Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

How to Identify Stakeholders in Project Management

As a project manager responsible for completing projects successfully and within scope, it’s imperative that you know the stakeholders. Stakeholders can be a person or organization with an interest in the project’s completion. This can be anyone from an influential customer, sponsor, the public or performing organization involved in the project.

What Makes Rapists Tick?

One of the most difficult things law enforcement officers must do is to interview rape victims. They must be asked highly intrusive questions that force them to relive an extraordinarily painful experience. Yet the hard, cold fact is that cops aren’t therapists. Their primary goal is to capture the rapist and to keep another victim from going through the same pain.

All the Ways You're Not Protecting Company Data

In most organizations, the Chief Security Officer (CSO) or Chief Information Security Officer (CISO) is responsible for alerting the Chief Information Officer (CIO) and other key executives of potential security risks related to the business’ critical Information Systems (IS) infrastructure and data. Another key responsibility is to mitigate cyber-attacks.

So You Think You Have a Smart Password?

In previous posts, I’ve written about potential security threats you face when it comes to protecting your computer systems and data. In this post, we get personal as I share ideas for protecting your personal assets from digital vulnerabilities.

What's at Stake Nationally With Transborder Security?

I recently presented at the Trans-Border Narco-Terrorism Conference co-hosted by Angelo State University, Texas Tech and the Transborder International Police. The conference was a perfect example of regional collaboration between academia, public sector – both from the U.S. and Mexico – and the private sector. It was a success, not by virtue of the number of participants, but rather by who was present, the information shared, and discussion of the hard issues found at the nexus of narcotics trafficking, crime and terrorism.

Can you Help Rebuild the Economy?

The economy is slowly recovering. But what can be done to fix the challenges we are facing?

How to Prevent Catching the Flu

In early January, 2013, Forbes.com reported the flu had arrived nearly five weeks ahead of season, and was already active in over 41 states.

Want to Know about a Degree in Homeland Security but Not Sure Whom to ask?

With the launch of our new master’s degree in homeland security, Colorado Technical University is sending a clear signal to all stakeholders in the field – from policymakers to players in the public and private sectors, and to all those staking their careers on some facet of this growing arena. We intend to set the educational standard for those who will lead the discipline into the future.

What Six Internal Security Threats are Lurking Down Your Office Corridors?

Big data is more than just hype from the tech world. The proliferation of information across multiple dimensions is real. It comes from everywhere, from cellphone GPS signals, to purchase records and to the updates we make to our favorite social media websites.

Fast Food and Russia: A Match Made in Food Heaven?

Is bringing a popular U.S. industry to Russia a good thing? The Burger King Corporation is attempting to find out. A recent Moscow Times article describes the Burger King Corporation’s strategy to increase competition with fast food rivals McDonald’s, KFC and Subway for a share of the Russian fast food market. Fast food is certainly not new to Russia but Burger King is late to the game, with Subway, McDonalds and KFC holding the top market share.

The Massacre at Sandy Hook Elementary: Reducing the Threat of Active Shooters

The horrible tragedy at Sandy Hook Elementary School in Newtown, Connecticut that left twenty-six adults and children dead has reignited the debate over gun control. Under particular scrutiny is the advisability and legality of allowing citizens to purchase assault rifles.

How Law Enforcement Agencies are Using Social Media

“Hey, @SeattlePD: What’s the Latest?” is the title of a New York Times article discussing one of the more interesting uses of social media by law enforcement. The article describes a new Seattle police department Twitter campaign that involves the agency launching 51 “hyper-local,” computer-automated Twitter accounts, in addition to their main profile. The project is called “Tweets-by-beat,” and it transforms the traditional police blotter into a real-time source of information, neighborhood by neighborhood.

Paperless Health Records - Are They Really a Good Idea?

If you’ve visited your doctor recently, you may have noticed some changes in your medical record and the accessibility of your medical record. There’s a lot less paper. That’s because many health care providers are taking advantage of an incentive program created by the Department of Health and Human Services to improve the overall quality of health care. These recent changes fall under the Meaningful Use criteria established by the Centers for Medicare and Medicaid.

A JD, DM or a PhD - What's the Best Post-Graduate Degree for Your Career Path?

When I completed my doctorate, my dissertation chair congratulated me and joked that I could now use the title “doctor” to get dinner reservations. He warned that this could potentially cause a problem if there were a medical emergency requiring a different kind of doctor. While most people think of the medical profession, the title “doctor” may be used to reference anyone who graduates with a doctoral degree. Doctoral graduates represent a wide array of skill, knowledge and capabilities.