The anti-corruption handbook [[electronic resource] ] : how to protect your business in the global marketplace / / William P. Olsen |
Autore | Olsen William P |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, c2010 |
Descrizione fisica | 1 online resource (193 p.) |
Disciplina | 658.4/7 |
Soggetto topico |
Business ethics - United States
Corporations - Corrupt practices - United States - Prevention Business enterprises - Corrupt practices - United States - Prevention Fraud - United States - Prevention Compliance auditing |
ISBN |
0-470-61311-4
1-119-19845-3 1-282-54771-2 9786612547713 0-470-61309-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Anti-Corruption Handbook: How to Protect Your Business in the Global Marketplace; Contents; Preface; About the Contributors; CHAPTER 1: Managing Corruption Risk; CHAPTER 2: What Is Anti-Corruption?; CHAPTER 3: U.S. Efforts to Combat Global Corruption; CHAPTER 4: U.S. Laws Governing Corruption; CHAPTER 5: The Evolution of the Foreign Corrupt Practices Act; CHAPTER 5: Internal Controls and Accounting Provisions of the FCPA; CHAPTER 7: Do Not Crimp: The Need for Oversight of Foreign Operations; CHAPTER 8: The Human Factor
CHAPTER 9: Corporate Governance: The Key to Unmasking Corrupt ActivityCHAPTER 10: Whistle-Blower Programs; CHAPTER 11: Document Retention; CHAPTER 12: Information Security: Intellectual Property Theft Is Often the Result of Government Corruption; CHAPTER 13: Anti-Money Laundering: The USA PATRIOT Act; CHAPTER 14: Procurement Fraud: Detecting and Preventing Procurement and Related Fraud; CHAPTER 15: Construction Fraud: Monitoring, Mitigating, and Investigating Construction Fraud; CHAPTER 16: Special Investigations: How to Investigate Allegations of Corruption CHAPTER 17: Navigating the Perils of the Global MarketplaceCHAPTER 18: Case for Collective Action: The World Bank Initiative; CHAPTER 19: Leveling the Playing Field; Book Research Summary; Index |
Record Nr. | UNINA-9910140618303321 |
Olsen William P
![]() |
||
Hoboken, N.J., : John Wiley & Sons, c2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The anti-corruption handbook : how to protect your business in the global marketplace / / William P. Olsen |
Autore | Olsen William P |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, c2010 |
Descrizione fisica | 1 online resource (193 p.) |
Disciplina | 658.4/7 |
Soggetto topico |
Business ethics - United States
Corporations - Corrupt practices - United States - Prevention Business enterprises - Corrupt practices - United States - Prevention Fraud - United States - Prevention Compliance auditing |
ISBN |
0-470-61311-4
1-119-19845-3 1-282-54771-2 9786612547713 0-470-61309-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Anti-Corruption Handbook: How to Protect Your Business in the Global Marketplace; Contents; Preface; About the Contributors; CHAPTER 1: Managing Corruption Risk; CHAPTER 2: What Is Anti-Corruption?; CHAPTER 3: U.S. Efforts to Combat Global Corruption; CHAPTER 4: U.S. Laws Governing Corruption; CHAPTER 5: The Evolution of the Foreign Corrupt Practices Act; CHAPTER 5: Internal Controls and Accounting Provisions of the FCPA; CHAPTER 7: Do Not Crimp: The Need for Oversight of Foreign Operations; CHAPTER 8: The Human Factor
CHAPTER 9: Corporate Governance: The Key to Unmasking Corrupt ActivityCHAPTER 10: Whistle-Blower Programs; CHAPTER 11: Document Retention; CHAPTER 12: Information Security: Intellectual Property Theft Is Often the Result of Government Corruption; CHAPTER 13: Anti-Money Laundering: The USA PATRIOT Act; CHAPTER 14: Procurement Fraud: Detecting and Preventing Procurement and Related Fraud; CHAPTER 15: Construction Fraud: Monitoring, Mitigating, and Investigating Construction Fraud; CHAPTER 16: Special Investigations: How to Investigate Allegations of Corruption CHAPTER 17: Navigating the Perils of the Global MarketplaceCHAPTER 18: Case for Collective Action: The World Bank Initiative; CHAPTER 19: Leveling the Playing Field; Book Research Summary; Index |
Record Nr. | UNINA-9910815776503321 |
Olsen William P
![]() |
||
Hoboken, N.J., : John Wiley & Sons, c2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson |
Autore | Watson Scott A |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Syngress/Elsevier, c2007 |
Descrizione fisica | 1 online resource (199 p.) |
Disciplina |
658.4/7
658.47 |
Soggetto topico |
Conflict management
Risk management Crisis management |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-02250-0
9786611022501 0-08-052201-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index |
Record Nr. | UNINA-9910457075003321 |
Watson Scott A
![]() |
||
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson |
Autore | Watson Scott A |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Syngress/Elsevier, c2007 |
Descrizione fisica | 1 online resource (199 p.) |
Disciplina |
658.4/7
658.47 |
Soggetto topico |
Conflict management
Risk management Crisis management |
ISBN |
1-281-02250-0
9786611022501 0-08-052201-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index |
Record Nr. | UNINA-9910784354503321 |
Watson Scott A
![]() |
||
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott |
Pubbl/distr/stampa | Bradford, England, : Emerald Group Publishing, c2002 |
Descrizione fisica | 1 online resource (88 p.) |
Disciplina | 658.4/7 |
Altri autori (Persone) |
AbbottJulie
StoneMerlin |
Collana | Qualitative marketing research: an international journal |
Soggetto topico |
Electronic commerce - Marketing
Marketing research |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-47967-1
9786610479672 1-84544-719-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Contents; Abstracts & keywords; Guest editorial; UK data warehousing and business intelligence implementation; Customer relationship management systems; Marketing principles in the application of e-commerce; There's no business like e-business; Reflections on customer knowledge management in e-business; From bricks to clicks; Perceived risks as barriers to Internet and e-commerce usage; Assessments of the ''new economy'' scenario; Awards for Excellence; Conference announcement; Author and title index to volume 5, 2002; Note from the publisher |
Record Nr. | UNINA-9910449790603321 |
Bradford, England, : Emerald Group Publishing, c2002 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott |
Pubbl/distr/stampa | Bradford, England, : Emerald Group Publishing, c2002 |
Descrizione fisica | 1 online resource (88 p.) |
Disciplina | 658.4/7 |
Altri autori (Persone) |
AbbottJulie
StoneMerlin |
Collana | Qualitative marketing research: an international journal |
Soggetto topico |
Electronic commerce - Marketing
Marketing research |
ISBN |
1-280-47967-1
9786610479672 1-84544-719-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Contents; Abstracts & keywords; Guest editorial; UK data warehousing and business intelligence implementation; Customer relationship management systems; Marketing principles in the application of e-commerce; There's no business like e-business; Reflections on customer knowledge management in e-business; From bricks to clicks; Perceived risks as barriers to Internet and e-commerce usage; Assessments of the ''new economy'' scenario; Awards for Excellence; Conference announcement; Author and title index to volume 5, 2002; Note from the publisher |
Record Nr. | UNINA-9910777071603321 |
Bradford, England, : Emerald Group Publishing, c2002 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny |
Autore | Baker Paul R. <1958-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (349 p.) |
Disciplina |
658.4/7
658.47 |
Altri autori (Persone) | BennyDaniel J |
Soggetto topico |
Business enterprises - Security measures
Security systems Computer security Private security services |
Soggetto genere / forma | Electronic books. |
ISBN |
0-429-13389-8
1-4665-8868-3 1-4200-9964-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover |
Record Nr. | UNINA-9910462621703321 |
Baker Paul R. <1958->
![]() |
||
Boca Raton : , : CRC Press, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny |
Autore | Baker Paul <1958, > |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (349 p.) |
Disciplina |
658.4/7
658.47 |
Altri autori (Persone) | BennyDaniel J |
Soggetto topico |
Business enterprises - Security measures
Security systems Computer security Private security services |
ISBN |
0-429-13389-8
1-4665-8868-3 1-4200-9964-7 |
Classificazione | BUS073000BUS093000LAW041000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover |
Record Nr. | UNINA-9910786040003321 |
Baker Paul <1958, >
![]() |
||
Boca Raton : , : CRC Press, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Corporate fraud. / by COMER M.J. |
Autore | Comer, M.J. |
Pubbl/distr/stampa | Londra, : McGraw-Hill, 1977 |
Descrizione fisica | 393 p. ; 23 cm |
Disciplina | 658.4/7 |
ISBN | 0-07-084494-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990002785160403321 |
Comer, M.J.
![]() |
||
Londra, : McGraw-Hill, 1977 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Corporate social responsibility, governance and corporate reputation [[electronic resource] /] / Petter Gottschalk |
Autore | Gottschalk Petter <1950-> |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2011 |
Descrizione fisica | 1 online resource (210 p.) |
Disciplina | 658.4/7 |
Soggetto topico |
Corporations - Corrupt practices
White collar crimes Social responsibility of business Corporate governance Corporations - Public relations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-23490-4
9786613234902 981-4335-18-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; Introduction; 1. White-Collar Crime; White-Collar Crime Defined; White-Collar Crime Categories; Variety of White-Collar Crime; Theories of White-Collar Crime; Detection of White-Collar Crime; 2. Corporate Reputation; Corporate Reputation Defined; Resource-Based Theory; Determinants of Corporate Reputation; Effects of Corporate Reputation; Theories of Corporate Reputation; Measurement of Corporate Reputation; Rebuilding Corporate Reputation; Social Responsibility and Corporate Reputation; Corporate Governance Ratings; 3. Reputation Damage and Repair; Reputation Survey Design
Reputation Survey ResultsContingent Perspectives; Crime Determinants of Reputation; Reputation Effects from Crime; Ethics in Repair and Prevention; Investigating or Reporting; Sequence of Actions; 4. Internal Investigations; Corporate Investigation; Investigation Approaches; Investigator Performance; Investigator as Detective; 5. Corporate Compliance; Compliance Officer; Compliance Plan; Compliance Leadership; Self Regulation; Whistle Blowing; Compliance Levels; 6. Corporate Governance; Financial Statements; Governance Systems; Executive Roles at Risk; Governance Principles Leader Types at RiskSelf-Regulation Governance; Influencing and Controlling; Responsible Business; Limits to Responsibility; 7. Stages of Corporate Responsibility; Theory Building in Management Research; Stage Modeling in Management Research; Theory Building for Stage Models; Modeling Process for Stage Models; Corporate Social Responsibility; Frontiers of Corporate Responsibility; Internal Change Management; Stages of Corporate Social Responsibility; 8. Forensic Accounting; Investigative Accounting; Cases of Forensic Audit; Deception Detection; Analytical Procedures; Suspicious Transactions Money LaunderingTransaction Criteria; Information Processing; 9. Knowledge Management; Knowledge Organization; Business Intelligence; Stages of Growth; Knowledge Resources; Core Competence; Entrepreneurship Capabilities; A Case of Dynamic Capabilities; Knowledge Driven Innovation; 10. Intelligence Strategy; Strategy Characteristics; Information Sources; Knowledge Categories; Value Shop Configuration; Conclusion; References; Index |
Record Nr. | UNINA-9910464520703321 |
Gottschalk Petter <1950->
![]() |
||
Hackensack, N.J., : World Scientific, c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|