Social AccountingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Social Accounting returned the following results.
RSS What is RSS?
Related Categories

 •   Social Networks and Community Management
 •   Data Security
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Treasury / Cash / Risk Management
 •   Application Security
 •   Wireless Technologies and Mobile Computing
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions

Related Searches
 •   Decision Social Accounting
 •   Example Social Accounting
 •   Manager Social
 •   Open Social
 •   Social Accounting Finds
 •   Social Accounting Manual
 •   Social Accounting Printable
 •   Social Accounting Report
 •   Social Accounting Risks
 •   Social Devices
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications by FaceTime Communications

September 21, 2010 - (Free Research)
This whitepaper sets out some of the key rules, guidelines and associated risks for FINRA member firms and suggests ways that organisations can use technology to protect themselves and their RRs. In addition, it looks at some of the other issues that enterprises may encounter when enabling the new internet. 
(WHITE PAPER) READ ABSTRACT |

Web 2.0 at Work: Departmental Use Cases by Oracle Corporation

August 01, 2008 - (Free Research)
With the introduction of Web 2.0 technologies into your enterprise, you can greatly increase the value of your company's most important assets. Leading companies are harnessing Web 2.0 technologies and applying them to build their next-generation workplaces. 
(WHITE PAPER) READ ABSTRACT |

Any Given Sales Day by Jive Software

July 10, 2013 - (Free Research)
In order to stay competitive, your sales representatives need to know their account down to the latest tweet, and have instant access to experts and content, even from the road. Access this brief resource for a comparison of those trying to get by without social and those who are levering social tools. 
(RESOURCE) READ ABSTRACT |

Social Recruiting: How to Effectively Use Social Networks by Oracle Corporation

March 20, 2014 - (Free Research)
This white paper explores the importance of developing a comprehensive social network recruiting strategy to deliver a true ROI from Facebook and LinkedIn. 
(WHITE PAPER) READ ABSTRACT |

McAfee Security Journal by McAfee, Inc.

December 2008 - (Free Research)
This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception. 
(WHITE PAPER) READ ABSTRACT |

The Social Enterprise: Using Social Enterprise Applications to Enable the Next Wave of Knowledge Worker Productivity by Oracle Corporation

October 2008 - (Free Research)
Enterprise social applications are the next generation of collaboration and productivity tools, capturing the interpersonal knowledge of workers and the implicit connections among people, systems, and data. 
(WHITE PAPER) READ ABSTRACT |

The Promises and Pitfalls of Social Media in the Legal Community by iCONECT

June 2011 - (Free Research)
From personal brand building to professional practice, social media offers professionals a host of opportunities and pitfalls to drive success or failure. Access this white paper to learn about the legal considerations surrounding content on social media websites. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

The Consumerisation of IT by ComputerWeekly.com

April 2013 - (Free Research)
This report looks at the nature and level of activity, motivations and drivers, unintended consequences, and the practicalities of managing consumer devices and social media at work. 
(ANALYST REPORT) READ ABSTRACT |

Your Small Business Security Questions Answered: SocialNetworks, SensitiveData, Business Banking by AVG Technologies USA, Inc.

November 2010 - (Free Research)
This white paper answers your most critical small business security questions. Social networks, sensitive data, and business banking are all topics covered in this security guide. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Zynga Grows to #1 Social Gaming Site with RightScale by RightScale

April 2010 - (Free Research)
With the skyrocketing popularity of Zynga games such as FarmVille – which is now the largest single application on Facebook – Zynga’s technology strategy has to be as savvy as its business model. Find out why Zynga now relies on cloud services to manage its precipitous growth, maintain high availability, and keep costs in check. 
(CASE STUDY) READ ABSTRACT |

Inspiring disruption: Tech Trends 2014 by ComputerWeekly.com

February 2014 - (Free Research)
This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly 4 October 2011: Download the latest issue of the UK's leading technology publication, with our analysis of the business technology news that matters to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, transformation. Download the new issue now. 
(EZINE)

Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking by AVG Technologies USA, Inc.

April 2010 - (Free Research)
This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more. 
(WHITE PAPER) READ ABSTRACT |

Are you minding your business's reputation? What can you do to mind it better? by IBM

May 2013 - (Free Research)
Changing social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment. 
(WEBCAST) READ ABSTRACT |

Protecting Your Website With Always On SSL by Symantec Corporation

May 2012 - (Free Research)
This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Predictions for 2013 by ComputerWeekly.com

November 2012 - (Free Research)
Analyst Group, Nucleus Research gives its view of the IT trends and technologies that will shape 2013. 
(ANALYST REPORT) READ ABSTRACT |

Overcoming the Modern Challenges to Corporate Records Management by Iron Mountain

August 2012 - (Free Research)
In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends. 
(PODCAST) READ ABSTRACT |

Top 10 Tips to Keep Your Small Business Safe by Trend Micro, Inc.

November 2010 - (Free Research)
Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address. 
(WHITE PAPER) READ ABSTRACT |

The Enterprise of the Future: Implications for the CIO by IBM

February 2009 - (Free Research)
The purpose of this paper is to highlight the key insights from the IBM Global CEO Study and relate them to the new CIO challenge: driving transformation as "change leaders" and implementing transformation as "change agents". 
(WHITE PAPER) READ ABSTRACT |

Records Management: The Keys to Success by Iron Mountain

April 2012 - (Free Research)
With the heightened compliance regulations, your records management has never been more important. Read this e-book to discover: the importance of physical and digital records convergence, why data retention is a cross-departmental concern, new apps designed specifically for e-discovery, and the compliance risks associated with social media. 
(EBOOK) READ ABSTRACT |

Computer Weekly - 31 January 2012: The importance of IT strategy by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now. 
(EZINE)

eBook - Email Retention: Standards and Practices by SearchCompliance.com

October 2009 - (Free Research)
Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization. 
(EBOOK) READ ABSTRACT |

Technical Guide on Emerging Threats by Websense, Inc.

February 2011 - (Free Research)
It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency. 
(EGUIDE) READ ABSTRACT |

The Business of Sustainability: Information Technology as a Catalyst for Short and Long-Term Profitability by SAP America, Inc.

June 2009 - (Free Research)
Read how SAP software can help your company manage risks and exploit operational and business opportunities regarding social, environmental, and economic sustainability. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts