top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The anti-corruption handbook [[electronic resource] ] : how to protect your business in the global marketplace / / William P. Olsen
The anti-corruption handbook [[electronic resource] ] : how to protect your business in the global marketplace / / William P. Olsen
Autore Olsen William P
Pubbl/distr/stampa Hoboken, N.J., : John Wiley & Sons, c2010
Descrizione fisica 1 online resource (193 p.)
Disciplina 658.4/7
Soggetto topico Business ethics - United States
Corporations - Corrupt practices - United States - Prevention
Business enterprises - Corrupt practices - United States - Prevention
Fraud - United States - Prevention
Compliance auditing
ISBN 0-470-61311-4
1-119-19845-3
1-282-54771-2
9786612547713
0-470-61309-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Anti-Corruption Handbook: How to Protect Your Business in the Global Marketplace; Contents; Preface; About the Contributors; CHAPTER 1: Managing Corruption Risk; CHAPTER 2: What Is Anti-Corruption?; CHAPTER 3: U.S. Efforts to Combat Global Corruption; CHAPTER 4: U.S. Laws Governing Corruption; CHAPTER 5: The Evolution of the Foreign Corrupt Practices Act; CHAPTER 5: Internal Controls and Accounting Provisions of the FCPA; CHAPTER 7: Do Not Crimp: The Need for Oversight of Foreign Operations; CHAPTER 8: The Human Factor
CHAPTER 9: Corporate Governance: The Key to Unmasking Corrupt ActivityCHAPTER 10: Whistle-Blower Programs; CHAPTER 11: Document Retention; CHAPTER 12: Information Security: Intellectual Property Theft Is Often the Result of Government Corruption; CHAPTER 13: Anti-Money Laundering: The USA PATRIOT Act; CHAPTER 14: Procurement Fraud: Detecting and Preventing Procurement and Related Fraud; CHAPTER 15: Construction Fraud: Monitoring, Mitigating, and Investigating Construction Fraud; CHAPTER 16: Special Investigations: How to Investigate Allegations of Corruption
CHAPTER 17: Navigating the Perils of the Global MarketplaceCHAPTER 18: Case for Collective Action: The World Bank Initiative; CHAPTER 19: Leveling the Playing Field; Book Research Summary; Index
Record Nr. UNINA-9910140618303321
Olsen William P  
Hoboken, N.J., : John Wiley & Sons, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The anti-corruption handbook [[electronic resource] ] : how to protect your business in the global marketplace / / William P. Olsen
The anti-corruption handbook [[electronic resource] ] : how to protect your business in the global marketplace / / William P. Olsen
Autore Olsen William P
Pubbl/distr/stampa Hoboken, N.J., : John Wiley & Sons, c2010
Descrizione fisica 1 online resource (193 p.)
Disciplina 658.4/7
Soggetto topico Business ethics - United States
Corporations - Corrupt practices - United States - Prevention
Business enterprises - Corrupt practices - United States - Prevention
Fraud - United States - Prevention
Compliance auditing
ISBN 0-470-61311-4
1-119-19845-3
1-282-54771-2
9786612547713
0-470-61309-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Anti-Corruption Handbook: How to Protect Your Business in the Global Marketplace; Contents; Preface; About the Contributors; CHAPTER 1: Managing Corruption Risk; CHAPTER 2: What Is Anti-Corruption?; CHAPTER 3: U.S. Efforts to Combat Global Corruption; CHAPTER 4: U.S. Laws Governing Corruption; CHAPTER 5: The Evolution of the Foreign Corrupt Practices Act; CHAPTER 5: Internal Controls and Accounting Provisions of the FCPA; CHAPTER 7: Do Not Crimp: The Need for Oversight of Foreign Operations; CHAPTER 8: The Human Factor
CHAPTER 9: Corporate Governance: The Key to Unmasking Corrupt ActivityCHAPTER 10: Whistle-Blower Programs; CHAPTER 11: Document Retention; CHAPTER 12: Information Security: Intellectual Property Theft Is Often the Result of Government Corruption; CHAPTER 13: Anti-Money Laundering: The USA PATRIOT Act; CHAPTER 14: Procurement Fraud: Detecting and Preventing Procurement and Related Fraud; CHAPTER 15: Construction Fraud: Monitoring, Mitigating, and Investigating Construction Fraud; CHAPTER 16: Special Investigations: How to Investigate Allegations of Corruption
CHAPTER 17: Navigating the Perils of the Global MarketplaceCHAPTER 18: Case for Collective Action: The World Bank Initiative; CHAPTER 19: Leveling the Playing Field; Book Research Summary; Index
Record Nr. UNINA-9910815776503321
Olsen William P  
Hoboken, N.J., : John Wiley & Sons, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
Autore Watson Scott A
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Descrizione fisica 1 online resource (199 p.)
Disciplina 658.4/7
658.47
Soggetto topico Conflict management
Risk management
Crisis management
Soggetto genere / forma Electronic books.
ISBN 1-281-02250-0
9786611022501
0-08-052201-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary
The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement
Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary
The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index
Record Nr. UNINA-9910457075003321
Watson Scott A  
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
Autore Watson Scott A
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Descrizione fisica 1 online resource (199 p.)
Disciplina 658.4/7
658.47
Soggetto topico Conflict management
Risk management
Crisis management
ISBN 1-281-02250-0
9786611022501
0-08-052201-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary
The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement
Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary
The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index
Record Nr. UNINA-9910784354503321
Watson Scott A  
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of war for security managers : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
The art of war for security managers : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
Autore Watson Scott A
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Descrizione fisica 1 online resource (199 p.)
Disciplina 658.4/7
658.47
Soggetto topico Conflict management
Risk management
Crisis management
ISBN 1-281-02250-0
9786611022501
0-08-052201-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary
The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement
Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary
The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index
Record Nr. UNINA-9910813080903321
Watson Scott A  
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Pubbl/distr/stampa Bradford, England, : Emerald Group Publishing, c2002
Descrizione fisica 1 online resource (88 p.)
Disciplina 658.4/7
Altri autori (Persone) AbbottJulie
StoneMerlin
Collana Qualitative marketing research: an international journal
Soggetto topico Electronic commerce - Marketing
Marketing research
Soggetto genere / forma Electronic books.
ISBN 1-280-47967-1
9786610479672
1-84544-719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Abstracts & keywords; Guest editorial; UK data warehousing and business intelligence implementation; Customer relationship management systems; Marketing principles in the application of e-commerce; There's no business like e-business; Reflections on customer knowledge management in e-business; From bricks to clicks; Perceived risks as barriers to Internet and e-commerce usage; Assessments of the ''new economy'' scenario; Awards for Excellence; Conference announcement; Author and title index to volume 5, 2002; Note from the publisher
Record Nr. UNINA-9910449790603321
Bradford, England, : Emerald Group Publishing, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Pubbl/distr/stampa Bradford, England, : Emerald Group Publishing, c2002
Descrizione fisica 1 online resource (88 p.)
Disciplina 658.4/7
Altri autori (Persone) AbbottJulie
StoneMerlin
Collana Qualitative marketing research: an international journal
Soggetto topico Electronic commerce - Marketing
Marketing research
ISBN 1-280-47967-1
9786610479672
1-84544-719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Abstracts & keywords; Guest editorial; UK data warehousing and business intelligence implementation; Customer relationship management systems; Marketing principles in the application of e-commerce; There's no business like e-business; Reflections on customer knowledge management in e-business; From bricks to clicks; Perceived risks as barriers to Internet and e-commerce usage; Assessments of the ''new economy'' scenario; Awards for Excellence; Conference announcement; Author and title index to volume 5, 2002; Note from the publisher
Record Nr. UNINA-9910777071603321
Bradford, England, : Emerald Group Publishing, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Edizione [1st ed.]
Pubbl/distr/stampa Bradford, England, : Emerald Group Publishing, c2002
Descrizione fisica 1 online resource (88 p.)
Disciplina 658.4/7
Altri autori (Persone) AbbottJulie
StoneMerlin
Collana Qualitative marketing research: an international journal
Soggetto topico Electronic commerce - Marketing
Marketing research
ISBN 1-280-47967-1
9786610479672
1-84544-719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Abstracts & keywords; Guest editorial; UK data warehousing and business intelligence implementation; Customer relationship management systems; Marketing principles in the application of e-commerce; There's no business like e-business; Reflections on customer knowledge management in e-business; From bricks to clicks; Perceived risks as barriers to Internet and e-commerce usage; Assessments of the ''new economy'' scenario; Awards for Excellence; Conference announcement; Author and title index to volume 5, 2002; Note from the publisher
Record Nr. UNINA-9910825497403321
Bradford, England, : Emerald Group Publishing, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business Intelligence and e-Marketing Workshop, IBM Warwick, 2001 [[electronic resource] /] / guest editors, Julie Abbott and Merlin Stone
Business Intelligence and e-Marketing Workshop, IBM Warwick, 2001 [[electronic resource] /] / guest editors, Julie Abbott and Merlin Stone
Edizione [1st ed.]
Pubbl/distr/stampa Bradford, England, : Emerald Group Publishing, c2003
Descrizione fisica 1 online resource (65 p.)
Disciplina 658.4/7
Altri autori (Persone) AbbottJulie
StoneMerlin
Collana Qualitative market research: an international journal
Soggetto topico Business intelligence
Electronic commerce - Marketing
ISBN 1-280-51188-5
9786610511884
1-84544-567-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents -- Abstracts & -- keywords -- Guest editorial -- Building an e-business scenario for small business -- Innovative use of the Internet in established small firms -- Integrating the Web and e-mail into a push-pull strategy -- Channel conflict and high involvement Internet purchases -- ''Following the yellow brick road'' -- An investigation of online consumer purchasing.
Record Nr. UNINA-9910826106903321
Bradford, England, : Emerald Group Publishing, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
Autore Baker Paul R. <1958->
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton : , : CRC Press, , 2013
Descrizione fisica 1 online resource (349 p.)
Disciplina 658.4/7
658.47
Altri autori (Persone) BennyDaniel J
Soggetto topico Business enterprises - Security measures
Security systems
Computer security
Private security services
Soggetto genere / forma Electronic books.
ISBN 0-429-13389-8
1-4665-8868-3
1-4200-9964-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover
Record Nr. UNINA-9910462621703321
Baker Paul R. <1958->  
Boca Raton : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui