Strengths assessment and Malware: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Layout.)
 
(Add link.)
 
Line 1: Line 1:
A framework for identifying personal attributes and core capabilities, which may be applicable in a number of settings such as career planning or employee performance.
Malware is an abbreviation for 'malicious software'.




1. ''The Association of Corporate Treasurers (ACT)''.
These are software programs designed to damage a computer system or cause other unwanted or unauthorised actions.


The ACT's career assessment framework includes assessments on
Examples include viruses, worms, trojan horses, spyware and ransomware.
*Temperament
*Personality insight
*Workplace culture
*Motivation at work
*Personal resilience
*Emotional control
*Management skills
*Giving feedback
*Stress management
*Customer focus
*Sound decision-making
*Assertiveness
*Learning styles
*Strengths
 
 
2.
 
Other strengths assessment tools include CliftonStrengths.




==See also==
==See also==
* [[16PF]]
*[[Cyber security]]
* [[ACT Competency Framework]]
*[[Cyberthreat]]
* [[Behavioural skills]]
*[[Man-in-the-middle attack]]
* [[Belbin team roles]]
*[[Ransomware]]
* [[CliftonStrengths]]
*[[Trojan horse]]
* [[DiSC]]
* [[Emotional intelligence]]
* [[Lumina Spark]]
* [[Myers-Briggs]]
* [[Psychometric profiling]]
* [[Working effectively with others]]


[[Category:Commercial_drive_and_organisation]]
[[Category:Identify_and_assess_risks]]
[[Category:Influencing]]
[[Category:Self_management_and_accountability]]
[[Category:Working_effectively_with_others]]
[[Category:Knowledge_and_information_management]]
[[Category:Planning_and_projects]]
[[Category:Treasury_operations_infrastructure]]

Latest revision as of 00:42, 3 February 2024

Malware is an abbreviation for 'malicious software'.


These are software programs designed to damage a computer system or cause other unwanted or unauthorised actions.

Examples include viruses, worms, trojan horses, spyware and ransomware.


See also