Click on a book cover for more information or to order.
SAVE 20% AND GET FREE SHIPPING when you order these or any book online! Simply enter this code--813DA--when you checkout.
Combat Rude Behavior with Radical Civility
The ability to thrive is the best way to ward off the negative effects of bad behavior. Two related, but distinct, paths can help get you there. Thriving cognitively occurs when we focus on improving our performance, learning new things, and finding ways to propel ourselves forward. Thriving affectively means that we are healthy of body and mind, and feel energized both inside and outside of work. These tips, taken together, can help you create a kind of personal armor that can help repel the damaging effects of rude behavior.
Today's Big Trends in Robotics: The Robolution
In their surveys, McKinsey and many other analysts are promising the massive arrival of robots in our factories, our service companies, our cities, our countrysides, and our homes. Whatever the editorial stance and target audience, all of the media are talking about robotics in just about every issue or report published. Yet the reality of the robotics transformation varies depending on the country and continent, and many innovations are having a hard time carving out a significant place for themselves on the market. Everyone keeps talking over and over about the Robolution, but where does it really stand as we speak?"
Analyzing and Securing Social Networks
This chapter from Analyzing and Securing Social Networks sets the stage to discuss both social media analytics and security. It discusses various applications of social media analytics. Then it considers applying various data mining techniques for social network analysis (SNA), before discussing security and privacy aspects.
To Get People Talking, Try Asking the Right Questions
It's happened to all of us: You pose a carefully-worded question, pause and wait for someone to respond. And then you hear nothing, other than an awkward, prolonged silence. In reality, if our entreaties are met by silence, it's because we simply haven't figured out how to invite people into the conversation the right way. Here are a few guidelines from Nancy Settle-Murphy to help you coax willing participation, most of the time, from even the most reticent virtual meeting participants. (These tips also work well when you're meeting face to face.)
Tackling Tough Issues Remotely, When Your Boss Is the Problem
We hear a lot about how virtual leaders can deal effectively with workplace conflicts and performance problems. But we don't hear nearly as much about how to confront tough issues from the remote worker's point of view. And that's precisely what Sue Shellenbarger, Work and Family columnist for the Wall Street Journal, wanted to know when she contacted Nancy Settle-Murphy recently for an interview. Since Sue's questions were so insightful, Nancy has paraphrased three of them here, along with a few replies.
5G Overview: Key Technologies
There are some main expectations from the 5G network to present a better telecommunication network. To achieve these goals, the 5G network must have the several characteristics. This chapter from Opportunities in 5G Networks: A Research and Development Perspective, discusses the characteristics and requirements for the coming 5G network.
Developments and Challenges in Location Mining
Identifying the location of social media users would enable, say, law enforcement to determine where the users are if they have committed a crime. On the other hand, we may want to protect the location of innocent users. This excerpt from Analyzing and Securing Social Networks discusses the importance of location mining and provides an overview of the related efforts on this topic. It then discusses the challenges in location mining, as well as aspects of geospatial proximity and friendship.
Balancing the Risk and Opportunity of Deep Customer Data Analytics
For Big Data to power new insights, it is critical that firms move their core customer and transaction histories into these new environments in addition to any new data sources that may be brought in. This often means taking data once stored and processed on the highly-secure mainframe and move it off-platform. This, paired with many high-profile breaches of consumer data, has driven heightened security and compliance regulations around how personal data is stored, analyzed and used by large enterprises. There are many steps--both policy- and technology-driven--that you can take to initiate these projects while balancing compliance and security.
Operational Assessment of IT: Understanding the Organization
This excerpt from Operational Assessment of IT by Steve Katzman explains why before management can consider committing resources and impeding any business productivity to accomplish any assessment, you must understand the organization. Without this understanding, you will not be recognized as adding value to the organization. You will be considered a cost center, similar to the overhead expense of the building, equipment, etc.
As enterprises have experienced the need to be simultaneously efficient, flexible, responsive, and adaptive, they have transitioned themselves into agile enterprises with small, autonomous teams that work concurrently and reconfigure quickly, and adopt highly decentralized management that recognizes its knowledge base and manages it effectively. This excerpt from Enhancing Enterprise Intelligence: Leveraging ERP, CRM, SCM, PLM, BPM, and BI delves into what it means to be an Agile Enterprise.
The Impossibility of Designing a "Perfect" Virtual Meeting in a Multicultural World
Nancy Settle-Murphy started to wonder, "If I am leading workshops that demonstrate "best practices" virtual meetings with global teams, who's to say that my best practices are right for other cultures?" For guidance, she turned to the brilliant new book by Erin Meyer. She got no further than the first chapter before she started to jot down dozens of ideas. Here are just a few.
Introduction to Change Management
This chapter from Change Management: Manage the Change or It Will Manage You by Frank Voehl and H. James Harrington answers the question, "In a nutshell, what is change management?"
Integrating Changes into Operations: Transition Management
This chapter from Improving Business Performance: A Project Portfolio Management Approach focuses on integrating the changes into the operations of an enterprise.
Fire Up Your Communications Mojo in a Virtual World
Public speaking is a full-body sport. To keep people engaged and maintain a strong presence when face-to-face, you must use your full body: your posture, gestures, voice, eye contact, and movement. Demonstrating a compelling presence is no less important in the virtual world, but it's done a bit differently. Here are some tips.
Lean Primer for IT Professionals
This chapter from The Lean IT Field Guide: A Roadmap for Your Transformation by Michael A. Orzen and Thomas A. Paider provides you with some familiarity on various applications of lean to IT. It's important to have a basic understanding of fundamental concepts and areas of practice in order to stay grounded in principles that really provide lasting results. We often see IT organizations jump from hot new topic to hot new topic, applying a flavor of the month strategy that never sustains itself.
IT Innovation and Ethics
Explaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains. The book explores the latest thinking on computer ethics, including the normative ethical theories currently shaping the debate over the good and bad consequences of technology. This excerpt makes the case as to why IT professionals, managers, and engineers must consider the ethical issues when designing IT systems.
Protecting the Oil and Gas Industry from email Threats
According to a recent report from the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), the energy sector is facing a significant rise in cyber attacks. The high volume of business communications conducted via email within this industry give hackers quite the window of opportunity to intercept sensitive information through the use of spear phishing. This article by OPSWAT's Doug Rangi describes spear phishing attacks that have occurred in various sectors of oil and gas, along with recommendations on how the industry can boost their cyber security and specifically adopt new preventative measures to protect against these and other email-borne threats.
Predicting the Cyber Security Future in 2016
In this article, Lancope CTO TK Keanini provides a brief retrospective on 2015, including the biggest patterns seen from within the cyber security industry; highlights the biggest trends to expect in 2016; from cracking as a service to DNA breaches; and discusses how these trends will impact businesses and individuals alike and have long reaching implications.
The Threat Within: 3 Out of 4 Companies Affected by Internal Information Security Incidents
Costly cyberattacks are now almost routine for businesses, but while many organizations are focusing on external attackers, it's important to also look at threats from within. According to the IT Security Risks Survey conducted by Kaspersky Lab and B2B International, 73% of companies have been affected by internal information security incidents. The survey also found that the largest single cause of confidential data losses is by employees (42%).
Introduction to Dependable Embedded Software
Embedded Software Development for Safety-Critical Systems discusses the development of safety-critical systems under the following standards: IEC 61508; ISO 26262; EN 50128; and IEC 62304. It details the advantages and disadvantages of many architectural and design practices recommended in the standards, ranging from replication and diversification, through anomaly detection to the so-called "safety bag" systems. Reviewing the use of open-source components in safety-critical systems, the book has evolved from a course text used as a training module on building embedded software for safety-critical devices. This excerpt introduces the concepts of dependable embedded software and the safety culture.
6 CyberHacks That Will Affect Your Life in 2016
As we are quickly marching toward the end of another year, Stephen Newman, CTO of Damballa, discusses the new types of cyber attackes that will likely see in 2016. He points out that these new types of attacks will draw everyone's attention to the lack of privacy and security in our interconnected world.
How Timeshifting Truly Transformed a Top-Performing Virtual Team
Basically, "timeshifting" means that a team can work together when it can't be together, either physically or virtually. Um, okay. But what does that really mean, and how do you accomplish it? This edition of Nancy Settle-Murphy's Communiqué shares just a few creative and insightful tips on how to make this happen.. You’re not going to want to miss a single one.
Drones in the City: Toward a Floating Robotic Panopticon?
A social robot is a robot that interacts and communicates with humans or other autonomous physical agents by following social behaviors and rules attached to its role. Just Ordinary Robots: Automation from Love to War provides a socially involved, yet sober, insight into the questions of robotics. Which robot technologies are coming? What are they capable of? Which ethical and regulatory questions will they consequently raise? The authors examine the social significance of the new generation of robots in five areas: home robot, care robot, auto robot, police robot, and military robot. This excerpt discusses Civil Applications of Drones.
4 Steps to Prepare Your Business for an ERP Implementation
One of the most common mistakes businesses make when preparing for an ERP system implementation is assuming it's just another project for the IT department. This couldn't be further from the truth. An ERP system implementation is a major period of change for any business, and the key to a successful deployment is the preparation. Before any software gets installed or any training takes place, there are several critical things you must do to prepare your business for the systemic overhaul of key operational processes. By preemptively accounting for common pitfalls, a business can avoid obvious mistakes and make the implementation process more seamless. These four steps can help ensure ERP implementation success.
Leading the Internal Audit Function
In this book, Lynn Fountain presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book explains how to clarify management expectations for the internal audit and balance those expectations with the IIA Standards. It examines the concept of risk-based auditing and explains how to determine whether management and the internal audit team have the same objectives. It also looks at the internal auditor's role in corporate governance and fraud processes.
Oracle Case Management Solutions
Oracle Case Management Solutions is the first book to translate case management from a business problem perspective into appropriate Oracle product usage. Covering the key Oracle technologies that support case management solution components, it explains how to conceptualize and implement quality case management solutions with these products.
If You See Marty McFly, Can You Tell Him ...
In honor of 'Back to the Future Day' (in case you're not a fan, October 21, 2015 is the day Marty McFly visits in the 1989 second film in the trilogy.) This article, written for fun by Martyn Ruks, Technical Director of MWR InfoSecurity, looks at the technology of the fictional 2015 and ponders just how secure it is.
Three Questions about Online Security
When you give your personal information to a financial institution, government, or insurance company, you have a certain level of trust that they will do everything in their power to keep it safe. It's easy to forget that at the same time you're filling out paperwork online, in the dark world of cybercrime, hackers are doing everything in their power to get your information. This article explains why hackers want this information, what they do with it, and how you can safeguard themself.
Managing Performance from Afar Made Easier: 10 Tips for a Happier Outcome
It can be awkward to give someone tough feedback when they're miles away. And that's the least of it. Without visual cues, the delivery of even the most well-meaning and thoughtful performance feedback can have the opposite effect. It can damage relationships, erode trust, sap motivation, and in reality, it can actually weaken performance, instead of strengthening it. In this edition of Communiqué, Nancy Settle-Murphy embellishs on a few tips from her Tips for Leading Amazingly Productive Virtual Teams guide.
Providing an Integrated Environment for Big Data Management with the Hadoop Ecosystem
As the new technologies developed for Hadoop continue to rise, it is essential to note that there are some products which will be better suited for specific requirements than others. This article provides an overview of the entire suite of technologies collectively constituting the Hadoop ecosystem. These include tools for database and data management, core functionalities, data transfer, security enhancement, analytics, data serialization as well as Hadoop-based cloud computing functions.
Only by understanding the threats and the basics of the tradecraft utilized to facilitate industrial espionage can an organization develop an effective counterespionage program. This chapter from Industrial Espionage: Developing a Counterespionage Program by Daniel J. Benny reviews espionage tradecraft including the intelligence cycle, the categories of intelligence collection, and the methods of collection.
Overview of Cloud Computing Networking
This chapter from Cloud Computing Networking: Theory, Practice, and Development introduces the types of networks and the operating systems that are able to provide network services and manage network devices. It analyzes the functionalities of these operating systems and presents their functionalities through network architecture. Finally, it explains how cloud computing is supported by the operating systems, and discusses the networking process and illustrates how to implement a network system.
CRC Press Exclusive Publisher and Distributor for the Healthcare Information and Management Systems Society
CRC Press announced that it has teamed up with the Healthcare Information and Management Systems Society (HIMSS) to become the exclusive publisher and distributor of HIMSS books. HIMSS is a global, cause-based, not-for-profit organization focused on better health through information technology (IT). HIMSS leads efforts to optimize health engagements and care outcomes using IT. To celebrate this new alliance, CRC offers exclusive savings plus free shipping on the healthcare information and informatics books. You can also browse the complete collection of healthcare informatics books at the HIMSS Bookstore and save 20% on your order with promo code HWP37.
It's What People Aren't Saying That Leaders Most Need to Hear
In this article, Nancy Settle-Murphy uses a hypothetical example, representing a composite of some of our actual clients, to show how unmet expectations can undermine trust, demotivate teams, and chip away at relationship equity. It provides some practical steps for self-aware leaders who know they can do much more to create the kind of environment where every team member can flourish.
Protecting Medical Record Data
After a slew of data breaches in 2014, the FBI warned the healthcare industry that cyber-criminals would be directing more attention their way in 2015. The healthcare industry, valued at $3 trillion, has become an increasingly valuable target for cyber criminals and, in some cases, a much easier target to attack, due to their often less than adequate investment in cyber security. What is it about the healthcare industry that has captured the cyber criminal's interest in the last few years? This article from OPSWAT discusses reasons for the popularity of medical data theft and gives advice on how to prevent future breaches.
The Privacy Professor's September Tips: Don't Let the Bloom Fade from Privacy Diligence
The latest tips from Rebecca Herold, The Privacy Professor. Her latest book is Data Privacy for the Smart Grid, co-written with Christine Hertzog.
Top 3 Factors Driving the Rise in Data Breaches
It comes as no surprise that the number of companies falling victim to data breaches is on the rise. These stories are making headlines, and making CEOs and employees alike nervous that they will be the next victim. As computers are getting faster, so are hacking attempts. Hackers are now more capable than ever to implement their plans. This article outlines the top three factors that are contributing to the rise of data breaches.
Call for Chapters: Nature-Inspired Networking: Theory and Applications
The book will contain highly original contributions about how the nature is going to shape networking systems of the future. Hence, it will focus on rigorous approaches and cutting-edge solutions, which encompass three classes of major methods. The book's purpose is to make a formal basis more accessible to researchers, scientists, professionals and students as well as developers and practitioners in ICT by providing them with state-of-the-art research results, applications, opportunities and future trends.
Avoiding the High Cost of Ambiguous Decisions
Truly bad decisions are made every day, often because the decision-making process is murky, and needed conversations are rushed. What is a better approach to facilitating group decisions? Joining Nancy M. Settle-Murphy, the author of Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results, in writing this Communiqué is her friend and colleague Rick Lent, president of Meeting for Results. Although the concepts can be applied to any kind of meeting, we offer tips for those who lead virtual meetings, where you lose vital visual cues.
Facial Recognition Technology: Commercial Uses, Privacy Issues, and Applicable Federal Law
Facial recognition technology, which can verify or identify an individual from a facial image, has rapidly improved in performance and now can surpass human performance in some cases. The Department of Commerce has convened stakeholders to review privacy issues related to commercial use of this technology, which GAO was also asked to examine.
Security Countermeasure Selection and Budgeting Tools
This chapter from the second edition of Risk Analysis and Security Countermeasure Selection explains what makes a security countermeasure effective or ineffective, the functions of security countermeasures, infiltration and attack scenarios, attack objectives, criminal offender types, criminal offender countermeasures, how to develop countermeasure effectiveness metrics, and how to develop a Decision Matrix to help decision makers reach consensus on a specific countermeasure when there are many points of view to consider.
Protests or Profiteering: The Hack Remains in Same
Whether it's cyber terrorism, hacktivism, or just another set of hackers trying to get famous by jumping on the media's hot topic, the key to fighting back is threat intelligence. Staying ahead of future attacks requires a proper investment in intelligence groups who have the proper tools, people and processes to deliver up-to-date intelligence.
Multilevel Modeling of Secure Systems in QoP-ML
This book introduces the Bogdan Ksiezopolski's quality of protection modeling language (QoP-ML), which provides the multilevel modeling language for making abstraction of security systems that put emphasis on the details concerning quality of protection. The analysis of the secure systems can be performed automatically by means of an automated quality of protection analysis tool. Based on the multilevel analysis, the foundations of the new decision support system can be introduced. The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML.
Just Because You're Silent, You May Not Be Really Listening
Most communications skills courses tend to focus on making people more articulate, effective and expressive through writing, speaking and presenting. Listening is rarely a focus. In this article from Communiqué, Nancy Settle-Murphy offers some practical tips for making you a better listener.
Agile Stakeholder Engagement
This chapter from Agile for Project Managers discusses the importance of stakeholder engagement on the agile project. This is an essential practice that ensures a successful product delivery. The chapter concentrates on important concepts such as getting the right stakeholders for the project, cementing stakeholder involvement, and managing the interests of stakeholders.
Provide Leadership Across All Levels
The nature and level of leadership on a program designed and launched to transform the entire business or significant parts of the business are primary determinants of the program being successful by achieving the intended business goals. Given organizational matrices, work complexities, and corporate politics, the program management team personnel rely heavily on their leadership traits to deftly guide issues and manage risks through multiple organizational levels and across functions. As this excerpt from Transforming Business with Program Management explains, leaders can model the behavioral changes needed to embrace the changes the program is driving.
Leveraging Stakeholders to Prepare Your Organization for Change
This excerpt from Stakeholder Engagement: The Game Changer for Program Management focuses first on change management theory to help drive in change management concepts and the importance of change management. It then introduces a simple change management model to incorporate change management activities into your program plans. After learning the foundational elements of change management and reviewing a change management model, the focus shifts to how to implement the change management elements for each of the four stakeholder quadrants.
Emerging Technologies in Healthcare
Connecting millions of patients with caregivers like never before, mobile health (mhealth) technologies are changing healthcare for good. Emerging Technologies in Healthcare by Suzanne Moss Richins provides detailed descriptions of the latest mhealth technologies. It outlines the role of mhealth for self-care and remote care and describes the differences between telemedicine, telehealth, and telecare. The book justifies the use of mhealth technologies for meeting regulatory standards of care and explains how analytics and social media are being used to improve healthcare delivery. It addresses healthcare reform, risk management, and future directions for healthcare technologies.
Call for Book Chapters: Vehicular Social Networks
Selected topics that are covered in this book are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, as well as novel trends and challenges in VSNs. The book aims to provide significant technical and practical insights in different aspects, starting from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.
Operational Models of Corporate Security Intelligence
This excerpt from Corporate Security Intelligence and Strategic Decision Making discusses why it is useful to have a model of intelligence to help guide structures, processes, and the deployment of resources. It then introduces a simple security intelligence model, applicable to any scale of deployment. Finally, it discuss aspects of a common dedicated countercrime model (the National Intelligence Model).
Turn 9 Common Virtual Meeting Misconceptions Inside Out
The basic premise: Successful virtual meetings require a thoughtful discipline that demonstrates a deep sense of respect for all participants, enabling them to be full and equal participants in the conversation. We also believe that any kind of meeting should be held only when discussions are needed. (If content review is required, let people do that somewhere else.) This article by Nancy M. Settle-Murphy refutes nine of the most popular misconceptions people hold about virtual meetings, and offer some practical tips that can help transform virtual meetings from mediocre to memorable. Nancy M. Settle-Murphy is author of Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results.
Call for Chapter Proposals: 5G Radio Access Network (RAN) - Centralized RAN, Cloud-RAN and Virtualization of Small Cells
Being at a very nascent stage, C-RAN and virtualized Small Cell technology poses several major research challenges. This book aims to provide a deeper insight into the next generation RAN architecture; especially in the presence of virtualization and cloud environment. The book will present a survey of the coexistence of SDN, C-RAN and Small Cells solutions proposed in the literature at different levels; e.g., physical characteristics, open access, dynamic resource allocation, technology-neutrality, coverage obligations, minimization of the interference problems, etc.
Healthcare Analytics Use in Population Health
Data collection and aggregation provide an opportunity to look for patterns and based on these patterns to make decisions to improve quality and decrease costs. The driver of this change comes from the payment shift from volume to value inherent in the Patient Protection and Affordable Care Act (PPACA). It augments the Health Information Technology for Economic and Clinical Health (HITECH) Act, which requires the implementation of electronic medical records (EMR).
Requirements Generation in ERP Planning
This excerpt from Directing the ERP Implementation: A Best Practice Guide to Avoiding Program Failure Traps While Tuning System Performance discusses the requirements generation process. It defines, in detail, the system functionality as well as the engineered process changes essential for an order of magnitude improvement in operational performance. The attributes of requirements definition include categories such as "mission critical," "essential," and "nice to have," which then establishes the baseline for a traceability matrix that flows through the project phases including design, prototyping, customization, testing, piloting, and delivery.
Flip Your (Virtual) Meetings - Learning from Our Best Teachers
To stave off boredom and stimulate learning that lasts longer than a class period, my kids' teachers are experimenting with "flipped classrooms." Rather than lecturing at kids with a bunch of PowerPoints during the precious classroom time, the teachers assign the content in advance. This way, sutdents come to class ready to debate ideas and apply what they've learned in ways that make the topics come alive. Let's take a page from teachers who have seen great results by flipping their classrooms. Here are a few steps to get you started.
Privacy Threats Come from All Corners
The types of personal information crooks, marketers, surveillors and others are after varies greatly. You can see it in the kinds of organizations under attack from black-market entreprenuers, just-because-I-can hackers, and even Chinese computer manufacturers. Increasingly, consumers must practice diligent privacy practices with every entity they allow access to their personal information. Read on for tips on doing exactly that.