| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910459858603321 |
|
|
Autore |
Wheatley Margaret J |
|
|
Titolo |
Walk out walk on : a learning journey into communities daring to live the future now / / Margaret Wheatley, Deborah Frieze |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
San Francisco, : Berrett-Koehler, c2011 |
|
|
|
|
|
|
|
ISBN |
|
1-283-00664-2 |
9786613006646 |
1-60509-732-2 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (289 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Communities |
Community development |
Community leadership |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; Our Invitation for How to Read This Book; PART I: LEAVING HOME; Walk Outs Who Walk On; Why We Visit These Communities; Your Hosts (The Authors); Seven Healthy and Resilient Communities; The Role Walk Outs Play in Creating Change; Preparing to Leave Home; The Courage to Quest; Packing for the Journey; PART II: JOURNEYING; Mexico: From Scaling Up to Scaling Across; Brazil: From Power to Play; South Africa: From Problem to Place; Zimbabwe: From Efficiency to Resilience; India: From Transacting to Gifting; Greece: From Intervention to Friendship; United States: From Hero to Host |
PART III: RETURNING HOMEThe Patterns That Connect; Will You Walk On?; Stepping Onto the Invisible Path; PART IV: REFLECTIONS; Choosing to Act; We Never Know Who We Are; Notes; Bibliography; Acknowledgments; Credits and Sources; Index; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; R; S; T; U; V; W; Y; Z; Website; About the Authors; About Berkana |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Bestselling author Margaret Wheatley and long-time Berkana Institute collaborator Deborah Frieze take readers on a learning journey into seven diverse communities that have walked out of limiting beliefs and |
|
|
|
|
|
|
|
|
|
|
|
|
|
practices and walked on to something new. From Brazil to Ohio, they demonstrate how each of these communities made a conscious choice to develop a healthier, more resilient world based on the idea to "create with what we have." |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910220146103321 |
|
|
Autore |
Libicki Martin C. |
|
|
Titolo |
H4ckers5 wanted : an examination of the cybersecurity labor market / / Martin C. Libicki, David Senty, Julia Pollak ; cover design by Dori Walker |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Santa Monica, California : , : RAND, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-8330-8501-8 |
0-8330-8503-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (107 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer crimes - Prevention |
Cyberspace - Security measures |
Professions - Supply and demand |
Hackers |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright; Preface; Contents; Figures and Table; Summary; Acknowledgments; Abbreviations; Prologue; Organization; Chapter One: Why Has Demand Risen Sharply?; The Federal/Military Cybersecurity Workforce Problem; Levels of the Game; Chapter Two: What Others Have Observed; GAO, Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination; Partnership for Public Service and BAH, "Cyber IN-Security: Strengthening the Federal Cybersecurity Workforce"; CSIS Commission on Cybersecurity for the 44th Presidency,; DoD, Cyber Operations Personnel Report |
Homeland Security Advisory Council, Cyber Skills Task Force Repor tAmyas Morse, The UK Cyber Security Strategy: Landscape Review; Other Articles; Conclusions; Chapter Three: Findings from Interviews |
|
|
|
|
|
|
|
|
|
|
|
and Statistics; How Employers Meet their Need for Cybersecurity Professionals; NSA; Central Intelligence Agency; USCYBERCOM; USAF; The Role of Education; Cybersecurity Programs; Overall Statistics; Chapter Four: The Economics of the Cybersecurity Labor Market; A Simplified View of the Labor Market for Cyberprofessionals; The Adjustment of Labor Demand to Shocks; Differences in Human Capital |
Factors Related to Government Agency Characteristics Geographic Considerations; Summary; Chapter Five: Upper-Tier Cybersecurity Professionals and Policy Options; The Search for the Upper-Tier Cybersecurity Professional; Policy Options for Meeting Cybersecurity Needs; Recruit Early; Use Foreign Nationals; Differentiate Job Categories More Precisely; Address Civil Service Issues; Review Veterans' Preferences; Use Guard and Reserve Units; Outsource More; Reducing the Demand for Cybersecurity Professionals; Chapter Six: Conclusions; In the Longer Run; References |
|
|
|
|
|
|
Sommario/riassunto |
|
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years. |
|
|
|
|
|
|
|
| |