Human Processes: How Processes can secure the Other End

Human Processes: How Processes can secure the Other End
Collaborative work that spans multiple organizations requires granting access to business-critical resources. To do so, the organization needs to know what resources need to be accessed by whom and why and what will be done with those resources. In his Column this month, Keith Harrison-Broninski proposes Role-Based Access Control (RBAC) as a solution to this problem. Read Keith`s Column for details on how this program addresses the critical security issues involved in sharing business information.

Keith Harrison-Broninski

Keith Harrison-Broninski

Keith Harrison-Broninski FRSA is an author, speaker, and technology/business consultant specialising in collaboration across organisational boundaries as well as social technology for wellness, community, and finance. Keith's first book was "Human Interactions" (2005): "Set to produce the first fundamental advances in personal productivity since the arrival of the spreadsheet" (Information Age); "The breakthrough that changes the rules of business" (Peter Fingar, author of "Business Process Management: The Third Wave"); "The overarching framework for 21st century business technology" (BP Trends); "The next logical step in process-based technology" (Chair of the Workflow Management Coalition). Keith went on to develop these principles for cross-boundary collaboration in further books and research and lead award-winning social enterprises for healthcare innovation, wellness, and community finance. Keith's latest book "Supercommunities" brings together insights from recent academic research with original ideas about wellness, collaboration, and finance to explain how communities everywhere can become antifragile through social trading.
Share
Share
Share