S. Faily I. Fléchais
|
|
|
- Randell Armstrong
- 10 years ago
- Views:
Transcription
1 Making the A theory of security culture for secure and usable grids S. Faily Computing Laboratory University of Oxford UK e-science All Hands Meeting 2008
2 Why Culture Values conflict. Existing understanding based on inappropriate contexts. Tools are value-free and not contextualised.
3 1 Grounded Theory [Corbin and Strauss, 2008] analysis from existing literature. 2 Comparative model derived from empirical data. 3 Theoretical and empirical models applied to a secure design process.
4 Case Studies NeuroGrid A grid based collaborative research environment [Geddes et al, 2006]. 3 clinical exemplars : Stroke, Dementia and Psychosis. Data both sensitive and distributed.
5 Case Studies Development Lifecycle A software development process for developing secure software [Howard and Lipner, 2006, Microsoft Corporation, 2008]. Pragmatic : based on Microsoft s experience securing Windows 2000,.NET and Windows Server Prescriptive: guidance for all stages of the secure software development lifecycle.
6 A combination of tangible and intangible factors within both an organisation s culture and its subcultures. Visible Tangible Socio- Measures Procedural Policy Perception Sub- Cultures Responsibility Socialisation Sub-culture norms In Intangible Compliant Behaviour Label Relation C is-associated-with C2 C1 is-part-of C2 C1 is-cause-of C2
7 Guideline 1 Have a single,, security policy Statements of management intent. Multiple forms of procedural control lead to multiple security perspectives. Reliance on social networks in lieu of policies. Visible Responsibility In Tangible Socio- Procedural Measures Policy Perception Sub-culture Socialisation norms Compliant Behaviour Intangible Sub- Cultures
8 Guideline 2 Leverage socialisation Socialisation is the process of developing culturally acceptable beliefs, values and behaviours [Brown, 1998]. Certificate installation as a rite of passage. Compliance and socialisation synonymous in the SDL. Visible Responsibility In Tangible Socio- Procedural Measures Policy Perception Sub-culture Socialisation norms Compliant Behaviour Intangible Sub- Cultures
9 Guideline 3 Model lines of responsibility Literature : organisational and moral responsibility. NeuroGrid : various and split between technical controls and assets. Ambiguity identified by modelling lines of responsibility before implementing a security policy. Visible Responsibility In Tangible Socio- Procedural Measures Policy Perception Sub-culture Socialisation norms Compliant Behaviour Intangible Sub- Cultures
10 Guideline 4 Know your subcultures Evident in NeuroGrid when asking users to describe how data was handled. Diffusion of Responsibility [Darley and Latané, 1970]. Understanding values helps to determine whether security will be sacrificed for operational goals. Visible Responsibility In Tangible Socio- Procedural Measures Policy Perception Sub-culture Socialisation norms Compliant Behaviour Intangible Sub- Cultures
11 Value Sensitive Design and the design process Identifies impacting human values and integrates them into the design process. Conceptual, Empirical and Investigation. Supplements existing design processes. Precedents in secure and usable design [Friedman et al., 2002, Friedman et al., 2005, Friedman et al., 2006] Conceptual Investigation Artifact Investigation Values Direct & Core Indirect Values Stakeholder Values Contexts Empirical Investigation
12 Augmenting Value Sensitive Design Conceptual Investigation. Augment with additional values. Empirical Investigation. Responsibility modelling. Investigation. Implications of augmenting the approach. Guideline Have a single, security policy Leverage socialisation Model lines of responsibility Understand your subcultures Value Compliant Behaviour Socialisation Responsibility Sub-culture norms
13 Contributions Culture : what is it and why do we need it. for a healthy security culture. An agenda for incorporating insights into the secure design process.
14 I Brown, A. (1998). Organisational Culture. Prentice Hall, 2nd edition. Corbin, J. M. and Strauss, A. L. (2008). Basics of qualitative research : techniques and procedures for developing grounded theory. Sage Publications, Inc., 3rd edition. Darley, J. M. and Latané, B. (1970). Norms and normative behaviour: field studies of social interdependence. In Berkowitz, L. and Macaulay, J., editors, Altruism and Helping Behaviour. Academic Press.
15 II Friedman, B., Howe, D., and Felten, E. (2002). Informed consent in the mozilla browser: implementing value-sensitive design. System Sciences, HICSS. Proceedings of the 35th Annual Hawaii International Conference on, pages 10 pp.. Friedman, B., Lin, P., and Miller, J. K. (2005). Informed consent by design. In Cranor, L. F. and Garfinkel, S., editors, and Usability: Designing Secure Systems that People Can Use. O Reilly Media.
16 III Friedman, B., Smith, I., Kahn Jr., P. H., Consolvo, S., and Selawski, J. (2006). Development of a privacy addendum for open source licenses: Value sensitive design in industry. In Dourish, P. and Friday, A., editors, Ubicomp 2006, LNSC 2006, pages Springer-Verlag Berlin Heidelberg. Geddes et al (2006). The challenges of developing a collaborative data and compute grid for neurosciences. Computer-Based Medical Systems, CBMS th IEEE International Symposium on, pages
17 IV Howard, M. and Lipner, S. (2006). The security development lifecycle: SDL, a process for developing demonstrably more secure software. Microsoft Press, Redmond, Wash. Microsoft Corporation (2008). Microsoft Development Lifecycle (SDL) - version
Grounded Theory. 1 Introduction... 1. 2 Applications of grounded theory... 1. 3 Outline of the design... 2
Grounded Theory Contents 1 Introduction... 1 2 Applications of grounded theory... 1 3 Outline of the design... 2 4 Strengths and weaknesses of grounded theory... 6 5 References... 6 1 Introduction This
ORGANISATIONAL CULTURE. Students what do you all think Organizational Culture is? Can you all define it in your own way.
Lesson:-35 ORGANISATIONAL CULTURE Students what do you all think Organizational Culture is? Can you all define it in your own way. In the 1980's, we saw an increase in the attention paid to organizational
A Theoretical Model of Augmented Reality Acceptance
A Theoretical Model of Augmented Reality Acceptance M. Claudia Leue, Dario tom Dieck, and Timothy Jung Department of Food and Tourism Management Manchester Metropolitan University, United Kingdom [email protected],
Secure Software Design in Practice ARES SECSE Workshop
Secure Software Design in Practice ARES SECSE Workshop Per Håkon Meland and Jostein Jensen SINTEF Information and Communication Technology Department of Security, Safety and System Development {Per.H.Meland,
On the attributes of a critical literature review. Saunders, Mark N. K. 1 & Rojon, Céline 2. United Kingdom.
On the attributes of a critical literature review Saunders, Mark N. K. 1 & Rojon, Céline 2 1 School of Management, University of Surrey, Guildford, GU2 7XH, United Kingdom; 2 Department of Psychology &
Methodical Notes for part-time BMCF TM study course M_SM / PROJECT MANAGEMENT
1 st session: INTRODUCTION TO PROJECT MANAGEMENT Objective of the thematic unit: To understand what is meant by Projects and to define Project Management. Students benefit by understanding the need to
Basic underlying assumptions
Organisational culture Broadly speaking there are two schools of thought on organisational culture. The first, suggests that culture is tangible and exists in much the same way an organisation chart can
A methodology for knowledge based project management (Work in progress)
A methodology for knowledge based project management (Work in progress) Patrick Onions [email protected] 23 January 2007 The characteristics of our late 20th century society demand the development
MRS Diploma in Market & Social Research Practice Full Syllabus & Assessment Guidelines
MRS Diploma in Market & Social Research Practice Full Syllabus & Assessment Guidelines Effective from June 2012 Assessment With members in more than 60 countries, MRS is the world s leading authority on
GRCM: A Model for Global Requirements Change Management
GRCM: A Model for Global Requirements Change Management Waqar Hussain, Tony Clear Auckland University of Technology {waqar.hussain,tclear}@aut.ac.nz http://www.aut.ac.nz Abstract. [Context and motivation]
The Role of Knowledge Management in Building E-Business Strategy
The Role of Knowledge Management in Building E-Business Strategy Mohammad A. ALhawamdeh, P.O.BOX (1002), Postal Code 26110, Jarash, Jordan, +962-2-6340222 [email protected] Abstract - e-business
Introduction to Software Engineering
CS1Ah Lecture Note 7 Introduction to Software Engineering In this note we provide an overview of Software Engineering. The presentation in this lecture is intended to map out much of what we will study
Management and Leadership in Healthcare
MODULE SPECIFICATION KEY FACTS Module name Management and Leadership in Healthcare Module code HMM022 School School of Health Sciences Department or equivalent Health Services Research and Management Division
Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
COURSE SPECIFICATION DOCUMENT. Business and Economics. Masters of Business Administration. Dr Parviz Dabir-Alai
COURSE SPECIFICATION DOCUMENT NOTE: ANY CHANGES TO A CSD MUST GO THROUGH ALL OF THE RELEVANT APPROVAL PROCESSES, INCLUDING LTPC. Academic School: Programme: Business and Economics Masters of Business Administration
Investing in renewables
Investing in renewables More than a matter of money Ingo Kastner & Paul C. Stern Research focus Understanding & promoting major energy investment in households (e.g., investments in solar energy) These
Tales of Empirically Understanding and Providing Process Support for Migrating to Clouds
Tales of Empirically Understanding and Providing Process Support for Migrating to Clouds M. Ali Babar Lancaster University, UK & IT University of Copenhagen Talk @ MESOCA, Eindhoven, the Netherlands September,
An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance)
An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance) Nicolas Mayer 1, Béatrix Barafort 1, Michel Picard 1, and Stéphane Cortina 1 1 Luxembourg Institute of Science
VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT. M.A. SEMESTER-III PSYCHOLOGY PAPER CCT 13
VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT. M.A. SEMESTER-III PSYCHOLOGY PAPER CCT 13 Advance of Social Psychology I (To come in force from June, 2012) University Exam : 70 Marks Internal Exam : 30 Marks
Cyber Security Issues on E-Commerce
Cyber Security Issues on E-Commerce L.Madhava Reddy, Librarian, Andhra Muslim College, Guntur L.Jyothsna,B.Tech,ECM, K.L.University ABSTRACT: Cyber security is at a sensitive and critical juncture in the
Data Analytics in Organisations and Business
Data Analytics in Organisations and Business Dr. Isabelle E-mail: [email protected] 1 Data Analytics in Organisations and Business Some organisational information: Tutorship: Gian Thanei:
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
Human Computer Interaction
Dr Mark Wright - Informatics HCI Course 2012/13 Human Computer Interaction Dr Mark Wright University of Edinburgh and Edinburgh College of Art Semester 1 2012/2013 Principles and Overview Lecture 1 Key
FINANCE AND ACCOUNTING OUTSOURCING AN EXPLORATORY STUDY OF SERVICE PROVIDERS AND THEIR CLIENTS IN AUSTRALIA AND NEW ZEALAND.
FINANCE AND ACCOUNTING OUTSOURCING AN EXPLORATORY STUDY OF SERVICE PROVIDERS AND THEIR CLIENTS IN AUSTRALIA AND NEW ZEALAND. Graham Ray, Accounting Lecturer, School of Commerce and Management, Southern
Requirements Engineering Process Models in Practice
AWRE 2002 141 Engineering Process Models in Practice Sacha Martin 1, Aybüke Aurum 1, Ross Jeffery 2, Barbara Paech 3 1 School of Information Systems, Technology and Management, University of New South
Appendix 2: Intended learning outcomes of the Bachelor IBA
Appendix 2: Intended learning outcomes of the Bachelor IBA Intended international & intercultural learning outcomes are presented in bold. Content related aspects Have knowledge of business administrative
Working with College Students: Applying Student Development Theories to Practice. Lacy N. Karpilo, Ph.D Director of Residence Life
Working with College Students: Applying Student Development Theories to Practice Lacy N. Karpilo, Ph.D Director of Residence Life Presentation Overview Purpose of SD Theory History of SD Theory Overview
Improving Traceability of Requirements Through Qualitative Data Analysis
Improving Traceability of Requirements Through Qualitative Data Analysis Andreas Kaufmann, Dirk Riehle Open Source Research Group, Computer Science Department Friedrich-Alexander University Erlangen Nürnberg
EFFECT OF ENVIRONMENTAL CONCERN & SOCIAL NORMS ON ENVIRONMENTAL FRIENDLY BEHAVIORAL INTENTIONS
169 EFFECT OF ENVIRONMENTAL CONCERN & SOCIAL NORMS ON ENVIRONMENTAL FRIENDLY BEHAVIORAL INTENTIONS Joshi Pradeep Assistant Professor, Quantum School of Business, Roorkee, Uttarakhand, India [email protected]
Juliet Corbin and Anselm Strauss. Basics of Qualitative Research: Grounded Theory Procedures and Techniques 3 rd edition (Sage 2008)
Qualitative Data Analysis PP&D U213 MGMT 291 POLSCI 273 SOCIOL 223 Winter term, 2009 Time: Friday, 9:30a - 12:20p Location: Social Ecology I Room 200 Professor Martha S. Feldman [email protected] Office:
Causes of Conflicts for Local Information Technology Managers in Multinational Companies
Abstract Causes of Conflicts for Local Information Technology Managers in Multinational Companies Jongtae Yu Mississippi State University Jong-Wook Ha Columbus State University Dong-Yop Oh University of
Developing Software with Scrum in a Small Cross-Organizational Project
Developing Software with Scrum in a Small Cross-Organizational Project Torgeir Dingsøyr 1,2, Geir Kjetil Hanssen 1, Tore Dybå 1 Geir Anker 3, and Jens Olav Nygaard 3 1 SINTEF Information and Communication
Qualitative Data Analysis Week 8 Andre S amuel Samuel
Qualitative Data Analysis Week 8 Andre Samuel Introduction Qualitative research generates a large and cumbersome amount of data Data is usually yg generated from field notes, interview transcripts, focus
B.Ed. Two Year Programme. F.2: Human Development, Diversity and Learning
B.Ed. Two Year Programme F.2: Human Development, Diversity and Learning Maximum Marks: 100 Vision This course will facilitate an understanding of the processes of development and learning and some of the
How To Understand The Role Of A Nurse As An Advocate
The Nurse as Advocate: A Grounded Theory Perspective PENNIE SESSLER BRANDEN, PHD, CNM, RN P S B R A N D E N @ A O L. C O M 2 What is a Nurse Advocate? 3 In one sentence, describe the role of the nurse
TOWARDS PREDICTABLE B2B CUSTOMER SATISFACTION AND EXPERIENCE MANAGEMENT WITH CONTINUOUS IMPROVEMENT ASSETS AND RICH FEEDBACK
TOWARDS PREDICTABLE B2B CUSTOMER SATISFACTION AND EXPERIENCE MANAGEMENT WITH CONTINUOUS IMPROVEMENT ASSETS AND RICH FEEDBACK PETRI KETTUNEN (UNIVERSITY OF HELSINKI) MIKKO ÄMMÄLÄ, JARI PARTANEN (ELEKTROBIT)
Requirements for Software Deployment Languages and Schema
Requirements for Software Deployment Languages and Schema Richard S. Hall, Dennis Heimbigner, Alexander L. Wolf Software Engineering Research Laboratory Department of Computer Science University of Colorado
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
Stock Market Reaction to Information Technology Investments in the USA and Poland: A Comparative Event Study
2012 45th Hawaii International Conference on System Sciences Stock Market Reaction to Information Technology Investments in the USA and Poland: A Comparative Event Study Narcyz Roztocki School of Business
The use of Trade-offs in the development of Web Applications
The use of Trade-offs in the development of Web Applications Sven Ziemer and Tor Stålhane Department of Computer and Information Science Norwegian University of Technology and Science {svenz, stalhane}@idi.ntnu.no
OPEN UNIVERSITY OF TANZANIA FACULTY OF BUSINESS MANAGEMENT
1 OPEN UNIVERSITY OF TANZANIA FACULTY OF BUSINESS MANAGEMENT OME 512: MARKETING MANAGEMENT COURSE OUTLINE INTRODUCTION This course introduces students to the concepts and principles marketing management.
International Journal of Information Technology & Computer Science ( IJITCS ) (ISSN No : 2091-1610 ) Volume 6 : Issue on November / December, 2012
IDENTIFYING THE RELATIONSHIPS BETWEEN KEY DEVELOPMENT STAGES AND CRITICAL SUCCESS FACTORS FOR CUSTOMER RELATIONSHIP MANAGEMENT Ahmed Sanad Department of informatics, Faculty of Technology, De Montfort
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
LONDON SCHOOL OF COMMERCE. Programme Specifications for the. Cardiff Metropolitan University. MSc in International Hospitality Management
LONDON SCHOOL OF COMMERCE Programme Specifications for the Cardiff Metropolitan University MSc in International Hospitality Management 1 Contents Programme Aims and Objectives 3 Programme Learning Outcomes
A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert
A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB 76131 Karlsruhe,
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System Yu-Cheng Lin, Yu-Chih Su, Yen-Pei Chen Department of Civil Engineering, National Taipei University of Technology, No.1.Chung-Hsiao E.
Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com
Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing 1 P a g e Table of Contents What is the key to agility in Data Warehousing?... 3 The need to address requirements completely....
Internal Marketing Orientation in Cultural Change Management for Organisation Development
MEB 2008 6 th International Conference on Management, Enterprise and Benchmarking May 30-31, 2008 Budapest, Hungary Internal Marketing Orientation in Cultural Change Management for Organisation Development
Quality in Use: Meeting User Needs for Quality
Journal of System and Software, 1999 (in press) Quality in Use: Meeting User Needs for Quality Nigel Bevan Serco Usability Services Abstract There is an increasing demand for software that matches real
The Role of Intangible Assets in Private Health Care Companies
Latvijas Ekonomistu asociācijas 4. ikgadējā konference Ceļš uz labklājību ekonomikas globalizācija un ekonomikas lokalizācija The Role of Intangible Assets in Private Health Care Companies Santa Babauska,
BCS Certificate in Business Analysis Extended Syllabus. Version 2.4 March 2015
BCS Certificate in Business Analysis Extended Syllabus Version 2.4 March 2015 http://certifications.bcs.org Change History Any changes made to the syllabus shall be clearly documented with a change history
Learning Outcomes : On completion of this course students should be able to:
Course Title : Introduction to Behavioral Science Course Code : BEH103 Recommended Study Year : First or Second Year No. of Credits/Term : 3 Mode of Tuition : Lecture-Tutorial Class Contact Hours : 3 hours
Evaluating Strengths and Weaknesses of Agile Scrum Framework using Knowledge Management
Evaluating Strengths and Weaknesses of Agile Scrum Framework using Knowledge Management Naga Sri Morampudi Lovely professional university Phagwara, Punjab, India Gaurav Raj Lovely professional university
Stepanova Elina EFFECTIVE LEADERSHIP PhD economic science Siberian Federal University Krasnoyarsk
Stepanova Elina EFFECTIVE LEADERSHIP PhD economic science Siberian Federal University Krasnoyarsk Leadership styles demonstrated their contribution to leadership effectiveness. Leadership styles is dependant
Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia
2014 IEEE 6th International Conference on Cloud Computing Technology and Science Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia Nouf Alkhater Gary Wills Robert
Communication Problems in Global Software Development: Spotlight on a New Field of Investigation
Communication Problems in Global Software Development: Spotlight on a New Field of Investigation Sébastien Cherry, Pierre N. Robillard Software Engineering Research Laboratory, École Polytechnique de Montréal
Towards a new paradigm of science
Essay Towards a new paradigm of science in scientific policy advising 2007 Eva Kunseler Kansanterveyslaitos Environment and Health Department Methods of Scientific Thought Prof. Lindqvist Introduction:
Applying the Principle of Least Privilege to Windows 7
1 Applying the Principle of Least Privilege to Windows 7 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
Accounting Problems of Research and Development
Accounting Problems of Research and Development KATA T. SZILÁGYI Department of Business Economics, Institute of Economic Science Eszterházy Károly College, Egészségház u. 4, Eger 3300, Hungary [email protected]
Level 4 Diploma in Advanced Hospitality and Tourism Management (VRQ) Qualification Syllabus
Level 4 Diploma in Advanced Hospitality and Tourism Management (VRQ) Qualification Syllabus Contents Page 1. The Level 4 Diploma in Advanced Hospitality and Tourism Management Syllabus 4 2. Structure of
SAGGI NEVO Associate Professor Department of Information Technology Management Office: #393 School of Business University at Albany
SAGGI NEVO Associate Professor Department of Information Technology Management Office: #393 School of Business University at Albany Earned Degrees Institution Specialization Degree Date Received York University
International group work in software engineering
International group work in software engineering Julian M. Bass Robert Gordon University Aberdeen, UK [email protected] J. T. Lalchandani IIIT-B Bangalore, India [email protected] R. McDermott Robert Gordon
The "Alignment" Theory: Creating Strategic Fit
20 MANAGEMENT DECISION 29,1 T he organisation and its competitive situation should be viewed not as separate, interdependent entities but as just different influences in the same global environment. The
Exploring the roles and responsibilities of data centres and institutions in curating research data a preliminary briefing.
Exploring the roles and responsibilities of data centres and institutions in curating research data a preliminary briefing. Dr Liz Lyon, UKOLN, University of Bath Introduction and Objectives UKOLN is undertaking
Project Planning With IT
Unit 17: Project Planning With IT Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose Y/601/7321 BTEC National The aim of this unit is to ensure learners understand the processes
Public Health Competency Based Employee Performance Management Self Assessment Tool - Manager/Supervisor
Public Health Competency Based Employee Performance Management Self Assessment Tool - Manager/Supervisor Public Health Competency Based Employee Performance Management Toolkit OPHA & Partners, Version
SSS 955 ADVANCED QUALITATIVE RESEARCH METHODOLOGIES
THE CATHOLIC UNIVERSITY OF AMERICA CUA National Catholic School of Social Service Washington, DC 20064 202-319-5458 Fax 202-319-5093 SSS 955 ADVANCED QUALITATIVE RESEARCH METHODOLOGIES I. COURSE PURPOSE
Scaling Down Large Projects to Meet the Agile Sweet Spot
Scaling Down Large Projects to Meet the Agile Sweet Spot Philippe Kruchten Kruchten Engineering Services Ltd Presenter Philippe Kruchten, Ph. D., P. Eng. KESL 2906 West 37 th avenue Vancouver BC V5Z 2M9
Impact of Organizational Culture on Employee Performance
Impact of Organizational Culture on Employee Performance ALHARBI MOHAMMAD AWADH University Technology Malaysia International Business School, Malaysia E-mail: [email protected] ALYAHYA, MOHAMMED
TEACHING OF INFORMATION ETHICS IN KENYA
TEACHING OF INFORMATION ETHICS IN KENYA By Japhet Otike, PhD. School of Information Sciences Moi University, Eldoret, Kenya e-mail: [email protected] ( A paper delivered in a Conference on the Teaching
Analysis and Design of Knowledge Management Systems for School of Information System at XYZ University (A Case Study Approach)
, pp. 229240 http://dx.doi.org/10.14257/ijmue.2014.9.12.21 Analysis and Design of Management Systems for School of Information System at XYZ University (A Case Study Approach) Yohannes Kurniawan and Siti
Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper
Protecting Business Information With A SharePoint Data Governance Model TITUS White Paper Information in this document is subject to change without notice. Complying with all applicable copyright laws
White paper. Supplier Performance Management Driving successful strategies & relationships
White paper Supplier Performance Management Driving successful strategies & relationships Introduction Being an important and integral part of any supplier chain management, a robust and well thought out
LEADERSHIP COMPETENCY FRAMEWORK
LEADERSHIP COMPETENCY FRAMEWORK 1 Introduction to the Leadership Competency Framework The Leadership Competency Framework focuses on three levels of management: Team Leaders/Supervisors responsible for
This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 15447
Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited
