Information technology risk management and compliance in modern organizations:
"This book explores the risks to IT which can impact the strategic and operational support to business goals have many sources such as technology risks, human and social risks and compliance risks. It covers topics such as, framework and methodologies, regulatory and compliance risks, human and...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2017]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores the risks to IT which can impact the strategic and operational support to business goals have many sources such as technology risks, human and social risks and compliance risks. It covers topics such as, framework and methodologies, regulatory and compliance risks, human and social risks, and technology risks"-- |
Beschreibung: | 17 PDFs (xxi, 360 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522526056 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00177555 | ||
003 | IGIG | ||
005 | 20170630112337.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 170631s2017 pau fob 000 0 eng d | ||
010 | |z 2017006893 | ||
020 | |a 9781522526056 |q ebook | ||
020 | |z 9781522526049 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-2604-9 |2 doi | |
035 | |a (CaBNVSL)slc19562585 | ||
035 | |a (OCoLC)993137220 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HF5548.37 |b .I545 2017e | |
082 | 7 | |a 658.4/78 |2 23 | |
245 | 0 | 0 | |a Information technology risk management and compliance in modern organizations |c Manish Gupta, Raj Sharman, John Walp, and Pavankumar Mulgund, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2017] | |
300 | |a 17 PDFs (xxi, 360 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Frameworks and m ethodologies. Chapter 1. An analytical study of methodologies and tools for enterprise information security risk management ; Chapter 2. A step-by-step procedural methodology for improving an organization's it risk management system ; Chapter 3. Strengthening IT governance with COBIT -- Section 2. Regulatory and compliance risks. Chapter 4. Implications of HIPAA and subsequent regulations on information technology ; Chapter 5. Navigating Through choppy waters of PCI DSS compliance -- Section 3. Human and social risks. Chapter 6. Fortifying corporate human wall: a literature review of security awareness and training ; Chapter 7. A tale of policies and breaches: analytical approach to construct social -- Section 4. Technology risks. Chapter 8. Information technology outsourcing risk factors and provider selection ; Chapter 9. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 10. Swimming upstream in turbulent waters: auditing agile development ; Chapter 11. Do privacy concerns affect information seeking via smartphones? | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores the risks to IT which can impact the strategic and operational support to business goals have many sources such as technology risks, human and social risks and compliance risks. It covers topics such as, framework and methodologies, regulatory and compliance risks, human and social risks, and technology risks"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 06/31/2017). | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Risk management. | |
700 | 1 | |a Gupta, Manish |d 1978- |e editor. | |
700 | 1 | |a Mulgund, Pavankumar, |e editor. | |
700 | 1 | |a Sharman, Raj, |e editor. | |
700 | 1 | |a Walp, John |d 1967- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2017006893 | |
776 | 0 | 8 | |i Print version: |z 1522526048 |z 9781522526049 |w (DLC) 2017006893 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2604-9 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00177555 |
---|---|
_version_ | 1816797078500671488 |
adam_text | |
any_adam_object | |
author2 | Gupta, Manish 1978- Mulgund, Pavankumar Sharman, Raj Walp, John 1967- |
author2_role | edt edt edt edt |
author2_variant | m g mg p m pm r s rs j w jw |
author_facet | Gupta, Manish 1978- Mulgund, Pavankumar Sharman, Raj Walp, John 1967- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 .I545 2017e |
callnumber-search | HF5548.37 .I545 2017e |
callnumber-sort | HF 45548.37 I545 42017E |
callnumber-subject | HF - Commerce |
collection | ZDB-98-IGB |
contents | Section 1. Frameworks and m ethodologies. Chapter 1. An analytical study of methodologies and tools for enterprise information security risk management ; Chapter 2. A step-by-step procedural methodology for improving an organization's it risk management system ; Chapter 3. Strengthening IT governance with COBIT -- Section 2. Regulatory and compliance risks. Chapter 4. Implications of HIPAA and subsequent regulations on information technology ; Chapter 5. Navigating Through choppy waters of PCI DSS compliance -- Section 3. Human and social risks. Chapter 6. Fortifying corporate human wall: a literature review of security awareness and training ; Chapter 7. A tale of policies and breaches: analytical approach to construct social -- Section 4. Technology risks. Chapter 8. Information technology outsourcing risk factors and provider selection ; Chapter 9. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 10. Swimming upstream in turbulent waters: auditing agile development ; Chapter 11. Do privacy concerns affect information seeking via smartphones? |
ctrlnum | (CaBNVSL)slc19562585 (OCoLC)993137220 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03462nam a2200517 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00177555</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20170630112337.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">170631s2017 pau fob 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2017006893</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522526056</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522526049</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-2604-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc19562585</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)993137220</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.I545 2017e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Information technology risk management and compliance in modern organizations </subfield><subfield code="c">Manish Gupta, Raj Sharman, John Walp, and Pavankumar Mulgund, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">17 PDFs (xxi, 360 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Frameworks and m ethodologies. Chapter 1. An analytical study of methodologies and tools for enterprise information security risk management ; Chapter 2. A step-by-step procedural methodology for improving an organization's it risk management system ; Chapter 3. Strengthening IT governance with COBIT -- Section 2. Regulatory and compliance risks. Chapter 4. Implications of HIPAA and subsequent regulations on information technology ; Chapter 5. Navigating Through choppy waters of PCI DSS compliance -- Section 3. Human and social risks. Chapter 6. Fortifying corporate human wall: a literature review of security awareness and training ; Chapter 7. A tale of policies and breaches: analytical approach to construct social -- Section 4. Technology risks. Chapter 8. Information technology outsourcing risk factors and provider selection ; Chapter 9. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 10. Swimming upstream in turbulent waters: auditing agile development ; Chapter 11. Do privacy concerns affect information seeking via smartphones?</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores the risks to IT which can impact the strategic and operational support to business goals have many sources such as technology risks, human and social risks and compliance risks. It covers topics such as, framework and methodologies, regulatory and compliance risks, human and social risks, and technology risks"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 06/31/2017).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Manish</subfield><subfield code="d">1978-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mulgund, Pavankumar,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharman, Raj,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Walp, John</subfield><subfield code="d">1967-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2017006893</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522526048</subfield><subfield code="z">9781522526049</subfield><subfield code="w">(DLC) 2017006893</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2604-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00177555 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:51Z |
institution | BVB |
isbn | 9781522526056 |
language | English |
oclc_num | 993137220 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 17 PDFs (xxi, 360 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, |
record_format | marc |
spelling | Information technology risk management and compliance in modern organizations Manish Gupta, Raj Sharman, John Walp, and Pavankumar Mulgund, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2017] 17 PDFs (xxi, 360 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. Frameworks and m ethodologies. Chapter 1. An analytical study of methodologies and tools for enterprise information security risk management ; Chapter 2. A step-by-step procedural methodology for improving an organization's it risk management system ; Chapter 3. Strengthening IT governance with COBIT -- Section 2. Regulatory and compliance risks. Chapter 4. Implications of HIPAA and subsequent regulations on information technology ; Chapter 5. Navigating Through choppy waters of PCI DSS compliance -- Section 3. Human and social risks. Chapter 6. Fortifying corporate human wall: a literature review of security awareness and training ; Chapter 7. A tale of policies and breaches: analytical approach to construct social -- Section 4. Technology risks. Chapter 8. Information technology outsourcing risk factors and provider selection ; Chapter 9. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 10. Swimming upstream in turbulent waters: auditing agile development ; Chapter 11. Do privacy concerns affect information seeking via smartphones? Restricted to subscribers or individual electronic text purchasers. "This book explores the risks to IT which can impact the strategic and operational support to business goals have many sources such as technology risks, human and social risks and compliance risks. It covers topics such as, framework and methodologies, regulatory and compliance risks, human and social risks, and technology risks"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 06/31/2017). Business enterprises Computer networks Security measures. Computer security. Data protection. Information technology Security measures. Risk management. Gupta, Manish 1978- editor. Mulgund, Pavankumar, editor. Sharman, Raj, editor. Walp, John 1967- editor. IGI Global, publisher. (Original) (DLC)2017006893 Print version: 1522526048 9781522526049 (DLC) 2017006893 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2604-9 Volltext |
spellingShingle | Information technology risk management and compliance in modern organizations Section 1. Frameworks and m ethodologies. Chapter 1. An analytical study of methodologies and tools for enterprise information security risk management ; Chapter 2. A step-by-step procedural methodology for improving an organization's it risk management system ; Chapter 3. Strengthening IT governance with COBIT -- Section 2. Regulatory and compliance risks. Chapter 4. Implications of HIPAA and subsequent regulations on information technology ; Chapter 5. Navigating Through choppy waters of PCI DSS compliance -- Section 3. Human and social risks. Chapter 6. Fortifying corporate human wall: a literature review of security awareness and training ; Chapter 7. A tale of policies and breaches: analytical approach to construct social -- Section 4. Technology risks. Chapter 8. Information technology outsourcing risk factors and provider selection ; Chapter 9. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 10. Swimming upstream in turbulent waters: auditing agile development ; Chapter 11. Do privacy concerns affect information seeking via smartphones? Business enterprises Computer networks Security measures. Computer security. Data protection. Information technology Security measures. Risk management. |
title | Information technology risk management and compliance in modern organizations |
title_auth | Information technology risk management and compliance in modern organizations |
title_exact_search | Information technology risk management and compliance in modern organizations |
title_full | Information technology risk management and compliance in modern organizations Manish Gupta, Raj Sharman, John Walp, and Pavankumar Mulgund, editors. |
title_fullStr | Information technology risk management and compliance in modern organizations Manish Gupta, Raj Sharman, John Walp, and Pavankumar Mulgund, editors. |
title_full_unstemmed | Information technology risk management and compliance in modern organizations Manish Gupta, Raj Sharman, John Walp, and Pavankumar Mulgund, editors. |
title_short | Information technology risk management and compliance in modern organizations |
title_sort | information technology risk management and compliance in modern organizations |
topic | Business enterprises Computer networks Security measures. Computer security. Data protection. Information technology Security measures. Risk management. |
topic_facet | Business enterprises Computer networks Security measures. Computer security. Data protection. Information technology Security measures. Risk management. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2604-9 |
work_keys_str_mv | AT guptamanish informationtechnologyriskmanagementandcomplianceinmodernorganizations AT mulgundpavankumar informationtechnologyriskmanagementandcomplianceinmodernorganizations AT sharmanraj informationtechnologyriskmanagementandcomplianceinmodernorganizations AT walpjohn informationtechnologyriskmanagementandcomplianceinmodernorganizations AT igiglobal informationtechnologyriskmanagementandcomplianceinmodernorganizations |