3 research outputs found

    Relational Leadership, DevOps, and The Post-PC Era: Toward a Practical Theory for 21st Century Technology Leaders

    Get PDF
    This theoretically oriented scholarly personal narrative (SPN) explored how the constructionist view of relational leadership might be applied in a post-PC technological era marked by fast-paced innovation and an always ontechnology organization and infrastructure. Through reflecting on my personal and professional experience, I hope to offer the reflective scholar-practitioner new ways of thinking, present relational practices and suggest ways of being a leader participating in the fast-paced technology driven world. This new way of being combined both relational leadership and new DevOps practices that reduce organizational friction, break down departmental silos, and increase employee engagement in technology operations. Through this inquiry, I uncovered several practices and ways of being that are grounded in philosophical, theoretical, and social domains. In challenging the taken-for-granted reality of managing technology, I am attempting to produce practices for higher performance, humane, sustainable, and inspiring corporate information technology (IT) departments. For information regarding full-text access, please contact the author at: [email protected]

    Relational Leadership, DevOps, and The Post-PC Era: Toward a Practical Theory for 21st Century Technology Leaders

    Get PDF
    This theoretically oriented scholarly personal narrative (SPN) explored how the constructionist view of relational leadership might be applied in a post-PC technological era marked by fast-paced innovation and an always on technology organization and infrastructure. Through reflecting on my personal and professional experience, I hope to offer the reflective scholar-practitioner new ways of thinking, present relational practices and suggest ways of being a leader participating in the fast-paced technology driven world. This new way of being combined both relational leadership and new DevOps practices that reduce organizational friction, break down departmental silos, and increase employee engagement in technology operations. Through this inquiry, I uncovered several practices and ways of being that are grounded in philosophical, theoretical, and social domains. In challenging the taken-for-granted reality of managing technology, I am attempting to produce practices for higher performance, humane, sustainable, and inspiring corporate information technology (IT) departments. The electronic version of this Dissertation is at AURA, http://aura.antioch.edu/etds/ and OhioLink ETD Center, www.ohiolink.edu/et

    Big Breaches: Cybersecurity Lessons for Everyone

    No full text
    The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone―not just techies―to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book. You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur. Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book’s expert insights and be prepared for the future of cybersecurity.https://aura.antioch.edu/stubooks/1050/thumbnail.jp
    corecore