People and the Digital Enterprise

2022 ◽  
pp. 707-741
Author(s):  
Vivek Balaraman ◽  
Sachin Patel ◽  
Mayuri Duggirala ◽  
Jayasree Raveendran ◽  
Ravi Mahamuni

The transformation of a conventional enterprise from a people-centric model to a technology-centric one has important implications for its human workforce. In this chapter, the authors look at three representative people-related focus areas for the digital enterprise, enhancing workplace wellbeing, enabling continuous learning and compliance to information security. They discuss each of these problems and then look at the technological infrastructure a digital enterprise would require to manage these areas.

Author(s):  
Vivek Balaraman ◽  
Sachin Patel ◽  
Mayuri Duggirala ◽  
Jayasree Raveendran ◽  
Ravi Mahamuni

The transformation of a conventional enterprise from a people-centric model to a technology-centric one has important implications for its human workforce. In this chapter, the authors look at three representative people-related focus areas for the digital enterprise, enhancing workplace wellbeing, enabling continuous learning and compliance to information security. They discuss each of these problems and then look at the technological infrastructure a digital enterprise would require to manage these areas.


Author(s):  
Angel Alejandro ALMANZA-GÓMEZ ◽  
Francisco CORTÉS-CARRILLO ◽  
Laura MOLINA-DE LA ROSA ◽  
Juán Elí GÓMEZ-VIDAL

The problem focuses on the lack of a service desk system, as well as a remote desktop system, causing the support process to have a longer period of time than due, and for IT not to focus on its main task. Not having credentials for some network computers or servers, causes optimal network performance to fail. In addition, the lack of updates to computers makes them vulnerable to external attacks. This implementation aims to achieve an ideal management of hardware and software assets, as well as how to determine how the technological infrastructure of the company is constituted, this by creating a catalog of services that encompasses each and every one of the services provided by the department, as well as the implementation of the KACE server. As a result of the Project, it is possible to increase the productivity of the department, minimize the support time, have fully identified the infrastructure, automate the support process, generating with this, a competitive advantage for the company. This optimizes the use of material resources, space and information security, it also makes the work more efficient.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


2020 ◽  
Vol 7 (1) ◽  
pp. 57-62
Author(s):  
Vladislav A. Voevodin ◽  
◽  
Maria S. Markina ◽  
Pavel V. Markin ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document