Categorieën Prijsstelling Zakelijk
Professionele eBook

Virtual Workplace Support Tools Book 3

Effective Tools to Manage Virtual Operations

59
Taal:  English
Description of a set of critical tools (e.g., virtual model, technology strategy, checklists, etc.) to support you in establishing, managing and improving your virtual company.
Professioneel Plus abonnement gratis voor 30 dagen, daarna $8.99 per maand
Lees dit boek via onze eReader, geen advertenties in het boek
Beschrijving
Inhoud

Description of a set of several critical tools (e.g., virtual business model (operations, security, data protection), technology strategy, policies, plans, checklists, etc.) to support you in establishing, defining, managing and improving your virtual company more effectively.

About the Author

John Kyriazoglou obtained a B.A. (Honours) from the University of Toronto, Canada, also earning a Scholastic award for Academic Excellence in Computer Science. John has worked in Canada, England, Switzerland, Luxembourg, Greece, Saudi Arabia and other countries for over 49 years, as a Senior IT manager, Managing Director, IT auditor and consultant, in a variety of clients and projects, in both the private and the public sectors. He has published several books and articles in professional publications, has served in numerous scientific committees and is a member of several professional and cultural associations.

He is currently the Editor-in-Chief for the Internal Controls Magazine (U.S.A.) and consulting on Data Privacy and Security Issues (GDPR, e-Privacy, etc.) to a large number of private and public clients.

  • Overview and Contents
  1. ST 1. Virtual Business Models
  2. ST 2. Data Quality Policy
  3. ST 3. Data Protection Technology Strategy
  4. ST 4. Digital Transformation Implementation Methodology
  5. ST 5. IT to Business Alignment Questionnaire
  6. ST 6. Data Encryption Policy
  7. ST 7. Virtual Risks and Actions Plan
  8. ST 8. Virtual Team Performance Checklist
  9. ST 9. Virtual Business Reassessment Plan
  10. ST 10. Mobile Devices Security Controls Checklist
  11. ST 11. Virtual Auditing Process
  12. ST 12. Integrated Communications Implementation Methodology
  13. ST 13. Email Management Policy
  14. ST 14. Segregation of Duties Plan
  15. ST 15. Log Management Procedure
  • Bibliography
Over de auteur

John Kyriazoglou