Cargando…

Information governance and security : protecting and managing your company's proprietary information /

This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for manag...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Iannarelli, John G. (Autor), O'Shaughnessy, Michael (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford, England ; Waltham, Massachusetts : Elsevier, 2015.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn891397260
003 OCoLC
005 20231120111741.0
006 m o d
007 cr cn|||||||||
008 140918t20152015enka ob 001 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d UIU  |d OCLCF  |d CUI  |d S4S  |d STF  |d B24X7  |d COO  |d OCLCQ  |d LIV  |d D6H  |d LQU  |d UHL  |d VLB  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 907360733  |a 1105178431  |a 1105560648 
020 |a 9780128004067  |q (e-book) 
020 |a 0128004061  |q (e-book) 
020 |z 9780128002476 
020 |z 0128002476 
035 |a (OCoLC)891397260  |z (OCoLC)907360733  |z (OCoLC)1105178431  |z (OCoLC)1105560648 
050 4 |a HD30.2  |b .I2336 2015eb 
082 0 4 |a 658.4/038  |2 23 
100 1 |a Iannarelli, John G.,  |e author. 
245 1 0 |a Information governance and security :  |b protecting and managing your company's proprietary information /  |c John Iannarelli, Michael O'Shaughnessy. 
264 1 |a Oxford, England ;  |a Waltham, Massachusetts :  |b Elsevier,  |c 2015. 
264 4 |c �2015 
300 |a 1 online resource (xvi, 191 pages) :  |b illustrations, graphs 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references at the end of each chapters and index. 
588 0 |a Print version record. 
520 |a This book shows managers how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. It establishes enterprise-level systems and disciplines necessary for managing all information generated by an organization. This resource also encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Real-world examples and cases to help illustrate key concepts and issues. --  |c Edited summary from book. 
505 0 |a Front Cover; Information Governance and Security: Protecting and Managing Your Company's Proprietary Information; Copyright; Dedication; Contents; About the Authors; Survey and Disclaimer; Foreword; Quote; Chapter 1 -- The Case for Information Governance; Information Governance; The Small Business; The Medium Size Business; The Large Business; What You will Learn; References; Chapter 2 -- The Threats of Today and Tomorrow; Defining Threats; Future Concerns; References; Chapter 3 -- The Ever Changing Technical Landscape; A Little History; The Issues; The World is Shrinking; References 
505 8 |a Chapter 4 -- The Changing Corporate LandscapeToday's Cyber Environment; The Federal Government; The Private Sector; Why Should Corporate America Care?; References; Chapter 5 -- How Information Governance Fits in the New World; Issues in the New World; References; Chapter 6 -- The Human Element; Cyber; Physical Acts; References; Chapter 7 -- The Technical Side; The Benefits; Concerns Brought About by Technology; References; Chapter 8 -- Balancing Information Governance and Your Company's Mission; Policies; Factors to Consider; References 
505 8 |a Chapter 9 -- The Case for Information Governance from within Your OrganizationNegative Perceptions of Information Governance; Implementation; References; Chapter 10 -- What to do First; The Basics; How to Determine Information Governance Needs for Your Company; How to Create Information Governance Policies; Methods of Security to Support Information Governance; How to Implement Information Governance Policies; References; Chapter 11 -- What to do Forever; Continuing Efforts; Evaluate Effectiveness of Information Governance Policies 
505 8 |a Encouraging Accountability and Ownership of Information GovernanceTraining and Education of Employees About Information Governance; References; Chapter 12 -- Charting the Best Future Course for Your Organization; Information Governance Impacts All Facets of an Organization; Closing Thoughts; References; Appendix A; Information Security Personnel Check List; Appendix B; Appendix C; Works Cited; Index 
650 0 |a Knowledge management. 
650 2 |a Knowledge Management  |0 (DNLM)D058436 
650 6 |a Gestion des connaissances.  |0 (CaQQLa)201-0306548 
650 7 |a Knowledge management  |2 fast  |0 (OCoLC)fst00988184 
700 1 |a O'Shaughnessy, Michael,  |e author 
776 0 8 |i Print version:  |a Iannarelli, John G.  |t Information governance and security.  |d Oxford, UK ; Waltham, MA : Butterworth-Heinemann, [2015]  |z 9780128002476  |w (DLC) 2014027431  |w (OCoLC)895299745 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128002476  |z Texto completo