Mostrando 9,621 - 9,640 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.13s Limitar resultados
  1. 9621
    Publicado 2019
    Tabla de Contenidos: “…Bladder Cancer -- Part H: Male Genitourinary -- 69. Low-Risk Prostate Cancer -- 70. Management of Intermediate- and High-Risk Prostate Cancer: What Do We Know? …”
    Libro electrónico
  2. 9622
    por Varma, Sumati
    Publicado 2015
    Tabla de Contenidos: “…Cover -- Copyright -- Dedication -- Contents -- Preface -- About the Author -- A01_INTE1689_FM -- Chapter 1_FUNDAMENTALS OF INTERNATIONAL BUSINESS -- INTRODUCTION -- ELEMENTS OF GLOBALIZATION -- Economic Globalization -- Cultural Globalization -- Political Globalization -- INTERNATIONAL BUSINESS -- GROWTH OF INTERNATIONAL BUSINESS -- Economic Forces -- Political Forces -- Technological Forces -- INTERNATIONAL VERSUS DOMESTIC BUSINESS -- MOTIVES FOR FIRM INTERNATIONALIZATION -- MODES OF ENTRY -- Trade-related Entry Modes -- Contractual Entry Modes -- Investment-related Entry Modes -- EMERGING TRENDS IN INTERNATIONAL BUSINESS -- FDI Moves in Search of Energy -- Pharmaceutical FDI Moves in Response to the 'Patent Cliff' -- Mega-regional Agreements -- Key Terms -- Discussion Questions -- Chapter 2 POLITICAL ECONOMY OF INTERNATIONAL BUSINESS -- INTRODUCTION -- ECONOMIC ENVIRONMENT -- Economic Systems -- Economic Indicators -- Economic Growth -- Economic Development -- POLITICAL ENVIRONMENT -- Political Ideologies and Systems -- Political Risk -- INTERNATIONAL BUSINESS NEGOTIATION -- Objectives of International Business Negotiation -- Bargaining Power of the TNC -- Key Terms -- Discussion Questions -- Chapter 3 THE INTERNATIONAL CULTURALAND LEGAL ENVIRONMENT -- INTRODUCTION -- ELEMENTS OF CULTURE -- Language -- Non-verbal Communication -- Religion -- Values and Attitudes -- Customs and Manners -- Aesthetics -- LEGAL ENVIRONMENT -- Global Legal Systems -- Legal Jurisdiction -- ETHICS IN INTERNATIONAL BUSINESS -- KEY Terms -- Discussion Questions -- Chapter 4_INTERNATIONAL TRADE THEORIES -- Introduction -- International Trade Theories -- Mercantilist Doctrine -- Classical Approach -- Factor Proportions Theory -- Leontief Paradox -- Linder's Income-preference Similarity Theory -- Product Life-cycle Theory -- The New Trade Theory…”
    Libro electrónico
  3. 9623
    Publicado 2012
    Tabla de Contenidos: “…Production Honeynets -- Honeynet Architectures -- Honeywall Accreditation -- Content Staging -- Content Filling -- Honeynet Training -- Honeynet Objectives -- Honeynet Risks and Issues -- Check Yourself Before You're Wrecked -- What's the Status of Your Physical Security? …”
    Libro electrónico
  4. 9624
    por Institute of Medicine (U.S.).
    Publicado 1997
    Tabla de Contenidos: “…Appendix: Maternal and Child Health Care and Computer-Based Patient Records -- 5 Improving Patient Records: Conclusions and Recommendations -- CONCLUSIONS -- RECOMMENDATIONS -- Data Acquisition -- Data and Security Standards -- Data Standards -- Security Standards -- Networking Support -- Cost-Benefit Analysis -- Quality Assurance -- Structure and Format of the Patient Record -- SUMMARY -- Appendix A Subcommittees -- USERS AND USES SUBCOMMITTEE MEMBERS -- TECHNOLOGY SUBCOMMITTEE MEMBERS -- STRATEGY AND IMPLEMENTATION SUBCOMMITTEE -- Appendix B Legal Aspects of Computer-based Patient Records and Record Systems -- STATE LICENSURE LAWS -- Hospital Licensure Laws as Barriers to Full Automation -- Other State Licensure Laws -- Medicare Regulations -- Hospital Accreditation Requirements -- PATIENT RIGHTS ISSUES -- Right of Privacy -- Right of Access to Health Records -- Ownership of Patient Data and of the Patient Record -- Ownership of the Patient Record -- Rights in Information Contained in the Record -- EVIDENTIARY ISSUES -- Importance of Admissibility of Patient Records as Evidence -- Rule Against Hearsay -- Definition of Hearsay -- Business Records Exception -- Best Evidence Rule -- RISKS ARISING FROM COMPUTER-BASED PATIENT RECORD SYSTEMS -- Breaches of Confidentiality and Unauthorized Access -- Computer Viruses and Other Computer Sabotage -- Potential for Inaccessibility -- Questions of Durability -- Accuracy Issues -- Selected Legal Issues in Computer Contracting -- OVERCOMING LEGAL BARRIERS TO COMPUTER-BASED PATIENT RECORDS AND RECORD SYSTEMS -- Adoption of Uniform National Licensure Standards and Health Information Laws -- Overcoming Special Legal Risks Related to Computer-based Patient Records -- CONCLUSION -- Index…”
    Libro electrónico
  5. 9625
    Publicado 2015
    Tabla de Contenidos: “…3.2.5 Calculating CVA and DVA Using Monte Carlo Simulation -- 3.3 Overnight Index Swap Discounting -- Chapter 4 An Introduction to Derivative Instruments -- 4.1 FX Forwards -- 4.1.1 Product Description -- 4.1.2 Forward Points -- 4.2 Interest Rate Swaps -- 4.2.1 Product Description -- 4.2.2 IFRS 9 Accounting Implications -- 4.3 Cross-Currency Swaps -- 4.3.1 Product Description -- 4.3.2 IFRS 9 Accounting Implications -- 4.4 Standard (Vanilla) Options -- 4.4.1 Product Description -- 4.4.2 Standard Equity Options -- 4.4.3 Standard Foreign Exchange Options -- 4.4.4 Interest Rate Options - Caps, Floors and Collars -- 4.5 Exotic Options -- 4.6 Barrier Options -- 4.6.1 Knock-out Barrier Options - Product Description -- 4.6.2 Knock-in Barrier Options - Product Description -- 4.7 Range Accruals -- Chapter 5 Hedging Foreign Exchange Risk -- 5.1 Types of Foreign Exchange Exposure -- 5.2 Introductory Definitions -- 5.2.1 Functional Currency and Presentation Currency -- 5.2.2 Relevant Dates in an FX Transaction -- 5.3 Summary of IAS 21 Translation Rates -- 5.3.1 Monetary versus Non-monetary Items -- 5.3.2 Translation Rates -- 5.4 Foreign Currency Transactions -- 5.4.1 Summary of Most Commonly Used FX Derivatives -- 5.5 Case Study: Hedging A Forecast Sale and Subsequent Receivable with an FX Forward (Forward Element Included in Hedging Relationship) -- 5.5.1 Background -- 5.5.2 Setting the Hedging Relationship Term -- 5.5.3 Hedging Relationship Documentation -- 5.5.4 Hedge Effectiveness Assessment - Hypothetical Derivative -- 5.5.5 Hedge Effectiveness Assessment Performed at Hedge Inception -- 5.5.6 Fair Valuation of Hedged Item and Hypothetical Derivative at the Relevant Dates -- 5.5.7 Accounting Entries - Hedge Objective Unchanged: No Discontinuation -- 5.5.8 Accounting Entries - Hedge Risk Management Objective Changed: Discontinuation…”
    Libro electrónico
  6. 9626
    Publicado 2024
    Tabla de Contenidos: “…Introduction -- 1.1 Theoretical background -- 1.1.1 "Sick lobe" model -- 1.1.2 Neoductgenesis -- 1.2 Technical knowledge -- 1.3 BC diagnosis using several imaging modalities -- 1.3.1 Mammography -- 1.3.2 Ultrasound -- 1.3.3 MRI -- 1.3.4 Histopathology -- 1.3.5 Thermography -- 1.4 Risk factors -- 1.5 Advantages in mammography -- 2. …”
    Libro electrónico
  7. 9627
    por Rios Insua, David, 1964-
    Publicado 2012
    Tabla de Contenidos: “…Machine generated contents note: Preface 1 Stochastic Processes 11 1.1 Introduction 11 1.2 Key Concepts in Stochastic Processes 11 1.3 Main Classes of Stochastic Processes 16 1.4 Inference, Prediction and Decision Making 21 1.5 Discussion 23 2 Bayesian Analysis 27 2.1 Introduction 27 2.2 Bayesian Statistics 28 2.3 Bayesian Decision Analysis 37 2.4 Bayesian Computation 39 2.5 Discussion 51 3 Discrete Time Markov Chains 61 3.1 Introduction 61 3.2 Important Markov Chain Models 62 3.3 Inference for First Order Chains 66 3.4 Special Topics 76 3.5 Case Study: Wind Directions at Gij́on 87 3.6 Markov Decision Processes 94 3.7 Discussion 97 4 Continuous Time Markov Chains and Extensions 105 4.1 Introduction 105 4.2 Basic Setup and Results 106 4.3 Inference and Prediction for CTMCs 108 4.4 Case Study: Hardware Availability through CTMCs 112 4.5 Semi-Markovian Processes 118 4.6 Decision Making with Semi-Markovian Decision Processes 122 4.7 Discussion 128 5 Poisson Processes and Extensions 133 5.1 Introduction 133 5.2 Basics on Poisson Processes 134 5.3 Homogeneous Poisson Processes 138 5.4 Nonhomogeneous Poisson Processes 147 5.5 Compound Poisson Processes 153 5.6 Further Extensions of Poisson Processes 154 5.7 Case Study: Earthquake Occurrences 157 5.8 Discussion 162 6 Continuous Time Continuous Space Processes 169 6.1 Introduction 169 6.2 Gaussian Processes 170 6.3 Brownian Motion and Fractional Brownian Motion 174 6.4 Dilusions 181 6.5 Case Study: Prey-predator Systems 184 6.6 Discussion 190 7 Queueing Analysis 201 7.1 Introduction 201 7.2 Basic Queueing Concepts 201 7.3 The Main Queueing Models 204 7.4 Inference for Queueing Systems 208 7.5 Inference for M=M=1 Systems 209 7.6 Inference for Non Markovian Systems 220 7.7 Decision Problems in Queueing Systems 229 7.8 Case Study: Optimal Number of Beds in a Hospital 230 7.9 Discussion 235 8 Reliability 245 8.1 Introduction 245 8.2 Basic Reliability Concepts 246 8.3 Renewal Processes 249 8.4 Poisson Processes 251 8.5 Other Processes 259 8.6 Maintenance 262 8.7 Case Study: Gas Escapes 263 8.8 Discussion 271 9 Discrete Event Simulation 279 9.1 Introduction 279 9.2 Discrete Event Simulation Methods 280 9.3 A Bayesian View of DES 283 9.4 Case Study: A G=G=1 Queueing System 286 9.5 Bayesian Output Analysis 288 9.6 Simulation and Optimization 292 9.7 Discussion 294 10 Risk Analysis 301 10.1 Introduction 301 10.2 Risk Measures 302 10.3 Ruin Problems 316 10.4 Case Study: Ruin Probability Estimation 320 10.5 Discussion 327 Appendix A Main Distributions 337 Appendix B Generating Functions and the Laplace-Stieltjes Transform 347 Index…”
    Libro electrónico
  8. 9628
    Publicado 2021
    Tabla de Contenidos: “…-- Chapter 1: Work-Life Blending -- Chapter 2: 15 Forces Impacting Your Future -- Chapter 3: Accelerated Relevancy -- Chapter 4: Curve Benders as Risk Mitigators in Your Personal S-Curve -- Chapter 5: Organization of the Future -- Chapter 6: Curve Bending in the Lives of Others -- Chapter 7: Your Curve Benders Roadmap -- Acknowledgments -- About the Author -- Other Books by the Author -- Relationship Economics - Forthcoming Third Edition (Wiley, 2021) -- Co-Create (St. …”
    Libro electrónico
  9. 9629
    Publicado 2023
    Tabla de Contenidos: “…-- Always Day One: The Perpetual Assumption -- 70/30: Knowing How to Distinguish Risk and Uncertainty -- Discerning Four Horizons of Opportunity -- Horizon 4 - What Ignorance are We (Intentionally) Generating? …”
    Libro electrónico
  10. 9630
    Publicado 2015
    Tabla de Contenidos: “…Cover -- Contents -- About the authors -- Publisher's acknowledgements -- Preface -- Using this book -- Part 1: Corporate and business strategy -- Chapter 1: Ansoff's matrix and product market grid -- Chapter 2: BCG matrix -- Chapter 3: Strategic dialogue -- Chapter 4: BHAG -- Chapter 5: Blue ocean strategy -- Chapter 6: Business model canvas -- Chapter 7: Business scope (Abell) -- Chapter 8: Competitive analysis: Porter's five forces model -- Chapter 9: Core competencies -- Chapter 10: Internationalisation strategy framework -- Chapter 11: Road-mapping -- Chapter 12: Scenario planning -- Chapter 13: Strategy maps -- Chapter 14: SWOT analysis -- Chapter 15: Value disciplines -- Part 2: Organisation and governance -- Chapter 16: 7-S framework -- Chapter 17: Balanced scorecard -- Chapter 18: Benchmarking -- Chapter 19: Organisational growth model (Greiner) -- Chapter 20: Offshoring/outsourcing -- Chapter 21: Organisational configurations (Mintzberg) -- Chapter 22: Overhead value analysis -- Chapter 23: Risk management -- Chapter 24: The value chain -- Part 3: Finance -- Chapter 25: Activity-based costing -- Chapter 26: Capital asset pricing model (CAPM) -- Chapter 27: Discounted cash flow (DCF) and net present value (NPV) -- Chapter 28: DuPont scheme -- Chapter 29: Economic value added (EVA) and weighted average cost of capital (WACC) -- Chapter 30: Financial ratio analysis: liquidity, solvency and profitability ratios -- Chapter 31: Investment stages -- Chapter 32: Real options theory -- Chapter 33: Risk-reward analysis -- Chapter 34: Value-based management -- Part 4: Marketing and sales -- Chapter 35: 4Ps of marketing (Kotler) -- Chapter 36: Branding pentagram -- Chapter 37: Client pyramid (Curry) -- Chapter 38: Crowdsourcing -- Chapter 39: Customer journey mapping -- Chapter 40: MABA analysis -- Chapter 41: Social network analysis…”
    Libro electrónico
  11. 9631
    Publicado 2021
    Tabla de Contenidos: “…Introduction - A Tutorial of Sorts -- Introduction -- Definitions -- Complexity Terms -- System Terms -- Engineering Terms -- Elaborations on Some Defined Systems and Their Nuances -- System of Systems -- Non-Technological SoS Factors -- SoS Leadership and Management -- SoS Engineering -- SoS Interoperability -- SoS Architecting -- SoS Modeling and Simulation -- SoS Summary -- Enterprises -- The Enterprise as a System -- Complex Systems -- Degrees of Complexity -- Extremely Complex Problems -- Complex Architecture Considerations -- Description a -- Description b -- Description c -- Description d -- Description e -- Description f -- Description g -- Other Questions -- Requirements Complexity -- Requirements Difficulty -- Cognitive Fog -- Stable Stakeholder Relationships -- Sensitivity to Initial Conditions -- Self-Organization -- Leadership (also, see [24] from Chapter 3) -- Co-Evolution -- Opportunity and Risk -- Modularity -- Complex Systems Engineering -- Interpreting Scale (or View) and Emergence in Complex Systems Engineering -- Practice Drives Theory -- Conclusion -- Acknowledgment -- References -- 2. …”
    Libro electrónico
  12. 9632
    Publicado 2023
    Tabla de Contenidos: “…Life Cycle Impacts -- Green Building Certifications -- Policy and Regulation -- Conclusion -- Chapter 10 The Importance of Planning to Avoid Things Going Wrong -- Introduction -- Acquisitions and Investments -- Operating Models and Commercial Contracts -- Funding Investment -- Construction -- Choice of Contract -- Technical and Pricing Schedules -- Risk Allocation -- Usual Suspects -- Infrastructure Provision and Project Rights -- Construction -- Moving to Low Carbon Solutions -- What Are Data Centre Operators Doing to Transition to Low Carbon? …”
    Libro electrónico
  13. 9633
    por OECD
    Publicado 2023
    Tabla de Contenidos: “…OECD Recommendation for Development Co-operation Actors on Managing the Risk of Corruption (2016) [OECD/LEGAL/0431] -- OECD Recommendation on Environmental Assessment of Development Assistance Projects and Programmes (2020) [OECD/LEGAL/0458] -- OECD DAC Declaration on a new approach to align development co-operation with the goals of the Paris Agreement on Climate Change (2021) [OECD/LEGAL/0466] (hereafter "the DAC Declaration") -- References -- Notes -- Annex C. …”
    Libro electrónico
  14. 9634
    Publicado 2014
    Tabla de Contenidos: “…SOVEREIGN SUKUK -- SUKUK -- DEBT CAPITAL MARKETS -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHORS -- Chapter 8: Hong Kong -- ASSET MANAGEMENT -- TAX -- RETAIL AND MICROFINANCE -- ISLAMIC BANKING -- Risk Management -- Adherence to Islamic Law -- Binding Documentation -- Disclosure of Risk and Return to Depositors -- SUKUK AND RENMINBI BUSINESS -- DEBT CAPITAL MARKETS AND EQUITY CAPITAL MARKETS -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHORS -- Chapter 9: India -- ASSET MANAGEMENT -- Alternative Investment Funds -- Real Estate Investment Trusts -- Structured Products -- TAX AND ACCOUNTING -- RETAIL AND MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- SOVEREIGN SUKUK -- DEBT CAPITAL MARKETS -- Tax and Stamp Duties -- Investor Perception and Documentation Challenge -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHOR -- Chapter 10: Indonesia -- MACROECONOMIC PERFORMANCE AND ASSET MANAGEMENT -- Public Response As Indicated by Liquidity Behavior -- Monetary Policy and Interest Rate Responses -- The Indonesian Islamic Banking Industry: Funding Activities -- The Indonesian Islamic Banking Industry: Financing Activities -- MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- SUKUK -- REGULATORY ISSUES -- CONCLUSION -- NOTES -- REFERENCES -- ABOUT THE AUTHOR -- Chapter 11: Iran -- THE HISTORY OF IRANIAN BANKING -- Modern Banking: 1887-1925 -- Establishment of Iranian Banks and the Central Bank: 1925-1979 -- Nationalization and Merger of Iranian Banks: 1979-1981 -- Demand for Riba-Free Banking: 1981-1983 -- Development of the Banking System Since 1983 -- THE RIBA-FREE BANKING ACT -- Objectives and Duties -- Mobilization of Financial Resources -- DEPOSITS -- Qard Hasan Deposits -- Current Accounts -- Savings Accounts -- Term Investment Deposits ( Wakalah Accounts)…”
    Libro electrónico
  15. 9635
    por Nomani, Qamar
    Publicado 2024
    Tabla de Contenidos: “…Best practices for asset inventory management -- Other tools and techniques for asset management -- Summary -- Further reading -- Chapter 10: Reviewing CSPM Dashboards -- Reviewing general dashboard types -- Risk dashboards -- Compliance dashboards -- Inventory dashboards -- Identity dashboards -- Network security dashboards -- Vulnerability dashboards -- Alerts and incident dashboards -- Custom dashboards -- Exporting dashboards -- Best practices for effectively using CSPM dashboards -- Summary -- Further reading -- Chapter 11: Major Configuration Risks -- Workload misconfigurations overview -- Malware, misconfigurations, and vulnerabilities and their correlations -- The risks associated with malware and its vulnerabilities -- Identity misconfigurations -- Network security misconfigurations -- Lateral movement misconfigurations -- Data protection misconfigurations -- Suspicious and malicious activities -- Best practices and lessons learned -- Best practices to mitigate network security misconfigurations -- Lesson learned and its implementation -- Summary -- Further reading -- Chapter 12: Investigating Threats with Query Explorers and KQL -- Query explorer and attack paths overview -- Understanding the security explorer mechanism -- The importance of the security explorer in threat hunting -- Building queries with Cloud Security Explorer -- Exploring built-in query templates -- KQL basics -- KQL statement structure -- KQL practice environment -- Built-in KQL in the query explorer -- Custom queries in the query explorer -- Best practices for effective investigation -- Lessons learned from threat investigation -- Summary -- Further reading -- Chapter 13: Vulnerability and Patch Management -- Vulnerability and patch management overview -- Important terminologies -- Effective strategies to prioritize vulnerabilities…”
    Libro electrónico
  16. 9636
    Publicado 2022
    Tabla de Contenidos: “…Contents at a Glance Introduction. 1 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work. 7 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work. 19 Chapter 3: Applying the Science Behind Human Behavior and Risk Management. 33 Part 2: Building a Security Awareness Program. 51 Chapter 4: Creating a Security Awareness Strategy. 53 Chapter 5: Determining Culture and Business Drivers. 61 Chapter 6: Choosing What to Tell The Users. 75 Chapter 7: Choosing the Best Tools for the Job 89 Chapter 8: Measuring Performance. 107 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program. 121 Chapter 10: Running Your Security Awareness Program 143 Chapter 11: Implementing Gamification 165 Chapter 12: Running Phishing Simulation Campaigns. 181 Part 4: The Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Chapter 15: Ten Fundamental Awareness Topics. 221 Chapter 16: Ten Helpful Security Awareness Resources. 227 Appendix: Sample Questionnaire 233 Index. 253 Table of Contents Introduction 1 About This Book. 1 Foolish Assumptions. 2 Icons Used in This Book. 3 Beyond the Book. 3 Where to Go from Here. 4 Part 1: Getting to Know Security Awareness. 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness. 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss. 10 Knowing How Security Awareness Programs Work. 11 Establishing and measuring goals. 12 Showing users how to "do things right". 14 Recognizing the Role of Awareness within a Security Program. 15 Disputing the Myth of the Human Firewall. 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work. 19 Making a Case Beyond Compliance Standards. 20 Treating Compliance as a Must. 21 Motivating users to take action. 22 Working within the compliance budget. 22 Limiting the Popular Awareness Theories. 23 Applying psychology to a diverse user base. 23 Differentiating between marketing and awareness. 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work. 27 Making Perfection the Stated Goal. 28 Measuring from the Start. 29 Prioritizing Program Over Product. 29 Choosing Substance Over Style. 30 Understanding the Role of Security Awareness. 31 Table of Contents Chapter 3: Applying the Science Behind Human Behavior and Risk Management. 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science. 35 Recognizing incidents as system failures. 36 Responding to incidents. 37 Applying Accounting Practices to Security Awareness. 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology. 40 The ABCs of behavioral science. 41 The Fogg Behavior Model. 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve. 44 Remembering That It's All About Risk. 45 Optimizing risk. 46 The risk formula. 46 Part 2: Building a Security Awareness Program. 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program. 54 Choosing effective communications tools. 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All. 58 Chapter 5: Determining Culture and Business Drivers. 61 Understanding Your Organization's Culture. 62 Determining security culture. 64 Recognizing how culture relates to business drivers. 65 Identifying Subcultures. 65 Interviewing Stakeholders. 67 Requesting stakeholder interviews. 67 Scheduling the interviews 70 Creating interview content. 70 Taking names. 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users. 75 Basing Topics on Business Drivers. 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right". 77 Common Topics Covered in Security Awareness Programs. 79 Security Awareness For Dummies Phishing 79 Social engineering. 80 Texting and instant messaging security. 80 Physical security. 81 Malware 81 Ransomware 81 Password security. 82 Cloud security 82 USB device security. 82 Internet of Things 83 Travel security. 83 Wi-Fi security 84 Mobile devices. 84 Work from home. 84 Basic computer security. 85 Insider threat. 85 Protecting children on the internet 85 Social media security 86 Moving security. 86 Compliance topics. 87 Chapter 7: Choosing the Best Tools for the Job. 89 Identifying Security Ambassadors 90 Finding ambassadors. 90 Maintaining an ambassador program. 91 Knowing the Two Types of Communications Tools. 92 Reminding users to take action. 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase. 95 Posters 96 Hardcopy newsletters. 97 Monitor displays 97 Screen savers. 98 Pamphlets. 98 Desk drops. 99 Table tents. 99 Coffee cups or sleeves 99 Stickers. 100 Mouse pads 100 Pens and other useful giveaways. 100 Camera covers. 101 Squishy toys and other fun giveaways. 101 Active communications tools. 101 Table of Contents Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts. 108 Meeting Compliance Requirements. 109 Collecting Engagement Metrics. 111 Attendance metrics. 111 Likability metrics. 112 Knowledge metrics. 112 Measuring Improved Behavior. 113 Tracking the number of incidents. 113 Examining behavior with simulations 114 Tracking behavior with gamification. 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics. 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program. 121 Knowing Your Budget. 122 Finding additional sources for funding 123 Allocating for your musts. 125 Limiting your discretionary budget. 126 Appreciating your team as your most valuable resource. 126 Choosing to Implement One Program or Multiple Programs. 127 Managing multiple programs 128 Beginning with one program. 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy. 131 Ensuring that your message sticks. 133 Distributing topics over three months. 133 Deciding Whether to Include Phishing Simulations. 136 Planning Which Metrics to Collect and When. 137 Considering metrics versus topics 137 Choosing three behavioral metrics. 138 Incorporating Day 0 metrics 138 Scheduling periodic updates. 138 Biasing your metrics. 139 Branding Your Security Awareness Program 139 Creating a theme. 139 Maintaining brand consistency. 140 Coming up with a catchphrase and logo. 140 Promoting your program with a mascot. 140 Security Awareness For Dummies Chapter 10: Running Your Security Awareness Program. 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors. 145 Recognizing the role of general project management. 146 Getting All Required Approvals. 146 Getting the Most from Day 0 Metrics. 147 Creating Meaningful Reports. 149 Presenting reports as a graphical dashboard. 149 Adding index scores. 152 Creating an awareness index. 152 Reevaluating Your Program. 153 Reconsidering your metrics. 154 Evaluating your communications tools 155 Measuring behavioral changes. 156 Redesigning Your Program 157 Anything stand out? …”
    Libro electrónico
  17. 9637
    Publicado 2010
    Tabla de Contenidos: “…Raemdonck -- 11: Role of Project Management in Quality Planning and Functions Throughout the Product Lifecycle / Thomas Dzierozynski and Ian Fleming -- 12: Regulatory Strategies and Submissions in an International Product Environment / Louise Johnson -- 13: Risk Management - A Practical Approach / Courtland R. …”
    Enlace del recurso
    Libro electrónico
  18. 9638
    Publicado 2007
    Tabla de Contenidos: “…Pardee -- The first major U.S. urban evacuation : Houston and the social construction of risk / Pamela Behan -- Pt. 4. After the storm : navigating new meanings of self and city. …”
    Enlace del recurso
    Libro electrónico
  19. 9639
    Publicado 2012
    Tabla de Contenidos: “…/ DUMENIA CASUTT -- Is resettlement a viable strategy to mitigate the risk of natural disasters? : views and voices from the citizens of Santa Fe, Argentina / JENNIFER DUYNE BARENSTEIN AND BRIGITTE MARTI ROJAS RIVAS -- Index…”
    Enlace del recurso
    Libro electrónico
  20. 9640
    Publicado 2021
    Tabla de Contenidos: “…Mortality of supercentenarians: estimates from the updated IDL -- Chapter 4. Does the risk of death continue to rise among supercentenarians? …”
    Libro electrónico