top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The anti-corruption handbook [[electronic resource] ] : how to protect your business in the global marketplace / / William P. Olsen
The anti-corruption handbook [[electronic resource] ] : how to protect your business in the global marketplace / / William P. Olsen
Autore Olsen William P
Pubbl/distr/stampa Hoboken, N.J., : John Wiley & Sons, c2010
Descrizione fisica 1 online resource (193 p.)
Disciplina 658.4/7
Soggetto topico Business ethics - United States
Corporations - Corrupt practices - United States - Prevention
Business enterprises - Corrupt practices - United States - Prevention
Fraud - United States - Prevention
Compliance auditing
ISBN 0-470-61311-4
1-119-19845-3
1-282-54771-2
9786612547713
0-470-61309-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Anti-Corruption Handbook: How to Protect Your Business in the Global Marketplace; Contents; Preface; About the Contributors; CHAPTER 1: Managing Corruption Risk; CHAPTER 2: What Is Anti-Corruption?; CHAPTER 3: U.S. Efforts to Combat Global Corruption; CHAPTER 4: U.S. Laws Governing Corruption; CHAPTER 5: The Evolution of the Foreign Corrupt Practices Act; CHAPTER 5: Internal Controls and Accounting Provisions of the FCPA; CHAPTER 7: Do Not Crimp: The Need for Oversight of Foreign Operations; CHAPTER 8: The Human Factor
CHAPTER 9: Corporate Governance: The Key to Unmasking Corrupt ActivityCHAPTER 10: Whistle-Blower Programs; CHAPTER 11: Document Retention; CHAPTER 12: Information Security: Intellectual Property Theft Is Often the Result of Government Corruption; CHAPTER 13: Anti-Money Laundering: The USA PATRIOT Act; CHAPTER 14: Procurement Fraud: Detecting and Preventing Procurement and Related Fraud; CHAPTER 15: Construction Fraud: Monitoring, Mitigating, and Investigating Construction Fraud; CHAPTER 16: Special Investigations: How to Investigate Allegations of Corruption
CHAPTER 17: Navigating the Perils of the Global MarketplaceCHAPTER 18: Case for Collective Action: The World Bank Initiative; CHAPTER 19: Leveling the Playing Field; Book Research Summary; Index
Record Nr. UNINA-9910140618303321
Olsen William P  
Hoboken, N.J., : John Wiley & Sons, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The anti-corruption handbook : how to protect your business in the global marketplace / / William P. Olsen
The anti-corruption handbook : how to protect your business in the global marketplace / / William P. Olsen
Autore Olsen William P
Edizione [1st ed.]
Pubbl/distr/stampa Hoboken, N.J., : John Wiley & Sons, c2010
Descrizione fisica 1 online resource (193 p.)
Disciplina 658.4/7
Soggetto topico Business ethics - United States
Corporations - Corrupt practices - United States - Prevention
Business enterprises - Corrupt practices - United States - Prevention
Fraud - United States - Prevention
Compliance auditing
ISBN 0-470-61311-4
1-119-19845-3
1-282-54771-2
9786612547713
0-470-61309-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Anti-Corruption Handbook: How to Protect Your Business in the Global Marketplace; Contents; Preface; About the Contributors; CHAPTER 1: Managing Corruption Risk; CHAPTER 2: What Is Anti-Corruption?; CHAPTER 3: U.S. Efforts to Combat Global Corruption; CHAPTER 4: U.S. Laws Governing Corruption; CHAPTER 5: The Evolution of the Foreign Corrupt Practices Act; CHAPTER 5: Internal Controls and Accounting Provisions of the FCPA; CHAPTER 7: Do Not Crimp: The Need for Oversight of Foreign Operations; CHAPTER 8: The Human Factor
CHAPTER 9: Corporate Governance: The Key to Unmasking Corrupt ActivityCHAPTER 10: Whistle-Blower Programs; CHAPTER 11: Document Retention; CHAPTER 12: Information Security: Intellectual Property Theft Is Often the Result of Government Corruption; CHAPTER 13: Anti-Money Laundering: The USA PATRIOT Act; CHAPTER 14: Procurement Fraud: Detecting and Preventing Procurement and Related Fraud; CHAPTER 15: Construction Fraud: Monitoring, Mitigating, and Investigating Construction Fraud; CHAPTER 16: Special Investigations: How to Investigate Allegations of Corruption
CHAPTER 17: Navigating the Perils of the Global MarketplaceCHAPTER 18: Case for Collective Action: The World Bank Initiative; CHAPTER 19: Leveling the Playing Field; Book Research Summary; Index
Record Nr. UNINA-9910815776503321
Olsen William P  
Hoboken, N.J., : John Wiley & Sons, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
Autore Watson Scott A
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Descrizione fisica 1 online resource (199 p.)
Disciplina 658.4/7
658.47
Soggetto topico Conflict management
Risk management
Crisis management
Soggetto genere / forma Electronic books.
ISBN 1-281-02250-0
9786611022501
0-08-052201-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary
The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement
Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary
The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index
Record Nr. UNINA-9910457075003321
Watson Scott A  
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
Autore Watson Scott A
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Descrizione fisica 1 online resource (199 p.)
Disciplina 658.4/7
658.47
Soggetto topico Conflict management
Risk management
Crisis management
ISBN 1-281-02250-0
9786611022501
0-08-052201-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary
The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement
Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary
The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index
Record Nr. UNINA-9910784354503321
Watson Scott A  
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Pubbl/distr/stampa Bradford, England, : Emerald Group Publishing, c2002
Descrizione fisica 1 online resource (88 p.)
Disciplina 658.4/7
Altri autori (Persone) AbbottJulie
StoneMerlin
Collana Qualitative marketing research: an international journal
Soggetto topico Electronic commerce - Marketing
Marketing research
Soggetto genere / forma Electronic books.
ISBN 1-280-47967-1
9786610479672
1-84544-719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Abstracts & keywords; Guest editorial; UK data warehousing and business intelligence implementation; Customer relationship management systems; Marketing principles in the application of e-commerce; There's no business like e-business; Reflections on customer knowledge management in e-business; From bricks to clicks; Perceived risks as barriers to Internet and e-commerce usage; Assessments of the ''new economy'' scenario; Awards for Excellence; Conference announcement; Author and title index to volume 5, 2002; Note from the publisher
Record Nr. UNINA-9910449790603321
Bradford, England, : Emerald Group Publishing, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Business intelligence and e-marketing workshop, IBM Warwick 2001 [[electronic resource] /] / guest editors Merlin Stone and Julie Abbott
Pubbl/distr/stampa Bradford, England, : Emerald Group Publishing, c2002
Descrizione fisica 1 online resource (88 p.)
Disciplina 658.4/7
Altri autori (Persone) AbbottJulie
StoneMerlin
Collana Qualitative marketing research: an international journal
Soggetto topico Electronic commerce - Marketing
Marketing research
ISBN 1-280-47967-1
9786610479672
1-84544-719-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Abstracts & keywords; Guest editorial; UK data warehousing and business intelligence implementation; Customer relationship management systems; Marketing principles in the application of e-commerce; There's no business like e-business; Reflections on customer knowledge management in e-business; From bricks to clicks; Perceived risks as barriers to Internet and e-commerce usage; Assessments of the ''new economy'' scenario; Awards for Excellence; Conference announcement; Author and title index to volume 5, 2002; Note from the publisher
Record Nr. UNINA-9910777071603321
Bradford, England, : Emerald Group Publishing, c2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
Autore Baker Paul R. <1958->
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton : , : CRC Press, , 2013
Descrizione fisica 1 online resource (349 p.)
Disciplina 658.4/7
658.47
Altri autori (Persone) BennyDaniel J
Soggetto topico Business enterprises - Security measures
Security systems
Computer security
Private security services
Soggetto genere / forma Electronic books.
ISBN 0-429-13389-8
1-4665-8868-3
1-4200-9964-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover
Record Nr. UNINA-9910462621703321
Baker Paul R. <1958->  
Boca Raton : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
Autore Baker Paul <1958, >
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton : , : CRC Press, , 2013
Descrizione fisica 1 online resource (349 p.)
Disciplina 658.4/7
658.47
Altri autori (Persone) BennyDaniel J
Soggetto topico Business enterprises - Security measures
Security systems
Computer security
Private security services
ISBN 0-429-13389-8
1-4665-8868-3
1-4200-9964-7
Classificazione BUS073000BUS093000LAW041000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover
Record Nr. UNINA-9910786040003321
Baker Paul <1958, >  
Boca Raton : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Corporate fraud. / by COMER M.J.
Corporate fraud. / by COMER M.J.
Autore Comer, M.J.
Pubbl/distr/stampa Londra, : McGraw-Hill, 1977
Descrizione fisica 393 p. ; 23 cm
Disciplina 658.4/7
ISBN 0-07-084494-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-990002785160403321
Comer, M.J.  
Londra, : McGraw-Hill, 1977
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Corporate social responsibility, governance and corporate reputation [[electronic resource] /] / Petter Gottschalk
Corporate social responsibility, governance and corporate reputation [[electronic resource] /] / Petter Gottschalk
Autore Gottschalk Petter <1950->
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, c2011
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.4/7
Soggetto topico Corporations - Corrupt practices
White collar crimes
Social responsibility of business
Corporate governance
Corporations - Public relations
Soggetto genere / forma Electronic books.
ISBN 1-283-23490-4
9786613234902
981-4335-18-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; Introduction; 1. White-Collar Crime; White-Collar Crime Defined; White-Collar Crime Categories; Variety of White-Collar Crime; Theories of White-Collar Crime; Detection of White-Collar Crime; 2. Corporate Reputation; Corporate Reputation Defined; Resource-Based Theory; Determinants of Corporate Reputation; Effects of Corporate Reputation; Theories of Corporate Reputation; Measurement of Corporate Reputation; Rebuilding Corporate Reputation; Social Responsibility and Corporate Reputation; Corporate Governance Ratings; 3. Reputation Damage and Repair; Reputation Survey Design
Reputation Survey ResultsContingent Perspectives; Crime Determinants of Reputation; Reputation Effects from Crime; Ethics in Repair and Prevention; Investigating or Reporting; Sequence of Actions; 4. Internal Investigations; Corporate Investigation; Investigation Approaches; Investigator Performance; Investigator as Detective; 5. Corporate Compliance; Compliance Officer; Compliance Plan; Compliance Leadership; Self Regulation; Whistle Blowing; Compliance Levels; 6. Corporate Governance; Financial Statements; Governance Systems; Executive Roles at Risk; Governance Principles
Leader Types at RiskSelf-Regulation Governance; Influencing and Controlling; Responsible Business; Limits to Responsibility; 7. Stages of Corporate Responsibility; Theory Building in Management Research; Stage Modeling in Management Research; Theory Building for Stage Models; Modeling Process for Stage Models; Corporate Social Responsibility; Frontiers of Corporate Responsibility; Internal Change Management; Stages of Corporate Social Responsibility; 8. Forensic Accounting; Investigative Accounting; Cases of Forensic Audit; Deception Detection; Analytical Procedures; Suspicious Transactions
Money LaunderingTransaction Criteria; Information Processing; 9. Knowledge Management; Knowledge Organization; Business Intelligence; Stages of Growth; Knowledge Resources; Core Competence; Entrepreneurship Capabilities; A Case of Dynamic Capabilities; Knowledge Driven Innovation; 10. Intelligence Strategy; Strategy Characteristics; Information Sources; Knowledge Categories; Value Shop Configuration; Conclusion; References; Index
Record Nr. UNINA-9910464520703321
Gottschalk Petter <1950->  
Hackensack, N.J., : World Scientific, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui