You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Recent years have seen a huge growth in European cross-border mergers and acquisitions (M&A), and considerable attention has been given to how such deals arise and are completed. A U.S. investor must understand the basic difference in the principle of individual labor law in the U.S. and how it compares with the laws of the target country in an M&A. In the U.S., under the employment at-will doctrine, the U.S. private sector employers can dismiss their non-unionized employees at any time for any reason or even no reason at all. In most European Union (EU) countries and Germany and Italy specifically, employees are presumed to have a basic right to keep their jobs indefinitely. One of the greatest labor cost disparity with the U.S. is not wages. It is the amount of paid time-off and other benefits. Employers in Germany and Italy will find it difficult to discharge employees without incurring substantial liability. For high-level, long-term employees, these severance payments can run into six or even seven figures.
None
Counterintelligence for Corporate Environments, Volume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume two discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that ...
Artificial Intelligence (AI) for Risk Management is about using AI to manage risk in the corporate environment. The content of this work focuses on concepts, principles, and practical applications that are relevant to the corporate and technology environments. The authors introduce AI and discuss the different types, capabilities, and purposes–including challenges. With AI also comes risk. This book defines risk, provides examples, and includes information on the risk-management process. Having a solid knowledge base for an AI project is key and this book will help readers define the knowledge base needed for an AI project by developing and identifying objectives of the risk-knowledge base and knowledge acquisition for risk. This book will help you become a contributor on an AI team and learn how to tell a compelling story with AI to drive business action on risk.
Counterintelligence for Corporate Environments, Volume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume two discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that ...
This book describes the thought process and specific activities a leader should consider as they interview for the IT risk/information security leader role, what they should do within their first 90 days, and how to organize, evangelize, and operate the program once they are into the job. Information technology (IT) risk and information security management are top of mind for corporate boards and senior business leaders. Continued intensity of cyber terrorism attacks, regulatory and compliance requirements, and customer privacy concerns are driving the need for a business-minded chief information security officer (CISO) to lead organizational efforts to protect critical infrastructure and se...
This book gives insight into the legal aspects of data ownership in the 21st century. With the amount of information being produced and collected growing at an ever accelerating rate, governments are implementing laws to regulate the use of this information by corporations. Companies are more likely than ever to face heavy lawsuits and sanctions for any misuse of information, which includes data breaches caused by cybercriminals. This book serves as a guide to all companies that collect customer information, by giving instructions on how to avoid making these costly mistakes and to ensure they are not liable in the event of stolen information.
This text serves as an accessible introduction to the law of contract. The headings chosen for examination track the main points in the lifetime of a contract-from its formation, drafting, and onward to its eventual dissolution, whether this occurs due to the terms of the contract, the will of the parties, or because of a breach of the agreed terms. It also provides studies of other notable areas within the subject, such as third-party rights, damages, and equitable remedies. In distinction to other guides to contract law, this text provides a comparative analysis of the area, incorporating sources drawn from both the civil law tradition, characteristic of several nations within Continental ...
This book helps the organization’s top leader gather the information needed to identify opportunities and threats and decide on the appropriate risk response in this uncertain world. Risk is the effect of uncertainty on the ability of an organization to meet its strategic objectives. The effects of uncertainty are expressed as opportunities and threats. Yet, most people associate risk with hazards and losses (i.e., pure risk). Unlike pure risk, uncertainty risk is not insurable because of its upside risk opportunities. Risk management is a key element of the open-sourced, high-level structure developed by the International Organization for Standardization. This structure for managing impor...