Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
Establishing a new framework for understanding insider risk by focusing on systems of organization within large enterprises, including public, private and not-for-profit sectors, this book analyses practices to better assess, prevent, detect, and respond to insider risk and protect assets and public good.
Choose an application
This book focuses on major challenges posed by the Fourth Industrial Revolution (4IR), particularly the associated risks. By recognizing and addressing these risks, it bridges the gap between technological advancements and effective risk management.
Choose an application
The field of risk science is continuously evolving to develop principles and practices that people to manage future risk. Risk and uncertainty are prevalent yet, it is important to consider what is on the horizon, anticipate the possibility of future events, its consequences, our vulnerability to those events, and how to recover from them.
Choose an application
Play the risk game to your advantage by learning from successful business leaders, entrepreneurs and individuals who took a risk, and won.
Choose an application
This essential guide to project risk management presents proven practical approaches to addressing risk in any project. This edition reflects advances in risk management practice and changes in international standards and guidelines, with new material exploring risk in complex projects, enterprise risk management and risky decision-making.
Choose an application
Choose an application
Choose an application
In this essential, Martin Pils unfolds a clear vision for effective security awareness programs aimed at strengthening the human element in cyber defense. The book is rich in practical examples and advice, offering strategies for implementation and providing valuable recommendations for turning employees into vigilant sentinels of information security. With additional materials and hands-on examples, this book is an indispensable resource for designing awareness campaigns that combine knowledge with enjoyment. A concluding checklist serves as a precise guide for practical implementation in daily business. The Content Understanding Cybersecurity The Goal of Awareness Campaigns Knowledge Transfer through Awareness Campaigns Checklist Target Audiences Entrepreneurs and Executives Security Enthusiasts The Author Martin Pils, with over 20 years of experience in IT and information security, is a sought-after expert when it comes to creating resilient security landscapes in organizations. His approach to awareness places people and ethics at the center. In this essential work, he consolidates his extensive knowledge and experience into a compact guide. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content. This book is a translation of an original German edition. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation.
Data protection. --- Risk management. --- Data and Information Security. --- IT Risk Management.
Choose an application
Regulatory changes can have profound managerial implications for companies. This is particularly evident with the introduction of the European Union Deforestation-Free Regulation (EUDR), which targets seven commodities closely linked to deforestation, forest degradation, and human rights violations. The regulation requires operators and traders of these commodities—namely palm oil, cattle, timber, coffee, cocoa, soy, and rubber—as well as derived products like chocolate, paper, and furniture, to conduct due diligence. The latter process must conclude that the commodity fulfills three conditions: it is deforestation-free, it has been produced in accordance with the relevant legislation of the country of production, and it is covered by a due diligence statement confirming a negligible risk of non-compliance with the first two conditions, based on a thorough risk assessment. This thesis specifically examines the risk assessment aspect of due diligence for the timber commodity, focusing on operators of timber products. These operators are legal entities or individuals who place timber on the European market for the first time and, as such, bear the primary responsibility for complying with this regulation's requirements. Through a review of both academic and non-academic literature, this study explores the concepts of risk analysis, risk assessment, supply chain risk assessment, and sustainable supply chain risk assessment to identify frameworks, tools, and sources of information that can support a thorough risk assessment for deforestation-free due diligence in the timber supply chain. The empirical component of this study includes data collected from interviews with ten stakeholders within the supply chain, including timber importers, consultants, and service providers, as well as visits to three different timber importers. This research aims to gain insights into the characteristics of the timber supply chain, the factors considered for risk assessment, the tools used for data validation and gathering, and current risk assessment practices under the EU Timber Regulation (EUTR). The ultimate goal is to identify key lessons from previous practices and propose ways to address challenges in conducting risk assessments for the new deforestation-free regulation (EUDR).
Choose an application
This open access book aims to provide the reader with some basic insight into the AI Act (REGULATION (EU) 2024/1689) and its relevance for the development of high-risk AI systems. It covers all aspects relevant in a safety plan that should serve as the foundation for developing future safety cases for AI safety systems. The topics include e.g. the system definition; hardware, software and its lifecycles; stakeholders and organizations; tools, programming languages, and existing software to be integrated; documentation and work products; procurement and subcontracting; and human aspects. The book aims at experts and stakeholders involved in developing high risk systems, both manufacturers and operators. It is also written for everyone having an interest in how the AI Act impacts technology development processes generally. As such, especially start-ups and small and medium-sized enterprises (SMEs) will find this book useful.
Software engineering. --- Risk management. --- Data protection. --- Computers. --- Software Engineering. --- IT Risk Management. --- Data and Information Security. --- Hardware Performance and Reliability.
Listing 1 - 10 of 13 | << page >> |
Sort by
|