Business Operations | News, how-tos, features, reviews, and videos
In today’s fast-paced global economy, examples of how empowered customers and citizens use social technology to influence everything from brands to governments are all around us.
When Boston mobster James "Whitey" Bulger recently was captured in California after 16 years on the lam, investigators found him to be living comfortably, at least in the financial sense, with $800,000 in cash stashed in his rent-controlled
For all their verbiage and legalese, outsourcing contracts can be surprisingly general and vague, leading to disputes between outsourcer and customer. To quickly resolve conflicts--and avoid costly litigation--consider the following six recommendatio
Social Intelligence, a California-based startup that conducts background checks on employees' social networking activity, claims to protect job seekers' privacy on the Web and to limit employers' exposure to employment discrimination s
As corporate recruiters and hiring managers turn to social networking websites to source and screen candidates for jobs, what constitutes illegal discrimination? Find out what information about job seekers gleaned from social networking websites you
Technology attorney Matthew Karlyn tells CIOs how to avoid poisonous cloud contracts
The U.S. Federal Trade Commission made clear it endorses an online do-not-track tool, while Republican lawmakers and tech companies think a congressional mandate is unnecessary.
Are your investments in social networks paying off? Get ready for a new way of e-business.
How CIOs should adjust their privacy policies to conform to the Supreme Courtu2019s decision on monitoring employeesu2019 text messages.
CIO.com can't reveal his name, but this 30-year veteran of stalking thinks the next generation of cyberstalkers is too spoiled. Between Facebook and Foursquare, it's no wonder, he says.
Sponsored Links