__ A CAVEAT 1 TODAY __ 1.1. Why BYOD is relevant __ 1.2. Pervasive computing __ 1.3. Ownership and control of devices __ 1.4. A systemic perspective __ 1.5. Managing (i.e. “governance” of) the BYOD risk 2 TOMORROW __ 2.1 Coping with the future __ 2.2 Impacts on the delivery of ICT services __ 2.3 Business architecture and “virtual” ICT systems __ 2.5 Essentials of a dynamic security policy
__ A CAVEAT 1 YESTERDAY AND TODAY __ 1.4. A systemic perspective __ 1.5. Managing (i.e. “governance” of) Business Intelligence needs 2 TOMORROW __ 2.4 Why the “Internet of Things” approach is relevant __ 2.5 Evolving your business intelligence infrastructure
1 TODAY __ 1.2. The key GDPR impacts __ 1.5. Your infrastructure is talking 2 TOMORROW __ 2.3. Internet of things: some privacy clouds B REFERENCES AND SUGGESTED READINGS