Cybersecurity Program Development for Businesses by Chris MoschovitisWritten in plain language by a top'flight technologist with decades of experience and a track record of success, this book demystifies the implementation of a cybersecurity program. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book, as individual questions and difficulties arise.
Call Number: HD30.2 .M674 2018
Publication Date: 2018-05-08
Global Information Warfare by Andrew Jones; Gerald L. KovacichSince the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks. In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens. Upgrades to the Second Edition Include: Revised discussions of changes and impacts of global information warfare since 2002 Updated analyses of the capabilities of several nation-states as well as nonstate actors A comprehensive list of incidents that have occurred in the past year to show the scope of the problem of GIW Discussions of post-9/11 governmental changes and shifting priorities with clearer hindsight than was possible in the first edition The book underscores how hostile countries, business competitors, terrorists, and others are waging information warfare against adversaries, even from across the globe. It describes attacks on information systems through theft, Internet espionage, deception, and sabotage, and illustrates countermeasures used to defeat these threats. The second edition of Global Information Warfare contains a wealth of information and detailed analyses of capabilities of contemporary information technology and the capabilities of the individuals and groups who employ it in their respective digital wars. It is a crucial source for gaining the best understanding of the current state of information warfare and the most effective ways to counter it.
Call Number: U163 .J66 2016
Publication Date: 2015-09-25
Facing Cyber Threats Head On by Brian MinickNews breaks all the time that hackers have attacked another company. Media outlets regularly cover cyber events. The President issues executive orders, and Congress explores cyber legislation. With all these events happening, business leaders must ask: what does this mean for my business and me? Facing Cyber Threats Head On looks at cyber security from a business leader perspective. By avoiding deep technical explanations of "how" and focusing on the "why" and "so what," this book guides readers to a better understanding of the challenges that cyber security presents to modern business, and shows them what they can do as leaders to solve these challenges. Facing Cyber Threats Head On explains that technology is not the answer to cyber security issues. People, not technology, are behind emerging cyber risks. Understanding this brings to light that cyber protection is not a battle of technology against technology, but people against people. Based on this, a new approach is required--one that balances business risk with the cost of creating defenses that can change as quickly and often as attackers can. Readers will find here a ready resource for understanding the why and how of cyber risks, and will be better able to defend themselves and their businesses against them in the future.
Call Number: HF5548.37 .M56 2016
Publication Date: 2017-01-12
The Power and the Story by John LloydIn this sweeping global survey, one of Britain's most distinguished journalists and media commentators analyses for the first time the state of journalism worldwide as it enters the post-truth age. From the decline of the newspaper in the West and the simultaneous threats posed by fake news and President Trump, to the part that Facebook and Twitter played in the Arab revolts and the radical openness stimulated by WikiLeaks, and from the vast political power of Rupert Murdoch's News International and the merger of television and politics in Italy, to the booming, raucous and sometimes corrupt Indian media and the growing self-confidence of African journalism, John Lloyd examines the technological shifts, the political changes and the market transformations through which journalism is currently passing. The Power and the Story offers a fascinating insight into a trade that has claimed the right to hold power to account and the duty to make the significant interesting--while making both the first draft of history, and a profit.
What's Your Digital Business Model? by Peter Weill; Stephanie L. Woerner (Other)Digital transformation is not about technology--it's about change. In the rapidly changing digital economy, you can't succeed by merely tweaking management practices that led to past success. And yet, while many leaders and managers recognize the threat from digital--and the potential opportunity--they lack a common language and compelling framework to help them assess it and guide them in responding. They don't know how to think about their digital business model. In this concise, practical book, MIT digital research leaders Peter Weill and Stephanie Woerner provide a powerful yet straightforward framework that has been field-tested globally with dozens of senior management teams. Based on years of study at the MIT Center for Information Systems Research (CISR), the authors find that digitization is moving companies' business models on two dimensions: from value chains to digital ecosystems, and from a fuzzy understanding of the needs of end customers to a sharper one. Looking at these dimensions in combination results in four distinct business models, each with different capabilities. The book then sets out six driving questions, in separate chapters, that help managers and executives clarify where they are currently in an increasingly digital business landscape and highlight what's needed to move toward a higher-value digital business model. Filled with straightforward self-assessments, motivating examples, and sharp financial analyses of where profits are made, this smart book will help you tackle the threats, leverage the opportunities, and create winning digital strategies.
Call Number: HD30.2 .W4514 2018
Publication Date: 2018-05-08
Guide to Business Information on Central and Eastern Europe by Tania KonnThis guide is an introduction to English language sources, in electronic and conventional print forms, dealing with Central and Eastern European business issues. It gives evaluative descriptions and costs of all listed sources, and concentrates on recent sources. Sources in respect of some of these countries can be difficult to locate, and the author provides guidance on how to go about finding them.
Strategic Business Development for Information Centres and Libraries by Margareta NelkeThis book is aimed at guiding managers towards systematic approaches to improve and facilitate necessary strategic business development and planning. Conditions in the workplace for the Library and Information Services (LIS) are rapidly changing: many organizations are experiencing budget restrictions as well as stakeholders questioning the value of the services. Strategic Business Development for Information Centres and Libraries offers methods and tools for LIS departments to ensure value and benefits are delivered to the parent organization. It argues that LIS must be prepared to change according to the parent organization's needs, to develop strategies for important activities and to seek alliances among key stakeholders. It also offers information on the best practice from five top-performing international LIS units.
Publication Date: 2011-11-09
Data Crush by Christopher SurdakThe Internet used to be a tool for telling your customers about your business. Now its real value lies in what it tells you about them. Every move your customers make online can be tracked, catalogued, and analyzed to better understand their preferences and predict their future behavior. And with mobile technology like smartphones, customers are online almost every second of every day. The companies that succeed going forward will be those that learn to leverage this torrent of information-without being drowned by it. Balancing examples from giants like Amazon, Home Depot, and Ford with newer players like Rovio, Groupon, and scores of niche-market winners, Data Crush examines the forces behind the explosive growth in data and reveals how the most innovative companies are responding to this challenge. The book clarifies the key drivers: the proliferation of "big data" generated by a never-ending range of online activities (and the mobility that enables much of it);the seemingly infinite array of digital commerce and entertainment pathways; and the rising growth of Cloud computing. These and other factors combine to create an overwhelming universe of valuable information-all constantly updated in real time with billions of mouse clicks each day. It's daunting, but with this onslaught of information comes tremendous opportunity-and Data Crush will help you make sense of it all.
Publication Date: 2014-02-18
Managing the Human Factor in Information Security by David LaceyWith the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals.
Publication Date: 2011-04-06
How to Find Business Information by Lucy HeckmanThis fact-filled guide serves as an introductory handbook or as a refresher for those who want to research a specific topic or update their research skills. * Annotated list of sources * An appendix listing core items in business