Security Awareness in the 1990's


Book Description

Presents 32 feature articles from the Security Awareness Bulletin, representing the work of many authors. Includes: the emerging foreign intelligence threat (counterintelligence challenges; what is the threat?), espionage and espionage case studies (Randy Miles Jeffries; Albert Sombolay; Aldrich Ames); information systems security (security measures; Boeing hacker incident; understanding the computer criminal); security policy and programs (national OPSEC program; technical security; TSCM); industrial security (arms control inspections); and the threat to U.S. technology (export control violations; foreign economic threat).




Security Awareness in the 1980s


Book Description







Delivering Distinctive Value in Emerging Economies


Book Description

The idea behind editing this book is to present a contemporary reference that tells the story of how businesses and institutions in emerging economies are circumventing or can better circumvent institutional voids in order to create distinct value for consumers and develop resilient and sustainable economies. For this book, we gathered 24 contributions (or chapters) on new directions and strategies to create value in emerging economies. The contributions span thematic areas such as: COVID-19 and small businesses, social influencers and COVID-19 advocacy, artisan entrepreneurship, leadership and project success, internationalization and intellectual property, cultural artifacts in corporate branding, fintech adoption, mobile money and agriculture value chain, workplace fraud, ethical decision-making in accountancy, modeling early detection of mother’s mode of delivery, assessment of health systems in Africa, online platforms and patient empowerment, students’ academic engagement and technology, and continuous use of e-learning among professional accounting students. The authors of these contributions discuss the relevance of each chapter to its target audience (practitioners and students). They also outline the implications for practice and policy (where applicable) alongside the concluding arguments of their respective chapters. In effect, the 24 chapters offer key strategic directions for businesses, public sector institutions, non-governmental organizations, and international development institutions to be more efficient and sustainably responsible in delivering distinctive value in emerging economies. Emerging economies have become an opportune interest of practitioners, entrepreneurs and policy makers worldwide. Hence, a contemporary text which explores how to create and deliver distinct value in these economies is a must a read.







Cyber security training for employees


Book Description

In the ever-evolving landscape of modern technology, the significance of robust cyber security practices cannot be overstated. As organizations increasingly rely on digital infrastructure for their daily operations, the looming threat of cyber attacks necessitates comprehensive preparation. "Cyber Security Training for Employees" stands as an indispensable manual, empowering employers and staff alike with the knowledge and skills required to navigate the intricate realm of cyber security effectively. About the Book: Within the pages of this comprehensive guide, readers will find a practical and user-friendly resource, crafted with insights drawn from years of experience in the field of cyber security. This book is a crucial reference for CEOs, managers, HR professionals, IT teams, and every employee contributing to the protection of their company's digital assets. Key Features: · Understanding Cyber Threats: Delve into the diverse spectrum of cyber threats that organizations confront today, ranging from phishing and malware attacks to social engineering and insider risks. Gain a lucid comprehension of the tactics malicious entities deploy to exploit vulnerabilities. · Fostering a Cyber-Aware Workforce: Learn how to nurture a culture of cyber security awareness within your organization. Acquire strategies to engage employees at all echelons and inculcate best practices that empower them to serve as the first line of defense against cyber attacks. · Practical Training Modules: The book presents a series of pragmatic training modules encompassing vital subjects such as password hygiene, email security, data safeguarding, secure browsing practices, and more. Each module includes real-world examples, interactive exercises, and actionable advice that can be seamlessly integrated into any organization's training curriculum. · Case Studies: Explore actual case studies spotlighting the repercussions of inadequate cyber security practices. Analyze the lessons distilled from high-profile breaches, gaining insight into how the implementation of appropriate security measures could have averted or mitigated these incidents. · Cyber Security for Remote Work: Addressing the surge in remote work, the book addresses the distinct challenges and vulnerabilities associated with a geographically dispersed workforce. Learn how to secure remote connections, protect sensitive data, and establish secure communication channels. · Sustained Enhancement: Recognizing that cyber security is a perpetual endeavor, the book underscores the significance of regular assessment, evaluation, and enhancement of your organization's cyber security strategy. Discover how to conduct security audits, pinpoint areas necessitating improvement, and adapt to emerging threats. · Resources and Tools: Gain access to a plethora of supplementary resources, including downloadable templates, checklists, and references to reputable online tools. These resources will facilitate the initiation of your organization's cyber security training initiatives, effecting enduring improvements.




Modern American Drama: Playwriting in the 1990s


Book Description

The Decades of Modern American Playwriting series provides a comprehensive survey and study of the theatre produced in each decade from the 1930s to 2009 in eight volumes. Each volume equips readers with a detailed understanding of the context from which work emerged: an introduction considers life in the decade with a focus on domestic life and conditions, social changes, culture, media, technology, industry and political events; while a chapter on the theatre of the decade offers a wide-ranging and thorough survey of theatres, companies, dramatists, new movements and developments in response to the economic and political conditions of the day. The work of the four most prominent playwrights from the decade receives in-depth analysis and re-evaluation by a team of experts, together with commentary on their subsequent work and legacy. A final section brings together original documents such as interviews with the playwrights and with directors, drafts of play scenes, and other previously unpublished material. The major playwrights and their plays to receive in-depth coverage in this volume include: * Tony Kushner: Angels in America: A Gay Fantasia on National Themes, Part One and Part Two (1991), Slavs! Thinking About the Longstanding Problems of Virtue and Happiness (1995) and A Dybbuk, or Between Two Worlds (1997); * Paula Vogel: Baltimore Waltz (1992), The Mineola Twins (1996) and How I Learned to Drive (1997); * Suzan-Lori Parks: The Death of the Last Black Man in the Whole Entire World (1990), The America Play (1994) and Venus (1996); * Terrence McNally: Lips Together, Teeth Apart (1991), Love! Valour! Compassion! (1997) and Corpus Christi (1998).




The Public Service


Book Description




Post-Humanitarianism


Book Description

The world has entered an unprecedented period of uncertainty and political instability. Faced with the challenge of knowing and acting within such a world, the spread of computers and connectivity, and the arrival of new digital sense-making tools, are widely celebrated as helpful. But is this really the case, or have we lost more than gained in the digital revolution? In Post-Humanitarianism, renowned scholar of development, security and global governance Mark Duffield offers an alternative interpretation. He contends that connectivity embodies new forms of behavioural incorporation, cognitive subordination and automated management that are themselves inseparable from the emergence of precarity as a global phenomenon. Rather than protect against disasters, we are encouraged to accept them as necessary for strengthening resilience. At a time of permanent emergency, humanitarian disasters function as sites for trialling and anticipating the modes of social automation and remote management necessary to govern the precarity that increasingly embraces us all. Post-Humanitarianism critically explores how increasing connectivity is inseparable from growing societal polarization, anger and political push-back. It will be essential reading for students of international and social critique, together with anyone concerned about our deepening alienation from the world.