Over 10 mio. titler Fri fragt ved køb over 499,- Hurtig levering Forlænget returret til 31/01/25

Managing Online Risk

- Apps, Mobile, and Social Media Security

  • Format
  • Bog, paperback
  • Engelsk

Beskrivelse

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.

Læs hele beskrivelsen
Detaljer
Størrelse og vægt
  • Vægt610 g
  • coffee cup img
    10 cm
    book img
    19,1 cm
    23,5 cm

    Findes i disse kategorier...

    Se andre, der handler om...

    Screening Transformation Generation Talent Management Succession Training Discrimination Money Future Reputation Content management Threat Data analysis Data protection Employment Intellectual property Knowledge management Models Recruitment Risk assessment Risk management Mobile Passwords Privacy Trade secrets Influence Growth Compliance Termination Confidentiality Identity theft Patents Value Trademarks F� ADA Corporate identity Security Risk mitigation Data management Copyrights Apps Employee Big data Internet of things content marketing Human resources Bitcoin Gamification cryptocurrency Employee training Tina Online-Banking Drones Digital currency Domain Names Workforce Risk Response Corporate brand Digital identity JOBS-Act PAC Dodd-Frank Data Classification PCI-DSS Incident Response Millennials SOX Collapse App development Risk analysis Digital payment systems Consumer Privacy Future scenarios Reputational risk NIST IP rights Constraint Kickstarter Data recovery E-payments Mobile payments Employer Followers HIPAA Social Media Guidelines International Intellectual Property OSHA Technology Development Think tanks Risk identification Sans Data security 3D printing Content Shadow IT Succession planning Data storage Data theft BYOD Virtual currency Online security FDA Online Politics Mobile device management Coppa FINRA Digital immortality Priority Social Scoring Game Development Recommendations Digital Assets Online-Fundraising FTC Federal Trade Commission Online-Reviews Pew 4 future archetypes App malware Benefits Banking safely online BYOD Policy Big data ecosystem BlueWave computing Citreas Badvocacy Casual layered analysis CAN-SPAM Data at Rest Data in creation Data in transit Digital advocacy Data breach backup Data Use employment cycle digital afterlife Digital legacy plan Disclaimers Digital political campaigns Executive identity EEOC Data access Employee privacy FERPA FFIEC Compliance oversight External security risk Future of risk Compliance apps compliance training Creative Commons License Fair use doctrine Cybersecurity simulation Critical Security Controls crowdfunding Data cycle data surveillance GLBA HESTA Digital lobbying digital legacy Digital resurrection Hafez Adel Digital expiration Digital life 2025 Human internet disclosures InfoSec pro Jim Dator Intellectual property legislation Facebook firings Federal privacy law Follr.com Mobile app management Mobile data protection Gripe sites Monitored man MRAID Password alternatives Peopleware Future Wheel PCI SSC Hot Spot Intellectual property risk regulated industries Internal security risk PSQUIA Risk management apps Intellectual property cycle Intellectual property valuation HITECH Stephen Fells Talent management software Trade libel Online micro-financing Mobile workforce Required skills Risk level Security budget Online badges Online charitable donations Succession planning cycle Risk Remediation Security Perception social media policy Socially legal audit Virtual banks Whistleblowing
    Machine Name: SAXO082