Nyheter
28392
28393
Bok
Utgivningsår: 2023
Språk: Finska
Medietyp: Bok
Typ: Bibliografi
Förlag: Helsinki : Edita, [2023]
Resurstyp: Fysiskt material
Anmärkning: Sisältää bibliografisia viitteitä ja hakemiston.
28908
Elektroniskt material
Utgivningsår: 2022
Språk: Engelska
Medietyp: Elektroniskt material
Förlag: Canberra : ANU Press, The Australian National University, [2022]
Resurstyp: Elektroniskt material
Anmärkning: Myös Ebscohost.
Rethinking social media and extremism / Shirley Leitch and Paul Pickering -- The making of a "made for social media" massacre / Shirley Leitch -- Becoming civic actors / Sally Wheeler -- Hate the player, not the game: Why did the Christchurch shooter’s video look like a game? / Robert Fleet -- Brand lone wolf: The importance of brand narrative in creating extremists / Andrew Hughes -- "Clumsy and flawed in many respects": Australia’s abhorrent violent material legislation / Mark Nolan and Dominique Dalla-Pozza -- Coarse and effect: Normalised anger online as an essential precondition to violence / Mark Kenny -- Performances of power – the site of public debate / Katrina Grant -- Crisis, what crisis? / Terhi Nurmikko-Fuller and Paul Pickering.
Terrorism, global pandemics, climate change, wars and all the major threats of our age have been targets of online extremism. The same social media occupying the heartland of our social world leaves us vulnerable to cybercrime, electoral fraud and the ‘fake news’ fuelling the rise of far-right violence and hate speech. In the face of widespread calls for action, governments struggle to reform legal and regulatory frameworks designed for an analogue age. And what of our rights as citizens? As politicians and lawyers run to catch up to the future as it disappears over the horizon, who guarantees our right to free speech, to free and fair elections, to play video games, to surf the Net, to believe ‘fake news’?
28905
Avhandling
Utgivningsår: 2023
Språk: Finska
Medietyp: Avhandling
Förlag: Tampere : Poliisiammattikorkeakoulu, 2023
Resurstyp: Fysiskt material
Anmärkning: Ohjaaja Timo Korander. Poliisi (AMK). AMK-opinnäytetyö : Poliisiammattikorkeakoulu, 2023.
28789
Bok
Utgivningsår: 2023
Språk: Engelska
Medietyp: Bok
Typ: Bibliografi
Förlag: Boca Raton : CRC Press, 2023
Resurstyp: Fysiskt material
Anmärkning: Sisältää bibliografisia viitteitä ja indeksin.
An abridged history of threats from the late 60s to today: a retrospective -- Is our world under threat? -- The globalization of threat -- The Securitization of Threats -- The quest for a method -- Anticipating the threat: Introduction to forecasting principles and techniques.
Threats in Context: Identify, Analyze, Anticipate begins with the premise that a risk assessment is relevant primarily—and hinges upon—the correct evaluation of the threat. According to the author, all the other stages of the risk evaluation are, in fact, dependent on getting the understanding and measurement of the threat right. Despite this truism, many risk assessment methods (i.e., the process of determining the threat) tend to rush through a vague typology, offer minimal classifications, utilize an often-outdated list of potential malevolent actions—all of which are based on precedent occurrences. There should be a way to improve on this: a way to provide security practitioners and analysts better tools to deal with the task of analyzing threats and risk and to prepare for such contingencies appropriately. The book begins with a retrospective on the threats from the 1960s through to the present. The list is long and includes hijackings and airport attacks, piracy, drug smuggling, attacks on trains, pipelines, city-wide multi-site attacks, road attacks, workplace shootings, lone wolf attacks, drone attacks, bombings, IEDs, sniper attacks, random stabbings, and more. Terrorism, workplace violence, and active shooter scenarios all present asymmetric problems and unique challenges that require new ways of thinking, operationally, of risk to properly prevent, mitigate, and respond to such threats. The author demonstrates how to develop an appropriate methodology to define both current and emerging threats, providing a five-step process to self-evaluate—to determine an organization’s, a location’s, or a facility’s threats and to plan risk mitigation strategies to accurately identify, minimize, and neutralize such threats. Coverage progressively builds from correctly identifying the root threats—both global and local—to a subsequent understanding of the corollary relationship between threat, vulnerability, and risk, with the threat serving as the fundamental cornerstone of the risk evaluation. As such, Threats in Context will serve as a pivotal resource to security professionals from all backgrounds serving in a variety of fields and industries.
28787
Bok
Utgivningsår: 2023
Språk: Engelska
Medietyp: Bok
Typ: Bibliografi
Förlag: New York : Routledge Taylor & Francis Group, 2023
Resurstyp: Fysiskt material
Anmärkning: Sisältää bibliografisia viitteitä ja indeksin.
Chapter 1. Introduction: Understanding Crime in Neighborhoods -- Chapter 2. A General Theory of Spatial Crime Patterns: Explaining Where Crime Occurs -- Chapter 3. What Is a Neighborhood? Spatial Social Networks and Egohoods -- Chapter 4. How Do We Learn About Crime and Disorder? -- Chapter 5. How Do Residents Respond to Neighborhood Crime?: The EVLN Model -- Chapter 6. Why Doesn’t Everyone Choose "Voice"? -- Chapter 7. Social Distance, Physical Distance, and Social Networks -- Chapter 8. Temporal Scale: Stability and Dynamic Neighborhoods -- Chapter 9. Larger Units of Analysis: How Do Small-Scale Processes Scale Up? -- Chapter 10. Conclusion: Where Are the Implications Of All This?.
"Combining insights from two distinct research traditions-the communities and crime tradition that focuses on why some neighborhoods have more crime than others, and the burgeoning crime and place literature that focuses on crime in micro-geographic units-this book expores the spatial scale of crime. Criminologist John Hipp articulates a new theoretical perspective that provides an individual- and household-level theory to underpin existing ecological models of neighborhoods and crime. A focus is maintained on the agents of change within neighborhoods and communities, and how households nested in neighborhoods might come to perceive problems in the neighborhood and then have a choice of exit, voice, loyalty, or neglect (EVLN). A characteristic of many crime incidents is that they happen at a particular spatial location and a point in time. These two simple insights suggest the need for both a spatial and a longitudinal perspective in studying crime events. The spatial question focuses on why crime seems to occur more frequently in some locations than others, and the consequences of this for certain areas of cities, or neighborhoods. The longitudinal component focuses on how crime impacts, and is impacted by, characteristics of the environment. This book looks at where offenders, targets, and guardians might live, and where they might spatially travel throughout the environment, exploring how vibrant neighborhoods are generated, how neighborhoods change, and what determines why some neighborhoods decline over time while others avoid this fate. Hipp's theoretical model provides a cohesive response to the general question of the spatial scale of crime and articulates necessary future directions for the field. The book is essential for students and scholars interested in spatial-temporal criminology"--
28833
Bok
Utgivningsår: 2022
Språk: Engelska
Medietyp: Bok
Typ: Bibliografi
Förlag: Abingdon : Routledge Taylor & Francis Group, 2023
Resurstyp: Fysiskt material
Anmärkning: Includes bibliographical references and index.
1 Introduction -- PART 1: The ecosystem -- 2 The CSAM ecosystem -- 3 How is CSAM produced? -- 4 How is CSAM distributed? -- 5 How is CSAM consumed? -- 6 Understanding CSAM problems -- PART 2: Addressing the problem -- 7 Taking a crime science approach -- 8 Approaches to reducing the production of CSAM -- 9 Approaches to preventing the distribution of CSAM -- 10 Approaches to preventing the consumption of CSAM -- 11 Conclusions.
"This book uses a crime science approach to explore the ways in which child sexual abuse material (CSAM) can be tackled. It describes the CSAM ecosystem, focusing on the ways in which it is produced, distributed and consumed and explores different interventions that can be used to tackle each issue. Eliminating Child Sexual Abuse Material provides a methodical approach to unpacking and understanding this growing problem, identifies approaches that have been shown to work and offers alternatives that might be tried. This analysis is set within a crime sciences context that draws on rational choice, routine activities, situation crime prevention and environmental criminology to better understand the nature of the problem and the potential ways in which it may be solved. This book is intended for policy-makers and practitioners working in child protection, online harms and related areas and for students studying sexual violence or internet-related crime. The book will also be of interest to crime scientists as it provides another example of how the approach can be used to understand and reduce crime"--
28832
Bok
Utgivningsår: 2023
Språk: Engelska
Medietyp: Bok
Upplaga: 1st Edition.
Typ: Bibliografi
Förlag: Abingdon : Routledge Taylor & Francis Group, 2023
Resurstyp: Fysiskt material
Anmärkning: Sisältää bibliografisia viitteitä ja indeksin.
1. Theorizing the Linkages between the Private Sector and Organized Crime, Yuliya Zabyelina -- 2. A Review of Methods in Research on Organized Crime Infiltration of Legitimate Businesses, Francesca M. Calamunci -- 3. Organized Crime and the Haulage Sector Livia Wagner and Lucia Bird Ruiz Benitez de Lugo -- 4. Private Port Authorities and Organized Crime, Luca Storti, Anna Sergi, and Yuliya Zabyelina -- 5. Information Technology and Communications Providers’ Measures against Organized Crime, Marie-Helen Maras -- 6. Organized Crime and the Hydrocarbons Industry, David Soud -- 7. Trafficking in Persons and the Hotel Industry, Yuliya Zabyelina and Thi Hoang -- 8. Organized Crime in the Waste Management Industry, Serena Favarin and Kimberley L. Thachuk -- 9. Organized Crime in the Fisheries Sector, Gohar A. Petrossian, Kimberley L. Thachuk, and Yuliya Zabyelina -- 10. Organized Forest Crimes: Charcoal and Timber Trade in the Democratic Republic of the Congo, Daan P. Van Uhm, Milou Tjoonk, and Eliode Bakole -- 11. Organized Crime in the Agri-food Industry, Alice Rizzuti -- 12. Organized Crime and the Retail Sector, Marco Dugato and Caterina Paternoster -- 13. Organized Crime Money Laundering through Online Gambling Businesses in Great Britain, Peter Duncan and Nicholas Lord -- 14. Private Art Businesses and Organized Crime, Donna Yates and Christoph Rausch -- 15. Organized Crime and the Pharmaceutical Industry, Yuliya Zabyelina and Stephen Noguera -- 16. Organized Crime and Tobacco Companies, Jay P. Kennedy -- 17. Organized Crime and the Private Security Industry, Anja P. Jakobi -- 18. Private Sector Criminal Risk Assessment and Risk Management, Phil Williams and Colin P. Clarke.
"This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses. It advances the existing scholarship on attacks, infiltration, and capture of legal businesses by organized crime and sheds light on the important role the private sector can play to fight back. It considers a range of industries from bars and restaurants to labour-intensive enterprises such as construction and waste management, to sectors susceptible to illicit activities including transportation, wholesale and retail trade, and businesses controlled by fragmented legislation such as gambling. Organized criminal groups capitalize on legitimate businesses beleaguered by economic downturns, government regulations, natural disasters, societal conflict, and the COVID-19 pandemic. To survive, some private companies have even become the willing partners of criminal organizations. Thus, the relationships between licit businesses and organized crime are highly varied and can range from victimization of businesses to willing collusion and even exploitation of organized crime by the private sector - albeit with arrangements that typically allow plausible deniability. In other words, these relationships are highly diverse and create a complex reality which is the focus of the articles presented here. This book will appeal to students, academics, and policy practitioners with an interest in organized crime. It will also provide important supplementary reading for undergraduate and graduate courses on topics such as transnational security issues, transnational organized crime, international criminal justice, criminal finance, non-state actors, international affairs, comparative politics, and economics and business courses"--
28786
Bok
Utgivningsår: 2023
Språk: Engelska
Medietyp: Bok
Typ: Bibliografi
Förlag: Abingdon : Routledge Taylor & Francis Group, 2023
Resurstyp: Fysiskt material
Anmärkning: Sisältää bibliografisia viitteitä ja indeksin.
PART 1: PRESENT DAY ISSUES IN FORENSIC PSYCHOLOGICAL -- ASSESSMENT -- Introduction: Forensic Context Assessment - Reliability, Validity, & Current Challenges / Glenda Liell, Martin Fisher and Lawrence Jones with Lorraine Hough -- Challenging Bias in the Forensic Context: Lived Experiences / Palwinder Athwal-Kooner, Martine Ratcliffe & Ana Da Silva -- The Role of Dynamic Risk Factors in Forensic Assessment and Treatment planning / Roxanne Hefferman and Tony Ward -- Why dynamic risk factors cannot be applied universally: Their normative nature and the importance of cultural awareness in risk assessment and intervention / Stefanie Schmidt, Roxanne Heffernan & Tony Ward -- The Validity of Reconviction as a Proxy Measure for Re-offending: Interpreting Risk Measures and Research in the Light of False Convictions and Detection and Conviction Evasion Skills (DACES) and processes / Lawrence Jones, Martin Fisher and Glenda Liell -- Measuring what matters: Standardized risk levels for criminal recidivism risk / Daryl Kroner and R. Karl Hanson -- The Cumulative Modelling of Risk / Sean Hamilton & Mags O'Rourke -- What Works in the Digital Age? VR and Smartphone Applications for Forensic Psychology / Aniek M. Siezenga, Jean-Louis van Gelder & Job van der Schalk -- Assessment and Intervention Technologies in Juvenile Justice / Christopher M. King, Lauren Grove, Rachel Bomysoad, Kenny Gonzalez & Loumarie Vasquez. -- Implications and Considerations for Conducting Remote Forensic Evaluations in Underserved and Marginalized Communities / Ashley Batastini, Natalie Anumba, Michelle Guyon & Meera Patel -- PART 2: FORENSIC PRACTICE & WORKING WITH BIASES -- Supervising Assessment Practice / Jason Davies -- The Power Threat Meaning Framework - Implications for the Criminal Justice System / Jo Ramsden & Kerry Beckley -- Individual Bias in Forensic Practice / Todd Hogue & Mats Dernevik. -- Cultural bias in Forensic Assessment: Considerations and Suggestions / Andrew Day, Yilma Woldgabreal & Luke Butcher -- Personal Construct Psychology & Repertory Grids in Formulation / Nicholas Blagden & Adrian Needs. -- Using Social Media Data in Forensic Evaluations: Addressing Bias / Ashley Batastini, Madison Lord & Michael Vitacco. -- PART 3: DIVERSITY & FORENSIC POPULATIONS: THEORETICAL AND PRACTICAL APPROACHES -- Gender-sensitive violence risk assessment / Vivienne de Vogel -- Critical Reflection on Gender Identity Assessments with Trans and Gender Non-Binary individuals: Challenges, implications, and a newly proposed approach in Forensic Psychology / Sören Henrich. -- Neurodiversity Assessment In Forensic Contexts / Nancy Doyle, Lorraine Hough, Karen Thorne & Tanya Banfield. -- Risk Assessment in Offenders with Learning Disabilities / Emma Longfellow, Mark Callender & Rachel Hicks. -- How forensic practitioners may better understand neurodevelopmental disorders within forensic practice with a specific focus on ADHD and ASD / Rachel Worthington. -- Deafness in a forensic context / Mats Dernevik, Brendan Monteiro, Lorraine Hough & Elizabeth Kimber -- Criminally Diverse Offenders / Phillip Willmot -- Challenging Bias in the Assessment of Extremist Offending / Christopher Dean & Monica Lloyd. -- The Assessment of Psychopathy / Jake Seaward & Jenny Tew. -- Technological assessment methods: New directions in the assessment of sexual offending and sexualised violence / Derek Perkins and Ignazio Puzzo -- FUTURE DIRECTIONS -- Challenging bias in cross-cultural forensic psychology assessment and testing: A summary perspective / Yilma Woldgabreal.
"Challenging Bias in Forensic Psychological Assessment and Testing is a ground-breaking work that addresses the biases and inequalities within the field of forensic psychology. It gives valuable insights into individuals practices and wider criminal justice approaches at an international level, while providing tangible solutions to tackle the disparities"--
28831
Bok
Utgivningsår: 2022
Språk: Engelska
Medietyp: Bok
Upplaga: Third edition.
Förlag: Abingdon : Routledge Taylor Francis Group, 2022
Resurstyp: Fysiskt material
Anmärkning: Includes bibliographical references and index.
1. Technology and Cybercrime -- 2. Law Enforcement, Privacy, and Security in Dealing with Cybercrime -- 3. Computer Hackers and Hacking -- 4. Malware and Automated Computer Attacks -- 5. Digital Piracy and Intellectual Property Theft -- 6. Online Fraud -- 7. Pornography, Image-Based Sexual Abuse, and Prostitution -- 8. Child Sexual Exploitation Material Offenses -- 9. Cyberbullying, Online Harassment, and Cyberstalking -- 10. Online Extremism and Cyberterror -- 11. Cyberwarfare and Information Operations Online -- 12. Illicit Market Operations Online -- 13. Cybercrime and Criminological Theories -- 14. Evolution of Digital Forensics -- 15. Acquisition and Examination of Forensic Evidence -- 16. Legal Challenges in Digital Forensic Investigations -- 17. The Future of Cybercrime, Terror, and Policy.
"This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: key theoretical and methodological perspectives; computer hacking and malicious software; digital piracy and intellectual theft; economic crime and online fraud; pornography and online sex crime; cyber-bullying and cyber-stalking; cyber-terrorism and extremism; the rise of the Dark Web; digital forensic investigation and its legal context around the world; the law enforcement response to cybercrime transnationally; cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology"--
28800
Bok
Utgivningsår: 2023
Språk: Engelska
Medietyp: Bok
Upplaga: Eleventh edition.
Typ: Bibliografi
Förlag: New York, NY : McGraw Hill LLC, [2023]
Resurstyp: Fysiskt material
Anmärkning: Kannessa myös: "This international student edition is for use outside of the U.S." Sisältää bibliografisia viitteitä ja hakemiston.
"If you're already familiar with A First Look at Communication Theory and understand the approach, organization, and main features of the book, you may want to jump ahead to the "Major Changes in the Tenth Edition" section. For those who are new to the text, reading the entire preface will give you a good grasp of what you and your students can expect. A Balanced Approach to Theory Selection. We've written A First Look for students who have no background in communication theory. It's designed for undergraduates enrolled in an entry-level course, regardless of the students' classification. The trend in the field is to offer students a broad introduction to theory relatively early in their program. But if a department chooses to offer its first theory course on the junior or senior level, the course will still be the students' first comprehensive look at theory, so the book will meet them where they are. Our goal in this text is to present 32 communication theories in a clear and interesting way. After reading about a given theory, students should understand the theory, know the research that supports it, see useful applications in their lives, and be aware of the theory's possible flaws. We hope readers will discover relationships among theories located across the communication landscape-a clear indication that they grasp what they're reading. But that kind of integrative thinking only takes place when students first comprehend what a theorist claims"--
28856
Bok
Utgivningsår: 2022
Språk: Engelska
Medietyp: Bok
Upplaga: Sixth Edition.
Förlag: Cambridge : Morgan Kaufmann Publishers, an imprint of Elsevier, [2022]
Resurstyp: Fysiskt material
Anmärkning: Sisältää indeksin. Key features: Features completely updated content with expanded coverage of the topics of utmost importance to students and networking professionals; Includes coverage of WiFi and cellular communication, security and cryptography, multimedia, and other applications; Includes expanded guidelines for instructors who prefer to teach networking using a "top-down" approach; Features chapter problem statements which introduce issues to be examined and shaded sidebars that elaborate on topics and introduce related ones. Readership: Upper level undergraduate and graduate students in CS, EE, and CSE programs; Networking professionals (Provided by publisher)
Chapter 1. Foundation -- Chapter 2. Direct links -- Chapter 3. Internetworking -- Chapter 4. Advanced Internetworking -- Chapter 5. End-to-End Protocols -- Chapter 6. Congestion Control -- Chapter 7. End-to-End Data -- Chapter 8. Network Security -- Chapter 9. Applications -- Solutions to Selected Exercises -- Glossary.
Computer Networks: A Systems Approach, Sixth Edition, explores the key principles of computer networking, using real world examples from network and protocol design. Using the Internet as the primary example, this best-selling classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This sixth edition contains completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, as provided by numerous contributors via a unique open source model developed jointly by the authors and publisher. Hallmark features of the book are retained, including chapter problem statements, which introduce issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What's Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is intended primarily for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking. (Publisher's description)
28900
Elektroniskt material
Utgivningsår: 2021
Språk: Finska
Medietyp: Elektroniskt material
Förlag: Helsinki : Valtioneuvoston kanslia, 2021
Resurstyp: Elektroniskt material
Tutkimuksessa tarkasteltiin seksuaalirikoksen tekijöitä, tekotilanteita sekä arvioitiin tulosten ja ennaltaehkäiseviä toimenpiteitä käsittelevän kirjallisuuskatsauksen avulla seksuaalirikosten ennaltaehkäisyn mahdollisuuksia Suomessa. Tutkimuksessa käytettiin rekisteri- ja kyselyaineistoja sekä seksuaalirikosten tekijöiltä ja heidän kanssaan työskenteleviltä asiantuntijoilta kerättyä haastatteluaineistoa. Tutkimustulosten mukaan erityisesti nuori ikä, varhaiset riskitekijät sekä sosiaalinen huono-osaisuus ovat yhteydessä seksuaalirikoksiin. Myös ulkomailla syntyneillä oli korkeampi riski syyllistyä seksuaalirikokseen, mikä ei selittynyt huono-osaisuudella. Tulosten mukaan tekijät valitsevat usein uhreikseen päihtyneitä henkilöitä. Painostaminen ja lahjominen kohdistuvat enemmän nähden heikommassa asemassa oleviin. Lapseen kohdistuva seksuaalirikos on monen tekijän summa, ja seksuaalirikokseen johtava prosessi alkaa tyypillisesti psykologisesta lähentymisestä tekijän ja uhrin välillä. Tekijöille oli tyypillistä kokea uhri aktiiviseksi. Nuorten kokema seksuaalinen väkivalta tapahtuu yleensä nuorten keskuudessa tuttujen välillä. Tulosten pohjalta laadittiin toimenpidesuositukset seksuaalirikosten ennaltaehkäisemiseksi.
28825
Bok
Utgivningsår: 2022
Språk: Finska
Medietyp: Bok
Upplaga: 4. päivitetty painos.
Förlag: [Helsinki] : FINVA Finanssikoulutus, [2022]
Resurstyp: Fysiskt material
Alkusanat uuteen painokseen -- Kirjoittajat -- 1 Myy riskienhallintatoiminnan idea -- 1.1 Haasta johto tiedostamaan riskinottonsa -- 1.2 Tuo esiin riskienhallinnan positiivinen puoli -- 1.3 Tunnista vaatimukset -- 1.4 Riskienhallinnan standardit -- 1.5 Yhteenveto -- 2 Määritä riskienhallinnan asema ja tehtävät -- 2.1 Aseta riskienhallinnan tavoitteet -- 2.2 Riskienhallinnan kokonaisvaltaisuus -- 2.3 Riskienhallinnan hyvä hallintotapa yrityksessä -- 2.4 Riskienhallinnan vastuualueet -- 2.5 Yrityksen tukitoimintojen rooli -- 2.6 Riskienhallinnan kypsyys yrityksessä -- 2.7 Tunne ansaintalogiikka -- 2.8 Riskienhallinnan ohjeistaminen -- 2.9 Yhteenveto -- 3 Tunnista ja arvioi riskit -- 3.1 Määrittele riskilajit ja muut luokittelukriteerit -- 3.2 Organisoi riskienhallinnan työskentely -- 3.3 Huomioi riskienhallinnan inhimilliset tekijät -- 3.4 Suunnittele ja toteuta kokonaisvaltainen riskienhallintaprosessi -- 3.5 Yksittäisen riskiarvion laatiminen -- 3.6 Kehittyneempiä riskien arviointimenetelmiä -- 3.7 Täydennä riskiarvioita keräämällä hiljaiset signaalit -- 3.8 Riskienhallinta ja kontrollit prosessityössä -- 3.9 Yhteenveto --
4 Toteuta riskienhallintakeinot -- 4.1 Hallitse yrityksen vastuulle otettavia riskejä -- 4.2 Siirrä riskejä sopimuksilla -- 4.3 Siirrä riskejä vakuuttamalla -- 4.4 Varmista toiminnan jatkuvuus -- 4.5 Hallitse IT-riskit -- 4.6 Hallitse tietoturva- ja kyberriskit -- 4.7 Hallitse digitalisaation riskit -- 4.8 Hallitse tietosuojariskit -- 4.9 Hallitse taloudelliset riskit -- 4.10 Hallitse kansainvälisen ympäristön riskit -- 4.11 Yhteenveto -- 5 Raportoi, seuraa ja kehitä -- 5.1 Vahingoista ja poikkeamista oppiminen -- 5.2 Riskisalkku, skenaariotyöskentely ja riskinkantokykyyn vertaaminen -- 5.3 Raportoi päätöksentekijöille -- 5.4 Johda strategisia tavoitteitasi kytkemällä riskit niihin -- 5.5 Benchmarkkaa riskienhallinta -- 5.6 Yhteenveto -- Sanasto -- Lähteet ja lisälukemista.
Kirja antaa kattavan ja selkeän kuvan riskienhallintaan liittyvästä toimintakentästä niin yrityksen sisällä kuin erilaisten ulkopuolisten vaatimusten kannalta. Kirjaa voi lukea myös itsenäisinä lukuina, jolloin siitä saa käytännön vinkkejä ja neuvoja riskienhallintatyöhön. Kirjan sisältö ja teoriapohja ovat syntyneet kirjoittajien käytännön työelämän kokemuksen perusteella. Teos ei pelkästään luettele riskilajeja ja erilaisia teoreettisia näkökulmia vaan ottaa kantaa asioihin. Riskienhallinnan teoriaa ja terminologiaa on avattu niin, että aiheeseen ensi kertaa tutustuva saa riskienhallinnasta hyvän yleiskäsityksen. Kirjassa käsitellään myös riskienhallintatyöhön yleisesti liittyviä sudenkuoppia ja sitä, miten niitä voi yrittää välttää Kirja sisältää lukuisia käytännön esimerkkejä riskienhallintatyöstä, ja tähän päivitettyyn painokseen on lisätty osioita mm. digitalisaation ja tietosuojan sekä yritysvastuullisuuden teemoista. Kirja on suunnattu erityisesti pienten ja keskisuurten yritysten omistajille sekä liiketoimintajohdolle. Kirjan neuvoja ja vinkkejä voi mainiosti soveltuvin osin käyttää myös muiden kuin yritysorganisaatioiden riskienhallintatyössä, esimerkiksi yhdistyksissä ja järjestöissä. Kirja sopii alan oppimateriaaliksi. Riskienhallinnan ammattilaisille kirja antaa vinkkejä siitä, miten riskienhallinnasta kannattaa kommunikoida sekä millä tavalla idean riskienhallinnasta voi parhaiten ottaa käyttöön päivittäiseen työskentelyyn.
28846
Bok
Utgivningsår: 2023
Språk: Finska
Medietyp: Bok
Förlag: Helsinki : Gummerus, [2023] : ©2021
Resurstyp: Fysiskt material
Anmärkning: Baillie Gifford Prize (2021)
28855
Bok
Utgivningsår: 2023
Språk: Finska
Medietyp: Bok
Förlag: Helsinki : Werner Söderström Osakeyhtiö, [2023]
Resurstyp: Fysiskt material
28747
Bok
Utgivningsår: 2021
Språk: Engelska
Medietyp: Bok
Typ: Bibliografi
Förlag: London, United Kingdom : Kogan Page Limited, 2021
Resurstyp: Fysiskt material
Anmärkning: Includes bibliographical references and index.
Why neurodiversity is important -- Labels: what do they mean? -- Categories and spiky profiles -- Eliminating kryptonite and enabling superheroes -- Pre-employment: the lost demographics -- Policies and procedures -- How can employers attract neurodiverse talent in recruitment? -- Apprenticeships, internships, work placements and hiring schemes -- Interviews and assessments -- Making workplace adjustments -- Induction and onboarding -- Line management means having good conversations -- Everyday meetings, conferences and seminars -- Champions, staff networks and communities -- Future workspaces and workplaces -- Next steps! Inclusion, equity and diversity = belonging.
"An organization's employees are its biggest competitive advantage. Performance gains can be achieved through cost saving, process improvement or technology adoption, but the biggest difference is made by people. This means that recruiting, engaging and retaining the very best talent has never been more important. Crucially, these employees should be a diverse group of people with different approaches, skills and strengths in problem solving and driving innovation. As well as focusing on gender, race, age and class, it is critical that businesses also develop a neurodiverse workforce if they are committed to outperforming the competition and achieving sustainable business growth. Neurodiversity at Work is a practical guide that explains what neurodiversity is, why it's important and what the benefits are. It covers how to attract, recruit and engage neurodiverse talent and provides guidance on how to adapt HR policies, processes and workplaces to ensure that all employees, including the 2 in 10 employees in the UK who are neurodiverse, can reach their full potential. Neurodiversity at Work is packed full of case studies from leading organizations who are already seeing the productivity, performance and financial benefits of neurodiversity in the workplace including Microsoft, Ford and EY. Also featured are interviews with people who have successfully adapted their HR processes for neurodiversity, including the Head of Talent Acquisition at IBM and the Head of People and Culture at Autotrader. Including tips, advice, examples and 'how to' actions in every chapter, this is essential reading for every HR professional"--
28801
Bok
Utgivningsår: 2023
Språk: Engelska
Medietyp: Bok
Upplaga: Tenth Edition.
Förlag: [Kustannuspaikka tuntematon] : Independently published, 2023
Resurstyp: Fysiskt material
Anmärkning: Sisältää hakemiston.
"It is time to look at OSINT in a different way. For many years,and within previous editions of this book,we have relied onexternal resources to supplyour searchtools, virtual environments, and investigation techniques.We have seen this protocol fail us when services shut down,websitesdisappear, and custom resources are dismantled dueto outside pressures. This book aims to correct our dilemma. We will takecontrol of our investigative resourcesand becomeself-reliant. There will be no more need for online search tools;we will makeand hostour ownlocally.We willno longer seek pre-built virtualmachines; we will create and configure our own. This book puts the power back inyour hands.The new OSINT professional must be self-sustainingand possess their own tools andresources.You will become a more proficient subject matter expert who will be armed with the knowledge and readiness to articulate the sources of your findings. This new edition contains hundreds of pages which have been updated to keep your OSINT investigative methods fresh, and completely rebuilt digital assets which complement the teachings. Brand-new search methods for Facebook, Instagram, LinkedIn, YouTube, and others ensure you have the latest techniques within your online investigation arsenal. This edition presents six new chapters unavailable within previous versions discussing Broadcast Streams, Application Programming Interfaces, and an entire new section containing chapters about Data Leaks, Data Breaches, Stealer Logs, and Ransomware. An entire section is devoted to Methodology, Workflow, Documentation, and Ethics which provides a clear game plan for your next active investigation. All digital files are included via download, and updated often. Today, we start over."
28780
Bok
Utgivningsår: 2023
Språk: Finska
Medietyp: Bok
Upplaga: 3., uudistettu painos.
Förlag: Helsinki : Alma Talent, 2023
Resurstyp: Fysiskt material
28737
Bok
Utgivningsår: 2023
Språk: Finska
Medietyp: Bok
Förlag: Helsinki : Art House, [2023]
Resurstyp: Fysiskt material