IT Risk 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线

IT Risk电子书下载地址
内容简介:
By M. McDonald (Chicago, IL United States) - See all my reviews
IT used to be thought of as separate from the business, a staff function that by itself could enable but not change the business, its value or its brand. Well that view no longer holds water and Westerman and Hunter show how IT risk is really business risk and needs to be treated as such. In their book, the two provide a clear and concise discussion about IT risk from the perspective of the leader/practioner rather than the perspective of the auditor.
Since business and IT have become so closely intertwined and this book offers clear and actionable advice - not fear, uncertainty or doubt - I recommend this as a read for the CIO/IT executive as well as the CEO so they can understand what to expect both in terms of protection but also competitive advantage from the ability to manage IT risks.
I come to this position from the way Westerman and Hunter introduce the concept of risk management and the way they have organized the book. They introduce a framework of four "A's" that looks at risk from a business perspective, rather than an auditing or compliance perspective. The four A's that define IT risk are:
Availability -- keeping business processes and information flowing through the business
Access -- ensuring that the appropriate people, including customers and suppliers, can get the information and functionality they need to be effective
Accuracy -- concentrating on providing timely and complete information to meet operating and oversight needs
Agility -- the ability to change with managed cost and speed.
Westerman and Hunter address this subject in a clean and concise nine chapters that provide actionable advices on how to plan and manage risks. One thing of note is that the book talks about using your risk management capability as a competitive weapon -- what you can do that others cannot because you manage risk better. This gives the topic of risk management a strategic context that is unique to this work.
The book can be thought of as being in three parts.
Part One is about the framework and the overall approach to risk management. It includes the following chapters:
Chapter 1: The 4A Risk Management Framework
Chapter 2: The Three Core Disciplines of IT Risk Management
Part Two concentrates on the actionable management steps business and technology executives can use to manage risk.
Chapter 3: Fixing the Foundation: strengthening the base of the pyramid -- about the importance of infrastructure in risk management.
Chapter 4: Fixing the Foundation: simplifying the base of the pyramid -- about how complexity drives risk, cost and performance levels.
Chapter 5: Developing the Risk Governance Process -- covering how do you manage and make decisions regarding IT and Business risks.
Chapter 6: Building a risk-aware culture-- here the authors make an important connection between risk and culture and a critical distinction between being risk aware (strategically important) and being risk adverse (strategic killer)
Chapter 7: Bringing the three disciplines up to speed -- concentrates on the program and patterns for effective implementation.
Part Three looks at the future and improvements to risk management
Chapter 8: Looking ahead -- talks about how to incorporate risk management as a positive force in planning and strategy setting
Chapter 9: Ten ways executives can improve IT risk Management.
Overall this is a must read for CIOs, IT risk management and IT profesionals. It is also recommended reading for CEOs and others who want to understand how to manage IT and how to gain advantage from having good IT.
By James Taylor "Enterprise Decision Management ... (Palo Alto, CA USA) - See all my reviews
I was lucky enough to get a pre-release copy of IT Risk: Turning Business Threats into Competitive Advantage by George Westerman and Richard Hunter. The book approaches IT risk not as a technical issue but as a business and management one with potentially serious consequences. As businesses increasingly are there information systems, this point of view is both necessary and valuable. The book introduces IT risk and its consequences, discusses the authors' 4A framework and outlines 3 core disciplines for IT risk management. It then drills into actual steps to take to fix the foundation, develop risk governance processes and establishing a risk aware culture. It wraps up with some forward looking thoughts and a list of ways in which executives can improve IT risk management.
Their basic premise is that effective IT governance essential in times of high change and increasing complexity (of systems as well as of business/problems). They discuss 4As - availability of systems, access to systems and data, accuracy or data and results, and agility in terms of ease of change - as being the framework for risk management. These 4As are supported by a foundation, a risk management process and a risk aware culture. The framework and the disciplines mostly work well for the authors, only occasionally becoming confusing to the reader. From my perspective I found the focus on agility very interesting as possible changes to systems should be considered along with general IT effectiveness when managing risk. Also, while the foundation is lower level than I usually consider, I think the objectives for the foundation can all be met more easily by and organization that has adopted enterprise decision management - the approach discussed in Smart Enough Systems: How to Deliver Competitive Advantage by Automating Hidden Decisions. It can make it easier to assess risk, easier to maintain systems, easier to change and fix them. It can also make it easier to apply risk assessments in operational systems by calling out the decisions that must be made, which is where risk assessment matters.
Fixing the foundation is described as a journey and I really liked the focus on incremental improvement. The foundation is a problem as most companies developed their IT infrastructure in stages. However, a poor foundation undermines agility by degrading the business/IT relationship and by making change to existing systems, to meet changing business needs, hard. While I think there are other ways to add agility into existing systems, I do agree with their assertion that you need to change and replace foundation to some extent. They make some fairly good suggestions for broad steps you can take and show the kinds of payoffs that come from the capabilities you enable with a better infrastructure. The authors make a critical point when they show how change in infrastructure is IT change while change in applications is business change but most IT departments don't see the difference - they see it all as "system" change making it harder to manage than necessary. Again, a focus on separate automation and management of decisions can help clarify this difference. There is a fair amount of useful discussion in the book about the need for both local and central management to which I would add one more category - where do decisions live in your organization? Should they be managed locally or centrally? The book outlines both incremental and "big bang" approaches to fixing the foundation and notes that incremental change is slower but surer. The discussion of how legacy application modernization might be business value based or risk based (human resources or technology risk for instance) or both (such as a need to change to support a new business strategy) was well done. I also really liked their idea of a renewal and reinvestment budget to keep legacy modernization ongoing and they had some great stories about human resources risk coming from retirements and the need to get knowledge out of people's heads and into systems.
The section on a risk governance process was thorough, although I think you need to be careful not to implement all of it blindly, and I liked the focus on broad risk awareness - not "risk-averse" or "risk-pro" just "risk-aware". To support this idea, IT needs to build systems in a risk-aware way - they need to drive their use of technologies and languages, consider the consequences of a failure to update documentation or code and so on. It occurred to me while reading these sections that organizations considering a policy manual for this stuff should also consider the value of rules and decision management as a basis for a "policy engine". They had a particularly nice example of a mid-sized company finding its legacy applications, and the lack of agility in them, to be a key risk and investing in replacing and upgrading systems to make maintenance and evolution easier and less risky. This kind of agility improvement is something enhanced by a parallel focus on decision management.
The book was a fairly quick read, had lots of useful suggestions and some good ways to think about the problem. If you think IT risk matters, you should read this.
书籍目录:
暂无相关目录,正在全力查找中!
作者介绍:
暂无相关内容,正在全力查找中
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
原文赏析:
暂无原文赏析,正在全力查找中!
其它内容:
书籍介绍
By M. McDonald (Chicago, IL United States) - See all my reviews
IT used to be thought of as separate from the business, a staff function that by itself could enable but not change the business, its value or its brand. Well that view no longer holds water and Westerman and Hunter show how IT risk is really business risk and needs to be treated as such. In their book, the two provide a clear and concise discussion about IT risk from the perspective of the leader/practioner rather than the perspective of the auditor.
Since business and IT have become so closely intertwined and this book offers clear and actionable advice - not fear, uncertainty or doubt - I recommend this as a read for the CIO/IT executive as well as the CEO so they can understand what to expect both in terms of protection but also competitive advantage from the ability to manage IT risks.
I come to this position from the way Westerman and Hunter introduce the concept of risk management and the way they have organized the book. They introduce a framework of four "A's" that looks at risk from a business perspective, rather than an auditing or compliance perspective. The four A's that define IT risk are:
Availability -- keeping business processes and information flowing through the business
Access -- ensuring that the appropriate people, including customers and suppliers, can get the information and functionality they need to be effective
Accuracy -- concentrating on providing timely and complete information to meet operating and oversight needs
Agility -- the ability to change with managed cost and speed.
Westerman and Hunter address this subject in a clean and concise nine chapters that provide actionable advices on how to plan and manage risks. One thing of note is that the book talks about using your risk management capability as a competitive weapon -- what you can do that others cannot because you manage risk better. This gives the topic of risk management a strategic context that is unique to this work.
The book can be thought of as being in three parts.
Part One is about the framework and the overall approach to risk management. It includes the following chapters:
Chapter 1: The 4A Risk Management Framework
Chapter 2: The Three Core Disciplines of IT Risk Management
Part Two concentrates on the actionable management steps business and technology executives can use to manage risk.
Chapter 3: Fixing the Foundation: strengthening the base of the pyramid -- about the importance of infrastructure in risk management.
Chapter 4: Fixing the Foundation: simplifying the base of the pyramid -- about how complexity drives risk, cost and performance levels.
Chapter 5: Developing the Risk Governance Process -- covering how do you manage and make decisions regarding IT and Business risks.
Chapter 6: Building a risk-aware culture-- here the authors make an important connection between risk and culture and a critical distinction between being risk aware (strategically important) and being risk adverse (strategic killer)
Chapter 7: Bringing the three disciplines up to speed -- concentrates on the program and patterns for effective implementation.
Part Three looks at the future and improvements to risk management
Chapter 8: Looking ahead -- talks about how to incorporate risk management as a positive force in planning and strategy setting
Chapter 9: Ten ways executives can improve IT risk Management.
Overall this is a must read for CIOs, IT risk management and IT profesionals. It is also recommended reading for CEOs and others who want to understand how to manage IT and how to gain advantage from having good IT.
By James Taylor "Enterprise Decision Management ... (Palo Alto, CA USA) - See all my reviews
I was lucky enough to get a pre-release copy of IT Risk: Turning Business Threats into Competitive Advantage by George Westerman and Richard Hunter. The book approaches IT risk not as a technical issue but as a business and management one with potentially serious consequences. As businesses increasingly are there information systems, this point of view is both necessary and valuable. The book introduces IT risk and its consequences, discusses the authors' 4A framework and outlines 3 core disciplines for IT risk management. It then drills into actual steps to take to fix the foundation, develop risk governance processes and establishing a risk aware culture. It wraps up with some forward looking thoughts and a list of ways in which executives can improve IT risk management.
Their basic premise is that effective IT governance essential in times of high change and increasing complexity (of systems as well as of business/problems). They discuss 4As - availability of systems, access to systems and data, accuracy or data and results, and agility in terms of ease of change - as being the framework for risk management. These 4As are supported by a foundation, a risk management process and a risk aware culture. The framework and the disciplines mostly work well for the authors, only occasionally becoming confusing to the reader. From my perspective I found the focus on agility very interesting as possible changes to systems should be considered along with general IT effectiveness when managing risk. Also, while the foundation is lower level than I usually consider, I think the objectives for the foundation can all be met more easily by and organization that has adopted enterprise decision management - the approach discussed in Smart Enough Systems: How to Deliver Competitive Advantage by Automating Hidden Decisions. It can make it easier to assess risk, easier to maintain systems, easier to change and fix them. It can also make it easier to apply risk assessments in operational systems by calling out the decisions that must be made, which is where risk assessment matters.
Fixing the foundation is described as a journey and I really liked the focus on incremental improvement. The foundation is a problem as most companies developed their IT infrastructure in stages. However, a poor foundation undermines agility by degrading the business/IT relationship and by making change to existing systems, to meet changing business needs, hard. While I think there are other ways to add agility into existing systems, I do agree with their assertion that you need to change and replace foundation to some extent. They make some fairly good suggestions for broad steps you can take and show the kinds of payoffs that come from the capabilities you enable with a better infrastructure. The authors make a critical point when they show how change in infrastructure is IT change while change in applications is business change but most IT departments don't see the difference - they see it all as "system" change making it harder to manage than necessary. Again, a focus on separate automation and management of decisions can help clarify this difference. There is a fair amount of useful discussion in the book about the need for both local and central management to which I would add one more category - where do decisions live in your organization? Should they be managed locally or centrally? The book outlines both incremental and "big bang" approaches to fixing the foundation and notes that incremental change is slower but surer. The discussion of how legacy application modernization might be business value based or risk based (human resources or technology risk for instance) or both (such as a need to change to support a new business strategy) was well done. I also really liked their idea of a renewal and reinvestment budget to keep legacy modernization ongoing and they had some great stories about human resources risk coming from retirements and the need to get knowledge out of people's heads and into systems.
The section on a risk governance process was thorough, although I think you need to be careful not to implement all of it blindly, and I liked the focus on broad risk awareness - not "risk-averse" or "risk-pro" just "risk-aware". To support this idea, IT needs to build systems in a risk-aware way - they need to drive their use of technologies and languages, consider the consequences of a failure to update documentation or code and so on. It occurred to me while reading these sections that organizations considering a policy manual for this stuff should also consider the value of rules and decision management as a basis for a "policy engine". They had a particularly nice example of a mid-sized company finding its legacy applications, and the lack of agility in them, to be a key risk and investing in replacing and upgrading systems to make maintenance and evolution easier and less risky. This kind of agility improvement is something enhanced by a parallel focus on decision management.
The book was a fairly quick read, had lots of useful suggestions and some good ways to think about the problem. If you think IT risk matters, you should read this.
网站评分
书籍多样性:4分
书籍信息完全性:5分
网站更新速度:5分
使用便利性:7分
书籍清晰度:8分
书籍格式兼容性:5分
是否包含广告:5分
加载速度:9分
安全性:4分
稳定性:3分
搜索功能:3分
下载便捷性:8分
下载点评
- 无多页(577+)
- 下载速度快(500+)
- 排版满分(422+)
- 下载快(186+)
- mobi(448+)
- 傻瓜式服务(108+)
- pdf(355+)
- 博大精深(549+)
- 内容齐全(421+)
- 图书多(680+)
- 中评多(188+)
- 目录完整(127+)
下载评价
- 网友 游***钰:
用了才知道好用,推荐!太好用了
- 网友 习***蓉:
品相完美
- 网友 仰***兰:
喜欢!很棒!!超级推荐!
- 网友 孙***夏:
中评,比上不足比下有余
- 网友 汪***豪:
太棒了,我想要azw3的都有呀!!!
- 网友 丁***菱:
好好好好好好好好好好好好好好好好好好好好好好好好好
- 网友 潘***丽:
这里能在线转化,直接选择一款就可以了,用他这个转很方便的
- 网友 相***儿:
你要的这里都能找到哦!!!
- 网友 通***蕊:
五颗星、五颗星,大赞还觉得不错!~~
- 网友 寇***音:
好,真的挺使用的!
- 网友 国***舒:
中评,付点钱这里能找到就找到了,找不到别的地方也不一定能找到
- 网友 宫***玉:
我说完了。
- 网友 孔***旋:
很好。顶一个希望越来越好,一直支持。
- 网友 印***文:
我很喜欢这种风格样式。
- 网友 郗***兰:
网站体验不错
- 网友 方***旋:
真的很好,里面很多小说都能搜到,但就是收费的太多了
喜欢"IT Risk"的人也看了
先进热能工程丛书--烟气二氧化碳化学吸收技术 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
植物生理学学习指导 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
走近人文:高职人文素质教程 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
杜威在华学谱 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
电炭制品物理化学性能试验方法第10 部分:径向抗压强度 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
高中刷真题2023版作业帮刷透高考真题 政治 高一高二高三高考高中总复习刷题练习册真题详解全刷 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
职场英语听说教程第2册 中国人民大学出版社 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
房屋设备基础知识(工业与民用建筑专业中等职业教育规划教材) 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
彝族传统禁忌文化研究 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
化学试剂 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- 玫瑰与夜莺 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- KET单词训练营 同步听写默写本 第1级 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- 唐史演义 蔡东藩著 足本无删减 大字版 文白对照 锁线精装 中国历史书籍 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- 儿童趣味奥数启蒙(7~8岁) 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- 在志愿填报上跑赢对手 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- 中国企业并购重组税收指南 中国财政经济出版社 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- 密斯·凡·德·罗评传 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- 生活中的民法典(看图学法) 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- Frommer's Portable Dominican Republic 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
- 对话家族信托:财富家族定制信托的21篇实战案例,张钧,谢玲丽,李海铭著,广东人民出版社,9787218120300 下载 pdf 百度网盘 epub 免费 2025 电子版 mobi 在线
书籍真实打分
故事情节:9分
人物塑造:4分
主题深度:3分
文字风格:4分
语言运用:6分
文笔流畅:4分
思想传递:5分
知识深度:8分
知识广度:3分
实用性:9分
章节划分:8分
结构布局:4分
新颖与独特:6分
情感共鸣:8分
引人入胜:4分
现实相关:3分
沉浸感:7分
事实准确性:6分
文化贡献:6分