Total: 10 results found.

Search for:
Search Only:

1. Trends In Healthcare And The Life Sciences And Their Impact On Ecommerce
(Management)
... technology can go a long way to lowering the costs of healthcare. It can become increasingly accessible and more immediate, although the risks of Internet hacking, cybercrime and identity theft remain ...
Created on 23 April 2015
2. Supply Chain Pros Say Data Loss Is Greatest Risk
(Technology)
... released earlier this month, indicate that when global supply chain pros work with third-party vendors, 63 percent fear the loss and theft of confidential data more than any other risk. In a press release, ...
Created on 16 March 2015
3. RFID Improves Efficiencies and Reduces Shrinkage for Retailers
(Technology)
... or asset. Interestingly, a newly released report indicates that retailers are considering RFID as a means to reduce shrinkage, as well. According to the Global Retail Theft Barometer, an annual study conduc ...
Created on 08 April 2013
4. Supply Chain Management And Logistics Risk
(Logistics)
... l disasters: hurricanes, tornadoes, floods, snow. Add to this list terrorist attacks, health epidemics, theft (physical or data), all the way to pirates capturing your ship. You will need to know anythi ...
Created on 20 March 2013
5. Reasons for Creating a Risk Framework
(News)
Risk is indeed all around us. That's why you need to develop a risk framework to help you identify and address threats. In an APICS article, Abe Eshkenazi discusses a few examples of recent supply ...
Created on 19 August 2012
6. It's Risky Out There
(Supply)
... for transactions and commerce (i.e. data theft, denial of service attacks, hackers, network reliability, cloud security), but they also implement safeguards into the applications used by the business to ...
Created on 18 August 2012
7. It's Risky Out There
(Logistics)
... for transactions and commerce (i.e. data theft, denial of service attacks, hackers, network reliability, cloud security), but they also implement safeguards into the applications used by the business to ...
Created on 18 August 2012
8. Required Attire for a Remote Workforce
(Retail)
...  physical theft of devices on planes, trains, waiting rooms and terminals -- the most likely places where they get stolen. Even if you pay connectivity bills for mobile staffers, send to them monthl ...
Created on 09 April 2012
9. Required Attire for a Remote Workforce
(Logistics)
...  physical theft of devices on planes, trains, waiting rooms and terminals -- the most likely places where they get stolen. Even if you pay connectivity bills for mobile staffers, send to them monthl ...
Created on 09 April 2012
10. Watch for the sharks, they may be after your AS/2
(Management)
... rithms are very strong, the theft of the certificates and keys is simple. There are products that are easily hacked by exploiting some simple designed-in functionality..." The IMer went on to describe two sce ...
Created on 05 July 2005