Analysis of industry-specific concentration of CPOs in Fortune 500 companies

References
[1]
Awazu, Y., and Desouza, K.C. The knowledge chiefs: CKOs, CLOs, and CPOs. European Management Journal 22, 3, (2004), 339--344.
[2]
Balasa, B. Trade liberalization and revealed comparative advantage. The Manchester School of Social and Economic Studies, 33, (1965), 99--123.
[3]
Bhatt, G. D., and Stump. R. L. An empirically derived model of the role of IS networks in business process improvement initiatives. Omega, 29, 1, (2001) 29--48.
[4]
California Office of Privacy Protection. Recommended practices on notice on security breach involving personal information. (April 2006). http://www.privacyprotection.ca.gov/recommendations/secbreach.pdf.
[5]
CNN LexisNexis acknowledges more ID theft. (June 2, 2005), http://money.cnn.com/2005/04/12/technology/personaltech/lexis/?cnn=yes.
[6]
FTC. Press release; http://www.ftc.gov/opa/2006/01/choicepoint.htm. (Jan. 26, 2006).
[7]
Hasson, J. 3 principles for chief privacy officers, http://www.fcw.com/article90645.
[8]
Hu, O. and Quan, J. Information intensity and the impact of IT investments on productivity: an industry level perspective. ECIS 2003.
[9]
Lahlou, S. Langheinrich, M. and Rocker, C. Privacy and trust issues with invisible computers. Comm. of the ACM 48, 3, (Mar. 2005) 59--64.
[10]
Pemberton, J.M. Chief Privacy Officer: Your next career? Information Management Journal 36, 3, (2002) 57--58.
[11]
Porter, M. E., and Millar, V. E. How information gives you competitive advantages. Harvard Business Review 63, 4, (1985) 149--160.
[12]
Stiroh, K. J. Computers, productivity, and input substitution. Economic Inquiry 36, 2, (1998), 175--191.
[13]
Vijayan, J. MyDoom lesson, take proactive steps to prevent DDoS attacks. Computerworld, (Feb. 6, 2004).
[14]
Wolff, N. E. (2005). "The growth of information workers in the U.S. economy."
[15]
Comm. of the ACM 48, 10, (Oct. 2005), 37--42.
[16]
Zeller, T. Data security laws seem likely, so consumers and businesses vie to shape them. New York Times (Nov. 12005).
[17]
Zhu, X. K. Strategic investment in information technologies: A real-options and game-theoretic approach. Doctoral dissertation. Stanford University. 1999.
Index Terms
- Analysis of industry-specific concentration of CPOs in Fortune 500 companies
Comments
Information & Contributors
Information
Published In

Copyright © 2009 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 01 April 2009
Published in CACM Volume 52, Issue 4
Check for updates
Qualifiers
- Research-article
- Popular
- Refereed
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 613Total Downloads
- Downloads (Last 12 months)64
- Downloads (Last 6 weeks)10
Reflects downloads up to 28 Feb 2025
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderMagazine Site
View this article on the magazine site (external)
Magazine SiteLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in