Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

behavior

Results 76 - 100 of 657Sort Results By: Published Date | Title | Company Name
Published By: SambaSaftey     Published Date: Mar 15, 2019
Three myths about driver safety can cause business leaders to make dangerous decisions -- exposing their organizations to unnecessary risk. Our free white paper Driver Monitoring: Myth vs. Reality, will show you: • Why background checks, public records, and license checks are inadequate • Why pulling Motor Vehicle Records once or twice a year isn’t enough • How to go beyond telematics and GPS to create real behavioral insights • The four best practices for comprehensive driver monitoring
Tags : 
    
SambaSaftey
Published By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
    
SambaSaftey
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
    
Intel
Published By: Riskified     Published Date: Nov 04, 2019
To maximize success, eCommerce merchants need to be familiar with the unique shopping behavior and fraud trends of the holiday season. We’ve identified six key ‘sub-seasons’ and insights pertaining to geographies, channels and shipping methods - to give actionable tips to ensure a safe and profitable season. This report explores how merchants can stay competitive and boost revenue, while meeting the sophisticated expectations of holiday shoppers. What you will get from this report: 1. Tools to enable more cross-border eCommerce: Get insights to help you capitalize on the holiday season’s opportunities 2. Fraud trends for different segments of the holiday season: Better manage risk during the most lucrative quarter for eCommerce merchants 3. Insights on six key holiday sub-seasons: Identify unique consumer preferences to boost revenue
Tags : 
    
Riskified
Published By: Oracle Oracle Marketing Cloud     Published Date: Jul 27, 2016
The urgency to transform marketing has never been higher. Pressure to deliver business results is mounting. Consumer technology adoption is accelerating changes in buying behavior and increasing the desire for personalized experiences.
Tags : 
modern marketing, marketing, digital marketing, customer experiences
    
Oracle Oracle Marketing Cloud
Published By: IBM     Published Date: Apr 14, 2016
Read this Stratecast white paper from Frost & Sullivan to learn about the challenges over-the-top (OTT) competitors such as Google, Hulu, Netflix, and Facebook are causing communications service providers (CSPs). Learn how CSPs can use customer behavior data to deliver personalized experiences and offers, and discover the solutions that can turn data into a competitive advantage.
Tags : 
ibm, behavior data, social media, csp, telecom, ott
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
Many companies can't predict which customer they will retain or which customers will increase their spend. With predictive analytics they can. This knowledge brief from Aberdeeon Group highlights research findings that show organizations which apply predictive analytics are able to: Establish timely and accurate insights into customer behavior. Empower employees to do their jobs more effectively. Encourage more repeat business and higher wallet share
Tags : 
predictive analytics, customer experience, customer relationships, customer retention, customer behavior, residual business
    
IBM
Published By: Akamai     Published Date: Mar 08, 2017
In this whitepaper, we present data from the first ever large-scale scientific study that shows how video performance quality affects viewer behavior. The results help to shed light on important considerations that can help businesses craft a successful online video strategy – boosting their business bottom line and ultimately reaping the rewards of online video’s vast potential.
Tags : 
data, customer engagement, video, online video, online video strategy, viewer behaviour
    
Akamai
Published By: Sitecore EMEA     Published Date: Jan 23, 2018
It’s no longer enough just to convert—to stay competitive, you need to turn prospects into lifelong fans of your brand. But with commerce channels and buying behavior changing so fast, we all know that’s easier said than done. What were once communications channels are now becoming commerce channels, with consumers making purchases on their TVs, on Twitter, and by text message. In the past, commerce and content data and experiences sat in their own silos. Those days are gone.
Tags : 
commerce, channels, content, customer, optimization, sitecore
    
Sitecore EMEA
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems UK
Published By: Genesys     Published Date: Oct 16, 2013
Changes in customer behavior and expectations are causing organizations to make dramatic shifts in how they engage with customers. The requirements for a world-class contact center in this new environment have also shifted. In this white paper you’ll find five key steps to keep in mind when building a world-class contact center in today’s rapidly changing customer landscape.
Tags : 
contact center, customer service, customer relationship management, technology, business process management, bpm, crm, enterprise applications
    
Genesys
Published By: Lumesse     Published Date: Aug 21, 2013
Recruiters need to harness the power of social media, mobile tools, and the potential of Big Data to transform the recruiting process. Download our presentation “A Futurist's Perspective on Talent Acquisition and Tomorrow's Tech Trends.”
Tags : 
talent acquisition, workforce management, recruiting, candidate engagement, candidate engagement tools
    
Lumesse
Published By: Castlight Health     Published Date: Apr 13, 2016
Mental illness affects one in four employees in the nation
Tags : 
castlight health, behavioral health, management practices, employee health, mental illness
    
Castlight Health
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
Everyone likes to be noticed. Recognition and rewards help people feel good about what they are doing and things they have accomplished. Recognizing employees will keep them focused, directed and willing to repeat the behaviors they were recognized for. Learn 10 reasons why recognizing your employees really works.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives
    
BI WORLDWIDE
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
As a manufacturer, your uncontrolled distribution channel has a lot of places to focus their attention. So how do you break through the clutter? Reward and recognition programs have long been used to engage channel partners and align their activities with manufacturers’ goals. Applying behavioral economics to your program design will drive extra focus and effort. Learn ten best practices to follow when designing your next channel reward and recognition program.
Tags : 
customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty
    
BI WORLDWIDE
Published By: CA Technologies     Published Date: Jun 04, 2015
Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Nov 14, 2018
Mike Rothman, President and Analyst at Securosis, and author of The Pragmatic CSO, conducted this study, which breaks down how companies can most effectively change employee security behavior and lower risk. If you want a blueprint for developing an effective program, this is a great place to start.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Mar 19, 2019
The Latest Threats, Confidence Killers And Bad Behaviors – And How To Fix Them Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if email isn’t part of an organization’s core security strategy, it can become a major vulnerability. Get this report to learn: -How employees are your first and last line of defense in attacks -Ways to adjust your approach to prioritize educating the riskiest employees -The magnitude of growth around impersonation attacks and phishing
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 10, 2019
The latest threats, confidence killers and bad behaviors - and a cyber resilience strategy to fix them.
Tags : 
    
Mimecast
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.