Green IT: Sustainability and Risk Analysis. David C. Chou Professor of Computer Information Systems Eastern Michigan University
|
|
- Jemima Gray
- 5 years ago
- Views:
Transcription
1 Green IT: Sustainability and Risk Analysis 1 David C. Chou Professor of Computer Information Systems Eastern Michigan University
2 2 Purposes of this study Discuss the implication of Green IT and sustainability. Propose a Green IT value model for assisting the IT industry to pursuit the goal of environmental sustainability. Illustrate the four components of Green IT value model: awareness, translation, comprehension, and green IT value. Identify the Risk in green IT implementation. Analyze various risk factors and uncertainties that encounter Green IT practice.
3 3 Why going to Green? Weather changes such as global warming, earthquake, and tsunami have raised people s anxiety toward environmental protection. Other environmental issues such as the rising price of gas, energy, and electricity, world water shortage, greenhouse gas emissions, use of hazardous materials, the proper disposal of industrial waste, etc. creating the pressure to go Green. Thomas Friedman (2008),in his well-known book Hot, Flat, and Crowded described the environmental concerns we faced today.
4 4 Sustainability Sustainability has become a norm in recent years since horrendous things happened. In dealing with sustainability, governments have stipulated a variety of laws and regulations to protect the environment. The three fundamental components of sustainability are economic growth, social equity, and environmental protection (United Nations General Assembly, 2005). Businesses today face not only market competitions but also new regulatory environment. Melville (2010) proposed a belief-action-outcome (BAO) framework to illustrate the role of information system that can contribute to the goal of environmental sustainability.
5 5 The IT Industry goes to Green Since the IT industry has to utilize resources such as energy, water, and hazardous materials to produce hardware, its production process may frequently generate waste that damages the environment. Thus the IT industry faces heavy pressure to go Green. The crusade of Green IT is the practice of designing, manufacturing, and using computers, servers, and various peripherals efficiently and effectively in order to minimize environmental damage. The realization of Green IT could generate great value for our society. International Green IT Conference 2014 in Malaysia.
6 6 Green IT Conference 2014 OCU 2014
7 7 Why Green IT? The IT impact to environmental sustainability has been recognized by computer professionals. Green IT also strives to achieve economic viability and improved system performance and use, while abiding by our social and ethical responsibilities. Green IT initiatives can greatly contribute to the three pillars of sustainability: economic, environmental, and social imperatives. Environmental impacts of IT includes green use, green disposal, green design, and green manufacturing.
8 8 Goals of environmental sustainability Competitiveness, resource productivity, and innovation Cost deduction A better environmental standards, technology, and investment Generating higher operational effectiveness in organizations Creating competitive environmental strategies
9 9 Green IT s activities design for environmental sustainability; energy-efficient computing ; power management; data center design, layout, and location; server virtualization; responsible disposal and recycling; regulatory compliance; green metrics, assessment tool, and methodology; environment-related risk mitigation; use of renewable energy sources; and eco-labeling of IT products.
10 10 Firm s responses to Green IT IBM has developed a comprehensive working model to help create Green business in the market. IBM s framework consists of the following seven areas: strategy, people, information, product, information technology, property, and business operations. HP manufactures its computers through: smart design (smart materials for energy efficiency or material innovation, careful design from the start or design for environment, and fewer materials, lower costs on packaging and transportation) built-in efficiency (new standards such as ENERGY STAR qualified, high ratings lead to high savings through EPEAT Gold ratings, and greater efficiency built right in through efficient power supplies).
11 11 IT valuation Value can be the measurement of satisfaction of utilizing goods or services. Value theory consists of a variety of ways to identifying how, why, and to what degree that people would value objects they have encountered. In Value Chain Analysis (Michal Porter, 1985), every step in business process has been analyzed to determine its value. It is a systematic way of examining all the activities a firm performs and how they interact to each other. Porter s value chain analysis can be applied into the information technology industry for seeking competitive advantage in environmental sustainability.
12 12 Value theory and Green IT analyses The value chain analysis can be further developed into the research of Green IT and its valuation process. IT creates value by saving people s working time, helping users to make better decisions, or improving the quality of products or services in an organization. IT value has been measured through financial metrics such as return on investment (ROI), total cost of ownership (TCO), net present value (NPV), internal rate of return (IRR), pay back analysis, etc. Furthermore, IT valuation result can be critical to corporate IT budgeting and IT investment decision processes. This paper introduces the Green IT value model to explore such venture.
13 13 IT value and Green IT The real IT value comes from the blending of IT practices and organization s skills at managing information and people s behaviors and beliefs. While Green IT and environmental sustainability can deliver social and economic values becomes a norm, which will affect people s behaviors and beliefs. The development of Green IT stems from the recognition of environmental sustainability. Therefore, corporate IT budgeting and IT investment processes must consider Green effort. IT value concept can be applied into the Green IT value model.
14 14 Green IT value model In order to identify the value of seeking Green IT and its performance outcome, the provision of a clear value framework would contribute to the Green IT field. The Green IT value model contains four components: Awareness ( 認知 ), Translation ( 轉換 ), Comprehension ( 理解 ), and Green IT value ( 綠能 IT 的價值實現 ).
15 15 Green IT value model awareness translation comprehension Green IT value Environmental sustainability OCU 2014
16 16 Awareness The potential value of Green IT must be identified and recognized by business and organizations before Green IT to be adopted to create its value. The economic benefits of Green IT have been recognized by organizations, including reducing IT operating and capital expenses, cutting down electricity bills, and enhancing public image to organizations. Other than that, the global awareness of environmental sustainability stimulates the societies to appreciate and seek the value of Green IT. Recognizing the opportunities of environmental, economic and social benefits would encourage organizations to reach these goals, thus Green IT value can be realized.
17 17 Awareness: organization s activities Understanding the relationship of environmental quality and quality of life. Recognizing the needs of Green IT by organizations, governments, and society. Knowing that IT devices consume high energy, release pollution, and generate waste. Identifying economic benefits of Green IT. Postulating potential value of Green IT.
18 18 Translation The value of Green IT is derived from the resources to be used for translating Green awareness into real life Green IT initiatives. Organizations must create Green IT strategies that link to their organizational strategies. The most important task in the translation component is to convert ideas and opportunities into operational courses. During this stage, organizations must seek to provide sufficient resources for Green IT conversion. Organizational changes and management capability must be fully arranged. Organizations must create a profound knowledge management system for Green IT knowledge gathering and distribution.
19 19 Translation: organization s activities Creating Green IT strategies and link it to organizational strategies. Sharing company s Green IT vision with employees. Classifying expected value of Green IT. Transforming Green IT idea into operational courses. Seeking resources and funding for Green IT practice. Developing innovative technologies for Green IT implementation. Performing organizational change and change management. Offering training programs to employees. Adopting knowledge management system to assist Green IT mission.
20 20 Comprehension During this stage, organizations must create measurement to measure Green IT outcomes against expected results, to remove deficiencies in the performance results, and to create situations in compliance with Green IT laws and regulation. Organizations could utilize public tools for calculating computer equipment s energy usage, such as: ENERGY STAR Computer Power Management Savings Calculator, Life Cycle Cost Estimate for ENERGY STAR Qualified Desktop/Side Computers, U.S. EPA s spreadsheet for calculating the green-house gas equivalent for energy usage, and Apple Mac s energy saving calculator.
21 21 Comprehension - continued Creating an environmental management system (EMS) in organization is essential for Green IT projects, as indicated in ISO standard. It is the overall management system that includes organizational structure, planning activities, responsibility, practice, procedures, processes and resources for developing, implementing, achieving, reviewing and maintaining the environmental policy. (ISO 14001, 1996, definition 3.5). Creating measures for reporting Green IT performance results to employees is an important mission in this stage. Another task in this stage is the creation of needed environmental laws and Green IT standards and regulations for the industries and societies.
22 22 Comprehension: organization s activities Creating measurements for assessing Green IT outcome. Monitoring performance in IT department. Adopting suitable tools for calculating energy usage. Creating an environmental management system (EMS) in organization. Creating Green IT performance reporting system. Establishing Green IT laws, standards, and regulations for industries and societies.
23 23 Green IT value Combining the results of Green IT awareness, translation, and comprehension will result in identifiable Green IT value. Value can be further depicted as the measurement of satisfaction of exploiting a thing. Green IT value, generally speaking, is the measurement of satisfaction of exploiting Green IT and its environmental impact. The value of Green IT can be identified through two levels: the enterprises satisfaction and the social and environmental satisfaction.
24 24 Green IT value - continued Enterprises achieved Green IT objectives through the following paths: green use, green disposal, green design, and green manufacturing. Similarly, enterprises Green IT value can be realized through these four paths. The value to be generated from greening IT consists of reducing the energy use of computer hardware and software, refurbishing old computers and possibly recycles retired computers and peripherals, designing computer hardware and peripherals with energy efficiency characteristics, and building computers and electronic devices with minimal impact on the environment.
25 25 Green IT value - continued Successful Green IT initiatives allow companies to attract more customers to buy their products and services. This will enhance corporate branding image in the market. It also may lead organizations to increase their IT investment for creating new technologies to enhancing green business processes and services in the market. These Green IT prompted benefits and satisfactions that add eminent value to enterprises.
26 26 Green IT value - continued The adoption of Green IT strategy and energy efficiency programs contributes to environmental value by mitigating potential environmental damages and risks on the planet. The combination of environmental protection and economic growth creates the value of social equity. After all, the whole society can enjoy Green IT value and environmental sustainability.
27 27 Green IT value: organization s activities Combining the results of the three components in Green IT value model: Awareness, translation and comprehension. Defining the value as the measurement of satisfaction of exploiting Green IT. Collecting value from enterprise s satisfaction of implementing Green IT. Collecting value from social and environmental satisfaction of implementing Green IT.
28 28 Risks in Green IT practice There are many risk factors and uncertainties that may affect and prohibit the practice of Green IT, which may then deviate from the pathway of environmental sustainability. In order to achieve the goal of Green IT and sustainability, those possible risks that may forbid the green practice need to be identified and monitored. Since the practice of Green IT is complicated, we should look into a variety of aspects of actions. Organizations should follow the laws to monitor their production and supply chain processes regularly. However, these regulations and policies may frequently cause oversights. The government also needs to bring up societal interests and passions to reach to environmental sustainability.
29 29 Implication of risk Risk that occurring in any task of business process or project management represents an undesirable event or a negative outcome to the expected result. Risk is defined as the combination of the probability of an event and its consequences. (ISO/IEC Guide 73). Chapman and Ward (2005, p. 48) defined risk as the implications of uncertainty about the level of performance achievable, portrayed by adverse variability relative to expected outcomes, assessed for each performance attribute using comparative cumulative probability distributions when measurement is appropriate.
30 30 Measuring risk A simple way to measure risk (RE) is through a function of the probability of a negative outcome and the importance of the loss due to the occurrence of this outcome. This risk measurement can be calculated through the following equation: RE = i P (UO i ) * L(UO i ) where P (UO i ) is the probability of an undesirable outcome i, and L(UO i ) is the loss due to the undesirable outcome i.
31 31 Risk in awareness component The awareness stage in the Green IT value model describes the degree of recognizing Green IT made by individuals, organizations, governments, and societies. Possible risks in this stage are: Lack of the knowledge of environmental sustainability. Lack of the knowledge of Green IT. Profit-centered managerial philosophy. Lack of individual behavioral change. Lack of social responsibility. Insufficient business ethics. Insufficient effort from government.
32 32 Risk in translation component The major work in the translation stage is to convert ideas and opportunities into operational courses of Green IT. Organizations during this step need to acquire adequate resources for pursuing Green IT. Possible risk factors are listed below: Insufficient support from top management. Concern of investment risk. Lack of stakeholder s consent and support. Inadequate experience in Green IT. Insufficient funding to Green IT initiatives. Lack of specific IT support. Inadequate experience in change management. Inadequate experience in training programs. Lack of skill in building knowledge management system.
33 33 Risk in comprehension component During this stage, organizations should construct suitable metrics for monitoring the performance of Green IT implementation. Striving for knowledge of crafting desirable measurements for assessing Green IT processes is a major focus in this practice. Possible risk factors are listed below: Lack of knowledge of Green IT metrics. Insufficient experience in workplace monitoring. Selecting improper tools for calculating energy usage. Insufficient knowledge in creating EMS. Insufficient knowledge in crafting Green IT policies and laws.
34 34 Risk in Green IT value A company that adopts Green IT strategy in its daily operation may contribute to environmental quality and sustainability. Corporation s social responsibility to Green IT should communicate well with the community and the society. Possible risks factor are listed below: Insufficient knowledge in defining the value of awareness, translation and comprehension. Insufficient knowledge in calculating Green IT value. Insufficient value data to be collected in organizations. Insufficient capability of interpreting the results of value. Insufficient capability of communicating with the society.
35 35 Risk Management in Green IT Risks Monitoring & Management awareness translation comprehension Green IT value Environmental sustainability OCU 2014
36 36 Conclusion Environmental sustainability has become a common goal in the global community. Organizations, especially in the manufacturing industry, are responsible for environmental protection and sustainability. The IT industry, as a heavy energy consumption group, needs to pay more attention to the goal of environmental sustainability. Complying with Green IT is now an important objective in the IT industry. Green IT Value Model demonstrates the path of achieving environmental sustainability in the IT industry. This value model can be further used to investigate risk analysis.
37 37 Conclusion - continued A successful Green IT practice can reach to environmental sustainability. However, risk and uncertainty may always affect the result of Green IT practice. The identification and understanding of these risk factors may allow companies preparing these threats ahead of time, so they may have better chance to achieve the goal of environmental sustainability. Future research could focus on empirical analyses on the value model and risk metrics identification.
38 38 Thank you!
Green IT (ICT) (Accredited by British Computer Society)
Green IT (ICT) (Accredited by British Computer Society) 1. What is Green IT? An Overview (4 hrs)* 1.1. Understand the overall need for an organization to adopt a Green IT strategy. (30 - The reality of
More informationGreen Governance Growth
G3 Data Centers Green Governance Growth DELIVER MORE WITH LESS The economic downturn changed the dynamics of the business world. It shifted the measure of success, driving companies to rethink how they
More informationDomino s Pizza Enterprises Ltd. The Business Partner. Code of Practice
Domino s Pizza Enterprises Ltd The Business Partner Code of Practice INTRODUCTION At Domino s we are committed to living our brand ethos of People Powered Pizza. This includes the people who work with
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationIf you have any questions regarding this survey, please contact Marcell Reid at or Thank you for your support!
ABBVIE GLOBAL SUPPLIER SUSTAINBILITY PROGRAM Annual Supplier Sustainability As an important supplier to AbbVie, we would like to document and assess your company s activities and progress regarding sustainability
More informationCommission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers
Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers Ben Vickery Senior Technical Analyst NIST MEP September
More informationJ.Enhancing energy security and improving access to energy services through development of public-private renewable energy partnerships
J.Enhancing energy security and improving access to energy services through development of public-private renewable energy partnerships Background ESCAP, jointly with the ECLAC, the ECA, the ECE, and the
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationSan Francisco Chapter. What an auditor needs to know
What an auditor needs to know Course Objectives Understand what a data center looks and feels like Know what to look for in a data center and what questions to ask Deepening understanding of controls that
More informationNational Open Source Strategy
National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications
More informationCorporate Responsibility at Tieto. Overview
Corporate Responsibility at Tieto Overview Sustainability is the new norm According to the Intergovernmental Panel on Climate Change (IPCC), global emissions of greenhouse gases grew more quickly between
More informationBCM s Role in Effective Risk Management: A Risk Manager s Point of View
BCM s Role in Effective Risk Management: A Risk Manager s Point of View Date: March 24, 2015 Presenter: Randall Davis, MBA, IBD, CPCU, ERM, ARM, ARM E, ABCP Agenda for this session Explore the case for
More informationACCOUNTING (ACCT) Kent State University Catalog
Kent State University Catalog 2018-2019 1 ACCOUNTING (ACCT) ACCT 23020 INTRODUCTION TO FINANCIAL ACCOUNTING 3 Credit (Equivalent to ACTT 11000) Introduction to the basic concepts and standards underlying
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationEnvironmental Sustainability
Environmental Sustainability Smart Applications to support future growth and care for the environment Michalis Grigoratos, EMEA Delivery Lead Energy and Sustainability Management, Hewlett-Packard Company
More informationCANADA S FUTURE BUILT ENVIRONMENT: SUSTAINABLE, INNOVATIVE AND RESILIENT. August 3, 2016
DR CANADA S FUTURE BUILT ENVIRONMENT: SUSTAINABLE, INNOVATIVE AND RESILIENT CCI Recommendations for Federal Budget 2017 August 3, 2016 Executive Summary Canadian Construction Innovations (CCI) welcomes
More informationPLANNING FOR THE TRANSMISSION NETWORK
PLANNING FOR THE TRANSMISSION NETWORK Page 1 of 1 TABLE OF CONTENTS 1. CONTEXT.... PLANNING METHOD OF THE TRANSMISSION NETWORK....1 Design and Planning of the Transmission Network.... Planning Process
More informationQUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM
DEPARTMENT OF CONSTRUCTION MANAGEMENT AND CIVIL AND CONSTRUCTION ENGINEERING QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM Updated 5/17 Organization The QIP consists of
More informationCourse Information
Course Information 2018-2020 Master of Information Systems: Digital Business System Institutt for teknologi / Department of Technology Index Index... i 1 s... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 31000 Risk Manager www.pecb.com The objective of the PECB Certified ISO 31000 Risk Manager examination is to ensure that the candidate
More informationREINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS
REINVENTING ETHICAL, SUSTAINABLE SUPPLY CHAINS HP Inc. Sustainability Briefing January 22, 2018 1 Copyright 2018 HP Development Company, L.P. The information contained herein is subject to change without
More informationACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES
ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION SCHEME MANUAL Document Title: Document Number: Various Accreditation Schemes ACCAB-ASM-7.0 CONTROLLED COPY Revision Number Revision
More informationCourse Information
Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme
More informationHP environmental messaging
HP environmental messaging Promise Definition Designing for the environment As a technology industry environmental leader for decades, HP is making a difference with a comprehensive Design for the Environment
More informationIsaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.
Isaca EXAM - CISM Certified Information Security Manager Buy Full Product http://www.examskey.com/cism.html Examskey Isaca CISM exam demo product is here for you to test the quality of the product. This
More informationACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES
ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES ACCREDITATION SCHEME MANUAL Document Title: Document Number: Various Accreditation Schemes ACCAB-ASM-7.0 CONTROLLED COPY Revision Number Revision
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationDomino s Pizza Enterprises Ltd. The Business Partner. Code of Practice
Domino s Pizza Enterprises Ltd The Business Partner Code of Practice INTRODUCTION At Domino s we are committed to living our brand ethos of People Powered Pizza. This includes the people who work with
More informationSustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America
Sustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America Content The Context The Report Country Assessment WEEE Management Challenges in Latin America Main Findings of
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : CISM Title : Certified Information Security Manager Vendor : ISACA Version : DEMO 1 / 10
More informationCORPORATE RESPONSIBILITY PERFORMANCE BY COUNTRY GREECE
2008 CORPORATE RESPONSIBILITY PERFORMANCE BY COUNTRY GREECE Sonae Sierra in Greece Sonae Sierra is an international specialist in shopping centres that is passionate about introducing innovation and emotion
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationAvailable online Journal of Scientific and Engineering Research, 2018, 5(4): Review Article
Available online www.jsaer.com, 2018, 5(4):247-251 Review Article ISSN: 2394-2630 CODEN(USA): JSERBR Green Computing: A Primer Matthew N. O. Sadiku 1, Nana K. Ampah 2 *, Sarhan M. Musa 1 1 Roy G. Perry
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationNATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES
NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda
More informationGUIDE TO TRUE ZERO WASTE CERTIFICATION
GUIDE TO TRUE ZERO WASTE CERTIFICATION VERSION 1.0 September 2017 Green Business Certification, Inc (GBCI) Washington, DC OVERVIEW GBCI s TRUE Zero Waste certification program is used by facilities to
More informationRethinking Information Security Risk Management CRM002
Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design
More informationTexas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13
Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas
More informationISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT )
ISACA Pasitikėjimas informacinėmis sistemomis ir jų nauda Certification Details for Certified in the Governance of Enterprise IT (CGEIT ) Dainius Jakimavičius, CGEIT ISACA Lietuva tyrimų ir metodikos koordinatorius
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release September 23, 2014 EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary For Immediate Release September 23, 2014 EXECUTIVE ORDER - - - - - - - CLIMATE-RESILIENT INTERNATIONAL DEVELOPMENT By the authority vested in me as President
More informationEnergy Performance Contracting
Energy Performance Contracting December 2017 Outlines Section One: Jonson Controls as an Energy Service Company (ESCO) Reasons behind investment in Energy Efficiency Section Two: Funding Options of Energy
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationRequest for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator
Request for Expression of Interest Consultant - Project Coordinator Project: I-CARE Global Imperative Indicator Unidentified Victims Portrayed on Child Abuse Images Organisational Background ECPAT International
More informationPioneer in the economic and ecological facility management
Pioneer in the economic and ecological facility management TO BE AT THE HEAD OF PROGRESS. ALL FIELDS OF TECHNICAL FACILITY MANAGEMENT IN ONE SYSTEM. What can be expected by CMS a worldwide unique service
More informationTHE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK
GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER
More informationInfrastructure and Asset Management. and Asset Management
Infrastructure and Asset Management 18/09/2015 Emad Elbeltagi 1 W elcome to Infrastructure and Asset Management 18/09/2015 Emad Elbeltagi 2 1 About Emad Elbeltagi Structure and delivery Assessment Course
More informationLearning's from Major Process Safety Incidents
Learning's from Major Process Safety Incidents Brian D. Rains Global PSM Practice Leader DuPont Sustainable Solutions 23 February 2012 Copyright 2010 DuPont. All rights reserved. The DuPont Oval Logo,
More information3.3 Project Idea for Technology 2: Variable Speed Drives for Motors
3.3 Project Idea for Technology 2: Variable Speed Drives for Motors (VSD) Project Idea: In country capacity development through strengthening of institutions / organizations for reducing carbon emissions
More informationGOVERNANCE, RISK & COMPLIANCE CPD FOR MEMBERS IN COMMERCE & INDUSTRY AUGUST 2018
GOVERNANCE, RISK & COMPLIANCE CPD FOR MEMBERS IN COMMERCE & INDUSTRY AUGUST 2018 1 GRC - INTRODUCTION A growing regulatory environment, higher business complexity and increased focus on accountability
More informationAccountancy (ACCTCY) Accountancy (ACCTCY) 1
Accountancy (ACCTCY) 1 Accountancy (ACCTCY) ACCTCY 2010: Introduction to Accounting Introduction to accounting for non-business majors. Emphasis on introducing students to business operations, as well
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationDemystifying GRC. Abstract
White Paper Demystifying GRC Abstract Executives globally are highly focused on initiatives around Governance, Risk and Compliance (GRC), to improve upon risk management and regulatory compliances. Over
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationREPORT 2015/010 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/010 Audit of information and communications technology strategic planning, governance and management in the Investment Management Division of the United Nations Joint
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationProject Management Professional (PMP ) Certification
Project Management Professional (PMP ) Certification atsc is the leading Training provider in the country with 10 years of experienced in conducting the PMP training. Ensuring your success with the right
More informationSenate Comprehensive Energy Bill
Senate Comprehensive Energy Bill Both the House and Senate energy committees are currently in the process of developing comprehensive energy bills. The Senate Energy and Natural Resources Committee released
More informationREVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009
APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto
More informationResults for the year ending 31 March 2010.
Induction MITIE at a glance We re the strategic outsourcing and asset management company; FTSE 250 listed support services business with a track record of more than 20 years of growth; Revenues in excess
More informationEUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER
EUROPEAN ORGANISATION FOR SECURITY SUPPLY CHAIN SECURITY WHITE PAPER Mark R. Miller Regional Vice President, COTECNA Inspection S.A. Vice Chairman, European Organisation for Security Coordinator, EOS Supply
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Implementer www.pecb.com The objective of the PECB Certified ISO 14001 Lead Implementer examination is to ensure that the candidate
More informationInternational Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Risk Management Theory Application in national information security risk control Analysis of the relationship
More informationHong Kong SME Business Sustainability Index Online Reporting Platform
Date: 26 th Apr, 2016 Version: 1.0 Hong Kong SME Business Sustainability Index Online Reporting Platform Quick Start Guide This guide is provided to give you information on completing your online form.
More informationSchool of Engineering & Computational Sciences
Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.
More informationHitachi Received Notice of Request for Arbitration
FOR IMMEDIATE RELEASE Hitachi Received Notice of Request for Arbitration Tokyo, August 22, 2017 --- Hitachi, Ltd. (TSE: 6501, Hitachi ) today announced that it has received the notice of the request for
More informationIntroduction to the NYISO
Introduction to the NYISO Power Control Center Guilderland, NY July 21, 2011 1 Today s Topics NYISO History NYISO Roles & Governance NYISO Markets Building Reliability Emerging Trends 2 Evolution of the
More informationGOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI
GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles
More information! " #! $ % & '( ) % * * $ " +, " -../
! " #!$% &'()%** $" +,"-../ 0$"1!" "#$%& & '( %!) #( ( *% % ( *+* *+* (( &2 2 * 2 /34! " #! $ %! & *5(,.3-4 '( '( '' )# '' *) ' +, ' # ' *--! '& %.*/. * $ $ # & )! 0 *2 2 +.3+6! (!* ' 1! # # 2 5*& +3/4.
More informationWhat is ITIL. Contents
What is ITIL Contents What is ITIL and what are its origins?... 1 Services and Service Management... 2 Service Providers... 3 Stakeholders in Service Management... 3 Utility and Warranty... 4 Best Practices
More informationIBM Security Services Overview
Services Overview Massimo Nardone Senior Lead IT Security Architect Global Technology Services, IBM Internet Security Systems massimo.nardone@fi.ibm.com THE VEHICLE THE SKILL THE SOLUTION Today s Business
More informationLevel 4 Diploma in Computing
Level 4 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that
More informationISSA Guidelines on Information and Communication Technology: Overview
ISSA Guidelines on Information and Communication Technology: Overview Raul Ruggia-Frick ISSA Secretariat ISSA Guidelines Information and Communication Technology 2 Outline Context The Guidelines on Information
More informationCaribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago
Caribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago Background The Sendai Framework for Disaster Risk Reduction 2015-2030 1 was adopted by United
More informationLEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change
Senate Meeting of April 28, 2010 Graduate Studies Committee Hegis Code: 0502 Program Code: 32786 LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK Department of Economics and Business Curriculum Change
More informationENGINEERING (ENGR) Engineering (ENGR) 1. ENGR 1352 Engineering Design with CAD for CHE
Engineering (ENGR) 1 ENGINEERING (ENGR) ENGR 1111 Introduction to Engineering Description: An introduction to the study and practice of engineering. Skills for students in CEAT; expected engineering student
More informationCitation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.
Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation
More informationThe Greening of Services
The Greening of Services CYNET Presentation - Under the scope of GN3Plus Project / NA3-T3 Activity Special Scientists: Nikoletta Tsioroli, Petros Ioannou CYNET 2015 Agenda Introduction NA3-T3 Tasks - Quick
More informationLet s Build a Smarter Planet: Green & Beyond
#sam.request.name# - #sam.user.title# #sam.request.date# Let s Build a Smarter Planet: Green & Beyond The world is smaller, flatter and hotter. 2 The ecological reality of living in a globally integrated
More informationAvoid a DCIM Procurement Disaster
Avoid a DCIM Procurement Disaster Matt Stansberry Senior Director, Uptime Institute 7 December 2016 2016 Uptime Institute, LLC Many organizations struggle with DCIM decisions Process takes too long, software
More informationUniversity ICT Security Certification. Francesco Ciclosi, University of Camerino
University ICT Security Certification Francesco Ciclosi, University of Camerino 1 Is secure an organization complies with the standard ISO/IEC 27001? TRUE FALSE Is the standard ISO/IEC 27001 a metric of
More informationTDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems
Data Analysis and Design for BI and Data Warehousing Systems Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your
More informationMDCSystems. MICHAEL A. BAKER, P.E., M.S.E.M. Consulting Engineer
MDCSystems Providing Expert Solutions for Projects Worldwide MICHAEL A. BAKER, P.E., M.S.E.M. Consulting Engineer Education Drexel University, M.S., Engineering Management, Technology Assessment Brown
More informationAgici Finanza d Impresa Utilities & Infrastructures
Agici Finanza d Impresa Utilities & Infrastructures Table of Contents AGICI RESEARCH: Observatory ADVISORY: Easy Solutions PUBLISHING Agici Finanza d Impresa 2 Agici Agici Finanza d Impresa is a research
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationAssessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society
ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling
More informationThe Secret Sauce of ILM
The Secret Sauce of ILM the ILM Assessment Core LeRoy Budnik, Knowledge Transfer Abstract The Secret Sauce of ILM Assessment Professional Services and internal consulting figure prominently in the success
More informationThe UNISDR Private Sector Alliance for Disaster Resilient Societies
The UNISDR Private Sector Alliance for Disaster Resilient Societies Sandra Amlang United Nations Office for Disaster Risk Reduction (UNISDR) Regional Office- the Americas. 24 August 2017 Increase in Frequency
More informationICT key driver to a low carbon society
ICT key driver to a low carbon society The need for the right policy framework Workshop on ICT s and Environmental Challenges 22-23 May 2008 www.gesi.org Luis Neves es GeSI Chairman Luis.Neves@telekom.de
More informationUniversity Strategy
University Strategy 2011-2015 FOREWORD Dear Colleagues Thank you for your contributions to the University Strategy 2011-2015, which was endorsed by University Council at its meeting in December 2010. The
More informationIntroduction to ISO/IEC 27001:2005
Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating
More informationManaging IT Risk: The ISACA Risk IT Framework. 1 st ISACA Day, Sofia 15 October Charalampos (Haris)Brilakis, CISA
Managing IT Risk: The ISACA Risk IT Framework Charalampos (Haris)Brilakis, CISA ISACA Athens Chapter BoD / Education Committee Chair Sr. Manager, Internal Audit, Eurobank (Greece) 1 st ISACA Day, Sofia
More informationHandling Economic Uncertainty While moving forward to a Smarter Planet
David Simms - Director, Integrated Technology Services, CEE, May/2009 Handling Economic Uncertainty While moving forward to a Smarter Planet Agenda Smarter Planet Economic Crisis Dynamic Infrastructure
More informationBachelor of Property Valuation
Course information for Bachelor of Property Valuation Course Number HE20507 Course design The Bachelor of Property Valuation is a three-year qualification that prepares graduates for work as a Valuer in
More information