To find the hidden open positions, you have to network with the ‘righ’t people and the members of The Refractive Thinker® community are ‘the right people’. After a recent layoff, I reached out to The Refractive Thinker® community to assist in my job search. Success!Dr. Karleen YappColorado State University-GlobalDelran, New Jersey
The authors contributing to this series are some of the best critical thinkers in their field of study.Dr. Rich SchuttlerPro Progress AcademyPhoenix, AZ
The Refractive Thinker Press is an established brand, doing an incredible job marketing the books and authors on social media. My colleagues expressed their admiration for my publications, seeing my books on Amazon, Barns & Nobles, & other websites/bookstores. I have been invited to several Think-Tanks, fellowships, and Visiting Scholar appointments, where different committee members cited seeing my books in blogs, press-releases, Google Scholar, and university libraries. The RT press increased … Read moreDr. Emad RahimEndowed Entrepreneur-in-Residence, Oklahoma State University Visiting Scholar, Rutgers University
Dr. Cheryl developed a totally new approach to publishing for The Refractive Thinker.®.Dr. Edward KnabEmbry Riddle UniversityPalm Springs, CA
The Refractive Thinker® demonstrates a clear understanding of the doctoral learner’s need for professional networking, intellectual marketing of peer works.Dr. Lucy Surhyel NewmanLagos, Nigeria
The Refractive Thinker® series will help you integrate refractive thinking into your core strategies.Brian JudBook Marketing WorksAvon, CT
Publishing is an expensive venture, time consuming, and most times heartbreaking just trying to get through the door. Who has an easy time with rejection of what may be potentially life changing theories? Join The Refractive Thinker® Family where academic writing is economically published.Dr. Beverly CarterNew Rochelle, New York
The Refractive Thinker® is a roadmap that discusses many dimensions of change management.Mary Beth HartlebPrism Global Management GroupHenderson, NV
Dr. Cheryl is a very brilliant woman, teacher, coach, friend, and a leader. I was attracted to her because of her unselfishness, and a willing heart to not only share the knowledge she has with those around her, but also to empower them to look beyond themselves. Dr. Cheryl, I thank you for everything, your wisdom, coaching, and for giving me a wing to fly on. You are an amazing strong woman and a great friend that shares all she has!Eva KatushabeLas Vegas, NV
Publishing in The Refractive Thinker® gives me more networking visibility. The prestige that comes with involvement in writing for The Refractive Thinker® is clear.Dr. Judy Fisher-BlandoCapella UniversityLa Mirada, CA
RT Vol XII: Chapter 1: Cybersecurity in Human Resources on Multiple Fronts
From the Book: The Refractive Thinker® Vol XII: CYBERSECURITY
SummaryHuman Resources (HR), as a strategic business component, confronts security on multiple fronts. The concept of security in HR on multiple fronts is unconventional. Using a refractive thinking approach, this includes securing data and applications using cloud technologies, hiring, learning and development, and partnering with information technology(IT) groups to ensure information security of data and applications. Organizations confront a talent shortage in their cybersecurity workforce with HR professionals who may not fully understand the complexity and breadth of information security. Additionally, employees and contractors are likely the most valuable asset and biggest threat to an organization’s line of data defense.
Cyber-attacks increase on a daily basis requiring organizational leaders to prepare people, systems, and processes to cross-functionally handle security. Otherwise, organizations can suffer high cost losses of revenue, talent, data, property, and more. This chapter examines the role of data security in implementing cloud technology for HR, talent acquisition, and security awareness training and development. With senior executive support, HR and IT can partner to provide a solid line of defense for information security.