Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Business

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jan 2011

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Innovation Engine, Arcot Desai Narasimhalu Jan 2011

Innovation Engine, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a meta-model for innovation using an automobile engine as a metaphor. This innovation meta-model is used to manage a collection of innovation models. We develop an algorithm to identify innovations with potential for success using this meta-model. This meta-model can be used by corporations and individuals to identify plausible innovations at any given point in time.


Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu Jan 2011

Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a method for enterprises to order the innovations of interest according to a number of parameters including their own business strategy and core competencies. The method takes into account aspects such as ability to create entry barriers and complementary assets. Enterprises can now use this method to both filter out innovations that may not be of interest to them and then order the short listed or selected innovations according to their attractiveness.


Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu Jan 2011

Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Several studies have addressed the process of taking ideas to markets but few have shared the experiences of start up companies that have reexamined their product strategies and repositioned their products and services for better revenues and profits. This paper reports the efforts related to repositioning of XID technologies, a start up company, into new markets while continuing to exploit its core technical competencies.


Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani Jan 2011

Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani

Arcot Desai NARASIMHALU

XID Technologies is a face processing start up company built initially around a disruptive face recognition technology. The technology innovation came from Kent Ridge Digital Labs, a publicly funded software research laboratory in Singapore. Face recognition is the least intrusive and harmless among the various biometric solutions available in the market. The basic approach to human face recognition is to identify a robust feature set that was unique enough to differentiate amongst the many millions of human faces that the system was required to verify. The technology innovation used by XID framed the problem differently and thereby overcame the challenges …


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jan 2011

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.