"This book examines the challenges and opportunities of managing information as a capital asset. It explores how to develop an effective information asset management strategy and how to operationalize and sustain that strategy through governance"--
Organisations are using data, information and knowledge as a competitive weapon. Their data, information and knowledge are arguably their most valuable assets. Yet, this fourth asset is managed badly when compared to the other three assets, namely money, people and infrastructure with considerable risk to the organisation. Executives are accountable for the success of their organisations, and those who don’t manage this critical resource and business enabler effectively can be regarded as negligent. Information Assets carry enormous risk and value. Most boards and executives don’t know how to govern and manage IAs effectively and nobody is held accountable. Given this, organisations should govern and manage their Information Assets the way they manage their Financial Assets. The benefits of managing IAs well are compelling. These benefits include increased efficiency, productivity, employee satisfaction, improved decision-making, mitigating business risk and improving product, protecting corporate reputation and service delivery. Drawing on ground-breaking research, this book explains why Information Assets are so important to organisations and the barriers to managing them well. This book is unique in the sense that it takes a fresh look at this topic, is based on experience and research, and includes interviews from more than 70 industry leaders. In short, this book is written by executives and explains where to start.
How well does your organization manage the risks associated with information quality? Managing information risk is becoming a top priority on the organizational agenda. The increasing sophistication of IT capabilities along with the constantly changing dynamics of global competition are forcing businesses to make use of their information more effectively. Information is becoming a core resource and asset for all organizations; however, it also brings many potential risks to an organization, from strategic, operational, financial, compliance, and environmental to societal. If you continue to struggle to understand and measure how information and its quality affects your business, this book is for you. This reference is in direct response to the new challenges that all managers have to face. Our process helps your organization to understand the "pain points" regarding poor data and information quality so you can concentrate on problems that have a high impact on core business objectives. This book provides you with all the fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, and written in a language that is clear and easy to understand for non-technical managers. - Shows how to manage information risk using a holistic approach by examining information from all sources - Offers varied perspectives of an author team that brings together academics, practitioners and researchers (both technical and managerial) to provide a comprehensive guide - Provides real-life case studies with practical insight into the management of information risk and offers a basis for broader discussion among managers and practitioners
Asset data integrity is a critical aspect of every business, yet it is often overlooked. This book will not only provide an appreciation of this fact, it will also provide a road map to achieving value out of something most CEOs, managers, and workers often overlook. The authors bring many years of experience and hands-on expertise that cannot be obtained elsewhere. An assessment tool is provided so once the problem is recognized by the reader, areas of improvement can be easily recognized. A detailed appendix provides further clarity.
This is the essential guide to information security for the business professional that explains how to protect a company's assets from a human and technology perspective. The guide also covers key products and vendors.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of t
Published by Academic Conferences and Publishing International Limited Edited by: Professor John Politis, Neapolis University Pafos, Cyprus. CD version of the proceedings of the 8th European Conference on Management Leadership and Governance - ECMLG 2012 hosted by the Neapolis University on the 8-9 November 2012. 567 pages
How can knowledge management professionals position themselves for greatest success? Providing practical guidance for professionals, and including mini-case studies of successes and failures, this book demonstrates how to map knowledge resources to support business critical capabilities, and increase the impact of knowledge management projects.
Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset provides a comprehensive discussion of EIM. It endeavors to explain information asset management and place it into a pragmatic, focused, and relevant light. The book is organized into two parts. Part 1 provides the material required to sell, understand, and validate the EIM program. It explains concepts such as treating Information, Data, and Content as true assets; information management maturity; and how EIM affects organizations. It also reviews the basic process that builds and maintains an EIM program, including two case studies that provide a birds-eye view of the products of the EIM program. Part 2 deals with the methods and artifacts necessary to maintain EIM and have the business manage information. Along with overviews of Information Asset concepts and the EIM process, it discusses how to initiate an EIM program and the necessary building blocks to manage the changes to managed data and content. - Organizes information modularly, so you can delve directly into the topics that you need to understand - Based in reality with practical case studies and a focus on getting the job done, even when confronted with tight budgets, resistant stakeholders, and security and compliance issues - Includes applicatory templates, examples, and advice for executing every step of an EIM program