

Financial Information Financial Information sales led by improving momentum in new economies New economies: 10 points better than mature countries Solution and services: 6 points above group average Demand in mature countries

More information

Example of Focus Group Discussion Guide (Caregiver)

Example of Focus Group Discussion Guide (Caregiver) Example of Focus Group Discussion Guide (Caregiver) MHealth Self-Management and Support System for Chronic and Complex Health Conditions (Phase 1-Development and Refinement) 1) Welcome, consent process,

More information

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this

More information

This website is managed by Club Systems International on behalf of the Hoburne and Burry and Knight Groups.

This website is managed by Club Systems International on behalf of the Hoburne and Burry and Knight Groups. Privacy Policy This website is managed by Club Systems International on behalf of the Hoburne and Burry and Knight Groups. Your privacy is important to us and this Privacy Policy ( Policy ) provides information

More information

The Economist rate card 2017 (USD)

The Economist rate card 2017 (USD) The Economist rate card 2017 (USD) The Economist newspaper, Digital Editions app, Snapchat, and Global Business Review The Economist allows you to reach our influential audience through print and our award

More information

The Widening Talent Gap: The greatest security challenge of our time

The Widening Talent Gap: The greatest security challenge of our time INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 13335-1 First edition 2004-11-15 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for

More information

ISO INTERNATIONAL STANDARD. Ionizing-radiation warning Supplementary symbol. Avertissement pour rayonnements ionisants Symbole supplémentaire

ISO INTERNATIONAL STANDARD. Ionizing-radiation warning Supplementary symbol. Avertissement pour rayonnements ionisants Symbole supplémentaire INTERNATIONAL STANDARD ISO 21482 First edition 2007-02-15 Ionizing-radiation warning Supplementary symbol Avertissement pour rayonnements ionisants Symbole supplémentaire Reference number ISO 21482:2007(E)

More information

Please note: Only the original curriculum in Danish language has legal validity in matters of discrepancy. CURRICULUM

Please note: Only the original curriculum in Danish language has legal validity in matters of discrepancy. CURRICULUM Please note: Only the original curriculum in Danish language has legal validity in matters of discrepancy. CURRICULUM CURRICULUM OF 1 SEPTEMBER 2008 FOR THE BACHELOR OF ARTS IN INTERNATIONAL COMMUNICATION:

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network 87-01-01 DATA SECURITY MANAGEMENT NETWORK TECHNOLOGIES FOR INFORMATION SECURITY PRACTITIONERS: PART 1 Chris Hare INSIDE What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches;

More information

TELECOMS SERVICES FOR SMALL AND MEDIUM-SIZED ENTERPRISES: WORLDWIDE FORECAST

TELECOMS SERVICES FOR SMALL AND MEDIUM-SIZED ENTERPRISES: WORLDWIDE FORECAST RESEARCH FORECAST REPORT TELECOMS SERVICES FOR SMALL AND MEDIUM-SIZED ENTERPRISES: WORLDWIDE FORECAST 2017 2022 CATHERINE HAMMOND analysysmason.com About this report This report analyses the demand for

More information

How to Write Engaging s

How to Write Engaging  s How to Write Engaging Emails Discover how to craft great subject lines, write engaging body copy and compelling calls to action (CTAs) Contents Introduction How to Craft Great Email Subject Lines How to

More information

Hong Kong EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST DEC Dan Thompson, Senior Analyst, Multi-tenant Datacenters

Hong Kong EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST DEC Dan Thompson, Senior Analyst, Multi-tenant Datacenters MARKET FORECAST DEC 2016 Hong Kong Multi-Tenant Datacenter Market Dan Thompson, Senior Analyst, Multi-tenant Datacenters This report provides an overview of the competitive dynamics in the Hong Kong market,

More information

Tellabs End of Profit study executive summary

Tellabs End of Profit study executive summary Tellabs End of Profit study executive summary Executive summary Between November 2010 and January 2011, Tellabs created a study that analysed revenue and cost trends for carriers in Western Europe, North

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 19770-5 Second edition 2015-08-01 Information technology IT asset management Overview and vocabulary Technologies de l information Gestion de biens de logiciel Vue d ensemble

More information

Multifaceted design. Example SHCS web application. The unaltered high standards for excellent data quality can be met thanks to digitalization.

Multifaceted design. Example SHCS web application. The unaltered high standards for excellent data quality can be met thanks to digitalization. 13 Multifaceted design The user comes first. Always. The design approach varies. While it is based on concrete tasks for specialized applications, websites serve a variety of purposes. By Ann Nguyen, Loïc

More information