security consultant
Recently Published Documents


TOTAL DOCUMENTS

47
(FIVE YEARS 1)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Thomas Cole ◽  
Amit Kumar Bhardwaj ◽  
Lalit Garg ◽  
Divya Prakash Shrivastava

Cloud computing is not associated with a specific technology, instead it as an alternative method to deliver technology as a service. This article investigates current cloud computing adoption in the United States (USA) and United Kingdom (UK) hedge fund industry. Hedge fund technologists, prime service consultants, technology service providers, industry application vendors, investors and an independent information security consultant participated were surveyed for this article. The article acknowledges the growth of cloud computing in the hedge fund sector. This research work also highlights that the private cloud definition is vague and requires further classification, elaborating on the variants of private cloud. This is important as the variants of private cloud computing offer varying benefits and risk which the hedge fund sector has proven to be sensitive. Equally, this article argues that some of the current security concerns are over-stated and perhaps reflect a conservative decision making framework rather than a realistic consideration of the options.


2019 ◽  
Vol 21 (3) ◽  
pp. 1-25
Author(s):  
Thomas Cole ◽  
Amit Kumar Bhardwaj ◽  
Lalit Garg ◽  
Divya Prakash Shrivastava

Cloud computing is not associated with a specific technology, instead it as an alternative method to deliver technology as a service. This article investigates current cloud computing adoption in the United States (USA) and United Kingdom (UK) hedge fund industry. Hedge fund technologists, prime service consultants, technology service providers, industry application vendors, investors and an independent information security consultant participated were surveyed for this article. The article acknowledges the growth of cloud computing in the hedge fund sector. This research work also highlights that the private cloud definition is vague and requires further classification, elaborating on the variants of private cloud. This is important as the variants of private cloud computing offer varying benefits and risk which the hedge fund sector has proven to be sensitive. Equally, this article argues that some of the current security concerns are over-stated and perhaps reflect a conservative decision making framework rather than a realistic consideration of the options.


2016 ◽  
Vol 14 (4) ◽  
pp. 434-450 ◽  
Author(s):  
Emmeline Taylor

Understanding of the potential ‘rewards’ that residential burglars gain through their offences has largely been confined to monetary return, thus overlooking the possibility that offenders obtain other ‘goods’ from their criminal activities. By illustrating how burglars could be attending to various lifestyle deficits through crime, the article reveals indicators for case management, rehabilitation and desistance. The Good Lives Model (GLM) is employed as a framework to explore the ‘primary human goods’ attained through residential burglary. The article concludes with suggestions to encourage desistance by challenging the authenticity of the goods burglars seek to fulfil or remedy through criminal behaviour.


2016 ◽  
Vol 55 (3) ◽  
pp. 245
Author(s):  
Sarah Clark

Dr. Steve Albrecht is a renowned security consultant with experience working with and consulting for libraries that are implementing or improving security plans and procedures. He is also a retired San Diego Police reserve sergeant. Library Security: Better Communication, Safer Facilities is a practical book dealing with security and customer service in an era in which workplace violence, mental illness, child neglect, and homelessness are realities for all libraries, regardless of their size or location. Filled with engaging anecdotes and forthright advice, this volume is both readable and useful. Although Albrecht emphasizes issues that are especially common in public libraries, this book provides information beneficial to those working in any kind of library, archive, or information setting that is open to the public.


Author(s):  
Josh More ◽  
Anthony J. Stieber ◽  
Chris Liu
Keyword(s):  

Author(s):  
James F. Broder ◽  
Eugene Tucker
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document