Skip to main content

Books in Social sciences and humanities

  • Financial Whirlpools

    A Systems Story of the Great Global Recession
    • 1st Edition
    • Karen L. Higgins
    • English
    How do economists reconcile their expertise with their failures to predict and manage the 2008 financial crisis? This book goes a long way toward an answer by using systems theory to reveal the complex interdependence of factors and forces behind the crisis. In her fully integrated view of the economy, how it works, and how the economic crisis burst, Karen Higgins combines human psychology, cultural values, and belief formation with descriptions of the ways banks and markets succeed and fail. In each chapter she introduces themes from financial crisis literature and brings a systems-theory treatment of them. Her methodology and visual presentations both develop the tools of systems theory and apply these tools to the financial crisis. Not just another volume about the crisis, this book challenges the status quo through its unique multidisciplinary approach.
  • From One Winning Career to the Next

    Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line
    • 2nd Edition
    • J. David Quilter
    • English
    In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. Having transitioned into the private sector from a long career in public service with the DEA, Quilter offers valuable perspective on the differences in culture and priorities between the public and private sectors, and how those differences can affect efforts in organizational security. Readers will benefit from the author’s insights on researching and joining a new organization, exploring a business’ structure and culture, and getting to know the executives and leaders within a business. Chapters contain practical advice on specific challenges (crisis management, assaultive behavior, threats to corporate assets, etc.), forming an effective team, and making a business case to gain executive support for a security agenda. This book is vital background for security professionals considering career changes. It will also aid those in established positions in their efforts to communicate, strategize, and implement security programs and goals within a business. From One Winning Career to the Next is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Crisis Management at the Speed of the Internet

    Trend Report
    • 1st Edition
    • Bob Hayes + 1 more
    • English
    Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster—even if the viral information isn’t factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training. It is a valuable resource for any security professional working to create or improve an existing corporate crisis management policy. Crisis Management at the Speed of the Internet is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Bring Your Own Device (BYOD) to Work

    Trend Report
    • 1st Edition
    • Bob Hayes + 1 more
    • English
    Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Bring Your Own Device (BYOD) to Work is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Safety Design for Space Operations

    • 1st Edition
    • Tommaso Sgobba + 3 more
    • English
    Endorsed by the International Association for the Advancement of Space Safety (IAASS) and drawing on the expertise of the world’s leading experts in the field, Safety Design for Space Operations provides the practical how-to guidance and knowledge base needed to facilitate effective launch-site and operations safety in line with current regulations. With information on space operations safety design currently disparate and difficult to find in one place, this unique reference brings together essential material on: Best design practices relating to space operations, such as the design of spaceport facilities. Advanced analysis methods, such as those used to calculate launch and re-entry debris fall-out risk. Implementation of safe operation procedures, such as on-orbit space traffic management. Safety considerations relating to the general public and the environment in addition to personnel and asset protection. Taking in launch operations safety relating unmanned missions, such as the launch of probes and commercial satellites, as well as manned missions, Safety Design for Space Operations provides a comprehensive reference for engineers and technical managers within aerospace and high technology companies, space agencies, spaceport operators, satellite operators and consulting firms.
  • Individual Differences and Personality

    • 2nd Edition
    • Michael C. Ashton
    • English
    How do we come to be who we are? Why do we differ in our personalities? How do these differences matter in life? Individual Differences and Personality aims to describe how and why personality varies among people. Unlike books that focus on individual theorists, this book focuses on current research and theory on the nature of personality and related individual differences. The book begins by discussing how personality is measured, the concept of a personality trait, and the basic dimensions of personality. This leads to a discussion of the origins of personality, with descriptions of its developmental course, its biological causes, its genetic and environmental influences, and its evolutionary function. The concept of a personality disorder is then described, followed by a discussion of the influence of personality on life outcomes in relationships, work, and health. Finally, the book examines the important differences between individuals in the realms of mental abilities, of beliefs and attitudes, and of behavior.
  • Context Effects on Embodied Representation of Language Concepts

    • 1st Edition
    • Jie Yang
    • English
    Embodied theories claim that semantic representations are grounded in sensorimotor systems, but the contribution of sensorimotor brain areas in representing meaning is still controversial. One current debate is whether activity in sensorimotor areas during language comprehension is automatic. Numerous neuroimaging studies reveal activity in perception and action areas during semantic processing that is automatic and independent of context, but increasing findings show that involvement of sensorimotor areas and the connectivity between word-form areas and sensorimotor areas can be modulated by contextual information. Context Effects on Embodied Representation of Language Concepts focuses on these findings and discusses the influences from word, phrase, and sentential contexts that emphasize either dominant conceptual features or non-dominant conceptual features.
  • Memory Reconsolidation

    • 1st Edition
    • Cristina M. Alberini
    • English
    As little as 10 years ago, it was believed that memory went from short to long term via one consolidation practice that made that memory intractable. Since then, research has shown that long-term memories can be activated, modified, and reconsolidated in their new form. This research indicates that memories are more dynamic than once believed. And understanding how this process works and helping people to redefine established memories can be clinically useful if those memories lead to problems, as is the case in post-traumatic stress disorder. This book provides a comprehensive overview of research on memory reconsolidation; what this has to say about the formation, storage, and changeability of memory; and the potential applications of this research to treating clinical disorders.
  • Forensic Fraud

    Evaluating Law Enforcement and Forensic Science Cultures in the Context of Examiner Misconduct
    • 1st Edition
    • Brent E. Turvey
    • English
    Forensic Fraud is the culmination of 12 years of research by author Brent E. Turvey. A practicing forensic scientist since 1996, Turvey has rendered this first of its kind study into the widespread problem of forensic fraud in the United States. It defines the nature and scope of the problem, the cultural attitudes and beliefs of those involved, and establishes clear systemic contributors. Backed up by scrupulous research and hard data, community reforms are proposed and discussed in light of the recently published National Academy of Sciences report on forensic science. An adaptation of Dr. Turvey’s doctoral dissertation, this volume relentlessly cites chapter and verse in support of its conclusions that law enforcement cultural and scientific values are incompatible, and that the problem of forensic fraud is systemic in nature. It begins with an overview of forensic fraud as a sub-type of occupational fraud, it explores the extent of fraud in both law enforcement and scientific employment settings, it establishes and then contrasts the core values of law enforcement and scientific cultures and then it provides a comprehensive review of the scientific literature regarding forensic fraud. The final chapters present data from Dr. Turvey’s original research into more than 100 fraudulent examiners between 2000 and 2010, consideration of significant findings, and a review of proposed reforms to the forensic science community based on what was learned. It closes with a chapter on the numerous crime lab scandals, and closures that occurred between 2010 and 2012 – an update on the deteriorating state of the forensic science community in the United States subsequent to data collection efforts in the present research. Forensic Fraud is intended for use as a professional reference manual by those working in the criminal system who encounter the phenomenon and want to understand its context and origins. It is intended to help forensic scientist and their supervisors to recognize, manage and expel it; to provide policy makers with the necessary understaffing for acknowledging and mitigating it; and to provide agents of the courts with the knowledge, and confidence, to adjudicate it. It is also useful for those at the university level seeking a strong secondary text for courses on forensic science, law and evidence, or miscarriages of justice.
  • Climate Vulnerability

    Understanding and Addressing Threats to Essential Resources
    • 1st Edition
    • Roger A. Pielke Sr.
    • English
    Climate change has been the subject of thousands of books and magazines, scientific journals, and newspaper articles daily. It’s a subject that can be very political and emotional, often blurring the lines between fact and fiction. The vast majority of research, studies, projections and recommendations tend to focus on the human influence on climate change and global warming as the result of CO2 emissions, often to the exclusion of other threats that include population growth and the stress placed on energy sources due to emerging global affluence. Climate Vulnerability, Five Volume Set seeks to strip away the politics and emotion that surround climate change and will assess the broad range of threats using the bottom up approach—including CO2 emissions, population growth, emerging affluence, and many others—to our five most critical resources: water, food, ecosystems, energy, and human health. Inclusively determining what these threats are while seeking preventive measures and adaptations is at the heart of this unique reference work.