Skip to main content

Books in Social sciences and humanities

    • Financial Whirlpools

      • 1st Edition
      • March 26, 2013
      • Karen L. Higgins
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 9 0 5 4
      • eBook
        9 7 8 0 1 2 4 0 5 9 2 1 4
      How do economists reconcile their expertise with their failures to predict and manage the 2008 financial crisis? This book goes a long way toward an answer by using systems theory to reveal the complex interdependence of factors and forces behind the crisis. In her fully integrated view of the economy, how it works, and how the economic crisis burst, Karen Higgins combines human psychology, cultural values, and belief formation with descriptions of the ways banks and markets succeed and fail. In each chapter she introduces themes from financial crisis literature and brings a systems-theory treatment of them. Her methodology and visual presentations both develop the tools of systems theory and apply these tools to the financial crisis. Not just another volume about the crisis, this book challenges the status quo through its unique multidisciplinary approach.
    • Managing Risks in Business

      • 1st Edition
      • March 26, 2013
      • Jerome Miller + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 5 5 3 3
      • eBook
        9 7 8 0 1 2 4 1 6 5 6 8 7
      Managing Risks in Business is a video presentation. Length: 24 minutes. Managing Risks in Business, a 24-minute Proven Practices presentation, is designed for both large and small companies that wish to create a structured approach to preparedness, response, and recovery from a critical incident. Presenters Jerome P. Miller and Radford W. Jones discuss how to develop and train an Incident Management Team (IMT) to protect a private sector company during a critical incident. Critical incidents may be the result of a natural disaster or a criminal act, including a terrorist attack. The presentation addresses the structure, responsibilities, and activities of an IMT and outlines the components of a critical incident management plan. It also addresses communication between the IMT and public sector emergency response agencies. Executives, security and risk management leaders, contingency planners, and operations managers can benefit from the practices described in this presentation, which can be used for professional self-development or group training. Jerome Miller has served as a commander in the Detroit Police Department and as the senior manager of international and special security operations at Chrysler Corporation. Radford Jones is the former manager of global security and fire protection at Ford Motor Company and spent 20 years in the public sector with the U.S. Secret Service. Managing Risks in Business is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Establishing the Value of All-Hazards Risk Mitigation

      • 1st Edition
      • March 26, 2013
      • Francis J. D'Addario
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 5 5 2 6
      • eBook
        9 7 8 0 1 2 4 1 6 5 6 7 0
      Establishing the Value of All-Hazards Risk Mitigation is a video presentation. Length: 32 minutes. Establishing the Value of All-Hazards Risk Mitigation is a video presentation of narrated slides discussing the cost of risk and the return-on-investment (ROI) value of risk mitigation. This 32-minute Proven Practices presentation describes a people-centric, data-qualified, and culturally relevant approach to enterprise risk mitigation. The presentation’s broad scope covers cost assessment of natural and man-made catastrophic events, information loss, fraud and theft, and more, as well as the importance of an organization’s preparedness and response. Presenter Francis D’Addario’s expertise in this area comes from his years of experience as an all-hazards risk mitigation leader for multinational convenience, food and beverage, manufacturing, restaurant, retail, and supply chain operators. This presentation is a valuable resource for business leaders and risk mitigation professionals who have responsibility for the protection of people, assets, and critical processes, as well as for educators preparing the next generation of security professionals and leaders. Establishing the Value of All-Hazards Risk Mitigation is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • From One Winning Career to the Next

      • 2nd Edition
      • March 26, 2013
      • J. David Quilter
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 5 9 4 1
      • eBook
        9 7 8 0 1 2 4 1 1 6 0 9 2
      In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. Having transitioned into the private sector from a long career in public service with the DEA, Quilter offers valuable perspective on the differences in culture and priorities between the public and private sectors, and how those differences can affect efforts in organizational security. Readers will benefit from the author’s insights on researching and joining a new organization, exploring a business’ structure and culture, and getting to know the executives and leaders within a business. Chapters contain practical advice on specific challenges (crisis management, assaultive behavior, threats to corporate assets, etc.), forming an effective team, and making a business case to gain executive support for a security agenda. This book is vital background for security professionals considering career changes. It will also aid those in established positions in their efforts to communicate, strategize, and implement security programs and goals within a business. From One Winning Career to the Next is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Domestic Violence Spills Over into the Workplace

      • 1st Edition
      • March 26, 2013
      • Rosalind Jackson
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 5 5 1 9
      • eBook
        9 7 8 0 1 2 4 1 6 5 6 6 3
      Domestic Violence Spills Over into the Workplace is a video presentation. Length: 22 minutes. Domestic Violence Spills Over into the Workplace presents ways to assess the danger of and address issues associated with domestic violence in the workplace. This 22-minute video presentation of narrated slides provides valuable information on recognizing signs of abuse, the cost to companies, and what actions to take to mitigate the negative impact of domestic violence in your workplace. It also addresses how to develop and communicate a domestic violence policy and a safety plan for survivors. Presenter Rosalind W. Jackson has years of experience managing workplace violence prevention programs in both corporate office and manufacturing settings. This presentation is a valuable tool for human resources and security professionals for use in training, business and security executives in the development of a corporate domestic violence policy, and educators in the classroom. Domestic Violence Spills Over into the Workplace is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Crisis Management at the Speed of the Internet

      • 1st Edition
      • March 25, 2013
      • Bob Hayes + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 5 8 7 3
      • eBook
        9 7 8 0 1 2 4 1 1 5 9 1 0
      Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster—even if the viral information isn’t factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training. It is a valuable resource for any security professional working to create or improve an existing corporate crisis management policy. Crisis Management at the Speed of the Internet is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Bring Your Own Device (BYOD) to Work

      • 1st Edition
      • March 25, 2013
      • Bob Hayes + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 5 9 2 7
      • eBook
        9 7 8 0 1 2 4 1 1 6 1 0 8
      Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Bring Your Own Device (BYOD) to Work is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Safety Design for Space Operations

      • 1st Edition
      • March 24, 2013
      • Tommaso Sgobba + 3 more
      • English
      • Hardback
        9 7 8 0 0 8 0 9 6 9 2 1 3
      • Paperback
        9 7 8 0 0 8 0 9 7 5 5 2 8
      • eBook
        9 7 8 0 0 8 0 9 6 9 2 2 0
      Endorsed by the International Association for the Advancement of Space Safety (IAASS) and drawing on the expertise of the world’s leading experts in the field, Safety Design for Space Operations provides the practical how-to guidance and knowledge base needed to facilitate effective launch-site and operations safety in line with current regulations. With information on space operations safety design currently disparate and difficult to find in one place, this unique reference brings together essential material on: Best design practices relating to space operations, such as the design of spaceport facilities. Advanced analysis methods, such as those used to calculate launch and re-entry debris fall-out risk. Implementation of safe operation procedures, such as on-orbit space traffic management. Safety considerations relating to the general public and the environment in addition to personnel and asset protection. Taking in launch operations safety relating unmanned missions, such as the launch of probes and commercial satellites, as well as manned missions, Safety Design for Space Operations provides a comprehensive reference for engineers and technical managers within aerospace and high technology companies, space agencies, spaceport operators, satellite operators and consulting firms.
    • Individual Differences and Personality

      • 2nd Edition
      • March 21, 2013
      • Michael C. Ashton
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 9 9 7 1
      • Paperback
        9 7 8 0 1 2 4 1 6 0 0 9 5
      • eBook
        9 7 8 0 1 2 3 9 1 4 7 0 5
      How do we come to be who we are? Why do we differ in our personalities? How do these differences matter in life? Individual Differences and Personality aims to describe how and why personality varies among people. Unlike books that focus on individual theorists, this book focuses on current research and theory on the nature of personality and related individual differences. The book begins by discussing how personality is measured, the concept of a personality trait, and the basic dimensions of personality. This leads to a discussion of the origins of personality, with descriptions of its developmental course, its biological causes, its genetic and environmental influences, and its evolutionary function. The concept of a personality disorder is then described, followed by a discussion of the influence of personality on life outcomes in relationships, work, and health. Finally, the book examines the important differences between individuals in the realms of mental abilities, of beliefs and attitudes, and of behavior.
    • Context Effects on Embodied Representation of Language Concepts

      • 1st Edition
      • March 20, 2013
      • Jie Yang
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 8 1 6 1
      • eBook
        9 7 8 0 1 2 4 0 7 9 3 0 4
      Embodied theories claim that semantic representations are grounded in sensorimotor systems, but the contribution of sensorimotor brain areas in representing meaning is still controversial. One current debate is whether activity in sensorimotor areas during language comprehension is automatic. Numerous neuroimaging studies reveal activity in perception and action areas during semantic processing that is automatic and independent of context, but increasing findings show that involvement of sensorimotor areas and the connectivity between word-form areas and sensorimotor areas can be modulated by contextual information. Context Effects on Embodied Representation of Language Concepts focuses on these findings and discusses the influences from word, phrase, and sentential contexts that emphasize either dominant conceptual features or non-dominant conceptual features.