Politicians and regulators do not run businesses. Bribery and Corruption is for managers who do. It will help you transform uncertainties and problems created via legislation and regulations (such as The UK Bribery Act, The Proceeds of Crime Act, The Foreign Corrupt Practices Act, Sarbanes-Oxley) into opportunities to: • Maintain entrepreneurial, profitable, and enjoyable working environments while easily surpassing compliance standards • Control incoming, internal, outgoing, competitive corruption and fraud • Take decisions in grey areas, confidently Bribery and Corruption frames control and compliance in an entirely different way: not as a brake on your company’s forward motion but as essential protective equipment enabling you to go faster and further in safety. Written by the world’s leading practitioners in the fields of fraud prevention, detection and investigation with massive practical experience in both commercial and governmental sectors, Bribery and Corruption exposes the misconceptions, myths and corruption of the word bribery and suggests effective solutions that go well beyond simple compliance. It commits to assertive managerial rather than timorous legal solutions to anti-bribery and other laws. It explains how processes can be tested - using automated fraud detection software - to expose current cases of fraud and corruption or to provide assurance that controls are functioning optimally. It tackles the usually ignored problems of stratospheric, political, academic and media corruption, which often motivate commercial bribery. It exposes the dangers of employee to employee corruption; skulduggery by blue collar workers and lots more. Over the last 25 years, Mike Comer, occasionally writing with Tim Stephens, has been responsible for some of the most readable and influential books on fraud. Bribery and Corruption is another tour de force, complete, authoritative and yet a great pleasure to read.
The recent turbulence in the stock market has brought into question the way, and prices at which, shares are traded, and how the market effectively values companies. It has also raised public concern as to the way by which dealers and investors take advantage of changes in market prices. A number of high profile criminal prosecutions of insider dealing and market abuse and the frequent claims of other instances, combined with the changes in regulations resulting in a more aggressive and proactive stance by the various regulators, have brought the issue under the spotlight. This book discusses what makes stock market efficiency so important for the economy, looks at the theory and issues that underpin market abuse and why an offence often dismissed as a victimless crime is punished so severely. It explores the impact of perception and other factors that distort the market and outlines the extent of abuse. Regulators, lawyers, company officials, investigators, professional advisers and of course investors, both professional and otherwise will find this a helpful guide to the underlying elements of fraud and market manipulation.
Security Manual provides practical guidance on all aspects of security work and is a ready made source of information for all members of the security profession, including managers, supervisors and trainers. This eighth edition has been fully restructured to better reflect recent changes in the criminal law, fire protection and security practices. New chapters on powers of arrest, industrial disputes, conflict resolution, dealing with emergencies, cultural awareness and door supervising have been added, including the latest information and procedures that should be adopted in relation to an act of terrorism. The manual continues to pay attention to the law of theft, other criminal offences affecting security and the basics of security practice, and can rightly be regarded as the standard overall work on the subject and a practical reference for existing security practitioners and those who are aspiring to enter the security profession. Security Manual is also ideal for those seeking professional qualifications such as: NVQ Levels 1, 2 and 3 in Security Guarding and for Supervisors; NVQ Level 3 in Investigations; C&G, BIIAB and NCFE qualifications in Door Supervision. Security Manual is the essential guide to this subject, and has been described as 'standard issue for every security officer, along with the uniform'.
Brand risk is often narrowly defined as risk to reputation. Yet risk and uncertainty are evident in many aspects of brand performance and marketing operations. Considered and responsible risk-taking is central to effective brand management. Risk literacy is the marketer’s third necessary competence, alongside strategic insight and financial understanding. In Brand Risk, a practical and accessible book for those who hold responsibilities in marketing or risk management, David Abrahams brings together relevant risk thinking and a range of techniques for the evaluation of brand exposures and opportunities - whether in response to the ambitions of a key business project, new market conditions or shareholder concern. A balanced review of the subject is enriched by reference to topics of current interest and is supported by illustrative examples throughout. Presenting the essentials of brand management and risk management side-by-side, Brand Risk offers graduated and complementary approaches to brand risk assessment, from the intuitive to the data-driven.
Executives are under enormous pressure to meet stakeholder expectations regarding the prevention of fraud and corruption. However, the drive to demonstrate that they are complying with legislative requirements and high principles has, in many cases, overshadowed the need to deal with the problem itself. As a result, fraud and corruption remain a significant unmanaged source of risk for many organizations. Drawing on experiences across Europe, America and Australia, Iyer and Samociuk give you the tools to establish an effective and far-reaching anti-fraud and corruption programme. Included is a compendium of techniques for assessing the true risk of fraud and corruption, reducing those risks and using health checks to provide early warnings. Also included is The Tightrope, A Story of Fraud and Corruption...which takes the reader from first suspicions through crisis and finally recovery in a vivid and instructive style, covering the lessons in the main text. This new book is a must-read for all those responsible for the prevention of fraud and corruption, risk management, corporate compliance, corporate responsibility and governance.
Many people in organizations resent internal control and risk management; these two processes representing unwelcome tasks to be completed for the benefit of auditors and regulators. Over the last few years this perception has been heightened by the disastrous implementation of section 404 of the Sarbanes-Oxley Act of 2002, which is generally regarded as having been too expensive for the benefits it has brought. This important book offers a way of improving this prevailing perception and increasing the value of control and risk management by bringing creativity and design skills to the fore. The value of risk and control activities is often limited by the value of the control ideas available and so Matthew Leitch provides an arsenal of 60 high performance control mechanisms. These include several alternative ways to design controls and control systems, as well as providing controls for monitoring and audit, controls for accelerated learning, and techniques for finding and recovering cash. This design material is combined with insights into the psychology of risk control, strategies for encouraging helpful behaviour and enabling change, and a surprisingly simple integration of internal control with risk management. The book is realistic, practical, original, and easier reading than most in the field. The material is not specific to any one country and has international appeal for internal auditors and all those concerned with risk management, corporate governance and security.
Ian Mann's Hacking the Human highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Offering more than a simple checklist to follow, the book provides a rich mix of examples, applied research and practical solutions for security and IT professionals that enable you to create and develop a security solution that is most appropriate for your organization.
The role of internal audit is changing. The Sarbanes-Oxley legislation in the US and the Combined Code for Corporate Governance in the UK focused on the need to demonstrate the active management of risks and report on this subject to shareholders. Boards of Directors are therefore increasingly requiring their Internal Audit functions to provide a much higher level of assurance in this regard. Phil Griffiths' Risk-Based Auditing explains the concepts and practice behind a risk-based approach to auditing. He explores the changing environment in both the private and public sectors and the associated legislation and guidance. The book then provides a blueprint for refocusing the internal audit role to embrace risk and to help plan, market, undertake and report a risk-based audit. The text includes a detailed risk-based audit toolkit with 14 sections of tools, techniques and information to enable a risk-based approach to be adopted. This is an essential guide for internal and external auditors seeking to manage the realities of the audit function in the turbulent and fast-changing business environment that has emerged since the end of the last century.
An earlier book, A Strategic Approach to Corporate Governance (Gower, 1999), examined corporate governance from a philosophical and 'big picture' standpoint. This book digs deeper and explores the operational issues around corporate governance, giving examples of good practice. It is a 'how to' book, which focuses on processes and practical issues, making the case for corporate governance in terms of measurable business benefits and competitive advantage. The author explores a number of key themes: • How corporate governance has expanded in scope and importance worldwide. • How to engage with the wider range of stakeholders whose support is essential for success in a competitive world. • How to distribute power to those who need to use it to perform effectively at all levels in the organisation. • How to encourage the behaviours needed to effect good governance. • How to embed best practice in the daily routine of the organisation. • How to adapt best practice to meet the needs of different organisations. • How effective corporate governance can build sustainable business success. • How corporate governance may evolve to meet the needs of the future. Corporate governance should address the needs of people seeking to cooperate effectively in a shared endeavour. It should be adopted, not imposed and Adrian Davies provides an eloquent and authoritative guide to this process.
HR Transformation Technology is a complete, business-orientated guide to the planning, design and delivery of HR information systems. It spells out the full scope of the applications required to support HR shared services, centres of excellence and business partner roles and goes on to set out the step-by-step process for managing the delivery of a major HR information system project, and ensure it remains on schedule and on budget. HR Transformation Technology provides: • An understanding of the role of IT in HR and the way in which it supports key elements such as the HR shared service centre and HR Business Partners; • A clear picture of the features and benefits of the main types of HR IT application and an overview of what can commonly go wrong; • The knowledge to build and communicate a definitive business case for the project; • Details of the processes to be followed when defining what you need and selecting the partners who can deliver it. The book also provides up to date, practical examples of what other major organizations have achieved along with an invaluable top ten list of dos and don'ts for the HR systems project manager. This book is indispensable for anyone with responsibility for delivering HR systems.
Most organisations purchase off-the-shelf computer-based systems to help them perform their day-to-day business activities. Sadly, many of the purchases fail to live up to expectations. This book provides a blueprint of what to cover in the early stages of the procurement process so as to prevent the recurring problem of information systems projects that run over budget, over time and yet under perform. The questions the book answers are simple but fundamental: where to find advice; who should be involved; how to manage the purchase; how to decide what you need; which package or supplier to choose; how to manage the implementation, and how to know if the system is successful. Real examples of information system purchases are used to help provide practical guidance on the methods, the pitfalls and the keys to success. In addition the book contains several adaptable tables and checklists to provide a flexible and effective step-by-step framework for the entire process.
The issue of brand has overshadowed that of reputation. It has been fashionable to re-brand, spend a lot of money on advertising and hope that you can leave your negative baggage behind. This strategy doesn't always work, witness Monday or Consignia, both victims of their 'infectious history'. Terry Hannington provides a blueprint for effectively measuring and managing your reputation. That means understanding the difference between brand and reputation, the significance of the latter and how you get your reputation in the first place. This book shows you how to measure and understand stakeholder influence via reputation assessment research techniques and, once you have done that, how to build and manage a reputation management plan.
Worldwide, anti-money laundering regulations and legislation have become one of the weapons of choice of governments that are fighting global terrorism and criminality. In this updated edition of Money Laundering, Doug Hopton explains how The Money Laundering Regulations 2007 have extended even further the range of UK businesses covered by the Proceeds of Crime Act to include solicitors, lawyers, accountants, estate agents, high value dealers, trust or company service providers and, in effect, many other companies involved in consultancy or business services. The complexity of the new laws and the limited amount of any case law asks more questions about the responsibilities of these companies and their liabilities. Doug Hopton's highly practical guide explains the basis of international law, regulations and standards in this area and how they affect businesses; and provides down-to-earth advice on the basic rules of good business management: customer due diligence, know your business (and your client's business), which will help companies understand what procedures to establish, and how and when to report suspicious activity. The author explains the basis of money laundering and how it works, along with the development of the law and regulations around the world, and how other countries' laws can affect UK companies.
Public sector fraud seems on the increase in all forms and countries. Part of this may be the impact of technology and the increased sophistication of organized crime; part of it may be a reflection of the increased transparency in the media. Fraud and Corruption in Public Services is a definitive, practical guide to the diverse sources of risk. There is a guidance on civil and criminal law as well as the national and international governmental measures and initiatives for countering this form of criminality. Most importantly of all, the book offers advice, examples and strategy both for preventing and combating fraud and corruption. The text is readable, well-informed and intensely practical; illustrated throughout with examples from the author's thirty year career.
Politicians and regulators do not run businesses. Bribery and Corruption is for managers who do. It will help you transform uncertainties and problems created via legislation and regulations (such as The UK Bribery Act, The Proceeds of Crime Act, The Foreign Corrupt Practices Act, Sarbanes-Oxley) into opportunities to: • Maintain entrepreneurial, profitable, and enjoyable working environments while easily surpassing compliance standards • Control incoming, internal, outgoing, competitive corruption and fraud • Take decisions in grey areas, confidently Bribery and Corruption frames control and compliance in an entirely different way: not as a brake on your company’s forward motion but as essential protective equipment enabling you to go faster and further in safety. Written by the world’s leading practitioners in the fields of fraud prevention, detection and investigation with massive practical experience in both commercial and governmental sectors, Bribery and Corruption exposes the misconceptions, myths and corruption of the word bribery and suggests effective solutions that go well beyond simple compliance. It commits to assertive managerial rather than timorous legal solutions to anti-bribery and other laws. It explains how processes can be tested - using automated fraud detection software - to expose current cases of fraud and corruption or to provide assurance that controls are functioning optimally. It tackles the usually ignored problems of stratospheric, political, academic and media corruption, which often motivate commercial bribery. It exposes the dangers of employee to employee corruption; skulduggery by blue collar workers and lots more. Over the last 25 years, Mike Comer, occasionally writing with Tim Stephens, has been responsible for some of the most readable and influential books on fraud. Bribery and Corruption is another tour de force, complete, authoritative and yet a great pleasure to read.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.