skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
CIO's guide to risk Preview this item
ClosePreview this item
Checking...

CIO's guide to risk

Author: Jessica Keyes
Publisher: Boca Raton, FL : Taylor and Francis, 2017.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"In an age of globalization, widely distributed systems and rapidly advancing technological change, IT professionals and their managers must understand that risk is inherent in all technological projects. The key to project success is to identify risk and then deal with it. The CIO's Guide to Risk addresses the many faces of risk, whether it be in procurement, development, innovation or even social media. Risk  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Keyes, Jessica, 1950-
CIO's guide to risk.
Boca Raton, FL : CRC Press, 2017
(DLC) 2017030802
(OCoLC)992576020
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jessica Keyes
ISBN: 9781351610759 1351610759 9781315108674 1315108674 9781351610766 1351610767
OCLC Number: 1015372475
Description: 1 online resource
Contents: Analyzing technology trends to evaluate risk --
IT project risk --
Risk analysis techniques --
Auditing knowledge management to reduce risk --
Innovation management to reduce risk --
Performance measurement and management for reduced risk --
IT project tracking and control --
Fundamentals of information technology project management --
Project critical success factors --
Legal, privacy and security risk --
Assessment and mitigation of risks in a byod environment --
Social media risk.
Responsibility: Jessica Keyes.

Abstract:

"In an age of globalization, widely distributed systems and rapidly advancing technological change, IT professionals and their managers must understand that risk is inherent in all technological projects. The key to project success is to identify risk and then deal with it. The CIO's Guide to Risk addresses the many faces of risk, whether it be in procurement, development, innovation or even social media. Risk management planning, risk identification, qualitative and quantitative risk analysis, contingency planning and risk monitoring and control are all addressed on a macro as well as micro level."--Provided by publisher.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1015372475<\/a>> # CIO\'s guide to risk<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:MediaObject<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1015372475<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/flu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_hardware_general<\/a>> ; # COMPUTERS--Hardware--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_data_processing<\/a>> ; # COMPUTERS--Data Processing<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_computer_science<\/a>> ; # COMPUTERS--Computer Science<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_reference<\/a>> ; # COMPUTERS--Reference<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/risk_management<\/a>> ; # Risk management<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_machine_theory<\/a>> ; # COMPUTERS--Machine Theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_information_technology<\/a>> ; # COMPUTERS--Information Technology<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_computer_literacy<\/a>> ; # COMPUTERS--Computer Literacy<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/information_technology_projects_management<\/a>> ; # Information technology projects--Management<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/004.0681\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Person\/keyes_jessica_1950<\/a>> ; # Jessica Keyes<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2017<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"In an age of globalization, widely distributed systems and rapidly advancing technological change, IT professionals and their managers must understand that risk is inherent in all technological projects. The key to project success is to identify risk and then deal with it. The CIO\'s Guide to Risk addresses the many faces of risk, whether it be in procurement, development, innovation or even social media. Risk management planning, risk identification, qualitative and quantitative risk analysis, contingency planning and risk monitoring and control are all addressed on a macro as well as micro level.\"--Provided by publisher.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Analyzing technology trends to evaluate risk -- IT project risk -- Risk analysis techniques -- Auditing knowledge management to reduce risk -- Innovation management to reduce risk -- Performance measurement and management for reduced risk -- IT project tracking and control -- Fundamentals of information technology project management -- Project critical success factors -- Legal, privacy and security risk -- Assessment and mitigation of risks in a byod environment -- Social media risk.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4672272525<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/992576020<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"CIO\'s guide to risk<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1015372475<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5185439<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1659533<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.taylorfrancis.com\/books\/e\/9781351610766<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.myilibrary.com?id=1056399<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351610766<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781351610759<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781315108674<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1015372475<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/004.0681\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Person\/keyes_jessica_1950<\/a>> # Jessica Keyes<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1950<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Keyes<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jessica<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Jessica Keyes<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_computer_literacy<\/a>> # COMPUTERS--Computer Literacy<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Computer Literacy<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_computer_science<\/a>> # COMPUTERS--Computer Science<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Computer Science<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_data_processing<\/a>> # COMPUTERS--Data Processing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Data Processing<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_hardware_general<\/a>> # COMPUTERS--Hardware--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Hardware--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_information_technology<\/a>> # COMPUTERS--Information Technology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Information Technology<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_machine_theory<\/a>> # COMPUTERS--Machine Theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Machine Theory<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/computers_reference<\/a>> # COMPUTERS--Reference<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Reference<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/information_technology_projects_management<\/a>> # Information technology projects--Management<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information technology projects--Management<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4672272525#Topic\/risk_management<\/a>> # Risk management<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Risk management<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/flu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"flu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781315108674<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1315108674<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781315108674<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351610759<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351610759<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351610759<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781351610766<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1351610767<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781351610766<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/992576020<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"CIO\'s guide to risk.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1015372475<\/a>> ; # CIO\'s guide to risk<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n