

Dominance vs. Prestige: Good Bosses Switch Between Two Leadership Styles
Think back to the last team project you participated in at work. How did the person running the project lead the group? Did they lead by presenting a plan and using their authority to insist that others follow along? Or did the person instead lead by explaining why a particular course of action seemed like the best one, allowing others to willfully get on board? These two leadership styles, which I and other researchers refer to as dominance and prestige, respectively, reflec


The Difference Between Good Leaders and Great Ones
The world tends toward continuums. We order everything from temperature (cold to hot, with tepid in the middle) to wealth (poor to comfortable to rich). Continuity along a linear line, like the inexorable laws of hydrodynamics, helps to capture and comprehend the complexities of science and society, and offers the promise of progress and growth. It’s tempting to think leadership also follows a continuum, one anchored by bad and great, with good somewhere in between. This deep


Expensive IT "glitch": British Airways could face £100m compensation bill over IT meltdown
IT glitch affected more than 1,000 flights over weekend meaning people missed holidays, lost luggage or were stranded on aircraft Disruption at Heathrow Terminal 5 over the bank holiday weekend. Photograph: Jack Taylor/Getty Images British Airways could face a bill of at least £100m in compensation, additional customer care and lost business resulting from an IT meltdown that affected more than 1,000 flights over the weekend. All the airline’s flights from Heathrow and Gatwic


Understanding “virtual” air-traffic control towers
Some airports are closing their most iconic structures and relocating them far away. ONE of the most symbolic images at any airport is the control tower where, from their lofty vantage point, air-traffic controllers monitor flights taking off, coming in to land and taxiing to and from terminals. Increasingly, though, control towers will be shuttered as airports switch to using remote centres to look after flights. These centres will be housed in ordinary low-rise buildings, s
Beyond phishing: Hackers now hiding cyber attacks in social media messages
It took only one attempt for Russian hackers to get into the computer of a Pentagon official. But the attack did not come through an e-mail or a file buried within a seemingly innocuous document. A link, attached to a Twitter post put out by a robot account, promised a family-friendly vacation package for the summer. It was the kind of thing anyone might click on, according to the official hit by the attack, who was not authorised to speak publicly about it. That is exactly t


The Watchers - Assaults on privacy in America
DO PEOPLE BEHAVE DIFFERENTLY when they think they are being watched? Illustration by Davide Bonazzi When former National Security Agency contractor Edward Snowden revealed the mass surveillance of American citizens in June 2013, the question suddenly grew in importance. Can the behavior of an entire population, even in a modern democracy, be changed by awareness of surveillance? And what are the effects of other kinds of privacy invasions? Jon Penney was nearing the end of a


Insights: The Key To The Future Of Data-Driven Smart Cities
Collecting vast amounts of data is all well and good, but you need to be able to do something with it. Pretty much every industry in today’s digital age relies on big data to mould future strategy and solve business problems, but many organisations are still nervous about getting into big data due to the various challenges that accompany it. Collecting data is only worthwhile if you are able to do something with it and that has so far been the message of the day when it comes


Another large-scale cyberattack underway: experts
Another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week's assault on computers worldwide, a global cybersecurity firm told AFP on Wednesday. The new attack targets the same vulnerabilities the WannaCry ransomware worm exploited but, rather than freeze files, uses the hundreds of thousands of computers believed to have been infected to mine virtual currency. Following the detection of the WannaCry attack on Friday, "researchers at Proofpoint