Regulation of IT Risk
In order to regulate the IT risk, governments work to address threat to computer crime. For example, representatives of 29 countries - including Canada, Japan and the U.S. – signed the Council of Europe Cybercrime convention in 2001. The convention deals with substantive and procedural cybercrime law. The substantive defines the following activities as crimina
미국 노사관계의 현황과 사례 분석
Ⅰ. 미국 노사관계의 역사
1) 1810년 이전의 시기
2) 1810년대 이후와 남북전쟁 후
3) 2차 세계대전 이후의 시기
Ⅱ. 미국 노사관계 특징 및 현황
1) 미국 노사관계 기본 지표
2) 미국 노사관계의 특성 및 최근 변화
Ⅲ. 미국 노사관계 사례
1) GM
2) GE
Ⅳ. 시사점
1) GM의 시
IBM: International Business Machines Corporation
Headquarter in Armonk, New York
Transnational technology and consulting
company – over 90 countries
Manufactures and markets computer hardware and software
Offers infrastructure, hosting and consulting
services
GIS: Global Information Systems
Manipulate, and transmit data across cultural and geographical boundaries
For
Mr. Gihun is 2nd grade crippled disorderdisability. He cannot feel his left hand, feet. Riding a motorcycle, Gihun's walking around town, and accumulating recycled work. Mr. Gihun is hard, even lifting a light box. Mr. gihun work out even in bad weather like rainy, windy day. For over 10 years, he has been picking up the boxes. There are many neighbors with the warm hearts of ar
Recent Situation
“ internal information security attacks are outgrowing external
attacks at the world’s largest financial institutions”
(The Global Security Survey): Only 20% of the respondents in security survey strongly
believed that Information security should be a CEO-level priority
Ernst and Young(2004)
2) IT liability risk management
: The corporations should install f