Listing 1 - 3 of 3 |
Sort by
|
Choose an application
In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards.
Business enterprises --- Information technology --- Management --- Security measures --- Management. --- Security measures. --- COBIT 5. --- COBIT. --- IT controls. --- IT governance. --- IT security risks. --- IT security.
Choose an application
Tourism destinations and businesses are becoming increasingly prone to the impacts of crises and disasters due to global environmental change and security risks. This is the first research based book that provides a strategic approach to understanding the nature of tourism crises and disasters before outlining tourism crisis and disaster planning, response, and longer term recovery and knowledge management strategies. It applies a wide range of theoretical perspectives and concepts to improve our understanding of both organisational crises and natural disasters. The book draws on examples from around the world including the USA, Europe, UK, Asia-Pacific and the Middle East. It will be essential reading for tourism academics and students as well as tourism managers and government officials involved in tourism destination management and marketing.
Tourism --- Crisis management. --- Travel --- Crises --- Management of crises --- Management --- Problem solving --- Conflict management --- Management. --- Safety measures. --- Crisis management --- Safety measures --- Tourism - Management --- Travel - Safety measures --- crisis management. --- crisis research. --- disaster management. --- global environmental change. --- natural disasters. --- organisational crises. --- security risks. --- tourism crisis and disaster planning. --- tourism management. --- tourism planning. --- tourism policy. --- tourism strategies.
Choose an application
How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit? This title examines the great variation in how terrorist groups are structured.
TERRORISM --- TERRORISTS --- Polemology --- Organization theory --- Terrorists. --- Terrorism. --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Criminals --- Violent crimes --- Organized crime --- Organizational behavior. --- History. --- Behavior in organizations --- Management --- Organization --- Psychology, Industrial --- Social psychology --- Crime syndicates --- Organised crime --- Crime --- Fatah. --- Hamas. --- Islamist groups. --- Islamist terrorism. --- Middle East. --- Northern Ireland. --- Palestinian terrorist groups. --- Provisional IRA. --- Russian terrorist groups. --- Tsarist secret police. --- Ulster Defense Association. --- Ulster Volunteer Force. --- agency problems. --- agency theory. --- al-Qa'ida in Iraq. --- al-Qa'ida. --- bureaucracy. --- control. --- counterterror policies. --- counterterrorism policies. --- discrimination. --- group-specific vulnerabilities. --- hierarchy. --- internal dynamics. --- internal politics. --- managerial challenges. --- managerial problems. --- negotiated settlement. --- operational management. --- organizational analysis. --- organizational challenges. --- organizational dynamics. --- organizational resources. --- political goals. --- preference divergence. --- secrecy. --- secular nationalist groups. --- security reducing. --- security risks. --- security-control tradeoff. --- strategic interactions. --- terrorism. --- terrorist activity. --- terrorist group structure. --- terrorist groups. --- terrorist leaders. --- terrorist operatives. --- terrorist organizations. --- terrorists. --- uncertainty. --- violence.
Listing 1 - 3 of 3 |
Sort by
|