Fintech Dictionary


Book Description

Fintech Dictionary - What is a blockchain framework? What is crowdlending or an ICO? The Fintech Dictionary helps readers in clarifying key terms that have emerged in the vivid field of financial technology (fintech). It links keywords from banking and insurance, from information technology as well as from innovation management – similar to the „melting pot“ of terms in reality. The collection of over 830 keywords presents the reader concise and up-to-date definitions of terms in an alphabetical order. It should serve students and interested parties from academia and practice alike.




The Governance, Compliance and Risk KPI Dictionary


Book Description

By assembling the first comprehensive dictionary of Key Performance Indicators (KPIs) for Governance, Compliance and Risk, The KPI Institute provides professionals a useful resource for novices and experts alike.It can be used in the early stages of implementing a performance management framework, in the process of selecting and documenting KPIs, but also to improve an existing performance measurement system. The KPI taxonomy presented in the dictionary covers all major functions related to Governance, Compliance and Risk, such as:- Compliance and Audit Management- Governance- Risk Management




HIMSS Dictionary of Health Information and Technology Terms, Acronyms, and Organizations


Book Description

This significantly expanded and newest edition of the bestselling HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations has been developed and extensively reviewed by more than 50 industry experts. The sixth edition of this dictionary serves as a quick reference for students, health information technology professionals, and healthcare executives to better navigate the ever-growing health IT field and includes new terms used as a result of the COVID-19 pandemic and will serve as a resource for HIMSS’ new certification based on digital health transformation as well as for those taking the CPHIMS and CAHIMS certification exams. This valuable resource includes more than 3,000 definitions, 30 organizations, and numerous new references. Definitions of terms for the information technology and clinical, medical, and nursing informatics fields are updated and included. This sixth edition also includes an acronym list with cross-references to current definitions, new word-search capability, and a list of health IT-related associations and organizations, including contact information, mission statements, and web addresses. Academic and certification credentials are also included.




Dictionary of Corporate Social Responsibility


Book Description

This book is a concise and authoritative reference work and dictionary in the field of corporate social responsibility, sustainability, business ethics and corporate governance. It provides reliable definitions to more than 600 terms and concepts for researchers and professionals alike. By its definitions the dictionary helps users to understand the meanings of commonly used terms in CSR, and the roles and functions of CSR-related international organizations. Furthermore, it helps to identify keynotes on international guidelines, codes and principles relevant to CSR. The role of CSR in the business world has developed from a fig leaf marketing front into an important and indispensable aspect of corporate behavior over the past years. Sustainable strategies are valued, desired and deployed more and more by relevant players in business, politics, and societies all over the world. Both research and corporate practice therefore see CSR as a guiding principle for business success.




Enterprise Risk Management


Book Description

A fully revised second edition focused on the best practices of enterprise risk management Since the first edition of Enterprise Risk Management: From Incentives to Controls was published a decade ago, much has changed in the worlds of business and finance. That's why James Lam has returned with a new edition of this essential guide. Written to reflect today's dynamic market conditions, the Second Edition of Enterprise Risk Management: From Incentives to Controls clearly puts this discipline in perspective. Engaging and informative, it skillfully examines both the art as well as the science of effective enterprise risk management practices. Along the way, it addresses the key concepts, processes, and tools underlying risk management, and lays out clear strategies to manage what is often a highly complex issue. Offers in-depth insights, practical advice, and real-world case studies that explore the various aspects of ERM Based on risk management expert James Lam's thirty years of experience in this field Discusses how a company should strive for balance between risk and return Failure to properly manage risk continues to plague corporations around the world. Don't let it hurt your organization. Pick up the Second Edition of Enterprise Risk Management: From Incentives to Controls and learn how to meet the enterprise-wide risk management challenge head on, and succeed.




Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security


Book Description

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security. To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs. This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.




Bridge Maintenance, Safety, Management, Life-Cycle Sustainability and Innovations


Book Description

Bridge Maintenance, Safety, Management, Life-Cycle Sustainability and Innovations contains lectures and papers presented at the Tenth International Conference on Bridge Maintenance, Safety and Management (IABMAS 2020), held in Sapporo, Hokkaido, Japan, April 11–15, 2021. This volume consists of a book of extended abstracts and a USB card containing the full papers of 571 contributions presented at IABMAS 2020, including the T.Y. Lin Lecture, 9 Keynote Lectures, and 561 technical papers from 40 countries. The contributions presented at IABMAS 2020 deal with the state of the art as well as emerging concepts and innovative applications related to the main aspects of maintenance, safety, management, life-cycle sustainability and technological innovations of bridges. Major topics include: advanced bridge design, construction and maintenance approaches, safety, reliability and risk evaluation, life-cycle management, life-cycle sustainability, standardization, analytical models, bridge management systems, service life prediction, maintenance and management strategies, structural health monitoring, non-destructive testing and field testing, safety, resilience, robustness and redundancy, durability enhancement, repair and rehabilitation, fatigue and corrosion, extreme loads, and application of information and computer technology and artificial intelligence for bridges, among others. This volume provides both an up-to-date overview of the field of bridge engineering and significant contributions to the process of making more rational decisions on maintenance, safety, management, life-cycle sustainability and technological innovations of bridges for the purpose of enhancing the welfare of society. The Editors hope that these Proceedings will serve as a valuable reference to all concerned with bridge structure and infrastructure systems, including engineers, researchers, academics and students from all areas of bridge engineering.




Analyzing Banking Risk


Book Description

This book provides a comprehensive overview of topics focusing on assessment, analysis, and management of financial risks in banking. The publication emphasizes risk-management principles and stresses that key players in the corporate governance process are accountable for managing the different dimensions of financial risk. This third edition remains faithful to the objectives of the original publication. A significant new edition is the inclusion of chapters on the management of the treasury function. Advances made by the Basel Committee on Banking Supervision are reflected in the chapters on capital adequacy, transparency, and banking supervision. This publication should be of interest to a wide body of users of bank financial data. The target audience includes persons responsible for the analysis of banks and for the senior management or organizations directing their efforts.




Cloud Security and Privacy


Book Description

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security




Metadata Management with IBM InfoSphere Information Server


Book Description

What do you know about your data? And how do you know what you know about your data? Information governance initiatives address corporate concerns about the quality and reliability of information in planning and decision-making processes. Metadata management refers to the tools, processes, and environment that are provided so that organizations can reliably and easily share, locate, and retrieve information from these systems. Enterprise-wide information integration projects integrate data from these systems to one location to generate required reports and analysis. During this type of implementation process, metadata management must be provided along each step to ensure that the final reports and analysis are from the right data sources, are complete, and have quality. This IBM® Redbooks® publication introduces the information governance initiative and highlights the immediate needs for metadata management. It explains how IBM InfoSphereTM Information Server provides a single unified platform and a collection of product modules and components so that organizations can understand, cleanse, transform, and deliver trustworthy and context-rich information. It describes a typical implementation process. It explains how InfoSphere Information Server provides the functions that are required to implement such a solution and, more importantly, to achieve metadata management. This book is for business leaders and IT architects with an overview of metadata management in information integration solution space. It also provides key technical details that IT professionals can use in a solution planning, design, and implementation process.