top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
Autore Ulsch N. MacDonnell <1951->
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2014
Descrizione fisica 1 online resource (227 p.)
Disciplina 658.4/78
Collana Wiley Corporate F&A
Soggetto topico Corporations - Security measures
Business enterprises - Computer networks - Security measures
Computer crimes - Prevention
Computer security
Computer networks - Security measures
ISBN 1-118-93595-0
1-118-91502-X
1-118-93596-9
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks; Contents; Foreword; Preface; Acknowledgments; Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming; What Factors Create a Perfect Storm?; Industry Vulnerability; Threat Intensification; Inadequate Government Preparedness; Low Level of Awareness; Inadequate Risk Assessments; Offshoring of Data; Insider Threat; Denial of Vulnerability; Increasingly Sophisticated Attacks; Mobile Devices at Higher Risk; Sometimes Security Just Doesn't Take Hold
It Wasn't Always Like ThisWithout a Bang; A Board Issue; The Cyber Frankenstein Cometh; Defining Success; Notes; Part I: The Cyber Threat to the Corporate Brand: How It Will Impact Your Company; Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact; Is Nothing Sacred?; The Liberty Reserve Case: Money Laundering in the Digital Age; The Corruption Factor; Information Threat, Physical Threat; Notes; Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy; A Case of Cyber Espionage Conspiracy?
According to the Select Committee . . .Notes; Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure; A Disabled America; A New Age: Inspiring Terrorists and Terrorism; A Call Heard Vaguely; Attack upon Attack, No Peace in Sight; Notes; Part II: Corporate Vulnerabilitiesin the Digital Society: Prepare to Defend Yourself and Your Brand; Chapter 4: What Is the True Cost of a Cyber Attack?; Cyber Attack Detection Sometimes Takes Years; One of the First Questions: "How Much Will This Cost?"; A Few Common Cost Factors; What about Unreported Breaches?
Cyber Attacks Result in a Wider Impact: The CommunityNotes; Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand; No Guarantees with This Executive Order; Government-Industry Cooperation: No Silver Bullet; The Challenge of Defining Cyber Public Policy; Cold War II: The Cyber Chapter; Is There a Silver Lining in an Attack?; Notes; Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts; Technology Trend; Loss of Situational Awareness: Distraction; Culture; Technology Is a Double-Edged Sword
NotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. Initiation
2. Discovery and Forensic Evidence Capture
Record Nr. UNINA-9910786630203321
Ulsch N. MacDonnell <1951->  
Hoboken, New Jersey : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
Autore Ulsch N. MacDonnell <1951->
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2014
Descrizione fisica 1 online resource (227 p.)
Disciplina 658.4/78
Collana Wiley Corporate F&A
Soggetto topico Corporations - Security measures
Business enterprises - Computer networks - Security measures
Computer crimes - Prevention
Computer security
Computer networks - Security measures
ISBN 1-118-93595-0
1-118-91502-X
1-118-93596-9
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks; Contents; Foreword; Preface; Acknowledgments; Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming; What Factors Create a Perfect Storm?; Industry Vulnerability; Threat Intensification; Inadequate Government Preparedness; Low Level of Awareness; Inadequate Risk Assessments; Offshoring of Data; Insider Threat; Denial of Vulnerability; Increasingly Sophisticated Attacks; Mobile Devices at Higher Risk; Sometimes Security Just Doesn't Take Hold
It Wasn't Always Like ThisWithout a Bang; A Board Issue; The Cyber Frankenstein Cometh; Defining Success; Notes; Part I: The Cyber Threat to the Corporate Brand: How It Will Impact Your Company; Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact; Is Nothing Sacred?; The Liberty Reserve Case: Money Laundering in the Digital Age; The Corruption Factor; Information Threat, Physical Threat; Notes; Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy; A Case of Cyber Espionage Conspiracy?
According to the Select Committee . . .Notes; Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure; A Disabled America; A New Age: Inspiring Terrorists and Terrorism; A Call Heard Vaguely; Attack upon Attack, No Peace in Sight; Notes; Part II: Corporate Vulnerabilitiesin the Digital Society: Prepare to Defend Yourself and Your Brand; Chapter 4: What Is the True Cost of a Cyber Attack?; Cyber Attack Detection Sometimes Takes Years; One of the First Questions: "How Much Will This Cost?"; A Few Common Cost Factors; What about Unreported Breaches?
Cyber Attacks Result in a Wider Impact: The CommunityNotes; Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand; No Guarantees with This Executive Order; Government-Industry Cooperation: No Silver Bullet; The Challenge of Defining Cyber Public Policy; Cold War II: The Cyber Chapter; Is There a Silver Lining in an Attack?; Notes; Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts; Technology Trend; Loss of Situational Awareness: Distraction; Culture; Technology Is a Double-Edged Sword
NotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. Initiation
2. Discovery and Forensic Evidence Capture
Record Nr. UNINA-9910816453803321
Ulsch N. MacDonnell <1951->  
Hoboken, New Jersey : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Overload! [[electronic resource] ] : how too much information is hazardous to your organization / / Jonathan B. Spira
Overload! [[electronic resource] ] : how too much information is hazardous to your organization / / Jonathan B. Spira
Autore Spira Jonathan B
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, NJ, : Wiley, 2011
Descrizione fisica 1 online resource (284 p.)
Disciplina 658.4/038
658.4038
Soggetto topico Knowledge management
Information resources management
Information technology - Management
Business communication - Management
Soggetto genere / forma Electronic books.
ISBN 1-119-20064-4
1-283-09879-2
9786613098795
1-118-06417-8
1-118-06415-1
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overload!: How Too Much Information is Hazardous to Your Organization; Contents; Foreword: Fighting the Good Fight against Information Bloat; Preface; A Note to the Reader; Acknowledgments; Introduction; The Way Work Was; The Age of the Knowledge Worker; Mark Rivington's Day; A Global Economy; Great Moments and Milestones in Information Overload History; Part I: How We Got Here; Chapter 1: Information, Please?; Chapter 2: History of Information; The Information Revolution and the Book; E-readers Rising; After the Book ... Getting the Word Out; The New News Cycle
Chapter 3: Welcome to the Information AgeIs Software Holding Us Back?; The Tools We Use; Mid-Nineteenth-Century Tools: Groundwork Is Laid; Twentieth-Century Tools: The Foundation for the Information Revolution; Breakthroughs in Productivity; Online Collaboration Makes Its Entrance; Enter Charlie Chaplin; Enter the Office Suite; An Office for the Twenty-First Century; The Problem with Documents; The Collaborative Business Environment; Chapter 4: What Is Information?; Quantifying Information; Why Information Is Exploding; How Information Is Going beyond Network and Storage Capabilities
Structured versus Unstructured InformationData Mining to the Rescue?; Chapter 5: The Information Consumer; Chapter 6: What Is Information Overload?; Meetings: Too Much of a Good Thing?; How Long Has This Been Going On?; More Information - Isn't that What We Wanted?; Information Overload and the Tragedy of the Commons; The Ephemerization of Information; Chapter 7: The Cost of Information Overload; In Search of a Management Science; Chapter 8: What Hath Information Overload Wrought?; Aspects of Information Overload; Information Overload-Related Maladies; The Compatibility Conundrum
Chapter 9: The Two FredsEntitlement; Mad about Information; Work-Life Balance; Chapter 10: Beep. Beep. Beep.; How Much Texting Is Too Much?; Sample Text Phraseology; The Search for Whatever It Is We Are Looking For; Chapter 11: Heading for a Nervous Breakdown; Thinking for a Living; The Roundtable; How the Other Half Lives; The New Busy Is Heading for a Nervous Breakdown; Part II: Where We Are and What We Can Do; Chapter 12: Managing Work and Workers in the Twenty-First Century; Chapter 13: Components of Information Overload; E-mail Overload; Unnecessary Interruptions and Recovery Time
Need for Instant GratificationEverything Is Urgent - and Important; Chapter 14: E-mail; The Cost of Too Much E-mail; E-mail and the Network Effect; Reply to All; Profanity in E-mail (Expletive Deleted); A Day Without E-mail; What to Do With 2.5 Billion E-mail Messages; Deleting E-mail, Deleting Knowledge; Chapter 15: The Googlification of Search; Search and the Quest for the Perfect Dishwasher; The Search Experience; Does the King of the Watusis Drive an Automobile?; Chapter 16: Singletasking; Attention; Three Types of Attention; Automaticity; The Supertaskers Among Us
Chapter 17: Intel's War
Record Nr. UNINA-9910139451003321
Spira Jonathan B  
Hoboken, NJ, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Overload! [[electronic resource] ] : how too much information is hazardous to your organization / / Jonathan B. Spira
Overload! [[electronic resource] ] : how too much information is hazardous to your organization / / Jonathan B. Spira
Autore Spira Jonathan B
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, NJ, : Wiley, 2011
Descrizione fisica 1 online resource (284 p.)
Disciplina 658.4/038
658.4038
Soggetto topico Knowledge management
Information resources management
Information technology - Management
Business communication - Management
ISBN 1-119-20064-4
1-283-09879-2
9786613098795
1-118-06417-8
1-118-06415-1
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overload!: How Too Much Information is Hazardous to Your Organization; Contents; Foreword: Fighting the Good Fight against Information Bloat; Preface; A Note to the Reader; Acknowledgments; Introduction; The Way Work Was; The Age of the Knowledge Worker; Mark Rivington's Day; A Global Economy; Great Moments and Milestones in Information Overload History; Part I: How We Got Here; Chapter 1: Information, Please?; Chapter 2: History of Information; The Information Revolution and the Book; E-readers Rising; After the Book ... Getting the Word Out; The New News Cycle
Chapter 3: Welcome to the Information AgeIs Software Holding Us Back?; The Tools We Use; Mid-Nineteenth-Century Tools: Groundwork Is Laid; Twentieth-Century Tools: The Foundation for the Information Revolution; Breakthroughs in Productivity; Online Collaboration Makes Its Entrance; Enter Charlie Chaplin; Enter the Office Suite; An Office for the Twenty-First Century; The Problem with Documents; The Collaborative Business Environment; Chapter 4: What Is Information?; Quantifying Information; Why Information Is Exploding; How Information Is Going beyond Network and Storage Capabilities
Structured versus Unstructured InformationData Mining to the Rescue?; Chapter 5: The Information Consumer; Chapter 6: What Is Information Overload?; Meetings: Too Much of a Good Thing?; How Long Has This Been Going On?; More Information - Isn't that What We Wanted?; Information Overload and the Tragedy of the Commons; The Ephemerization of Information; Chapter 7: The Cost of Information Overload; In Search of a Management Science; Chapter 8: What Hath Information Overload Wrought?; Aspects of Information Overload; Information Overload-Related Maladies; The Compatibility Conundrum
Chapter 9: The Two FredsEntitlement; Mad about Information; Work-Life Balance; Chapter 10: Beep. Beep. Beep.; How Much Texting Is Too Much?; Sample Text Phraseology; The Search for Whatever It Is We Are Looking For; Chapter 11: Heading for a Nervous Breakdown; Thinking for a Living; The Roundtable; How the Other Half Lives; The New Busy Is Heading for a Nervous Breakdown; Part II: Where We Are and What We Can Do; Chapter 12: Managing Work and Workers in the Twenty-First Century; Chapter 13: Components of Information Overload; E-mail Overload; Unnecessary Interruptions and Recovery Time
Need for Instant GratificationEverything Is Urgent - and Important; Chapter 14: E-mail; The Cost of Too Much E-mail; E-mail and the Network Effect; Reply to All; Profanity in E-mail (Expletive Deleted); A Day Without E-mail; What to Do With 2.5 Billion E-mail Messages; Deleting E-mail, Deleting Knowledge; Chapter 15: The Googlification of Search; Search and the Quest for the Perfect Dishwasher; The Search Experience; Does the King of the Watusis Drive an Automobile?; Chapter 16: Singletasking; Attention; Three Types of Attention; Automaticity; The Supertaskers Among Us
Chapter 17: Intel's War
Record Nr. UNINA-9910830705803321
Spira Jonathan B  
Hoboken, NJ, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Overload! : how too much information is hazardous to your organization / / Jonathan B. Spira
Overload! : how too much information is hazardous to your organization / / Jonathan B. Spira
Autore Spira Jonathan B
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, NJ, : Wiley, 2011
Descrizione fisica 1 online resource (284 p.)
Disciplina 658.4/038
658.4038
Soggetto topico Knowledge management
Information resources management
Information technology - Management
Business communication - Management
ISBN 9786613098795
9781119200642
1119200644
9781283098793
1283098792
9781118064177
1118064178
9781118064153
1118064151
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overload!: How Too Much Information is Hazardous to Your Organization; Contents; Foreword: Fighting the Good Fight against Information Bloat; Preface; A Note to the Reader; Acknowledgments; Introduction; The Way Work Was; The Age of the Knowledge Worker; Mark Rivington's Day; A Global Economy; Great Moments and Milestones in Information Overload History; Part I: How We Got Here; Chapter 1: Information, Please?; Chapter 2: History of Information; The Information Revolution and the Book; E-readers Rising; After the Book ... Getting the Word Out; The New News Cycle
Chapter 3: Welcome to the Information AgeIs Software Holding Us Back?; The Tools We Use; Mid-Nineteenth-Century Tools: Groundwork Is Laid; Twentieth-Century Tools: The Foundation for the Information Revolution; Breakthroughs in Productivity; Online Collaboration Makes Its Entrance; Enter Charlie Chaplin; Enter the Office Suite; An Office for the Twenty-First Century; The Problem with Documents; The Collaborative Business Environment; Chapter 4: What Is Information?; Quantifying Information; Why Information Is Exploding; How Information Is Going beyond Network and Storage Capabilities
Structured versus Unstructured InformationData Mining to the Rescue?; Chapter 5: The Information Consumer; Chapter 6: What Is Information Overload?; Meetings: Too Much of a Good Thing?; How Long Has This Been Going On?; More Information - Isn't that What We Wanted?; Information Overload and the Tragedy of the Commons; The Ephemerization of Information; Chapter 7: The Cost of Information Overload; In Search of a Management Science; Chapter 8: What Hath Information Overload Wrought?; Aspects of Information Overload; Information Overload-Related Maladies; The Compatibility Conundrum
Chapter 9: The Two FredsEntitlement; Mad about Information; Work-Life Balance; Chapter 10: Beep. Beep. Beep.; How Much Texting Is Too Much?; Sample Text Phraseology; The Search for Whatever It Is We Are Looking For; Chapter 11: Heading for a Nervous Breakdown; Thinking for a Living; The Roundtable; How the Other Half Lives; The New Busy Is Heading for a Nervous Breakdown; Part II: Where We Are and What We Can Do; Chapter 12: Managing Work and Workers in the Twenty-First Century; Chapter 13: Components of Information Overload; E-mail Overload; Unnecessary Interruptions and Recovery Time
Need for Instant GratificationEverything Is Urgent - and Important; Chapter 14: E-mail; The Cost of Too Much E-mail; E-mail and the Network Effect; Reply to All; Profanity in E-mail (Expletive Deleted); A Day Without E-mail; What to Do With 2.5 Billion E-mail Messages; Deleting E-mail, Deleting Knowledge; Chapter 15: The Googlification of Search; Search and the Quest for the Perfect Dishwasher; The Search Experience; Does the King of the Watusis Drive an Automobile?; Chapter 16: Singletasking; Attention; Three Types of Attention; Automaticity; The Supertaskers Among Us
Chapter 17: Intel's War
Altri titoli varianti How too much information is hazardous to your organization
Record Nr. UNINA-9911020003903321
Spira Jonathan B  
Hoboken, NJ, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets
Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets
Autore Smallwood Robert F. <1959->
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Wiley, 2012
Descrizione fisica 1 online resource (285 p.)
Disciplina 005.8
658.472
Soggetto topico BUSINESS & ECONOMICS / Information Management
Computer security
Cyberspace - Security measures
Cyberspace -- Security measures
Database security
Electronic records
Computer security - Security measures
Cyberspace
ISBN 9786613703163
9781119204909
1119204909
9781280792779
1280792779
9781118286876
1118286871
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Safeguarding Critical E-Documents; Contents; Foreword; Preface; Acknowledgments; PART I THE PROBLEM AND BASIC TOOLS; CHAPTER 1 The Problem: Securing Confidential Electronic Documents; WikiLeaks: A Wake-Up Call; U.S. Government Attempts to Protect Intellectual Property; Threats Persist across the Pond: U.K. Companies on Guard; Increase in Corporate and Industrial Espionage; Risks of Medical Identity Theft; Why Don't Organizations Safeguard Their Information Assets?; The Blame Game: Where Does Fault Lie When Information Is Leaked?; Consequences of Not Employing E-Document Security; Notes
CHAPTER 2 Information Governance: The Crucial First Step First, Better Policies; Then, Better Technology for Better Enforcement; Defining Information Governance; Accountability Is Key; Why IG Is Good Business; Impact of a Successful IG Program; Critical Factors in an IG Program; Who Should Determine IG Policies?; Notes; PART II Information Platform Risks and Countermeasures; CHAPTER 3 Managing E-Documents and Records; Enterprise Content Management; Document Management Principles; The Goal: Document Lifecycle Security; Electronic Document Management Systems; Records Management Principles
Electronic Records Management Notes; CHAPTER 4 Information Governance and Security for E-mail Messages; Employees Regularly Expose Organizations to E-mail Risk; E-mail Policies Should Be Realistic and Technology Agnostic; Is E-mail Encryption the Answer?; Common E-mail Security Mistakes; E-mail Security Myths; E-record Retention: Fundamentally a Legal Issue; Preserve E-mail Integrity and Admissibility with Automatic Archiving; E-mail Archiving Rationale: Compliance, Legal, and Business Reasons; Don't Confuse E-mail Archiving with Backup; No Personal Archiving in the Workplace
Are All E-mails Records?Destructive Retention of E-mail; Notes; CHAPTER 5 Information Governance and Security for Instant Messaging; Instant Messaging Security Threats; Stealing Information through Hijacking and Impersonation; Denial-of-Service Attacks Freeze Access; Network Sniffers and Unauthorized Disclosure of Information Assets; Best Practices for Business IM Use; Technology to Monitor IM; Tips for Safer IM; Notes; CHAPTER 6 Information Governance and Security for Social Media; Types of Social Media in Web 2.0; Social Media in the Enterprise
Key Ways Social Media Is Different from E-mail and Instant Messaging Biggest Security Threats of Social Media; Legal Risks of Social Media Posts; Tools to Archive Facebook and Twitter; IG Considerations for Social Media; Notes; CHAPTER 7 Information Governance and Security for Mobile Devices; Current Trends in Mobile Computing; Security Risks of Mobile Computing; Securing Mobile Data; IG for Mobile Computing; Building Security into Mobile Applications; Real Threats Are Poorly Understood; Innovation versus Security: Choices and Trade-Offs; Best Practices to Secure Mobile Applications; Notes
CHAPTER 8 Information Governance and Security for Cloud Computing Use
Record Nr. UNINA-9910141258503321
Smallwood Robert F. <1959->  
New York, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
Autore Roberts Dan
Edizione [Second edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2014]
Descrizione fisica 1 online resource (242 p.)
Disciplina 004.068
Collana Wiley CIO series
Soggetto topico Business - Data processing
Information technology - Management
ISBN 1-118-82467-9
1-118-82452-0
1-118-82472-5
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Foreword; Preface; Acknowledgments; About the Contributing Authors; Chapter 1 Creating Your Twenty-First-Century Workforce and Culture; Core Skills for Success; Assess Your Core Competencies; Who Will Benefit Most?; Getting the Most out of This Book; Chapter 2 Transforming Your IT Team; How to Make This Transition: Learn to Think Differently; Mind-Set Change 1: Force Yourself to Plan and Think of the Big Picture; Mind-Set Change 2: Adopt a Proactive Approach; Mind-Set Change 3: Resist the Temptation to Delve into Tactics
Mind-Set Change 4: Be Candid with Yourself and Others Mind-Set Change 5: Prepare for and Embrace Change; Mind-Set Change 6: Anticipate, Understand, Respect, and Work through Complexities; Five Critical Success Factors That Enable IT Organizational Excellence; Leadership: Positively Influence and Inspire Others; Strategy: Establish the Right Game Plan for Your Organization; People: Hire and Professionally Develop Your Winning Team; Best Practices: Select and Customize Them to Fit Your Organization
Execution: Translate Your Strategy, Goals, and Initiatives into Specific Action Plans That Deliver Measurable Results Conclusion; Chapter 3 Driving Change with Intent; Defining Terms; The Components of Change; Achieving Commitment Is Essential for Sustaining Change; Change Takes a Community; Change Leaders; Change Agents; Change Advocates; Clarity Precedes Activity; Making the Case for Change; Ensuring a Clear Path Forward; Messaging the Change; Conclusion; Chapter 4 Building a Client-Focused IT Culture; What Good Service Looks Like; Service Skills for a New Mind-Set
Developing a ''We'' Mentality Learning to Love Complaints; Making Every Interaction Count; Strategies for Developing a Service Mentality; Never Let It Go; Clearly Define Your Service Level Offerings; Engage Your Clients in the Culture Shift; Conclusion; Chapter 5 Evolving into the Role of Consultant; What Is the Consultant's Role?; Why Do I Need to Become More Consultative?; Learning to Change Hats: The Four Roles of IT; How Do I Become a Consultant?; Business Acumen; Human Interaction Skills; How Difficult Can This Be?; Conclusion
Chapter 6 Negotiating: Getting What You Want without Damaging the Relationship Position versus Interest Negotiations; Three Steps and Three Key Factors; Negotiation Elements; People and Relationships; Styles and Situations; Applying the Key Factors to the Second Step: Information Exchange; The Final Step: Now Comes the Bargaining; Conclusion; Chapter 7 Sharpening Your Political Savvy; Picturing Yourself as a Political Player; IT and Politics: Historically Strange Bedfellows; A Five-Step Process for Developing Political Awareness; Start Your Radar; Determine Where the Power Bases Are
Distinguish Your Enemies from Your Allies
Record Nr. UNINA-9910139044603321
Roberts Dan  
Hoboken, New Jersey : , : Wiley, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
Autore Roberts Dan (Dan D.), <1963->
Edizione [Second edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2014]
Descrizione fisica 1 online resource (242 p.)
Disciplina 004.068
Collana Wiley CIO series
Soggetto topico Business - Data processing
Information technology - Management
ISBN 9781118824672
1118824679
9781118824528
1118824520
9781118824726
1118824725
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Foreword; Preface; Acknowledgments; About the Contributing Authors; Chapter 1 Creating Your Twenty-First-Century Workforce and Culture; Core Skills for Success; Assess Your Core Competencies; Who Will Benefit Most?; Getting the Most out of This Book; Chapter 2 Transforming Your IT Team; How to Make This Transition: Learn to Think Differently; Mind-Set Change 1: Force Yourself to Plan and Think of the Big Picture; Mind-Set Change 2: Adopt a Proactive Approach; Mind-Set Change 3: Resist the Temptation to Delve into Tactics
Mind-Set Change 4: Be Candid with Yourself and Others Mind-Set Change 5: Prepare for and Embrace Change; Mind-Set Change 6: Anticipate, Understand, Respect, and Work through Complexities; Five Critical Success Factors That Enable IT Organizational Excellence; Leadership: Positively Influence and Inspire Others; Strategy: Establish the Right Game Plan for Your Organization; People: Hire and Professionally Develop Your Winning Team; Best Practices: Select and Customize Them to Fit Your Organization
Execution: Translate Your Strategy, Goals, and Initiatives into Specific Action Plans That Deliver Measurable Results Conclusion; Chapter 3 Driving Change with Intent; Defining Terms; The Components of Change; Achieving Commitment Is Essential for Sustaining Change; Change Takes a Community; Change Leaders; Change Agents; Change Advocates; Clarity Precedes Activity; Making the Case for Change; Ensuring a Clear Path Forward; Messaging the Change; Conclusion; Chapter 4 Building a Client-Focused IT Culture; What Good Service Looks Like; Service Skills for a New Mind-Set
Developing a ''We'' Mentality Learning to Love Complaints; Making Every Interaction Count; Strategies for Developing a Service Mentality; Never Let It Go; Clearly Define Your Service Level Offerings; Engage Your Clients in the Culture Shift; Conclusion; Chapter 5 Evolving into the Role of Consultant; What Is the Consultant's Role?; Why Do I Need to Become More Consultative?; Learning to Change Hats: The Four Roles of IT; How Do I Become a Consultant?; Business Acumen; Human Interaction Skills; How Difficult Can This Be?; Conclusion
Chapter 6 Negotiating: Getting What You Want without Damaging the Relationship Position versus Interest Negotiations; Three Steps and Three Key Factors; Negotiation Elements; People and Relationships; Styles and Situations; Applying the Key Factors to the Second Step: Information Exchange; The Final Step: Now Comes the Bargaining; Conclusion; Chapter 7 Sharpening Your Political Savvy; Picturing Yourself as a Political Player; IT and Politics: Historically Strange Bedfellows; A Five-Step Process for Developing Political Awareness; Start Your Radar; Determine Where the Power Bases Are
Distinguish Your Enemies from Your Allies
Record Nr. UNINA-9910821414503321
Roberts Dan (Dan D.), <1963->  
Hoboken, New Jersey : , : Wiley, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unleashing the power of IT [[electronic resource] ] : bringing people, business, and technology together / / Dan Roberts
Unleashing the power of IT [[electronic resource] ] : bringing people, business, and technology together / / Dan Roberts
Autore Roberts Dan (Dan D.), <1963->
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, N.J., : John Wiley & Sons, 2011
Descrizione fisica 1 online resource (290 p.)
Disciplina 004.068
Collana Wiley CIO
Soggetto topico Information technology - Management
ISBN 1-118-04450-9
1-283-05276-8
9786613052766
1-118-04447-9
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Unleashing the Power of IT: Bringing People, Business, and Technology Together; Contents; Foreword; Preface; Acknowledgments; 1 Creating Your Twenty-First Century Workforce and Culture; Core Skills for Success; A Consistent Terminology; Who Will Benefit Most; Leveraging This Book; 2 Transforming Your IT Team; How to Make This Transition: Learn to Think Differently; Five Critical Success Factors that Enable IT Organizational Excellence; Conclusion: High-Performance Reality; 3 Building a Client-Focused IT Culture; What Good Service Looks Like; Service Skills and Mindsets
Strategies for Developing a Service Mentality Conclusion; 4 Evolving into the Role of Consultant; What Exactly Is a Consultant's Role, Anyway?; Why Do I Need to Become More Consultative?; Learning to Change Hats: The Four Roles of IT; So, How Do I Become a Consultant?; How Difficult Can This Be?; Conclusion; 5 Negotiating: Getting What You Want without Damaging the Relationship; Position versus Interest Negotiations; Three Key Factors; Three-Step Process; Applying the Key Factors to the Second Step: Information Exchange; The Final Step: Now Comes the Bargaining
Conclusion: Effective Negotiators Are Made, Not Born Notes; 6 Managing Projects: The Science and the Art; The Building Blocks of Project Management; Structuring Projects for Success; Developing Plans that Work; Managing to Successful Completion; The Four Tenets of the Project Manager's Mindset; Conclusion: Thinking like a Project Manager; 7 Changing Your Requirements- Gathering Mindset; The What, Not the How; The Importance of the Interview; Communicating through Pictures; Writing a Solid Requirements Document; Conclusion; 8 Sharpening Your Political Savvy
Picturing Yourself as a Political Player IT and Politics: Historically Strange Bedfellows; A Five-Step Process for Developing Political Awareness; Developing Political Skills; Conclusion; 9 Marketing IT's Value; Marketing to the IT Department; Build Partnerships; Differentiate Yourself; Establish Credibility; Create Product and Service Awareness; Develop a Formal Plan; Determining Success; Conclusion; 10 Managing the Vendor Relationship; Both Sides of the Coin; Preparing for a New Role; Getting a Fresh Start; Seven Phases of Managing Vendor Partnerships; Conclusion
11 Driving Change with IntentDefining Terms; The Components of Change; Achieving Commitment Is Essential for Sustaining Change; Change Takes a Community; Clarity Precedes Activity; Messaging the Change; Conclusion; 12 Putting the Book into Action: Stories from the Trenches; A Newly Consultative IT Function Helps Drive St. Luke's Health System Transformation; At Marriott, a Transformed IT-Business Relationship Is the Underpinning for Hospitality Giant's Success; At Bowdoin College, Trust in IT Created a Culture of Change within a Haven of Liberal Arts; Conclusion
A Call to Action: Create Your Road Map for IT Transformation
Record Nr. UNINA-9910789606603321
Roberts Dan (Dan D.), <1963->  
Hoboken, N.J., : John Wiley & Sons, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
Autore Roberts Dan (Dan D.), <1963->
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, N.J., : John Wiley & Sons, 2011
Descrizione fisica 1 online resource (290 p.)
Disciplina 004.068
Collana Wiley CIO
Soggetto topico Information technology - Management
ISBN 9786613052766
9781118044506
1118044509
9781283052764
1283052768
9781118044476
1118044479
Classificazione BUS083000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Unleashing the Power of IT: Bringing People, Business, and Technology Together; Contents; Foreword; Preface; Acknowledgments; 1 Creating Your Twenty-First Century Workforce and Culture; Core Skills for Success; A Consistent Terminology; Who Will Benefit Most; Leveraging This Book; 2 Transforming Your IT Team; How to Make This Transition: Learn to Think Differently; Five Critical Success Factors that Enable IT Organizational Excellence; Conclusion: High-Performance Reality; 3 Building a Client-Focused IT Culture; What Good Service Looks Like; Service Skills and Mindsets
Strategies for Developing a Service Mentality Conclusion; 4 Evolving into the Role of Consultant; What Exactly Is a Consultant's Role, Anyway?; Why Do I Need to Become More Consultative?; Learning to Change Hats: The Four Roles of IT; So, How Do I Become a Consultant?; How Difficult Can This Be?; Conclusion; 5 Negotiating: Getting What You Want without Damaging the Relationship; Position versus Interest Negotiations; Three Key Factors; Three-Step Process; Applying the Key Factors to the Second Step: Information Exchange; The Final Step: Now Comes the Bargaining
Conclusion: Effective Negotiators Are Made, Not Born Notes; 6 Managing Projects: The Science and the Art; The Building Blocks of Project Management; Structuring Projects for Success; Developing Plans that Work; Managing to Successful Completion; The Four Tenets of the Project Manager's Mindset; Conclusion: Thinking like a Project Manager; 7 Changing Your Requirements- Gathering Mindset; The What, Not the How; The Importance of the Interview; Communicating through Pictures; Writing a Solid Requirements Document; Conclusion; 8 Sharpening Your Political Savvy
Picturing Yourself as a Political Player IT and Politics: Historically Strange Bedfellows; A Five-Step Process for Developing Political Awareness; Developing Political Skills; Conclusion; 9 Marketing IT's Value; Marketing to the IT Department; Build Partnerships; Differentiate Yourself; Establish Credibility; Create Product and Service Awareness; Develop a Formal Plan; Determining Success; Conclusion; 10 Managing the Vendor Relationship; Both Sides of the Coin; Preparing for a New Role; Getting a Fresh Start; Seven Phases of Managing Vendor Partnerships; Conclusion
11 Driving Change with IntentDefining Terms; The Components of Change; Achieving Commitment Is Essential for Sustaining Change; Change Takes a Community; Clarity Precedes Activity; Messaging the Change; Conclusion; 12 Putting the Book into Action: Stories from the Trenches; A Newly Consultative IT Function Helps Drive St. Luke's Health System Transformation; At Marriott, a Transformed IT-Business Relationship Is the Underpinning for Hospitality Giant's Success; At Bowdoin College, Trust in IT Created a Culture of Change within a Haven of Liberal Arts; Conclusion
A Call to Action: Create Your Road Map for IT Transformation
Record Nr. UNINA-9910962622503321
Roberts Dan (Dan D.), <1963->  
Hoboken, N.J., : John Wiley & Sons, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui