SUBSCRIBE TO EMAIL LIST – Free eBook
The Refractive Thinker® demonstrates a clear understanding of the doctoral learner’s need for professional networking, intellectual marketing of peer works.Dr. Lucy Surhyel NewmanLagos, Nigeria
Cheryl is a special leader and visionary, a strong APA editor, and evolving publisher, and a great speaker. She is not afraid to fail in order to succeed and as a result accomplishes more than others might attempt.Dr. Tom WoodruffWalden UniversityGeorgetown, TX
Publishing is an expensive venture, time consuming, and most times heartbreaking just trying to get through the door. Who has an easy time with rejection of what may be potentially life changing theories? Join The Refractive Thinker® Family where academic writing is economically published.Dr. Beverly CarterNew Rochelle, New York
The authors contributing to this series are some of the best critical thinkers in their field of study.Dr. Rich SchuttlerPro Progress AcademyPhoenix, AZ
Publishing in The Refractive Thinker® gives me more networking visibility. The prestige that comes with involvement in writing for The Refractive Thinker® is clear.Dr. Judy Fisher-BlandoCapella UniversityLa Mirada, CA
The Refractive Thinker Press is an established brand, doing an incredible job marketing the books and authors on social media. My colleagues expressed their admiration for my publications, seeing my books on Amazon, Barns & Nobles, & other websites/bookstores. I have been invited to several Think-Tanks, fellowships, and Visiting Scholar appointments, where different committee members cited seeing my books in blogs, press-releases, Google Scholar, and university libraries. The RT press increased … Read moreDr. Emad RahimEndowed Entrepreneur-in-Residence, Oklahoma State University Visiting Scholar, Rutgers University
My promotion to full Professor was just approved. According to the feedback I’ve received, my chapter in The Refractive Thinker was a factor in establishing my scholarship credentials.Dr. Joseph PughProfessor
To find the hidden open positions, you have to network with the ‘righ’t people and the members of The Refractive Thinker® community are ‘the right people’. After a recent layoff, I reached out to The Refractive Thinker® community to assist in my job search. Success!Dr. Karleen YappColorado State University-GlobalDelran, New Jersey
Dr. Cheryl is a very brilliant woman, teacher, coach, friend, and a leader. I was attracted to her because of her unselfishness, and a willing heart to not only share the knowledge she has with those around her, but also to empower them to look beyond themselves. Dr. Cheryl, I thank you for everything, your wisdom, coaching, and for giving me a wing to fly on. You are an amazing strong woman and a great friend that shares all she has!Eva KatushabeLas Vegas, NV
“Dear Dr. Cheryl Lentz: As we are working towards completing my book, I find that your editing is very thorough and detailed. I wish many college professors can learn from your style”. Zack Hasan, Ph.D., P.E.
RT Vol XII: Chapter 1: Cybersecurity in Human Resources on Multiple Fronts
From the Book: The Refractive Thinker® Vol XII: CYBERSECURITY
SummaryHuman Resources (HR), as a strategic business component, confronts security on multiple fronts. The concept of security in HR on multiple fronts is unconventional. Using a refractive thinking approach, this includes securing data and applications using cloud technologies, hiring, learning and development, and partnering with information technology(IT) groups to ensure information security of data and applications. Organizations confront a talent shortage in their cybersecurity workforce with HR professionals who may not fully understand the complexity and breadth of information security. Additionally, employees and contractors are likely the most valuable asset and biggest threat to an organization’s line of data defense.
Cyber-attacks increase on a daily basis requiring organizational leaders to prepare people, systems, and processes to cross-functionally handle security. Otherwise, organizations can suffer high cost losses of revenue, talent, data, property, and more. This chapter examines the role of data security in implementing cloud technology for HR, talent acquisition, and security awareness training and development. With senior executive support, HR and IT can partner to provide a solid line of defense for information security.