{"id":12710,"date":"2013-09-17T10:37:07","date_gmt":"2013-09-17T08:37:07","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=12710"},"modified":"2021-02-18T10:52:01","modified_gmt":"2021-02-18T09:52:01","slug":"recognize-need","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/bedarf-erkennen\/","title":{"rendered":"Recognize demand!"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12713\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg\" alt=\"Recognize demand!\" width=\"876\" height=\"714\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg 876w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen-768x626.jpg 768w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen-215x175.jpg 215w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen-429x350.jpg 429w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen-300x245.jpg 300w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>D<\/strong><\/em>he risks associated with the increasing use of IT resources in any business are very often underestimated. This is due in no small part to the power of IT, which largely operates in the background without users noticing.<\/p>\n<p><strong>Uninterrupted IT operations?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>One of the most important tasks is to ensure that systems and applications can be operated without interruption and that the data contained therein can be accessed without data loss.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Everything under control without interruption<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>available in compliance with the law. It is precisely in these important points that there is often a lack of clarity as to what concrete backup and storage requirements the organization places on IT resources. Rough process requirements for IT may still be familiar to employees in small, manageable companies. In medium-sized and large organizations, the situation is often quite different due to the division of labor: users assume utopian availability requirements. A failure of the computer workstation or a single important application has never occurred. The reason is seen in the fact that IT has completely ruled out such scenarios through system design and product selection.<\/p>\n<p><strong>Know the risks<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>If IT wants to minimize failure risks in a targeted manner and align itself with the needs of the company, then the requirements for the processes and the applications and IT resources used in them must be known. Especially in large companies or administrations, where the range of different applications and data is very large, it is important to know the requirements regarding the security dimensions. Key figures on availability, data existence, integrity and confidentiality should be recorded systematically and reproducibly by the IT department. This enables them to adapt the systems, processes and emergency scenarios of IT to the requirements.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Targeted identification of default risks<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>of the organization accordingly. Risks are thus minimized in a targeted manner and legal requirements can be better implemented. Finally, the goal is to know the requirements for backup and archiving for the organization, to quantify the consequences of failures and their temporal effects, and consequently to offer IT services adapted to the protection needs.<\/p>\n<p><strong>Define procedure<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The need for protection can be procured in various ways and with varying quality. The established and tried and tested risk dialogue in the form of interviews is the best way to obtain the key parameters. Individual risks can be specifically filtered out on the basis of the questions and reactions of the persons interviewed. The relevant variables for IT are systematically determined with the questions.<\/p>\n<p>&nbsp;<\/p>\n<p>There are many stumbling blocks in the procedure during this risk dialogue. If, for example, the respondents are only asked about the key indicators of security and storage without more detailed background knowledge, the results obtained cannot be easily understood. No business-critical factors can be identified that justify the implementation of the surveyed requirement. The risk dialogue must therefore not be aimed directly at the performance indicators, but must be carried out with questions based on the \"what if?\" principle. Questions about the consequences of failures or errors aimed at impairing task performance, public reputation or legal consequences must be addressed. To this end, it is advantageous if comprehensible damage scenarios are used specifically as examples<\/p>\n<p><strong>Consider environment<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>In smaller and medium-sized companies, requirements can be met directly with the risk dialogue described. In the case of fewer than seven departments, it is advisable to hold personal discussions with the responsible persons and the employees involved. If hundreds of analyses are to be carried out in large, heterogeneous organisations, this can no longer be done with personal risk dialogues.<\/p>\n<p>&nbsp;<\/p>\n<p>For this purpose, for example, an electronic survey is more suitable. Any number of addressees can be defined. It takes significantly less time than face-to-face risk dialogues. Such a business impact analysis covers the entire inventory of applications. Of course, there are also disadvantages<\/p>\n<p>&nbsp;<\/p>\n<p>le connected with a questionnaire. Due to the lack of personal contact, there is a lack of intuition to check certain statements for their relevance. In the follow-up to the analysis, this can be<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>PersonalRiskDialogue<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The problem can be countered by seeking dialogue in isolated cases where extreme manifestations appear or where there is a suspicion of inconsistencies.<\/p>\n<p><strong>Enter requirements<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>The backup and retention requirements were recorded using a multiple-choice questionnaire adapted to the backup guidelines, consisting of 25 questions divided into three chapters: data backup, data retention and information security.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>1. data backup<\/strong> - \u2013<\/em> the most important values for the backup are requested. The maximum acceptable interruption time or the maximum tolerable data loss are values that flow directly into the backup policy. This procedure is based on ISO 22301, the leading business continuity standard. Because these statements are often answered in a distorted way by the respondents from their subjective point of view, it is necessary to also include the consequences of system failures or data loss. The consequences are recorded in the form of the temporal progression of the severity. With the help of this progression, the absolute data can be verified. This also provides IT with the most important parameter for data protection: the average recovery time of a system. This is determined from the results of the survey.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>2. data retention<\/strong><\/em> - In contrast to the backup, this aims at designing the retention period and thus the retention time of the backups. Important compliance requirements such as the legal minimum retention period are queried and, as already in the chapter on data backup, time-related effects are elicited in the event of non-compliance. Data retention requires a great deal of sensitivity due to the exploding amount of data and the varying but sometimes long retention periods. Anyone who thinks they can derive a 1:1 retention guideline from the survey will be disappointed. Not even IT experts can give a conclusive answer to the question of how long backups need to be retained - in relation to their own data. In addition to the theoretical requirements, economic aspects and the strategic orientation of IT always play a role in the topic of retention.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>3. data security -<\/strong><\/em> In the last part of the questionnaire, aspects of data security are addressed and, for example, the consequences of unintentional information leakage are included. In addition to protection requirements for backups and archives, answers in this topic area also provide information on how IT should handle information from the applications.<\/p>\n<p>&nbsp;<\/p>\n<p>Finally, the questionnaire provides information on the requirements for backup and storage from the perspective of the service recipient and the consequences of failure, loss and compliance violations. The results are used to quantify the priorities for security and storage. In this specific case, the results were used to create a backup and retention guideline and a backup concept based on the requirements of over 100 applications.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>The requirements elicitation approach described above is particularly attractive for medium-sized and large IT organizations. With manageable effort for IT, the needs of the service recipients for the applications are assessed. The method provides those responsible for security with an overview of what is expected of crisis management (BCM) and efficient security. The person responsible for security has<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Efficient securing as a goal<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The CIO, in turn, can use this information to perform a repeatable impact analysis based on the ISO 27001 and ISO 22301 standards. The CIO, in turn, has a comprehensible and repeatable impact analysis based on the ISO 27001 and ISO 22301 standards. Armed with this knowledge, IT knows what is effectively required of it in terms of security and storage. Nothing more stands in the way of implementation.<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; &nbsp; Die Risiken, die mit dem steigenden Einsatz von IT-Mitteln in jedem Betrieb einhergehen, werden sehr gerne untersch\u00e4tzt. Dies ist nicht zuletzt der Leistung der IT zu verdanken, die gr\u00f6sstenteils im Hintergrund wirkt, ohne dass Anwender es wahrnehmen. Unterbrechungsfreier IT-Betrieb? &nbsp; Eine der wichtigsten Aufgaben besteht n\u00e4mlich im Bestreben, Systeme und Applikationen ohne [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":12713,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[4804],"class_list":["post-12710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-9-2013"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bedarf erkennen! - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Die Informatik als Unternehmenseinheit stellt unternehmenskritische Infrastrukturen zur Verf\u00fcgung. IT-gest\u00fctzte Prozesse werden heute rigoros eingesetzt, ohne dass die Unternehmensf\u00fchrung oder die Anwender sich ernsthafte Gedanken \u00fcber die verheerenden Folgen von Ausf\u00e4llen der IT machen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/recognize-need\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bedarf erkennen! - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Die Informatik als Unternehmenseinheit stellt unternehmenskritische Infrastrukturen zur Verf\u00fcgung. IT-gest\u00fctzte Prozesse werden heute rigoros eingesetzt, ohne dass die Unternehmensf\u00fchrung oder die Anwender sich ernsthafte Gedanken \u00fcber die verheerenden Folgen von Ausf\u00e4llen der IT machen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/recognize-need\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-17T08:37:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-18T09:52:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"876\" \/>\n\t<meta property=\"og:image:height\" content=\"714\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"upwork_1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"upwork_1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/\"},\"author\":{\"name\":\"upwork_1\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7\"},\"headline\":\"Bedarf erkennen!\",\"datePublished\":\"2013-09-17T08:37:07+00:00\",\"dateModified\":\"2021-02-18T09:52:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/\"},\"wordCount\":1157,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg\",\"keywords\":[\"9\/2013\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/\",\"url\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/\",\"name\":\"Bedarf erkennen! - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg\",\"datePublished\":\"2013-09-17T08:37:07+00:00\",\"dateModified\":\"2021-02-18T09:52:01+00:00\",\"description\":\"Die Informatik als Unternehmenseinheit stellt unternehmenskritische Infrastrukturen zur Verf\u00fcgung. IT-gest\u00fctzte Prozesse werden heute rigoros eingesetzt, ohne dass die Unternehmensf\u00fchrung oder die Anwender sich ernsthafte Gedanken \u00fcber die verheerenden Folgen von Ausf\u00e4llen der IT machen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/bedarf-erkennen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg\",\"width\":876,\"height\":714,\"caption\":\"Bedarf erkennen!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/bedarf-erkennen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bedarf erkennen!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7\",\"name\":\"upwork_1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g\",\"caption\":\"upwork_1\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/upwork_1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recognize demand! - MQ Management and Quality","description":"IT as a business unit provides mission-critical infrastructures. IT-supported processes are rigorously deployed today without management or users giving serious thought to the devastating consequences of IT failures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/recognize-need\/","og_locale":"en_US","og_type":"article","og_title":"Bedarf erkennen! - MQ Management und Qualit\u00e4t","og_description":"Die Informatik als Unternehmenseinheit stellt unternehmenskritische Infrastrukturen zur Verf\u00fcgung. IT-gest\u00fctzte Prozesse werden heute rigoros eingesetzt, ohne dass die Unternehmensf\u00fchrung oder die Anwender sich ernsthafte Gedanken \u00fcber die verheerenden Folgen von Ausf\u00e4llen der IT machen.","og_url":"https:\/\/www.m-q.ch\/en\/recognize-need\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2013-09-17T08:37:07+00:00","article_modified_time":"2021-02-18T09:52:01+00:00","og_image":[{"width":876,"height":714,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg","type":"image\/jpeg"}],"author":"upwork_1","twitter_card":"summary_large_image","twitter_misc":{"Written by":"upwork_1","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/"},"author":{"name":"upwork_1","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7"},"headline":"Bedarf erkennen!","datePublished":"2013-09-17T08:37:07+00:00","dateModified":"2021-02-18T09:52:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/"},"wordCount":1157,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg","keywords":["9\/2013"],"articleSection":["Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/","url":"https:\/\/www.m-q.ch\/bedarf-erkennen\/","name":"Recognize demand! - MQ Management and Quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg","datePublished":"2013-09-17T08:37:07+00:00","dateModified":"2021-02-18T09:52:01+00:00","description":"IT as a business unit provides mission-critical infrastructures. IT-supported processes are rigorously deployed today without management or users giving serious thought to the devastating consequences of IT failures.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/bedarf-erkennen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Bedarf-erkennen.jpg","width":876,"height":714,"caption":"Bedarf erkennen!"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/bedarf-erkennen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Bedarf erkennen!"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7","name":"upwork_1","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g","caption":"upwork_1"},"url":"https:\/\/www.m-q.ch\/en\/author\/upwork_1\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/12710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=12710"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/12710\/revisions"}],"predecessor-version":[{"id":12719,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/12710\/revisions\/12719"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/12713"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=12710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=12710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=12710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}