Free Essay

Itil 2011 Foundations Study Guide

In:

Submitted By ComputerDe
Words 1961
Pages 8
ITIL Study Guide | | | |

ITILFND01 Service Management as a practice
The purpose of this unit is to help the candidate to define Service and to comprehend and explain the concept of Service Management as a practice.
01-1. Describe the concept of Good Practice (SS 1.2.2)
01-2. Define and explain the concept of a Service (SS 2.2.1)
01-3. Define and explain the concept of Service Management (SS 2.1)
01-4. Functions and Processes (SS 2.3, 2.6.1, SD 2.3, SD 3.6.4, ST 2.3, SO 2.3, 3.1, CSI 2.3)
01-5. Explain the process model and the characteristics of processes (SD 2.3.2, 3.6.4)
The recommended study period for this unit is minimum 45 minutes

ITILFND02 The Service Lifecycle
The purpose of this unit is to help the candidate to understand the value of the Service Lifecycle, how the processes integrate with each other, throughout the Lifecycle and explain the objectives and business value for each phase in the Lifecycle
02-2. Structure, scope, components and interfaces of the Service Lifecycle (SS 1.2.3 All )
02-3. Account for the main goals and objectives of Service Strategy (SS 1.3)
02-4. Account for the main goals and objectives of Service Design (SD 2.4.1, SD 3.1)
02-5. Briefly explain what value Service Design provides to the business (SD 2.4.3)
02-6. Account for the main goals and objectives of Service Transition (ST 2.4.1)
02-7. Briefly explain what value Service Transition provides to the business (ST 2.4.3)
02-8. Account for the main goals and objectives of Service Operations (SO 2.4.1)
02-9. What value Service Operation provides to the business (SO 2.4.3 1st para, SO 1.2.3.4)
02-10. Account for the main goals and objectives of CSI (CSI 2.4.1, 2.4.2)
It is recommended that this training is covered within other units.
The recommended study period for this unit is minimum 1.0 hours.

ITILFND03 Generic Concepts and Cefinitions
The purpose of this unit is to help the candidate to define some of the key terminology and explain the key concepts of Service Management.
03-1. Utility and Warranty (SS 2.2.2 )
03-2. Resources, Capabilities and Assets (SS 3.2.1)
03-3. Service Portfolio (SS 4.2.3, SD 3.6.2 – to end of 1st bullet list)
03-4. Service Catalogue (Business and Technical Service Catalogue) (SS 4.2.3.1, SD 4.1.4)
03-5. The role of IT Governance across the Service Lifecycle (CSI 3.10 All)
03-6. Business Case (SS 5.2.1 Intro, CSI 4.4.1)
03-7. Risk (SS 9.5.1, CSI 5.6.3)
03-9. Service Provider (not detail) (SS 3.3 Intro only, not 3.3.1, 3.3.2, 3.3.3)
03-10. Supplier (SD 4.2.4, 4.7.2)
03-11. Service Level Agreement (SLA) (SD 4.2.4, 4.2.5.1)
03-12. Operational Level Agreement (OLA) (SD 4.2.4)
03-13. Contract (SD 4.7.5.1)
03-14. Service Design Package (SD Appendix A)
03-15. Availability (SD 4.4.4)
03-16. Service Knowledge Management System (SKMS) (ST 4.7.4.2)
03-17. Configuration Item (CI) (ST 4.3.4.2)
03-18. Configuration Management System (ST 4.3.4.3 )
03-19. Definitive Media Library (DML) (ST 4.3.4.3)
03-20. Service Change (ST 4.2.2)
03-21. Change types (Normal, Standard and Emergency) (ST 4.2.6.1, 4.2.4.5, 4.2.6.9)
03-22. Release Unit (ST 4.4.4.1)
03-23. Concept of 7R’s of Change Management (ST 4.2.6.4); no to learn list
03-24. Event (SO 4.1 1st para)
03-25. Alert (SO Glossary)
03-26. Incident (SO 4.2)
03-27. Impact, Urgency and Priority (SO 4.2.5.4, 4.4.5.4)
03-28. Service Request (SO 4.3)
03-29. Problem (SO 4.4)
03-30. Workaround (SO 4.4.5.6)
03-31. Known Error (SO 4.4.5.7)
03-32. Known Error Data Base (KEDB) (SO 4.4.7.2)
03-33. The role of communication in Service Operation (SO 3.6)
03-34. Service Assets (SS 3.2)
03-35. Release policy (ST 4.1.4.2)
It is recommended that this unit is covered as part of the training in the other units.
The recommended study period for this unit is minimum 1.0 hours.

ITILFND04 Key Principles and Models
The purpose of this unit is to help the candidate to comprehend and account for the key principles and models of Service Management and to balance some of the opposing forces within Service Management.
Service Strategy
04-2. Describe basics of Value Creation through Services (SS 3.1.1, 3.1.2)
Service Design
04-3. People, Processes, Products and Partners for Service Management (SD 2.4.2)
04-4. Understand the five major aspects of Service Design (SD 2.4.2):
• Service Portfolio Design
• ID Business Requirements, definition of Service Requirements
• Design of Services Technology and architectural design
• Process design
• Measurement design
Continual Service Improvement
04-8. Plan, Do, Check, Act (PDCA) Model to control & manage quality (CSI 3.6, 5.5.1, Fig 5.6)
04-9. Explain the Continual Service Improvement Model (CSI 2.4.4, Fig 2.3)
04-10. Understand the role of measurement for CSI and explain the following key elements:
• The role of KPIs in the Improvement Process (CSI 4.1.2)
• Baselines (CSI 3.7.1)
• Types of metrics (technology metrics, process metrics, service metrics) (CSI 4.1.2)
The recommended study period for this unit is minimum 1.5 hours.

ITILFND05 Processes
The purpose of this unit is to help the candidate understand how the Service Management processes contribute to the Service Lifecycle, to explain the high level objectives, scope, basic concepts, activities and challenges for five of the core processes, and to state the objectives and some of the basic concepts for thirteen of the remaining processes including how they relate to each other. The list of activities to be included from each process is the minimum required and should not be taken as an exhaustive list.
Service Strategy
State the objectives and basic concepts for:
05-21. Demand Management (SS 5.5)
The following list must be covered:
• Challenges in managing demand for Services (SS 5.5.1)
• Activity-based Demand Management (Patterns of business activity (PBAs) (SS 5.5.2)
• Business activity patterns and user profiles (SS 5.5.3)
• 05-22. Financial Management (SS 5.1 Intro, 5.1.2 Intro)
• Business case
Service Design
Explain high level objectives, basic concepts, process activities and relationships:
05-31. Service Level Management (SLM) (SD 4.2.1, 4.2.2, 4.2.5, 4.2.5.1 - 9, CSI 3.5 )
The following list must be covered:
• Service-based SLA
• Multi-level SLAs
• Service level requirements (SLRs)
• SLAM chart
• Service review
• Service improvement plan (SIP)
State the objectives and basic concepts for:
05-41. Service Catalogue Management (SD 4.1 Intro, 4.1.1, 4.1.4)
05-42. Availability Management (SD 4.4.1, 4.4.4)
• Service availability
• Component availability
• Reliability
• Maintainability
• Serviceability
05-43. Information Security Management (ISM) (SD 4.6 Intro, 4.6.1, 4.6.4 )
• Security framework (SD 4.6.4.1)
• Information security policy (SD 4.6.4.2)
• Information security management system (ISMS) (SD 4.6.4.3)
05-44. Supplier Management (SD 4.7 Intro, 4.7.1)
• Supplier Contract Database (SCD) (SD 4.7.4)
05-45. Capacity Management (SD 4.3.1, 4.3.4)
• Capacity plan
• Business capacity management
• Service capacity management
• Component capacity management
05-46. IT Service Continuity Management (SD 4.5.1, 4.5.4)
• Business Continuity Plans
• Business Continuity Management
• Business Impact Analysis
• Risk Analysis
Service Transition
Explain high level objectives, basic concepts, process activities and relationships:
05-51. Change Management (ST 4.2)
• Types of change request (ST 4.2.4.3, Table 4.3)
• Change process models and workflows (ST 4.2.4.4)
• Standard change (ST 4.2.4.5)
• Remediation Planning (ST 4.2.5)
• Change Advisory Board / Emergency Change Advisory Board (ST 4.2.6.8)
05-52. Service Asset & Configuration Management (SACM) (ST 4.3.1, 4.3.4, 4.3.5) to include:
• The Configuration Model
• Configuration items
• Configuration Management System (CMS)
• Definitive Media Library
• Configuration baseline
State the objectives and basic concepts for:
05-61. Release and Deployment Management (ST 4.4.1, 4.4.4)
05-62. Knowledge Management (ST 4.7 Intro, 4.7.1, 4.7.4)
• DIKW & SKMS
Service Operation
Explain high level objectives, basic concepts, process activities and relationships:
05-71. Incident Management (SO 4.2, Fig 4.2)
05-72. Problem Management (SO 4.4, Fig 4.4), not PM techniques
State the objectives and basic concepts for:
05-81. Event Management (SO 4.1 Intro, 4.1.1, 4.1.4)
05-82. Request Fulfilments (SO 4.3 Intro, 4.3.1, 4.3.4)
05-83. Access Management (SO 4.5 Intro, 4.5.1, 4.5.4)
The recommended study period for this unit is minimum 10.0 hours.

ITILFND06 Functions
The purpose of this unit is to help the candidate to explain the role, objectives and organizational structures of the Service Desk function, and to state the role, objectives and overlap of three other functions. Specifically:
06-1. Explain the role, objectives and organizational structures for
• The Service Desk function (SO 6.2)
06-2. State the role, objectives and organizational overlap of:
• The Technical Management function (SO 6.1, 6.3 Intro, 6.3.1, 6.3.2)
• The Application Management function (SO 6.5 Intro, 6.5.1, 6.5.2)
• The IT Ops Mgmnt function (IT Ops Control and Facilities Mgmnt) (SO 6.4 Intro, 6.4.1, 6.4.2)
The recommended study period for this unit is minimum 1.0 hours.

ITILFND07 Roles
The purpose of this unit is to help the candidate to account for and to be aware of the responsibilities of some of the key roles in Service Management.
07-1. Account for the role and the responsibilities of the
• Process owner (SD 6.4 Intro, 6.4.1)
• Service owner (CSI 6.1 Intro, 6.1.4)
07-2. Recognize the RACI model; explain its role in org structure. (SD 6 Intro, CSI 6.2 – not RASI-VS or RASCI)
The recommended study period for this unit is minimum 30 minutes.

ITILFND08 Technology and Architecture
The purpose of this unit is to help the candidate to 08-2. Understand how Service Automation assists with integrating Service Management processes (SS 8.1)
It is recommended that this unit is covered as part of the training in the other units.

ITILFND09 ITIL Qualification scheme
The purpose of this unit is to help the candidate to:
09-1. Explain the ITIL Qualification scheme, distinguish between the purposes of the two intermediate streams, mention the included certificates, ITIL Expert and ITIL Master, and understand the different options for further training.
The recommended study period for this unit is minimum 15 minutes.

ITILFND10 Mock exam
The purpose of this unit is to help the candidate to pass the ITIL Foundation exam. Specifically, candidates must:
10-1. Sit minimum one ITIL Foundation mock exam.
The recommended study period for this unit is minimum 2.0 hours inclusive of revision

Similar Documents

Premium Essay

Itil Service Strategy

...Service Strategy Meghna B. Patel Illinois Institute of Technology, Chicago Service Strategy ITIL (Information Technology Infrastructure Library) framework is considered as a set of best practices for IT Service Management (ITSM). This framework is widely used by many IT service providers to deliver quality IT services that adds value to customer and aims at attaining the business objectives. It consists of different processes and functions which are divided among five stages of service life cycle. Service Strategy is the first stage in this life cycle. “ITIL Service Strategy provides guidance on how to view service management not only as an organizational capability but as a strategic asset” (Cannon, 2011). It helps in designing, development and implementation of IT services that aligns with the business strategy and thus allowing service providers to think and act in a strategic manner. Service Strategy Principles Utility and Warranty Value of service consists of two components: Utility (fitness for purpose) and Warranty (fitness for use). According to Cannon (2011), Utility is the functionality offered by a product or service to meet a particular need. It refers to those characteristics of a service that contribute to tasks associated with achieving business outcomes. It is used to improve performance of these tasks and/or to remove constraints that prevent the task from being carried out sufficiently. Warranty is an assurance that a product or service will meet its agreed...

Words: 1575 - Pages: 7

Premium Essay

Project Management - Prince 2 -Case Study

...For writing services like this Contact :sethamimo@gmail.com Project management - prince 2 -case study Name Professor Institution Course Date ITIL (Information Technology Infrastructure Library) ITIL provides a framework that describes the best practice direction for IT Service Management. Therefore, ITIL framework is focused on a concept towards the service lifecycle. The main phases of the ITIL service lifecycle are service design, service strategy, service operation, service transition, and service improvement. In this project, main function of the ITIL framework addresses how Aplestia’s IT as a whole should be operated. The project management aspect addresses how single projects within the Aplestia should be executed. PRINCE 2 (Projects IN Controlled Environments) PRINCE 2 is a kind of an industry standard used extensively in the whole world. It Is known as project management technique designed to offer a framework covering the wide variety of activities and disciplines needed within a project. In this project, PRINCE 2 is focused on Aplestia ‘s case, which shows the rationale and business justification for this project. This is a process-based technique where the structure includes 5 phases as well as 8 high level processes. One of the merits of PRINCE 2, is that it can be applied to any size of set up or any type of project. One of the key shortcomings of PRINCE 2 is that it does not provide and cover for any support...

Words: 4374 - Pages: 18

Premium Essay

Tft2 Task 2

...Introduction The major healthcare provider in question has experienced a potential security breach within their records. They are now currently investigating how this happened and what information was access by the unauthorized individual. However, the company is now interested in established a baseline framework to avoid future information breaches from occurring. This document will outline three major IT frameworks and how each could have mitigated the recent information breach. ISO Policy The ISO 27001 recommendation is a high-level discussion. A precise policy was not located. The discussion did contain a preventive feature to denied access afterhours; however, how the afterhours check relates to a policy is not clear. The COBIT5 recommendation is a discussion and needs to develop a policy. The discussion includes auditing in general; however, details about the auditing need to be developed once a precise policy is developed. The NIST framework discussion includes review of log files. Details need to be developed about the review once a policy is developed. The three major security frameworks in the discussion are excellent overall recommendations. Precise policy statements that will prevent an identified security flaw in the scenario need to be developed. The first policy presented is ISO 27001 (International Standards Organization Security Standards). According to the ISO website, “The ISO 27000 family of standards helps organizations keep information assets secure. Using...

Words: 3049 - Pages: 13

Free Essay

Itil Methods

...Index: ITIL® v3 Foundation 2011 Study Notes 1. ITIL v3 Foundation Certification Notes: Service Management as a Practice 2. ITIL v3 Foundation Certification Notes: Service Strategy 3. ITIL v3 Foundation Certification Notes: Service Strategy [2] 4. ITIL v3 Foundation Certification Notes: Service Design 5. ITIL v3 Foundation Certification Notes: Service Design [2] 6. ITIL v3 Foundation Certification Notes: Service Design [3] 7. ITIL v3 Foundation Certification Notes: Service Design [4] 8. ITIL v3 Foundation Certification Notes: Service Transition 9. ITIL v3 Foundation Certification Notes: Service Transition [2] 10. ITIL v3 Foundation Certification Notes: Service Operation and Functions 11. ITIL v3 Foundation Certification Notes: Service Operation [2] 12. ITIL v3 Foundation Certification Notes: Service Operation [3] 13. ITIL v3 Foundation Certification Notes: Continual Service Improvement 14. ITIL v3 Foundation Certification Notes: Last Minutes Revision Notes ITIL v3 Foundation Certification Notes: Service Management as a Practice Why IT Service Management is needed? * Higher IT service quality is always required while fewer resources are available * Users are not interested in the processes / technology, rather they just need to utilize the service to achieve business goals * As users are usually not directly responsible for the costs of IT services, they would endlessly request more and more IT services with higher and higher standards /...

Words: 20852 - Pages: 84

Premium Essay

Research Methodology

...Özsen, (2010),"Analysis of risk dynamics in information technology service delivery", Journal of Enterprise Information Management, Vol. 23 Iss 3 pp. 350 - 364 Permanent link to this document: http://dx.doi.org/10.1108/17410391011036102 Downloaded on: 13 July 2015, At: 09:35 (PT) References: this document contains references to 37 other documents. To copy this document: permissions@emeraldinsight.com The fulltext of this document has been downloaded 1723 times since 2010* Users who downloaded this article also downloaded: Norita Ahmad, Noha Tarek Amer, Faten Qutaifan, Azza Alhilali, (2013),"Technology adoption model and a road map to successful implementation of ITIL", Journal of Enterprise Information Management, Vol. 26 Iss 5 pp. 553-576 http://dx.doi.org/10.1108/JEIM-07-2013-0041 F. Ponsignon, P.A. Smart, R.S. Maull, (2011),"Service delivery system design: characteristics and contingencies", International Journal of Operations & Production Management, Vol. 31 Iss 3 pp. 324-349 http://dx.doi.org/10.1108/01443571111111946 Kakoli Bandyopadhyay, Peter P. Mykytyn, Kathleen Mykytyn, (1999),"A framework for integrated risk management in information technology", Management Decision, Vol. 37 Iss 5 pp. 437-445 http:// dx.doi.org/10.1108/00251749910274216 Access to this document was granted through an Emerald subscription provided by emerald-srm:540740 [] For Authors If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service...

Words: 7780 - Pages: 32

Premium Essay

It Governance

...Global Technology Audit Guide Auditing IT Governance Global Technology Audit Guide (GTAG®) 17 Auditing IT Governance July 2012 GTAG — Table of Contents Executive Summary......................................................................................................................................... 1 1. Introduction................................................................................................................................................ 2 2. IT Governance Risks................................................................................................................................... 7 3. Aligning the Organization and IT — Key Considerations................................................................ 12 4. The Role of Internal Audit in IT Governance............................................................................ 15 Conclusion....................................................................................................................................................... 18 Authors and Reviewers.............................................................................................................................. 18 Appendix — IT Governance Risk Assessment/Engagement Planning Considerations............................................. 19 iv GTAG — Executive Summary Executive Summary To support the heightened importance of IT governance and the mandatory nature of the International Standards...

Words: 10762 - Pages: 44

Premium Essay

Auditing It Governance

...Global Technology Audit Guide Auditing IT Governance Global Technology Audit Guide (GTAG®) 17 Auditing IT Governance July 2012 GTAG — Table of Contents Executive Summary......................................................................................................................................... 1 1. Introduction................................................................................................................................................ 2 2. IT Governance Risks................................................................................................................................... 7 3. Aligning the Organization and IT — Key Considerations................................................................ 12 4. The Role of Internal Audit in IT Governance............................................................................ 15 Conclusion....................................................................................................................................................... 18 Authors and Reviewers.............................................................................................................................. 18 Appendix — IT Governance Risk Assessment/Engagement Planning Considerations............................................. 19 iv GTAG — Executive Summary Executive Summary To support the heightened importance of IT governance and the mandatory nature of the International Standards for the Professional...

Words: 10762 - Pages: 44

Premium Essay

Case

...KXO223: Systems Acquisition and Implementation Assignment 1, 2013 – Case Studies Tutorial-based group assessments Due: See ‘Due Dates for Case Study Submission’ section Marks: 30% of the total marks for the unit Background – Learning with Cases Harvard University, probably the most famous source of teaching cases, describes these resources as follows: “Teaching cases – also known as case studies – are narratives designed to serve as the basis for classroom discussion. Cases don’t offer their own analysis. Instead, they are meant to test the ability of students to apply the theory they’ve learned to a ‘real world’ situation … where good accounts of specific events can help exemplify and illuminate theory” (Harvard, 2000). The use of cases based on or around real organisations and/or current issues provides an entirely different approach to learning from that of lectures or more conventional tutorial exercises, where students solve specific problems in isolation from the world of business. Case preparation is a significant part of both undergraduate and postgraduate business study – particularly in the English-speaking world – and it is important to learn to do it effectively and efficiently. I have provided two introductory readings to help you with this process: “Learning Information Systems with Cases” (a pdf file available from your KXO223 MyLO resources) and “Notes on Writing a Case Study Report” (included in this document as Appendix A). Please begin by reading...

Words: 15979 - Pages: 64

Premium Essay

Cybercrime

...understanding and critical assessment of the University of Dar es Salaam cyber security policy through addressing the following research questions: What are the IT risk management policy and systems that can be developed for the University of Dar es salaam? The primary data is collected through surveys, and interviews that are open ended and close ended. The results of the paper demonstrated that colleges and universities have been a target for cyber-attacks due to the fact that of the vast amount of computing power they possess, and they provide open access to their constituents and to the public. The research also showed that University of Dar es Salaam doesn’t have a comprehensive IT security risk management policy or guidelines that will guide the business process in the event of an IT security threat. Therefore the University needs to develop policiesthat provide roadmap for effectively protecting the availability, integrity and confidentiality of University of Dar es Salaam Information Systems. Chapter One Introduction 1. Introduction Cybercrime is one of the fast growing areas of crime. Accordingly, there have been increased...

Words: 7435 - Pages: 30

Premium Essay

Xlri Brochure

...Exploring Excellence PGDM (GM) (GMP 2013–14) AN AICTE APPROVED FLAGSHIP FULL-TIME MBA PROGRAM FOR EXPERIENCED PROFESSIONALS E-brochure http://www.placementkloud.com/xlrigmp 01 02 03 04 05 06 08 10 12 14 16 MESSAGE FROM THE DIRECTOR Learning and growth are vital for a healthy environment in organizations. We at XLRI have structured our programmes in such a manner as to equip the future managers of tomorrow with learning, competencies and skills that can significantly contribute to the growth of the organization. XLRI has always been proudly associated with academic excellence, personal values and social concern. It has been the crucible of leadership training for over 60 years and its banner is held high by a fine breed of alumni who serve as “change agents” thereby adding a new dimension to their corporate role. This integral and value based formation will greatly assist our students to be innovative, competent and creative leaders. They are groomed in a manner as to serve as agents of continuous improvement and change. It was in 1997 that XLRI recognized an unfulfilled need for formal management training at middle and senior levels of corporate strata. The result of that thought process was the General Management Programme, which has ever since, transformed several industry professionals into veritable leaders who reflect the standards and values of XLRI at various organizations. Recognized by AICTE, the programme places emphasis on stringent admission procedures...

Words: 25500 - Pages: 102

Premium Essay

Cyber Liability

...over the country and it is also doing remarkably high business. The company’s gross premium (in India) has increased tremendously over the years 2010-2012. It was Rs. 8542.86 crores in the year 2011-2012, as against Rs. 7097.14 crores in the year 2010-2011. Also, the company’s total assets are as high as Rs. 42162.74 crores as on 31st March 2012. The company has an extensive network of offices covering each and every state and other regions of India as shown in Figure1. . Figure 1.New India Assurance India Limited presence all over the country. Such large and extensive network makes NIA Rank No. 1 in the Indian market. Not only this, the company is also the largest Non-Life insurer in Afro-Asia excluding Japan. It is infact also the first Indian non-life company to reach Rs. 10073.88 crores Gross Premium. International Presence NIA also provides global Re-insurance facilities. It has its over-seas presence in countries like Japan, U.K, Middle East, Fiji and Australia. Overseas operations commenced in 1920. The company has operations in 20 countries in the year 2011-12 which spans through a network of 9 branches, 7 agencies, 1 associate company and 3 subsidiary companies in the year 2011-12. The company received an overseas premium of Rs. 1531.37 crores in the year 2011-12. Strengths New India Insurance has many strength and advantage that puts it ahead of others. The company has the largest number of offices in India and abroad. It is also blessed with skilful...

Words: 14892 - Pages: 60

Premium Essay

Pmbok

...Project Management Institute A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Fifth Edition Licensed To: Jorge Diego Fuentes Sanchez PMI MemberID: 2399412 This copy is a PMI Member benefit, not for distribution, sale, or reproduction. Library of Congress Cataloging-in-Publication Data A guide to the project management body of knowledge (PMBOK® guide). -- Fifth edition. pages cm Includes bibliographical references and index. ISBN 978-1-935589-67-9 (pbk. : alk. paper) 1. Project management. I. Project Management Institute. II. Title: PMBOK guide. HD69.P75G845 2013 658.4’04--dc23 2012046112 ISBN: 978-1-935589-67-9 Published by: Project Management Institute, Inc. 14 Campus Boulevard Newtown Square, Pennsylvania 19073-3299 USA Phone: +610-356-4600 Fax: +610-356-4647 Email: customercare@pmi.org Internet: www.PMI.org ©2013 Project Management Institute, Inc. All rights reserved. “PMI”, the PMI logo, “PMP”, the PMP logo, “PMBOK”, “PgMP”, “Project Management Journal”, “PM Network”, and the PMI Today logo are registered marks of Project Management Institute, Inc. The Quarter Globe Design is a trademark of the Project Management Institute, Inc. For a comprehensive list of PMI marks, contact the PMI Legal Department. PMI Publications welcomes corrections and comments on its books. Please feel free to send comments on typographical, formatting, or other errors. Simply make a copy of the relevant page of the book, mark the error, and...

Words: 162869 - Pages: 652

Premium Essay

Something

...Innovative Business Practices Innovative Business Practices: Prevailing a Turbulent Era Edited by Demetris Vrontis and Alkis Thrassou Innovative Business Practices: Prevailing a Turbulent Era, Edited by Demetris Vrontis and Alkis Thrassou This book first published 2013 Cambridge Scholars Publishing 12 Back Chapman Street, Newcastle upon Tyne, NE6 2XX, UK British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Copyright © 2013 by Demetris Vrontis and Alkis Thrassou and contributors All rights for this book reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN (10): 1-4438-4604-X, ISBN (13): 978-1-4438-4604-2 TABLE OF CONTENTS Chapter One ................................................................................................. 1 Knowledge Hybridization: An Innovative Business Practices to Overcome the Limits of the Top-Down Transfers within a Multinational Corporation Hela Chebbi, Dorra Yahiaoui, Demetris Vrontis and Alkis Thrassou Chapter Two .............................................................................................. 17 Rethinking Talent Management in Organizations: Towards a Boundary-less Model Carrie Foster, Neil Moore and Peter Stokes Chapter Three .......

Words: 128975 - Pages: 516

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Premium Essay

Risk Management

...Butterworth-Heinemann is an imprint of Elsevier Linacre House, Jordan Hill, Oxford OX2 8DP, UK 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA First edition 2009 Copyright © 2009 Elsevier Ltd. All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone (144) (0) 1865 843830; fax (144) (0) 1865 853333; email: permissions@elsevier.com. Alternatively you can submit your request online by visiting the Elsevier web site at http://elsevier.com/locate/permissions, and selecting Obtaining permission to use Elsevier material Notice No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. Because of rapid advances in the medical sciences, in particular, independent verification of diagnoses and drug dosages should be made. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloguing in Publication Data A catalog record for this book is available from the Library of Congress ISBN–13:...

Words: 89973 - Pages: 360