Monday, December 30, 2013

Happy New Year


Happy New Year to all!

 

Here is an ancient Greek quotation for your consideration and enjoyment:

‘Do not spoil what you have by desiring what you have not; remember that what you now have was once among the things you only hoped for.’

   Epicurus (Greek philosopher, 341- 270 B.C.)

 

More sayings, quotations and maxims of ancient Greece and how these may apply and improve your personal, family and business life are included in my recent book

‘Ancient Greek Pearls of Wisdom for the 21ST Century’ (Amazon.com).

 

Best and warmest regards,

 

John Kyriazoglou

 

Wednesday, December 11, 2013

Ancient Greek Wisdom for the 21st Century


New Book: ‘Ancient Greek Pearls of Wisdom for the 21st Century’

 

Hi,

 

I am glad to inform you that this book was just published and is available at: https://www.createspace.com/4324169   and


 

Authored by John Kyriazoglou

This book 'Ancient Greek Pearls of Wisdom for the 21st Century' is about guiding and supporting you to improve your personal, professional and business life in our current 21st century society.

This is achieved by:
1. Presenting a set of Ancient Greek Pearls of Wisdom in each area of life (wealth, governance, friendship, etc.) and proposing a solution in responding to basic questions in each such area (e.g. 'Why should I believe in the Supreme Being? and What do I need religion for in my business activities?)
2. Summarizing the impact of several noted ancient Greek thinkers to the world and the relevance of their contributions today.
3. Offering you, an Improvement Approach (The Pandora Way) based on Ancient Greek Wisdom (for each area: governance, wealth, association with others, self-management, education and family, etc.) including: over 60 'tips', more than 40 'golden rules' and numerous (over 20) 'recommendations' that you may consider and use to manage yourself, your family and your business more effectively and potentially make your life better.
The ancient Greek wisdom pearls relate to:
(a) The maxims, quotations and sayings (over 600) of the Oracle of Delphi, the Seven Sages and other well-known ancient Greek thinkers: Aristotle, Plato, Socrates, Pythagoras, Heraclitus, Epicurus, etc.
(b) Four hymns, the Hippocratic Oath, 9 fables of Aesop, several short stories (over 17) and the works and thoughts of noted ancient Greek philosophers, poets and intellectuals, such as: Aristotle, Plato, Socrates, Heraclitus, Epicurus, Pythagoras, etc.

(c) The real-life examples and stories of the every-day life and activities of ancient Greeks.


The book contains: A foreword, a preface, ten chapters (one for each area of living, such as: governance, wealth, etc.), three appendices, and a bibliography.


I would appreciate your comments if you have the time to review it.

 

Please like my ‘Ancient Greek Wisdom’ page on Facebook.

You may follow me on Twitter and Slideshare and connect with me on Facebook and LinkedIn.

 

 

 

Thank you for your support and my best wishes for the Holiday Season and the New Year 2014.

 

John Kyriazoglou

 

 

Saturday, October 19, 2013

Business Data Security Guidelines


Business Data Security Guidelines

 

John Kyriazoglou*

 

A business data security policy and related procedures should include protection controls and measures that cover the following issues:

1. Comprehensive due diligence of all critical staff, including external parties (outsourcing, external suppliers, sub-contractors, etc.). 

2. Authentication of all customers.

3. Non repudiation and accountability for all on-line transactions.

4. Segregation of duties.

5. Authorization controls.

6. Business data, transactions, records and information integrity.

7. Transactions audit trails.

8. Information confidentiality.

9. Appropriate disclosures for organizational services.

10. Data privacy.

11. Business continuity and contingency planning.

12. Security and other crises incident response planning.

13. Access controls: encryption, passwords, password control devices, tokens, user authentication devices, anti-hacking tools/techniques, digital signals origin identification, anti-tapping tools/techniques.

14. Data confidentiality.                              

15. Data integrity.

16. Anti-virus and e-crime detection software.

17. Time stamping.

18. Biometrics.

19. Digital signatures.

20. Smart cards.                            

 

 

John Kyriazoglou (jkyriazoglou@hotmail.com)

John Kyriazoglou, CICA, B.A (Hon-University of Toronto)

International IT and Management Consultant, author of several books



SSRN Free Publications: http://ssrn.com/author=1315434

 

 

The Beauty of Number 147


The Beauty of Number 147

By John  Kyriazoglou*

The maxims of the Oracle at Delphi (Maxims of Delphi), the most famous religious location of Greece for over 1000 years were made up of very brief quotations (two to five words) full of wisdom and moral values. The subject matter they deal with varies from religious faith, to obedience to law, how to treat friends, how to behave in a just manner, education, country, way of life, happiness, etc.

 

These maxims, 147 in total, were inscribed in the frontal columns at the temple of the god Apollo, at the Oracle of Delphi. They were copied on single marble tablets and were transported to all parts of the Ancient Greek World, as the writing on paper or on parchment was not known at the time.

It should be noted that these 147 maxims of Delphi embodied the complete universe of values for the ancient Greeks. The number 147 equals 3 times 7 times 7 (or 3x7x7). The meanings of numbers in the ancient Greek world were quite important.

Number 3 represents divine perfection, and in Pythagorean terms completion. 

Number 4 represents the whole creation, as there are 4 seasons in a year, 4 winds, 4 directions, 4 elements (fire, water, air and , earth), etc.

Number 7 is the combination of 3 and 4, and represents the universe. Also Apollo’s lyre (musical instrument) had 7 strings, there were 7 sages, etc. In Pythagorean terms 7 is a cosmic number with 3 of heaven and 4 of the world. Number 147, being 3x7x7, represented all divine values for all universes (a universe of a universe).

Most, if not all, of these maxims (e.g., ‘Follow God’, ‘Obey the law’, ‘Worship God’, ‘Respect your parents’, etc.) have been attributed to the seven sages of Ancient Greece: Thales, Pittacos, Bias, Solon, Cleovoulos, Periandros, and Chilon, who are also credited of having their own quotations, as well. For a full list of these maxims, quotations and sayings see my book ‘Pearls of Wisdom of the 7 Sages of Ancient Greece’ at Amazon.

Ethical maxims and quotations play a significant role in shaping our every-day life and social interactions with others, as they embody simple rules to memorize and follow and thus make our life easier as they provide a level of assurance that we are doing the right and accepted thing.

These Oracle of Delphi maxims and the quotations and sayings of the Seven Sages cover all areas of living, such as:

1. Religiosity (faith, worship, religious behavior, God, praying, etc.),

2. Governance (protect home country, society, laws, ruling),

3. Managing Property (wealth, protection of self and property, profit, finance, etc.), 

4. Principles, Virtues and Values for Association with Others (friendship and love, peace and hate, anger, justice, honor, goodness, murder and vice, wisdom, mercy and forgiveness, and happiness),

5. Personal Skills (self-control, efficiency, effectiveness, hope, fortune, etc.), 

6. Knowledge, Education and Training, and

7. Family, Values and Conduct in Life (marriage, family, wife, children and parents, conduct and virtues during life, and death).

 

How all of these can support and help you improve your life is described in detail in my book ‘Pre-Classical Greek Wisdom for a Better Life’, available at:


*John Kyriazoglou, CICA, B.A (Hon-University of Toronto, Canada)

Greek-Canadian Author, Business Thinker, and Management Consultant




 

 

Monday, August 26, 2013

Free E-BOOK: How To Improve Your Production


HOW TO IMPROVE YOUR PRODUCTION: Summary

By John Kyriazoglou

 

This book (in 2 parts) contains a wealth of general information on production systems, methods, policies, procedures, controls and management tools and offers several practical recommendations you may consider and use to improve your production operation.

 

Part 1 of this book, in summary, describes the main types of production controls, such as:

1. Production Policies and Procedures,

2. Production Management Duties and Responsibilities,

3. Manufacturing Process Controls,

4. Quality Management Controls, 

5. Standardization Procedures,

6. Production Performance Management Controls, and

7. Production Performance Measures for several areas (innovation, inventory control, manufacturing, production cost, etc.).




 
Title of Book: ‘How to Improve Your Production: Part I’
http://bookboon.com/en/how-to-improve-your-production-part-i-ebook




Part 2 of this book, presents additional items that facilitate, complement and support Part 1, such as:

1. Detail examples of various policies and procedures on purchasing, quality, health and safety, etc.

2. The steps of a methodology for establishing the production function and production policies and procedures.

3. Several audit programs and checklists.



 
Title of Book: ‘How to Improve Your Production: Part II’
http://bookboon.com/en/how-to-improve-your-production-part-ii-ebook
 



Sunday, May 19, 2013

New Book: Auditing and Improving Business Performance


New Book: Auditing and Improving Business Performance

 

Please check out my new book, at:


This book provides you, the business owner, board member, company director, senior manager, auditor, other stakeholder, etc., with a useful set of practical tools to assist and support you in reviewing and improving the performance of your small, medium-size or large company.

It contains:

1. A general business model of five dimensions: ‘C1’ for customers, ‘P1’ for people, ‘P2’ for property, ‘P3’ for production and ‘P4’ for performance.

2. Description of several performance-related aspects, such as: Measurement Culture, Vision, Mission and Strategy, Policies and Procedures, Management Support and Commitment, Performance Measurement and Management System, etc.

3. Eight business performance audit questionnaires with 100 questions for items described in 2 above.

4. Over forty performance measures for the functions of: Finance, Sales, Production Output, Management and IT.

5. An evaluation approach with a scoring scheme on the basis of the audit replies collected in 3 above.

6. Five business performance improvement recommendations.

7. Guidelines and control processes to consider in implementing the suggested improvement recommendations.

 

MORE DETAILS, at:


 

Thank you,

John Kyriazoglou, CICA, B.A (Hon-University of Toronto),

Business Thinker, Consultant and Author of several books

Editor-in-Chief for the Internal Controls Magazine (U.S.A.)

E-Mail: jkyriazoglou@hotmail.com                                                          

Profile: http://www.linkedin.com/pub/john-kyriazoglou/0/9b/919

Saturday, February 16, 2013

Cyber Threat Security Mechanisms



By John Kyriazoglou

The following methods and techniques may be utilized for the analysis, design, implementation, assessment and evaluation of the cyber threat strategy and measures required to protect any type of organization.

1. Corporate Physical security: Guards, dogs, locks, cameras, video surveillance, etc.

2. Corporate administrative procedures: corporate governance policies and procedures like ethics program, risk management approach and procedure, personnel review and due diligence, segregation of duties, business data management files and data procedures, etc.

3. IT policies and procedures: passwords, access controls, hardware security, data validation rules within application software, back up procedures, offsite data retention capabilities, etc.

4. Corporate recovery mechanisms: business continuity policy, IT recovery process, backup procedures, offsite storage and testing procedures, etc.

5. Security trapping mechanisms: honey net and other trapping facilities, special security trapping and diversion tools and techniques, etc.

6. Business intelligence function.

7. Corporate anti-espionage techniques.

 More details may be found in my books:
(1) Printed Book: Business Management Controls: A Guide, www.itgovernance.co.uk.
(2) Printed Book: Business Management Controls: Toolkit, www.itgovernance.co.uk.               
(3) Printed Book: ‘Corporate Strategic and Operational Controls’
Direct Link: http://www.theiic.org/publicationsbookstore/bookstore2.html
(4) Printed Book: 'IT Strategic & Operational Controls’
Direct Link: www.itgovernance.co.uk/products/3066
(5) E-Book: ‘Implementing Management Controls for Small and Medium-Size Companies’
Direct Link: http://www.amazon.com/dp/B007Z1WTOM
(6) E-Book: ‘Auditing and Improving Business Performance’
Direct Link: http://www.amazon.com/dp/B0088I8IVY
(7) Free E-Book: IT-Business Alignment (2 Parts)
http://bookboon.com/en/business-ebooks/it/it-business-alignment-part-i
http://bookboon.com/en/business-ebooks/it/it-business-alignment-part-ii

 

Saturday, February 9, 2013

Thursday, January 17, 2013

Strategy Assessment Methods: GAP Analysis



 By John Kyriazoglou

 The following methods and techniques may be utilized for the analysis, assessment and evaluation of strategy of any type of organization. The evaluator may use only one method, or more than one, depending on his (or her) experience and situation.
These methods and techniques are: SWOT analysis, PEST Analysis (also known as PESTLE Analysis), Gap Analysis, Portfolio analysis, Value chain analysis, Delphi Method, Life cycle analysis, Screening strategic options, Financial analysis, Scenario planning, Critical success factor analysis, The five forces, Directional Policy Matrix, and Competitor Analysis.

Previous posts described SWOT and PEST. Other future posts will deal with the rest of these methods and techniques.

 
Gap Analysis

Gap Analysis is a method used extensively in the process of designing the strategy of an organization.  With the use of this method, the gaps between the present situation and the desired state are defined, in terms of processes, procedures, technology, systems, human resources, infrastructure and organizational structure.

The steps to achieve this are:

Step 1. Describe the business goals and objectives to be achieved. Describe where you want your whole business or business function or department to go. This could be a long-term plan for the company, or something more immediate for a particular business function. Consult with all managers involved, directly or indirectly, with the systems and procedures of the company or function.

Step 2. Select the basic performance metrics, quality and quantity criteria, which you will use to monitor your gap analysis work.

Step 3. Describe the existing business processes. This could involve all business processes of the company as a whole or the processes of a specific department or function. This description also includes identifying the IT systems utilized in the processes you document.

Step 4. Define the desired future performance position.

Step 5. Measure your current performance.

Step 6. Recognize the gaps between your existing and the future desired position. This involves identifying the gaps, which are the differences between your goals and the existing processes, and recommend remedies. A chart or summary table may be useful in showing the "to be" and "as is" cases.

Step 7. Design a strategy to achieve the desired position as described above by bridging all the defined gaps, and for all processes, procedures, technology, systems, human resources, infrastructure and organizational structure components identified.

Step 8. Execute the strategy described in step 7 to achieve the desired position by bridging all the defined gaps, and by improving the processes, procedures, technology, systems, human resources, infrastructure and organizational structure.

Step 9. Request feedback on a draft version of the gap analysis document. The review process might identify additional gaps and help build awareness and support for your recommendations.

Step 10. Monitor and report progress achieved.


Monday, January 14, 2013

Free Business Controls Toolkit-Demo


Free Business Management Toolkit-Demo

Please note that a free downloadable Business Management Controls Toolkit demo is now available for immediate download. It contains around 10% of the full toolkit (see description below), giving you sample documentation demonstrating the style and content of the full toolkit.

blog.itgovernance.co.uk


Toolkit: Business Management Controls Toolkit

This Business Management Controls Toolkit provides you with the performance measures and compliance indicators, the checklists and questionnaires, documents, plans, policies … extensive documentation that, tailored to your organization, will prove to be invaluable to your existing practices. This toolkit will demonstrate its unique design to structure and shape the business control practices in your organization. Included in this toolkit are: Checklists and Questionnaires; Documents; Management Plans; Policies; Procedures, etc.

Compliance Controls Framework

Corporate Fraud Management Systems Audit Program Ethics Management Checklist Financial Management Systems Checklist Internal Audit Function Checklist Soft Controls Evaluation Checklist Regards,

John Kyriazoglou, CICA, B.A (Hon-University of Toronto),
Business Thinker, Consultant and Author of several books
Editor-in-Chief for the Internal Controls Magazine (U.S.A.)
Member of the Board of Directors of Voices of Hellenism Literary Society (U.S.A.)
E-Mail: jkyriazoglou@hotmail.com
Profile: http://www.linkedin.com/pub/john-kyriazoglou/0/9b/919
Blog: http://businessmanagementcontrols.blogspot.com/
SSRN Free Publications: http://ssrn.com/author=1315434