Skip to main content

Books in Business management and accounting

Our Business, Management, and Accounting titles are essential reading for students and professionals, and cover a range of foundational and advanced topics across actuarial science, quantitative assets management and investment modelling, business venturing, business law, and human resource management, among other topics

  • The Benefits and Security Risks of Web-Based Applications for Business

    Trend Report
    • 1st Edition
    • Kathleen Kotwica
    • English
    This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report. It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use. The Benefits and Security Risks of Web-Based Applications for Business is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • The Case for the Chief Data Officer

    Recasting the C-Suite to Leverage Your Most Valuable Asset
    • 1st Edition
    • Peter Aiken + 1 more
    • English
    Data are an organization's sole, non-depletable, non-degrading, durable asset. Engineered right, data's value increases over time because the added dimensions of time, geography, and precision. To achieve data's full organizational value, there must be dedicated individual to leverage data as assets - a Chief Data Officer or CDO who's three job pillars are: Dedication solely to leveraging data assets, Unconstrained by an IT project mindset, and Reports directly to the business Once these three pillars are set into place, organizations can leverage their data assets. Data possesses properties worthy of additional investment. Many existing CDOs are fatally crippled, however, because they lack one or more of these three pillars. Often organizations have some or all pillars already in place but are not operating in a coordinated manner. The overall objective of this book is to present these pillars in an understandable way, why each is necessary (but insufficient), and what do to about it.
  • Diversity and the Effective Corporate Board

    • 1st Edition
    • Ram Kumar Mishra + 1 more
    • English
    The book discusses the various aspects of diversity of corporate boards in terms of gender, age, nationality, tenure, education, experience and personalities. It enumerates the need for such diversity in each category and related concerns. Statistics from around the world support the authors’ claims. The nine chapters in this short book have not been previously published.
  • Assessing Vendors

    A Hands-On Guide to Assessing Infosec and IT Vendors
    • 1st Edition
    • Josh More
    • English
    Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. Assessing Vendors shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
  • Business Continuity

    Playbook
    • 2nd Edition
    • Bob Hayes + 1 more
    • Dean Correia
    • English
    The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization’s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after a crisis. This playbook guides the security leader through the development, implementation, and maintenance of a successful BCP. The text begins with a detailed description of the concept and value of business continuity planning, transitioning into a step-by-step guide to building or enhancing a BCP. Its 14 appendices, which include sample forms, templates, and definitions, make it an invaluable resource for business continuity planning. The Business Continuity playbook is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • The Compliance Response to Misconduct Allegations

    Playbook
    • 2nd Edition
    • John D. Thompson
    • English
    The Compliance Response to Misconduct Allegations playbook is a step-by-step guide for what to do—and what not to do—in performing an investigation into claims of violations of employee policies. It has been created for corporate professionals who are often the first to be contacted during a suspected employee-related claim, and who may not have investigative training. Sections of this playbook address the decision whether to investigate, the naming of investigators, investigation planning, interview techniques and issues, the importance of taking notes and written statements, investigations in union settings, and much more. Also included are a series of checklists and templates to aid the investigative team before, during, and after an investigation. This playbook is an excellent risk management resource for audit professionals, human resources managers, site or facility managers, small business owners, or anyone who may be the first to receive reports of wrongdoing, regulatory violations, or prohibited workforce behavior. The Compliance Response to Misconduct Allegations is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Establishing the Value of All-Hazards Risk Mitigation

    Proven Practices
    • 1st Edition
    • Francis J. D'Addario
    • English
    Establishing the Value of All-Hazards Risk Mitigation is a video presentation. Length: 32 minutes. Establishing the Value of All-Hazards Risk Mitigation is a video presentation of narrated slides discussing the cost of risk and the return-on-investment (ROI) value of risk mitigation. This 32-minute Proven Practices presentation describes a people-centric, data-qualified, and culturally relevant approach to enterprise risk mitigation. The presentation’s broad scope covers cost assessment of natural and man-made catastrophic events, information loss, fraud and theft, and more, as well as the importance of an organization’s preparedness and response. Presenter Francis D’Addario’s expertise in this area comes from his years of experience as an all-hazards risk mitigation leader for multinational convenience, food and beverage, manufacturing, restaurant, retail, and supply chain operators. This presentation is a valuable resource for business leaders and risk mitigation professionals who have responsibility for the protection of people, assets, and critical processes, as well as for educators preparing the next generation of security professionals and leaders. Establishing the Value of All-Hazards Risk Mitigation is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • From One Winning Career to the Next

    Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line
    • 2nd Edition
    • J. David Quilter
    • English
    In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. Having transitioned into the private sector from a long career in public service with the DEA, Quilter offers valuable perspective on the differences in culture and priorities between the public and private sectors, and how those differences can affect efforts in organizational security. Readers will benefit from the author’s insights on researching and joining a new organization, exploring a business’ structure and culture, and getting to know the executives and leaders within a business. Chapters contain practical advice on specific challenges (crisis management, assaultive behavior, threats to corporate assets, etc.), forming an effective team, and making a business case to gain executive support for a security agenda. This book is vital background for security professionals considering career changes. It will also aid those in established positions in their efforts to communicate, strategize, and implement security programs and goals within a business. From One Winning Career to the Next is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Success in Innovation

    Improving the Odds by Understanding the Factors for Unsuccess
    • 1st Edition
    • Jan Verloop
    • English
    Success in Innovation tackles its subject from a novel perspective: instead of focusing on factors for success, it specifically examines the factors for failure. Similar books often attempt to stimulate more effort on innovation with success stories and methods. But innovation is risky business and most innovative ideas fail. By understanding the typical pitfalls and hurdles in the process, and how to avoid or manage them, readers can significantly improve their chances of success. Success in Innovation is broad in scope and useful to managers, consultants, entrepreneurs, tech start-ups — anyone with a stake in new and powerful ideas, products, businesses, or methods. This book helps readers work smarter, not simply more.
  • Environmental Toxicology of Pesticides

    • 1st Edition
    • Matsumura
    • English
    Environmental Toxicology of Pesticides provides an overview of the state of knowledge in the major pesticidal subject areas and describes the efforts and approaches underway in solving or understanding these problems. The book emerged from the United States-Japan seminar on ""Environmental Toxicology of Pesticides"" held in Oiso, Japan, in October 1971. The purpose of the seminar was to discuss and exchange ideas and technology on the problems associated with pesticidal contamination in these two countries. The book is organized into eight parts. Part I reviews pesticide use and contamination levels in Japan, the United States, and Britain. Part II examines the environmental impact of mercury. Part III presents studies on chlorinated hydrocarbon pesticides. Part IV examines the effects of fungicides, herbicides, organophosphates, and carbamates. Part V deals with the microbial degradation of pesticides. Part VI examines the photodecomposition of pesticides. Part VII investigates the biological effects of pesticides on wildlife. Part VIII deals with the development of new pesticides.