Table of Contents: CHAPTER 1 A Few Important Details Before We Begin (Pages: 1-6) 1.1. Information systems 1.2. Decision support systems 1.3. Recommender systems 1.4. Comparisons 1.5. Recommendation versus personalization CHAPTER 2 Recommender Systems (Pages: 7-27) 2.1. Introduction 2.2. Classification of recommender systems 2.3. User profiles 2.…
Contents Section 1 – The background 1. Introduction 2. Research Section 2 – setting your project`s foundation 3. Choosing a projects and writng a proposal 4. Project planning and risk management 5. Literature searching and literature reviews Sectin 3 – Conducting your projects 6. Software development 7. Controlling your project Section 4 – Presenting your project 8. …
Contents Chapter 1 Getting information security right: top to bottom Chapter 2 Developing information security strategy Chapter 3 Defining the security management Chapter 4 Interacting with the C-suite Chapter 5 Managing risk to an acceptable level Chapter 6 Creating effective information security policies Chapter 7 Security compliance using control frameworks Chapter 8 Managerial con…
Contents: Introduction Entity-Level Policies and Procedures Access-Control Policies and Procedures Change Control and Change Management System Information Integrity and Monitoring System Services Acquisition and Protection Informational Asset Management Continuity of Operations Appendices: ISO / IEC 27001 (Annex A) Controls(c) ISO NIST S P 800-53 Controls HIPAA Security R…
Contents: 1. Introducing Knowledge Management 2. The Nature of Knowledge 3. Knowledge Management Foundations: Infrastructure, Mechanisms, and Technologies 4. Knowledge Management Solutions: Processes and Systems 5. Organizational Impacts of Knowledge Management 6. Knowledge Application Systems: Systems that Utilize Knowledge 7. Knowledge Capture Systems: Systems that Preserve and Form…
Dafatr isi; 1. Struktur, proses, dan mekanisme tata kelola 2. Strategi dan teknik Tata Kelola Teknologi Informasi 3. Nilai teknologi informasi 4. Tata Kelola Teknologi Informasi 5. Pedoman implementasi Tata Kelola Teknologi Informasi 6. Studi kasus: Tata Kelola Teknologi Informasi
Created with today’s increasingly complex business and technology landscape in mind, COBIT 5 for Assurance can be used for many different purposes including: - Obtaining a view (based on COBIT 5 concepts such as the enablers) on current good practices on assurance - Learning how to use different COBIT 5 components and related concepts for planning, scoping, executing and reporting on vari…
Contents: 1. Foreword / Deborah G. Johnson 2. Introduction / Kenneth Einar Himma and Herman T. Tavani 3. Foundations of information ethics / Luciano Floridi 4. Milestones in the history of information and computer ethics / Terrell Ward Bynum 5. Moral methodology and information technology / Jeroen van den Hoven 6. Value sensitive design and information systems / Batya Friedman, Peter…