Team Dynamics: Building a “Human System”
暂无分享,去创建一个
In the first half of this book, Chapters 1 to 5, we have presented the foundations of information risk management (Chapter 1), the profiles required by an IT security team (Chapter 2), the basic aspects that guide the team-individual contract (Chapter 3), a list of security principles to follow and activities to perform by the team (Chapter 4) and some techniques on how to organise their IT security activities (Chapter 5).
[1] Harold J. Leavitt,et al. Readings in managerial psychology , 1964 .
[2] A. Damasio. Descartes’ Error. Emotion, Reason and the Human Brain. New York (Grosset/Putnam) 1994. , 1994 .
[3] S. Harding. MBA Management Models , 1998 .
[4] G. Breeuwsma. Geruchten als besmettelijke ziekte. Het succesverhaal van de Hush Puppies. Bespreking van Malcolm Gladwell, The tipping point. How little things can make a big difference. London: Little, Brown and Company, 2000 , 2000 .