Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
| Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch |
| Autore | Ulsch N. MacDonnell <1951-> |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (227 p.) |
| Disciplina | 658.4/78 |
| Collana | Wiley Corporate F&A |
| Soggetto topico |
Corporations - Security measures
Business enterprises - Computer networks - Security measures Computer crimes - Prevention Computer security Computer networks - Security measures |
| ISBN |
1-118-93595-0
1-118-91502-X 1-118-93596-9 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks; Contents; Foreword; Preface; Acknowledgments; Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming; What Factors Create a Perfect Storm?; Industry Vulnerability; Threat Intensification; Inadequate Government Preparedness; Low Level of Awareness; Inadequate Risk Assessments; Offshoring of Data; Insider Threat; Denial of Vulnerability; Increasingly Sophisticated Attacks; Mobile Devices at Higher Risk; Sometimes Security Just Doesn't Take Hold
It Wasn't Always Like ThisWithout a Bang; A Board Issue; The Cyber Frankenstein Cometh; Defining Success; Notes; Part I: The Cyber Threat to the Corporate Brand: How It Will Impact Your Company; Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact; Is Nothing Sacred?; The Liberty Reserve Case: Money Laundering in the Digital Age; The Corruption Factor; Information Threat, Physical Threat; Notes; Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy; A Case of Cyber Espionage Conspiracy? According to the Select Committee . . .Notes; Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure; A Disabled America; A New Age: Inspiring Terrorists and Terrorism; A Call Heard Vaguely; Attack upon Attack, No Peace in Sight; Notes; Part II: Corporate Vulnerabilitiesin the Digital Society: Prepare to Defend Yourself and Your Brand; Chapter 4: What Is the True Cost of a Cyber Attack?; Cyber Attack Detection Sometimes Takes Years; One of the First Questions: "How Much Will This Cost?"; A Few Common Cost Factors; What about Unreported Breaches? Cyber Attacks Result in a Wider Impact: The CommunityNotes; Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand; No Guarantees with This Executive Order; Government-Industry Cooperation: No Silver Bullet; The Challenge of Defining Cyber Public Policy; Cold War II: The Cyber Chapter; Is There a Silver Lining in an Attack?; Notes; Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts; Technology Trend; Loss of Situational Awareness: Distraction; Culture; Technology Is a Double-Edged Sword NotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. Initiation 2. Discovery and Forensic Evidence Capture |
| Record Nr. | UNINA-9910786630203321 |
Ulsch N. MacDonnell <1951->
|
||
| Hoboken, New Jersey : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch
| Cyber threat! : how to manage the growing risk of cyber attacks / / N. MacDonnell Ulsch |
| Autore | Ulsch N. MacDonnell <1951-> |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (227 p.) |
| Disciplina | 658.4/78 |
| Collana | Wiley Corporate F&A |
| Soggetto topico |
Corporations - Security measures
Business enterprises - Computer networks - Security measures Computer crimes - Prevention Computer security Computer networks - Security measures |
| ISBN |
1-118-93595-0
1-118-91502-X 1-118-93596-9 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks; Contents; Foreword; Preface; Acknowledgments; Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming; What Factors Create a Perfect Storm?; Industry Vulnerability; Threat Intensification; Inadequate Government Preparedness; Low Level of Awareness; Inadequate Risk Assessments; Offshoring of Data; Insider Threat; Denial of Vulnerability; Increasingly Sophisticated Attacks; Mobile Devices at Higher Risk; Sometimes Security Just Doesn't Take Hold
It Wasn't Always Like ThisWithout a Bang; A Board Issue; The Cyber Frankenstein Cometh; Defining Success; Notes; Part I: The Cyber Threat to the Corporate Brand: How It Will Impact Your Company; Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact; Is Nothing Sacred?; The Liberty Reserve Case: Money Laundering in the Digital Age; The Corruption Factor; Information Threat, Physical Threat; Notes; Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy; A Case of Cyber Espionage Conspiracy? According to the Select Committee . . .Notes; Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure; A Disabled America; A New Age: Inspiring Terrorists and Terrorism; A Call Heard Vaguely; Attack upon Attack, No Peace in Sight; Notes; Part II: Corporate Vulnerabilitiesin the Digital Society: Prepare to Defend Yourself and Your Brand; Chapter 4: What Is the True Cost of a Cyber Attack?; Cyber Attack Detection Sometimes Takes Years; One of the First Questions: "How Much Will This Cost?"; A Few Common Cost Factors; What about Unreported Breaches? Cyber Attacks Result in a Wider Impact: The CommunityNotes; Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand; No Guarantees with This Executive Order; Government-Industry Cooperation: No Silver Bullet; The Challenge of Defining Cyber Public Policy; Cold War II: The Cyber Chapter; Is There a Silver Lining in an Attack?; Notes; Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts; Technology Trend; Loss of Situational Awareness: Distraction; Culture; Technology Is a Double-Edged Sword NotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. Initiation 2. Discovery and Forensic Evidence Capture |
| Record Nr. | UNINA-9910816453803321 |
Ulsch N. MacDonnell <1951->
|
||
| Hoboken, New Jersey : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Overload! [[electronic resource] ] : how too much information is hazardous to your organization / / Jonathan B. Spira
| Overload! [[electronic resource] ] : how too much information is hazardous to your organization / / Jonathan B. Spira |
| Autore | Spira Jonathan B |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, NJ, : Wiley, 2011 |
| Descrizione fisica | 1 online resource (284 p.) |
| Disciplina |
658.4/038
658.4038 |
| Soggetto topico |
Knowledge management
Information resources management Information technology - Management Business communication - Management |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-119-20064-4
1-283-09879-2 9786613098795 1-118-06417-8 1-118-06415-1 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Overload!: How Too Much Information is Hazardous to Your Organization; Contents; Foreword: Fighting the Good Fight against Information Bloat; Preface; A Note to the Reader; Acknowledgments; Introduction; The Way Work Was; The Age of the Knowledge Worker; Mark Rivington's Day; A Global Economy; Great Moments and Milestones in Information Overload History; Part I: How We Got Here; Chapter 1: Information, Please?; Chapter 2: History of Information; The Information Revolution and the Book; E-readers Rising; After the Book ... Getting the Word Out; The New News Cycle
Chapter 3: Welcome to the Information AgeIs Software Holding Us Back?; The Tools We Use; Mid-Nineteenth-Century Tools: Groundwork Is Laid; Twentieth-Century Tools: The Foundation for the Information Revolution; Breakthroughs in Productivity; Online Collaboration Makes Its Entrance; Enter Charlie Chaplin; Enter the Office Suite; An Office for the Twenty-First Century; The Problem with Documents; The Collaborative Business Environment; Chapter 4: What Is Information?; Quantifying Information; Why Information Is Exploding; How Information Is Going beyond Network and Storage Capabilities Structured versus Unstructured InformationData Mining to the Rescue?; Chapter 5: The Information Consumer; Chapter 6: What Is Information Overload?; Meetings: Too Much of a Good Thing?; How Long Has This Been Going On?; More Information - Isn't that What We Wanted?; Information Overload and the Tragedy of the Commons; The Ephemerization of Information; Chapter 7: The Cost of Information Overload; In Search of a Management Science; Chapter 8: What Hath Information Overload Wrought?; Aspects of Information Overload; Information Overload-Related Maladies; The Compatibility Conundrum Chapter 9: The Two FredsEntitlement; Mad about Information; Work-Life Balance; Chapter 10: Beep. Beep. Beep.; How Much Texting Is Too Much?; Sample Text Phraseology; The Search for Whatever It Is We Are Looking For; Chapter 11: Heading for a Nervous Breakdown; Thinking for a Living; The Roundtable; How the Other Half Lives; The New Busy Is Heading for a Nervous Breakdown; Part II: Where We Are and What We Can Do; Chapter 12: Managing Work and Workers in the Twenty-First Century; Chapter 13: Components of Information Overload; E-mail Overload; Unnecessary Interruptions and Recovery Time Need for Instant GratificationEverything Is Urgent - and Important; Chapter 14: E-mail; The Cost of Too Much E-mail; E-mail and the Network Effect; Reply to All; Profanity in E-mail (Expletive Deleted); A Day Without E-mail; What to Do With 2.5 Billion E-mail Messages; Deleting E-mail, Deleting Knowledge; Chapter 15: The Googlification of Search; Search and the Quest for the Perfect Dishwasher; The Search Experience; Does the King of the Watusis Drive an Automobile?; Chapter 16: Singletasking; Attention; Three Types of Attention; Automaticity; The Supertaskers Among Us Chapter 17: Intel's War |
| Record Nr. | UNINA-9910139451003321 |
Spira Jonathan B
|
||
| Hoboken, NJ, : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Overload! [[electronic resource] ] : how too much information is hazardous to your organization / / Jonathan B. Spira
| Overload! [[electronic resource] ] : how too much information is hazardous to your organization / / Jonathan B. Spira |
| Autore | Spira Jonathan B |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, NJ, : Wiley, 2011 |
| Descrizione fisica | 1 online resource (284 p.) |
| Disciplina |
658.4/038
658.4038 |
| Soggetto topico |
Knowledge management
Information resources management Information technology - Management Business communication - Management |
| ISBN |
1-119-20064-4
1-283-09879-2 9786613098795 1-118-06417-8 1-118-06415-1 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Overload!: How Too Much Information is Hazardous to Your Organization; Contents; Foreword: Fighting the Good Fight against Information Bloat; Preface; A Note to the Reader; Acknowledgments; Introduction; The Way Work Was; The Age of the Knowledge Worker; Mark Rivington's Day; A Global Economy; Great Moments and Milestones in Information Overload History; Part I: How We Got Here; Chapter 1: Information, Please?; Chapter 2: History of Information; The Information Revolution and the Book; E-readers Rising; After the Book ... Getting the Word Out; The New News Cycle
Chapter 3: Welcome to the Information AgeIs Software Holding Us Back?; The Tools We Use; Mid-Nineteenth-Century Tools: Groundwork Is Laid; Twentieth-Century Tools: The Foundation for the Information Revolution; Breakthroughs in Productivity; Online Collaboration Makes Its Entrance; Enter Charlie Chaplin; Enter the Office Suite; An Office for the Twenty-First Century; The Problem with Documents; The Collaborative Business Environment; Chapter 4: What Is Information?; Quantifying Information; Why Information Is Exploding; How Information Is Going beyond Network and Storage Capabilities Structured versus Unstructured InformationData Mining to the Rescue?; Chapter 5: The Information Consumer; Chapter 6: What Is Information Overload?; Meetings: Too Much of a Good Thing?; How Long Has This Been Going On?; More Information - Isn't that What We Wanted?; Information Overload and the Tragedy of the Commons; The Ephemerization of Information; Chapter 7: The Cost of Information Overload; In Search of a Management Science; Chapter 8: What Hath Information Overload Wrought?; Aspects of Information Overload; Information Overload-Related Maladies; The Compatibility Conundrum Chapter 9: The Two FredsEntitlement; Mad about Information; Work-Life Balance; Chapter 10: Beep. Beep. Beep.; How Much Texting Is Too Much?; Sample Text Phraseology; The Search for Whatever It Is We Are Looking For; Chapter 11: Heading for a Nervous Breakdown; Thinking for a Living; The Roundtable; How the Other Half Lives; The New Busy Is Heading for a Nervous Breakdown; Part II: Where We Are and What We Can Do; Chapter 12: Managing Work and Workers in the Twenty-First Century; Chapter 13: Components of Information Overload; E-mail Overload; Unnecessary Interruptions and Recovery Time Need for Instant GratificationEverything Is Urgent - and Important; Chapter 14: E-mail; The Cost of Too Much E-mail; E-mail and the Network Effect; Reply to All; Profanity in E-mail (Expletive Deleted); A Day Without E-mail; What to Do With 2.5 Billion E-mail Messages; Deleting E-mail, Deleting Knowledge; Chapter 15: The Googlification of Search; Search and the Quest for the Perfect Dishwasher; The Search Experience; Does the King of the Watusis Drive an Automobile?; Chapter 16: Singletasking; Attention; Three Types of Attention; Automaticity; The Supertaskers Among Us Chapter 17: Intel's War |
| Record Nr. | UNINA-9910830705803321 |
Spira Jonathan B
|
||
| Hoboken, NJ, : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Overload! : how too much information is hazardous to your organization / / Jonathan B. Spira
| Overload! : how too much information is hazardous to your organization / / Jonathan B. Spira |
| Autore | Spira Jonathan B |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, NJ, : Wiley, 2011 |
| Descrizione fisica | 1 online resource (284 p.) |
| Disciplina |
658.4/038
658.4038 |
| Soggetto topico |
Knowledge management
Information resources management Information technology - Management Business communication - Management |
| ISBN |
9786613098795
9781119200642 1119200644 9781283098793 1283098792 9781118064177 1118064178 9781118064153 1118064151 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Overload!: How Too Much Information is Hazardous to Your Organization; Contents; Foreword: Fighting the Good Fight against Information Bloat; Preface; A Note to the Reader; Acknowledgments; Introduction; The Way Work Was; The Age of the Knowledge Worker; Mark Rivington's Day; A Global Economy; Great Moments and Milestones in Information Overload History; Part I: How We Got Here; Chapter 1: Information, Please?; Chapter 2: History of Information; The Information Revolution and the Book; E-readers Rising; After the Book ... Getting the Word Out; The New News Cycle
Chapter 3: Welcome to the Information AgeIs Software Holding Us Back?; The Tools We Use; Mid-Nineteenth-Century Tools: Groundwork Is Laid; Twentieth-Century Tools: The Foundation for the Information Revolution; Breakthroughs in Productivity; Online Collaboration Makes Its Entrance; Enter Charlie Chaplin; Enter the Office Suite; An Office for the Twenty-First Century; The Problem with Documents; The Collaborative Business Environment; Chapter 4: What Is Information?; Quantifying Information; Why Information Is Exploding; How Information Is Going beyond Network and Storage Capabilities Structured versus Unstructured InformationData Mining to the Rescue?; Chapter 5: The Information Consumer; Chapter 6: What Is Information Overload?; Meetings: Too Much of a Good Thing?; How Long Has This Been Going On?; More Information - Isn't that What We Wanted?; Information Overload and the Tragedy of the Commons; The Ephemerization of Information; Chapter 7: The Cost of Information Overload; In Search of a Management Science; Chapter 8: What Hath Information Overload Wrought?; Aspects of Information Overload; Information Overload-Related Maladies; The Compatibility Conundrum Chapter 9: The Two FredsEntitlement; Mad about Information; Work-Life Balance; Chapter 10: Beep. Beep. Beep.; How Much Texting Is Too Much?; Sample Text Phraseology; The Search for Whatever It Is We Are Looking For; Chapter 11: Heading for a Nervous Breakdown; Thinking for a Living; The Roundtable; How the Other Half Lives; The New Busy Is Heading for a Nervous Breakdown; Part II: Where We Are and What We Can Do; Chapter 12: Managing Work and Workers in the Twenty-First Century; Chapter 13: Components of Information Overload; E-mail Overload; Unnecessary Interruptions and Recovery Time Need for Instant GratificationEverything Is Urgent - and Important; Chapter 14: E-mail; The Cost of Too Much E-mail; E-mail and the Network Effect; Reply to All; Profanity in E-mail (Expletive Deleted); A Day Without E-mail; What to Do With 2.5 Billion E-mail Messages; Deleting E-mail, Deleting Knowledge; Chapter 15: The Googlification of Search; Search and the Quest for the Perfect Dishwasher; The Search Experience; Does the King of the Watusis Drive an Automobile?; Chapter 16: Singletasking; Attention; Three Types of Attention; Automaticity; The Supertaskers Among Us Chapter 17: Intel's War |
| Altri titoli varianti | How too much information is hazardous to your organization |
| Record Nr. | UNINA-9911020003903321 |
Spira Jonathan B
|
||
| Hoboken, NJ, : Wiley, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets
| Safeguarding Critical E-Documents : Implementing a Program for Securing Confidential Information Assets |
| Autore | Smallwood Robert F. <1959-> |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | New York, : Wiley, 2012 |
| Descrizione fisica | 1 online resource (285 p.) |
| Disciplina |
005.8
658.472 |
| Soggetto topico |
BUSINESS & ECONOMICS / Information Management
Computer security Cyberspace - Security measures Cyberspace -- Security measures Database security Electronic records Computer security - Security measures Cyberspace |
| ISBN |
9786613703163
9781119204909 1119204909 9781280792779 1280792779 9781118286876 1118286871 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Safeguarding Critical E-Documents; Contents; Foreword; Preface; Acknowledgments; PART I THE PROBLEM AND BASIC TOOLS; CHAPTER 1 The Problem: Securing Confidential Electronic Documents; WikiLeaks: A Wake-Up Call; U.S. Government Attempts to Protect Intellectual Property; Threats Persist across the Pond: U.K. Companies on Guard; Increase in Corporate and Industrial Espionage; Risks of Medical Identity Theft; Why Don't Organizations Safeguard Their Information Assets?; The Blame Game: Where Does Fault Lie When Information Is Leaked?; Consequences of Not Employing E-Document Security; Notes
CHAPTER 2 Information Governance: The Crucial First Step First, Better Policies; Then, Better Technology for Better Enforcement; Defining Information Governance; Accountability Is Key; Why IG Is Good Business; Impact of a Successful IG Program; Critical Factors in an IG Program; Who Should Determine IG Policies?; Notes; PART II Information Platform Risks and Countermeasures; CHAPTER 3 Managing E-Documents and Records; Enterprise Content Management; Document Management Principles; The Goal: Document Lifecycle Security; Electronic Document Management Systems; Records Management Principles Electronic Records Management Notes; CHAPTER 4 Information Governance and Security for E-mail Messages; Employees Regularly Expose Organizations to E-mail Risk; E-mail Policies Should Be Realistic and Technology Agnostic; Is E-mail Encryption the Answer?; Common E-mail Security Mistakes; E-mail Security Myths; E-record Retention: Fundamentally a Legal Issue; Preserve E-mail Integrity and Admissibility with Automatic Archiving; E-mail Archiving Rationale: Compliance, Legal, and Business Reasons; Don't Confuse E-mail Archiving with Backup; No Personal Archiving in the Workplace Are All E-mails Records?Destructive Retention of E-mail; Notes; CHAPTER 5 Information Governance and Security for Instant Messaging; Instant Messaging Security Threats; Stealing Information through Hijacking and Impersonation; Denial-of-Service Attacks Freeze Access; Network Sniffers and Unauthorized Disclosure of Information Assets; Best Practices for Business IM Use; Technology to Monitor IM; Tips for Safer IM; Notes; CHAPTER 6 Information Governance and Security for Social Media; Types of Social Media in Web 2.0; Social Media in the Enterprise Key Ways Social Media Is Different from E-mail and Instant Messaging Biggest Security Threats of Social Media; Legal Risks of Social Media Posts; Tools to Archive Facebook and Twitter; IG Considerations for Social Media; Notes; CHAPTER 7 Information Governance and Security for Mobile Devices; Current Trends in Mobile Computing; Security Risks of Mobile Computing; Securing Mobile Data; IG for Mobile Computing; Building Security into Mobile Applications; Real Threats Are Poorly Understood; Innovation versus Security: Choices and Trade-Offs; Best Practices to Secure Mobile Applications; Notes CHAPTER 8 Information Governance and Security for Cloud Computing Use |
| Record Nr. | UNINA-9910141258503321 |
Smallwood Robert F. <1959->
|
||
| New York, : Wiley, 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
| Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts |
| Autore | Roberts Dan |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2014] |
| Descrizione fisica | 1 online resource (242 p.) |
| Disciplina | 004.068 |
| Collana | Wiley CIO series |
| Soggetto topico |
Business - Data processing
Information technology - Management |
| ISBN |
1-118-82467-9
1-118-82452-0 1-118-82472-5 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Foreword; Preface; Acknowledgments; About the Contributing Authors; Chapter 1 Creating Your Twenty-First-Century Workforce and Culture; Core Skills for Success; Assess Your Core Competencies; Who Will Benefit Most?; Getting the Most out of This Book; Chapter 2 Transforming Your IT Team; How to Make This Transition: Learn to Think Differently; Mind-Set Change 1: Force Yourself to Plan and Think of the Big Picture; Mind-Set Change 2: Adopt a Proactive Approach; Mind-Set Change 3: Resist the Temptation to Delve into Tactics
Mind-Set Change 4: Be Candid with Yourself and Others Mind-Set Change 5: Prepare for and Embrace Change; Mind-Set Change 6: Anticipate, Understand, Respect, and Work through Complexities; Five Critical Success Factors That Enable IT Organizational Excellence; Leadership: Positively Influence and Inspire Others; Strategy: Establish the Right Game Plan for Your Organization; People: Hire and Professionally Develop Your Winning Team; Best Practices: Select and Customize Them to Fit Your Organization Execution: Translate Your Strategy, Goals, and Initiatives into Specific Action Plans That Deliver Measurable Results Conclusion; Chapter 3 Driving Change with Intent; Defining Terms; The Components of Change; Achieving Commitment Is Essential for Sustaining Change; Change Takes a Community; Change Leaders; Change Agents; Change Advocates; Clarity Precedes Activity; Making the Case for Change; Ensuring a Clear Path Forward; Messaging the Change; Conclusion; Chapter 4 Building a Client-Focused IT Culture; What Good Service Looks Like; Service Skills for a New Mind-Set Developing a ''We'' Mentality Learning to Love Complaints; Making Every Interaction Count; Strategies for Developing a Service Mentality; Never Let It Go; Clearly Define Your Service Level Offerings; Engage Your Clients in the Culture Shift; Conclusion; Chapter 5 Evolving into the Role of Consultant; What Is the Consultant's Role?; Why Do I Need to Become More Consultative?; Learning to Change Hats: The Four Roles of IT; How Do I Become a Consultant?; Business Acumen; Human Interaction Skills; How Difficult Can This Be?; Conclusion Chapter 6 Negotiating: Getting What You Want without Damaging the Relationship Position versus Interest Negotiations; Three Steps and Three Key Factors; Negotiation Elements; People and Relationships; Styles and Situations; Applying the Key Factors to the Second Step: Information Exchange; The Final Step: Now Comes the Bargaining; Conclusion; Chapter 7 Sharpening Your Political Savvy; Picturing Yourself as a Political Player; IT and Politics: Historically Strange Bedfellows; A Five-Step Process for Developing Political Awareness; Start Your Radar; Determine Where the Power Bases Are Distinguish Your Enemies from Your Allies |
| Record Nr. | UNINA-9910139044603321 |
Roberts Dan
|
||
| Hoboken, New Jersey : , : Wiley, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
| Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts |
| Autore | Roberts Dan (Dan D.), <1963-> |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2014] |
| Descrizione fisica | 1 online resource (242 p.) |
| Disciplina | 004.068 |
| Collana | Wiley CIO series |
| Soggetto topico |
Business - Data processing
Information technology - Management |
| ISBN |
9781118824672
1118824679 9781118824528 1118824520 9781118824726 1118824725 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Foreword; Preface; Acknowledgments; About the Contributing Authors; Chapter 1 Creating Your Twenty-First-Century Workforce and Culture; Core Skills for Success; Assess Your Core Competencies; Who Will Benefit Most?; Getting the Most out of This Book; Chapter 2 Transforming Your IT Team; How to Make This Transition: Learn to Think Differently; Mind-Set Change 1: Force Yourself to Plan and Think of the Big Picture; Mind-Set Change 2: Adopt a Proactive Approach; Mind-Set Change 3: Resist the Temptation to Delve into Tactics
Mind-Set Change 4: Be Candid with Yourself and Others Mind-Set Change 5: Prepare for and Embrace Change; Mind-Set Change 6: Anticipate, Understand, Respect, and Work through Complexities; Five Critical Success Factors That Enable IT Organizational Excellence; Leadership: Positively Influence and Inspire Others; Strategy: Establish the Right Game Plan for Your Organization; People: Hire and Professionally Develop Your Winning Team; Best Practices: Select and Customize Them to Fit Your Organization Execution: Translate Your Strategy, Goals, and Initiatives into Specific Action Plans That Deliver Measurable Results Conclusion; Chapter 3 Driving Change with Intent; Defining Terms; The Components of Change; Achieving Commitment Is Essential for Sustaining Change; Change Takes a Community; Change Leaders; Change Agents; Change Advocates; Clarity Precedes Activity; Making the Case for Change; Ensuring a Clear Path Forward; Messaging the Change; Conclusion; Chapter 4 Building a Client-Focused IT Culture; What Good Service Looks Like; Service Skills for a New Mind-Set Developing a ''We'' Mentality Learning to Love Complaints; Making Every Interaction Count; Strategies for Developing a Service Mentality; Never Let It Go; Clearly Define Your Service Level Offerings; Engage Your Clients in the Culture Shift; Conclusion; Chapter 5 Evolving into the Role of Consultant; What Is the Consultant's Role?; Why Do I Need to Become More Consultative?; Learning to Change Hats: The Four Roles of IT; How Do I Become a Consultant?; Business Acumen; Human Interaction Skills; How Difficult Can This Be?; Conclusion Chapter 6 Negotiating: Getting What You Want without Damaging the Relationship Position versus Interest Negotiations; Three Steps and Three Key Factors; Negotiation Elements; People and Relationships; Styles and Situations; Applying the Key Factors to the Second Step: Information Exchange; The Final Step: Now Comes the Bargaining; Conclusion; Chapter 7 Sharpening Your Political Savvy; Picturing Yourself as a Political Player; IT and Politics: Historically Strange Bedfellows; A Five-Step Process for Developing Political Awareness; Start Your Radar; Determine Where the Power Bases Are Distinguish Your Enemies from Your Allies |
| Record Nr. | UNINA-9910821414503321 |
Roberts Dan (Dan D.), <1963->
|
||
| Hoboken, New Jersey : , : Wiley, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Unleashing the power of IT [[electronic resource] ] : bringing people, business, and technology together / / Dan Roberts
| Unleashing the power of IT [[electronic resource] ] : bringing people, business, and technology together / / Dan Roberts |
| Autore | Roberts Dan (Dan D.), <1963-> |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, 2011 |
| Descrizione fisica | 1 online resource (290 p.) |
| Disciplina | 004.068 |
| Collana | Wiley CIO |
| Soggetto topico | Information technology - Management |
| ISBN |
1-118-04450-9
1-283-05276-8 9786613052766 1-118-04447-9 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Unleashing the Power of IT: Bringing People, Business, and Technology Together; Contents; Foreword; Preface; Acknowledgments; 1 Creating Your Twenty-First Century Workforce and Culture; Core Skills for Success; A Consistent Terminology; Who Will Benefit Most; Leveraging This Book; 2 Transforming Your IT Team; How to Make This Transition: Learn to Think Differently; Five Critical Success Factors that Enable IT Organizational Excellence; Conclusion: High-Performance Reality; 3 Building a Client-Focused IT Culture; What Good Service Looks Like; Service Skills and Mindsets
Strategies for Developing a Service Mentality Conclusion; 4 Evolving into the Role of Consultant; What Exactly Is a Consultant's Role, Anyway?; Why Do I Need to Become More Consultative?; Learning to Change Hats: The Four Roles of IT; So, How Do I Become a Consultant?; How Difficult Can This Be?; Conclusion; 5 Negotiating: Getting What You Want without Damaging the Relationship; Position versus Interest Negotiations; Three Key Factors; Three-Step Process; Applying the Key Factors to the Second Step: Information Exchange; The Final Step: Now Comes the Bargaining Conclusion: Effective Negotiators Are Made, Not Born Notes; 6 Managing Projects: The Science and the Art; The Building Blocks of Project Management; Structuring Projects for Success; Developing Plans that Work; Managing to Successful Completion; The Four Tenets of the Project Manager's Mindset; Conclusion: Thinking like a Project Manager; 7 Changing Your Requirements- Gathering Mindset; The What, Not the How; The Importance of the Interview; Communicating through Pictures; Writing a Solid Requirements Document; Conclusion; 8 Sharpening Your Political Savvy Picturing Yourself as a Political Player IT and Politics: Historically Strange Bedfellows; A Five-Step Process for Developing Political Awareness; Developing Political Skills; Conclusion; 9 Marketing IT's Value; Marketing to the IT Department; Build Partnerships; Differentiate Yourself; Establish Credibility; Create Product and Service Awareness; Develop a Formal Plan; Determining Success; Conclusion; 10 Managing the Vendor Relationship; Both Sides of the Coin; Preparing for a New Role; Getting a Fresh Start; Seven Phases of Managing Vendor Partnerships; Conclusion 11 Driving Change with IntentDefining Terms; The Components of Change; Achieving Commitment Is Essential for Sustaining Change; Change Takes a Community; Clarity Precedes Activity; Messaging the Change; Conclusion; 12 Putting the Book into Action: Stories from the Trenches; A Newly Consultative IT Function Helps Drive St. Luke's Health System Transformation; At Marriott, a Transformed IT-Business Relationship Is the Underpinning for Hospitality Giant's Success; At Bowdoin College, Trust in IT Created a Culture of Change within a Haven of Liberal Arts; Conclusion A Call to Action: Create Your Road Map for IT Transformation |
| Record Nr. | UNINA-9910789606603321 |
Roberts Dan (Dan D.), <1963->
|
||
| Hoboken, N.J., : John Wiley & Sons, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts
| Unleashing the power of IT : bringing people, business, and technology together / / Dan Roberts |
| Autore | Roberts Dan (Dan D.), <1963-> |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, 2011 |
| Descrizione fisica | 1 online resource (290 p.) |
| Disciplina | 004.068 |
| Collana | Wiley CIO |
| Soggetto topico | Information technology - Management |
| ISBN |
9786613052766
9781118044506 1118044509 9781283052764 1283052768 9781118044476 1118044479 |
| Classificazione | BUS083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Unleashing the Power of IT: Bringing People, Business, and Technology Together; Contents; Foreword; Preface; Acknowledgments; 1 Creating Your Twenty-First Century Workforce and Culture; Core Skills for Success; A Consistent Terminology; Who Will Benefit Most; Leveraging This Book; 2 Transforming Your IT Team; How to Make This Transition: Learn to Think Differently; Five Critical Success Factors that Enable IT Organizational Excellence; Conclusion: High-Performance Reality; 3 Building a Client-Focused IT Culture; What Good Service Looks Like; Service Skills and Mindsets
Strategies for Developing a Service Mentality Conclusion; 4 Evolving into the Role of Consultant; What Exactly Is a Consultant's Role, Anyway?; Why Do I Need to Become More Consultative?; Learning to Change Hats: The Four Roles of IT; So, How Do I Become a Consultant?; How Difficult Can This Be?; Conclusion; 5 Negotiating: Getting What You Want without Damaging the Relationship; Position versus Interest Negotiations; Three Key Factors; Three-Step Process; Applying the Key Factors to the Second Step: Information Exchange; The Final Step: Now Comes the Bargaining Conclusion: Effective Negotiators Are Made, Not Born Notes; 6 Managing Projects: The Science and the Art; The Building Blocks of Project Management; Structuring Projects for Success; Developing Plans that Work; Managing to Successful Completion; The Four Tenets of the Project Manager's Mindset; Conclusion: Thinking like a Project Manager; 7 Changing Your Requirements- Gathering Mindset; The What, Not the How; The Importance of the Interview; Communicating through Pictures; Writing a Solid Requirements Document; Conclusion; 8 Sharpening Your Political Savvy Picturing Yourself as a Political Player IT and Politics: Historically Strange Bedfellows; A Five-Step Process for Developing Political Awareness; Developing Political Skills; Conclusion; 9 Marketing IT's Value; Marketing to the IT Department; Build Partnerships; Differentiate Yourself; Establish Credibility; Create Product and Service Awareness; Develop a Formal Plan; Determining Success; Conclusion; 10 Managing the Vendor Relationship; Both Sides of the Coin; Preparing for a New Role; Getting a Fresh Start; Seven Phases of Managing Vendor Partnerships; Conclusion 11 Driving Change with IntentDefining Terms; The Components of Change; Achieving Commitment Is Essential for Sustaining Change; Change Takes a Community; Clarity Precedes Activity; Messaging the Change; Conclusion; 12 Putting the Book into Action: Stories from the Trenches; A Newly Consultative IT Function Helps Drive St. Luke's Health System Transformation; At Marriott, a Transformed IT-Business Relationship Is the Underpinning for Hospitality Giant's Success; At Bowdoin College, Trust in IT Created a Culture of Change within a Haven of Liberal Arts; Conclusion A Call to Action: Create Your Road Map for IT Transformation |
| Record Nr. | UNINA-9910962622503321 |
Roberts Dan (Dan D.), <1963->
|
||
| Hoboken, N.J., : John Wiley & Sons, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||