You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Politicians and regulators do not run businesses. Bribery and Corruption is for managers who do. It will help you transform uncertainties and problems created via legislation and regulations (such as The UK Bribery Act, The Proceeds of Crime Act, The Foreign Corrupt Practices Act, Sarbanes-Oxley) into opportunities to: ¢ Maintain entrepreneurial, profitable, and enjoyable working environments while easily surpassing compliance standards ¢ Control incoming, internal, outgoing, competitive corruption and fraud ¢ Take decisions in grey areas, confidently Bribery and Corruption frames control and compliance in an entirely different way: not as a brake on your company’s forward motion but as...
Deception at Work tells you how to recognize and deal with lies, in meetings, negotiations, discussions and in writing. It is guaranteed to make you a more effective and confident operator, no matter what job you do. Simply leaving the book on your desk for others to see will improve your chances of not being deceived. The book exposes deception in all of its forms, linking the authors' 40 years of experience in dealing with fraudsters with the most recent findings on MRI scanning and the human brain. It explains how, why and in what circumstances both achievement and exculpatory lies are told, and how they can be resolved. It sets out a low key but effective plan for dealing with liars in all shapes and sizes, from confidence tricksters to malingerers and hard-nosed fraudsters. This ground-breaking work includes the most comprehensive summary of the clues to deception of any book currently in print.
Fact: Barings was an excellent company, with professional managers. Their careers were devastated by fraud. How many other managers are now in the same position without knowing it? Fact: The average company loses between 2 per cent and 5 per cent of its turnover as a result of dishonesty. When Mike Comer’s book first appeared it quickly established itself worldwide as the standard work in its field. This third edition is a radical revision reflecting the world of EDI, electronic commerce, derivatives, computerization, empowerment, downsizing and other recent developments. Ironically, many of these have exposed companies to an alarming range of new risks. With the help of real-life case histories the author identifies the main types of fraud, the circumstances in which they occur and the telltale signs that give them away. He examines internal control systems and the attitudes and practices that allow fraud to flourish. He explains in detail how fraud can be prevented and detected, and shows why it is that many fashionable management techniques can also potentially pave the way to corporate disaster.
It is reliably estimated that over 70 per cent of all job applications contain misleading information. If that was the limit of deception at work faced by HR and line managers, then maybe things wouldn't be too bad. But deception isn't limited simply to the area of recruitment; there's also absenteeism, minor theft, misuse of information, not to mention the tissue of half-truths and falsehoods thrown up by an employee seeking to camouflage theft, responsibility for a fatal accident or a multi-million pound fraud. An HR Guide to Workplace Fraud and Criminal Behaviour is full of advice, best practice and case studies of deception from around the world. In fact, everything you need to: ¢ prote...
Many people in organizations resent internal control and risk management; these two processes representing unwelcome tasks to be completed for the benefit of auditors and regulators. Over the last few years this perception has been heightened by the disastrous implementation of section 404 of the Sarbanes-Oxley Act of 2002, which is generally regarded as having been too expensive for the benefits it has brought. This important book offers a way of improving this prevailing perception and increasing the value of control and risk management by bringing creativity and design skills to the fore. The value of risk and control activities is often limited by the value of the control ideas available...
Ian Mann's Hacking the Human highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Offering more than a simple checklist to follow, the book provides a rich mix of examples, applied research and practical solutions for security and IT professionals that enable you to create and develop a security solution that is most appropriate for your organization.
The role of internal audit is changing. The Sarbanes-Oxley legislation in the US and the Combined Code for Corporate Governance in the UK focused on the need to demonstrate the active management of risks and report on this subject to shareholders. Boards of Directors are therefore increasingly requiring their Internal Audit functions to provide a much higher level of assurance in this regard. Phil Griffiths' Risk-Based Auditing explains the concepts and practice behind a risk-based approach to auditing. He explores the changing environment in both the private and public sectors and the associated legislation and guidance. The book then provides a blueprint for refocusing the internal audit role to embrace risk and to help plan, market, undertake and report a risk-based audit. The text includes a detailed risk-based audit toolkit with 14 sections of tools, techniques and information to enable a risk-based approach to be adopted. This is an essential guide for internal and external auditors seeking to manage the realities of the audit function in the turbulent and fast-changing business environment that has emerged since the end of the last century.
Most organisations purchase off-the-shelf computer-based systems to help them perform their day-to-day business activities. Sadly, many of the purchases fail to live up to expectations. This book provides a blueprint of what to cover in the early stages of the procurement process so as to prevent the recurring problem of information systems projects that run over budget, over time and yet under perform. The questions the book answers are simple but fundamental: where to find advice; who should be involved; how to manage the purchase; how to decide what you need; which package or supplier to choose; how to manage the implementation, and how to know if the system is successful. Real examples of information system purchases are used to help provide practical guidance on the methods, the pitfalls and the keys to success. In addition the book contains several adaptable tables and checklists to provide a flexible and effective step-by-step framework for the entire process.
The issue of brand has overshadowed that of reputation. It has been fashionable to re-brand, spend a lot of money on advertising and hope that you can leave your negative baggage behind. This strategy doesn't always work, witness Monday or Consignia, both victims of their 'infectious history'. Terry Hannington provides a blueprint for effectively measuring and managing your reputation. That means understanding the difference between brand and reputation, the significance of the latter and how you get your reputation in the first place. This book shows you how to measure and understand stakeholder influence via reputation assessment research techniques and, once you have done that, how to build and manage a reputation management plan.