Listing 1 - 10 of 65 | << page >> |
Sort by
|
Choose an application
Die vorliegende Publikation thematisiert das Misstrauen und Vertrauen von Mitarbeitenden in einem Unternehmen. Das Fallstudiendesign besteht aus der Kombination von drei Erhebungsmethoden. Aus der Analyse der subjektiv erlebten Ereignisse stellt die Autorin die misstrauensbildenden Faktoren von Mitarbeitenden dar. Die Mitarbeitenden haben negative Wahrnehmungen und Erwartungen gegenüber dem Unternehmen, da sie prognostizieren, in Zukunft geschädigt zu werden. Ihre Misstrauensbildung ist von einer negativen Reziprozität und der gegenseitigen Selbstbestätigung geprägt. Aus den Erkenntnissen können Praxismaßnahmen zur Überwindung von starkem Misstrauen abgeleitet werden.
Choose an application
Employee crimes. --- Employee theft. --- Risk. --- Sabotage.
Choose an application
It's risky business...
Risk management. --- Fraud --- Employee crimes --- Prevention.
Choose an application
Violence in the workplace --- Employee crimes --- Prevention.
Choose an application
Violence in the workplace. --- Workplace violence --- Employee crimes --- Work environment
Choose an application
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success of - and insight provided by - the first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka "rising tide") insider attacks. This edition is fully updated with coverage from the previous edition having undergone extensive review and revision, including updating citations and publications that have been published in the last decade. Three new chapters drill down into the advanced exploration of rising tide threats, examining the nuanced complexities and presenting new tools such as the loyalty ledger (Chapter 10) and intensity scale (Chapter 11). New explorations of ambiguous situations and options for thwarting hostile insiders touch on examples that call for tolerance, friction, or radical turnaround (Chapter 11). Additionally, a more oblique discussion (Chapter 12) explores alternatives for bolstering organizational resilience in circumstances where internal threats show signs of gaining ascendancy over external ones, hence a need for defenders to promote clearer thinking as a means of enhancing resilience against hostile insiders. Coverage goes on to identify counters to such pitfalls, called lifelines, providing examples of questions rephrased to encourage clear thinking and reasoned debate without inviting emotional speech that derails both. The goal is to redirect hostile insiders, thereby offering alternatives to bolstering organizational resilience - particularly in circumstances where internal threats show signs of gaining ascendancy over external ones, hence a need for defenders to promote clearer thinking as a means of enhancing resilience against hostile insiders. Defenders of institutions and observers of human rascality will find, in Managing the Insider Threat, Second Edition, new tools and applications for the No Dark Corners approach to countering a vexing predicament that seems to be increasing in frequency, scope, and menace.
Corporations --- Employee crimes --- Sabotage in the workplace --- Security measures. --- Prevention.
Choose an application
Corporations --- Employee crimes --- Computer networks --- Security measures. --- Prevention.
Choose an application
""If you don't think that some employees have figured out ingenious ways to steal from businesses, read this book. The real-life examples will change your mind."" -Joseph T. Wells, CFE, CPA, founder and Chairman, Association of Certified Fraud Examiners ""An easy-to-read, but comprehensive step-by-step approach that covers every potential area for employee fraud and embezzlement. Great checklists at the end of each chapter show what steps to put into place for controls and protection. Includes real-life examples that really 'bring the story home.' "" -Jean L. Conover, CPA, past CEO/
Employee theft --- Employee theft. --- Embezzlement --- Embezzlement. --- Employee crimes --- Prevention.
Choose an application
The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully.Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable results. To achieve this and reduce the exposure to unnecessary business disruptions and litigation, every workplace investigation must by driven by process. Investigations in the Workplace, Second Edition pro
Employee crimes. --- Investigations --- Employee theft --- Personnel management --- Investigation
Choose an application
"A professional guide to developing training for fraud risk and detection. This book provides a simple but effective method of developing a fraud risk awareness strategy that focuses on training employees using a six-stage approach to this task that involves understanding the threat, appreciating respective responsibilities, embracing a sound moral compass, recognizing red flags, mastering suitable internal controls, and managing the risk of fraud. Using this step-by-step approach, all senior executives, managers, employees, and associates can develop an important new skill set that will help them understand and deal with the risk of fraud in the workplace"--
Employee theft. --- Employee crimes --- Fraud --- Auditing, Internal. --- Prevention.
Listing 1 - 10 of 65 | << page >> |
Sort by
|