(Difference between pages)
imported>Doug Williamson |
|
Line 1: |
Line 1: |
| A framework for identifying personal attributes and core capabilities, which may be applicable in a number of settings such as career planning or employee performance.
| | Malware is an abbreviation for 'malicious software'. |
|
| |
|
|
| |
|
| 1. ''The Association of Corporate Treasurers (ACT)''.
| | These are software programs designed to damage a computer system or cause other unwanted or unauthorised actions. |
|
| |
|
| The ACT's career assessment framework includes assessments on
| | Examples include viruses, worms, trojan horses, spyware and ransomware. |
| *Temperament
| |
| *Personality insight
| |
| *Workplace culture
| |
| *Motivation at work
| |
| *Personal resilience
| |
| *Emotional control
| |
| *Management skills
| |
| *Giving feedback
| |
| *Stress management
| |
| *Customer focus
| |
| *Sound decision-making
| |
| *Assertiveness
| |
| *Learning styles
| |
| *Strengths
| |
| | |
| | |
| 2.
| |
| | |
| Other strengths assessment tools include CliftonStrengths.
| |
|
| |
|
|
| |
|
| ==See also== | | ==See also== |
| * [[16PF]] | | *[[Cyber security]] |
| * [[ACT Competency Framework]] | | *[[Cyberthreat]] |
| * [[Behavioural skills]] | | *[[Man-in-the-middle attack]] |
| * [[Belbin team roles]]
| | *[[Ransomware]] |
| * [[CliftonStrengths]]
| | *[[Trojan horse]] |
| * [[DiSC]]
| |
| * [[Emotional intelligence]]
| |
| * [[Lumina Spark]]
| |
| * [[Myers-Briggs]]
| |
| * [[Psychometric profiling]] | |
| * [[Working effectively with others]] | |
|
| |
|
| [[Category:Commercial_drive_and_organisation]] | | [[Category:Identify_and_assess_risks]] |
| [[Category:Influencing]]
| |
| [[Category:Self_management_and_accountability]]
| |
| [[Category:Working_effectively_with_others]]
| |
| [[Category:Knowledge_and_information_management]]
| |
| [[Category:Planning_and_projects]]
| |
| [[Category:Treasury_operations_infrastructure]]
| |
Latest revision as of 00:42, 3 February 2024
Malware is an abbreviation for 'malicious software'.
These are software programs designed to damage a computer system or cause other unwanted or unauthorised actions.
Examples include viruses, worms, trojan horses, spyware and ransomware.
See also