Every company wants to improve the way it does business, to produce goods and services more efficiently, and to increase profits. Nonprofit organizations are also concerned with efficiency, productivity, and with achieving the goals they set for themselves. Every manager understands that achieving these goals is part of his or her job. BUSINESS PROCESS MANAGEMENT (or BPM) is what they call these activities that companies perform in order to improve and adapt processes that will help improve the way they do business. In this balanced treatment of the field of business process change, Paul Harmon offers concepts, methods, and cases for all aspects and phases of successful business process improvement. Updated and added for this edition are coverage of business process management systems, business rules, enterprise architectures and frameworks (SCOR), and more content on Six Sigma and Lean--in addition to new coverage of performance metrics.
Operations Risk--a form of Operational Risk, is becoming increasingly important as more and more sophisticated products and the use of those products occurs in the financial services industry. Outsourcing, including overseas outsourcing, is changing the structure of firms and particularly operations teams. Thus understanding the existing and the changing risk environment in operations functions and its impact on operational risk is centrally important today. The book focuses on areas such as technology risk, people risk, and settlement risk, examining the dangers that lurk within different organisations. Case studies throughout the book illustrate the way in which risk can become magnified and ultimately become a serious danger to the businesses concerned. The reader is challenged throughout the book to interpret given situations in Operations Risk so as to understand the impact of the risks and devise solutions through a series of exercises included in the relevant chapters. (answers are provided). This “self-test” approach will help reinforce understanding of the detailed material contained throughout the book.
The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for the professional, as well as a valuable teaching tool for the security student, the book includes discussion questions and a glossary of common security terms. Additionally, a brand new appendix contains contact information for academic, trade, and professional security organizations.
Everyone makes decisions, but not everyone is a decision analyst. A decision analyst uses quantitative models and computational methods to formulate decision algorithms, assess decision performance, identify and evaluate options, determine trade-offs and risks, evaluate strategies for investigation, and so on. Info-Gap Decision Theory is written for decision analysts. The term "decision analyst" covers an extremely broad range of practitioners. Virtually all engineers involved in design (of buildings, machines, processes, etc.) or analysis (of safety, reliability, feasibility, etc.) are decision analysts, usually without calling themselves by this name. In addition to engineers, decision analysts work in planning offices for public agencies, in project management consultancies, they are engaged in manufacturing process planning and control, in financial planning and economic analysis, in decision support for medical or technological diagnosis, and so on and on. Decision analysts provide quantitative support for the decision-making process in all areas where systematic decisions are made. This second edition entails changes of several sorts. First, info-gap theory has found application in several new areas - especially biological conservation, economic policy formulation, preparedness against terrorism, and medical decision-making. Pertinent new examples have been included. Second, the combination of info-gap analysis with probabilistic decision algorithms has found wide application. Consequently "hybrid" models of uncertainty, which were treated exclusively in a separate chapter in the previous edition, now appear throughout the book as well as in a separate chapter. Finally, info-gap explanations of robust-satisficing behavior, and especially the Ellsberg and Allais "paradoxes", are discussed in a new chapter together with a theorem indicating when robust-satisficing will have greater probability of success than direct optimizing with uncertain models.
Managing Maintenance Resources shows how to reduce the complexity involved in engineering, or re-engineering, a maintenance organization. It recognises that this is a complex problem involving many inter-related decisions – such as whether or not resources should be centralized, contractor alliances be entered into or flexible working be adopted. This book provides a unique approach to modeling maintenance-production organizations. It enables the identification of problems and delivers guidelines to develop effective solutions. This is one of three stand-alone volumes designed to provide maintenance professionals in any sector with a better understanding of maintenance management, enabling the identification of problems and the delivery of effective solutions.
For over 30 years, Reliability, Maintainability and Risk has been recognised as a leading text for reliability and maintenance professionals. Now in its seventh edition, the book has been updated to remain the first choice for professional engineers and students. The seventh edition incorporates new material on important topics including software failure, the latest safety legislation and standards, product liability, integrity of safety-related systems, as well as delivering an up-to-date review of the latest approaches to reliability modelling, including cutsec ranking. It is also supported by new detailed case studies on reliability and risk in practice.
This book is a complimentary follow-on book to Operational Risk Control with Basel II. While the previous book focuses on operational risk, Economic Capital Allocation provides an overview of credit risk within the context of the Basel II accords.The book provides:* comprehensive coverage of the evolution of the banking industry with Basel II in mind* extensive information on the capital requirements for bank liquidity and solvency * coverage of the new rules as laid down by the supervisory authorities of the Group of Ten industrialized nations* key information on the technical requirements for credit institutions such as: new credit rating scales, modeling of credit risk, control of operational risks, and, novel ways and means for the management of exposure to Credit Risk
'Regulation and Compliance in Operations' looks at how regulation affects the operations function by focusing on regulatory issues and drivers. As regulatory demands ever increasing, it is important for operations teams to be aware of the important regulatory issues which exist globally. Like any other part of an organization in the financial services industry, operations has rules and regulations to comply with. Although many view regulation as being about rooting out rogue traders and controlling speculators, its role is much more profound than this, and without it many more 'scandals' would undoubtedly occur. The problem for the regulator is that unless total oversight of every transaction, account, business and individual can be made, there will always be rogue traders or more recent examples like Enron and World.Com. As such intense oversight is not practical, the regulator can only do so much, with most of the responsibility resting with the firms and organizations themselves.For operations teams their role in protecting the firm stems from their ability to manage critical processes like reconciliation, asset position agreements and the nostro accounts efficiently and effectively. Regulators need the help and support of the businesses to have a 'business-friendly environment'. When some abuse the trust placed in them and the regulatory environment, a 'scandal' or worse occurs, with the result that the majority are penalized as regulators react to criticism and apply more onerous regulations.It is often the operations teams that bear most, or at least some, of the repercussions of greater regulatory oversight of the business. It is therefore vitally important for operations teams to have a firm understanding of the regulatory issues and drivers. This book will help you gain that understanding, as well as looking at the important regulatory issues in the various global markets in which your business operates.
Introduction to Security, Seventh Edition, presents the latest in security issues from security equipment and design theory to security management practice. This complete revision of the classic textbook has been reorganized to reflect the industry changes since the 9/11 World Trade Center attacks. It includes new coverage throughout of terrorism as it relates to cargo and travel security, potential areas of attack and target hardening techniques, and the use of current technologies to combat new threats. The book begins with a new chapter on the development of Homeland Security in the United States. Traditional physical and guard security is covered in addition to advances in the electronic and computer security areas, including biometric security, access control, CCTV surveillance advances, as well as the growing computer security issues of identity theft and computer fraud. The Seventh Edition provides the most comprehensive breakdown of security issues for the student while detailing the latest trends, legislation, and technology in the private and government sectors for real-world application in students' future careers. As the definitive resource for anyone entering or currently working in the security industry, this book will also benefit law enforcement personnel, security consultants, security managers, security guards and other security professionals, and individuals responsible for Homeland Security.
Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.