Skip to main content

Books in Business management and accounting

Our business, management, and accounting titles are essential reading for students and professionals, and cover a range of foundational and advanced topics across actuarial science, quantitative assets management and investment modelling, business venturing, business law, and human resource management, among other topics

101-110 of 382 results in All results

Handbook of Footwear Design and Manufacture

  • 1st Edition
  • September 30, 2013
  • A. Luximon
  • English
  • eBook
    9 7 8 - 0 - 8 5 7 0 9 - 8 7 9 - 5
Understanding footwear design and manufacture is vital for improving the functionality, aesthetics and marketability of a product. The Handbook of footwear design and manufacture provides a comprehensive review of footwear production and design and explores how these processes are used across a variety of application areas.Part one, an introductory section, reviews the fundamentals of footwear anatomy; chapters discuss the anatomy of the human foot, biomechanics and gait, foot models and measurements, the development of the foot in childhood and adolescence, and foot problems and their implications for footwear design. Part two examines footwear design including the development of shoe design, foot sketch templates, and footwear drawing templates. Aspects of footwear manufacture are highlighted in part three including the design, manufacture, and sizing and grading of shoe lasts. Further chapters focus on the footwear business, advertising, and the environmental impact of footwear manufacture. Part four explores the design and manufacture of footwear for specific applications and includes chapters on footwear for cold weather, textiles and other materials used in the production of protective military and orthopaedic footwear, and design issues in geriatric footwear.The Handbook of footwear design and manufacture is a wide-ranging and technical resource for footwear designers, materials scientists and researchers involved in the production of footwear, and professionals in the footwear industry looking to expand their knowledge of design and manufacture processes.

Data Stewardship

  • 1st Edition
  • September 16, 2013
  • David Plotkin
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 4 4 5 - 7
Data stewards in business and IT are the backbone of a successful data governance implementation because they do the work to make a company’s data trusted, dependable, and high quality. Data Stewardship explains everything you need to know to successfully implement the stewardship portion of data governance, including how to organize, train, and work with data stewards, get high-quality business definitions and other metadata, and perform the day-to-day tasks using a minimum of the steward’s time and effort. David Plotkin has loaded this book with practical advice on stewardship so you can get right to work, have early successes, and measure and communicate those successes, gaining more support for this critical effort.

Influencing Enterprise Risk Mitigation

  • 2nd Edition
  • September 11, 2013
  • Francis J. D'Addario
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 2 3 3 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 2 4 3 - 2
In Influencing Enterprise Risk Mitigation, author Francis J. D’Addario draws on his many years of impressive security experience to describe business risk prevention and mitigation strategies. D’Addario, former security manager at Starbucks, Hardee’s, and Jerrico, shares stories of risk mitigation successes and failures—including natural disasters, a triple murder, and multimillion dollar fraud schemes—to help explain the need for an all-hazard risk mitigation approach. In this book, the author discusses the psychology of security, the geography of risk, and baseline identity authentication and access control measures. He also talks through the steps for making security a priority for the business, estimating return on investment for security services, and leveraging data to learn from the mistakes and successes of those who came before us. The ability to quantify the benefits of risk mitigation will influence business investment in prevention and response preparedness. Influencing Enterprise Risk Mitigation teaches us that both hazards and mitigation opportunities in the enterprise start at the individual and community level, and that recovery from a catastrophe hinges on individual and community resiliency. Influencing Enterprise Risk Mitigation is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

Demystifying the Institutional Repository for Success

  • 1st Edition
  • August 31, 2013
  • Marianne Buehler
  • English
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 3 2 1 - 3
Institutional repositories remain key to data storage on campus, fulfilling the academic needs of various stakeholders. Demystifying the Institutional Repository for Success is a practical guide to creating and sustaining an institutional repository through marketing, partnering, and understanding the academic needs of all stakeholders on campus. This title is divided into seven chapters, covering: traditional scholarly communication and open access publishing; the academic shift towards open access; what the successful institutional repository looks like; institutional repository collaborations and building campus relationships; building internal and external campus institutional repository relationships; the impact and value proposition of institutional repositories; and looking ahead to open access opportunities.

The Benefits and Security Risks of Web-Based Applications for Business

  • 1st Edition
  • May 28, 2013
  • Kathleen Kotwica
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 9 8 7 - 6
This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report. It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use. The Benefits and Security Risks of Web-Based Applications for Business is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

The Case for the Chief Data Officer

  • 1st Edition
  • April 22, 2013
  • Peter Aiken + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 1 4 6 3 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 1 4 9 5 - 1
Data are an organization's sole, non-depletable, non-degrading, durable asset. Engineered right, data's value increases over time because the added dimensions of time, geography, and precision. To achieve data's full organizational value, there must be dedicated individual to leverage data as assets - a Chief Data Officer or CDO who's three job pillars are: Dedication solely to leveraging data assets, Unconstrained by an IT project mindset, and Reports directly to the business Once these three pillars are set into place, organizations can leverage their data assets. Data possesses properties worthy of additional investment. Many existing CDOs are fatally crippled, however, because they lack one or more of these three pillars. Often organizations have some or all pillars already in place but are not operating in a coordinated manner. The overall objective of this book is to present these pillars in an understandable way, why each is necessary (but insufficient), and what do to about it.

Diversity and the Effective Corporate Board

  • 1st Edition
  • April 16, 2013
  • Ram Kumar Mishra + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 0 4 9 7 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 5 3 2 - 4
The book discusses the various aspects of diversity of corporate boards in terms of gender, age, nationality, tenure, education, experience and personalities. It enumerates the need for such diversity in each category and related concerns. Statistics from around the world support the authors’ claims. The nine chapters in this short book have not been previously published.

Assessing Vendors

  • 1st Edition
  • April 10, 2013
  • Josh More
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 9 6 0 7 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 4 4 6 - 4
Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. Assessing Vendors shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price

Business Continuity

  • 2nd Edition
  • April 3, 2013
  • Bob Hayes + 1 more
  • Dean Correia
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 1 6 4 8 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 5 6 4 - 9
The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization’s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after a crisis. This playbook guides the security leader through the development, implementation, and maintenance of a successful BCP. The text begins with a detailed description of the concept and value of business continuity planning, transitioning into a step-by-step guide to building or enhancing a BCP. Its 14 appendices, which include sample forms, templates, and definitions, make it an invaluable resource for business continuity planning. The Business Continuity playbook is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

The Compliance Response to Misconduct Allegations

  • 2nd Edition
  • March 28, 2013
  • John D. Thompson
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 5 6 3 - 2
The Compliance Response to Misconduct Allegations playbook is a step-by-step guide for what to do—and what not to do—in performing an investigation into claims of violations of employee policies. It has been created for corporate professionals who are often the first to be contacted during a suspected employee-related claim, and who may not have investigative training. Sections of this playbook address the decision whether to investigate, the naming of investigators, investigation planning, interview techniques and issues, the importance of taking notes and written statements, investigations in union settings, and much more. Also included are a series of checklists and templates to aid the investigative team before, during, and after an investigation. This playbook is an excellent risk management resource for audit professionals, human resources managers, site or facility managers, small business owners, or anyone who may be the first to receive reports of wrongdoing, regulatory violations, or prohibited workforce behavior. The Compliance Response to Misconduct Allegations is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.