000 04225cam a2200553Mu 4500
001 ocn862831013
003 OCoLC
005 20220525094356.0
006 m d
007 cr |n|
008 131111s2013 vtu o 000 0 eng d
020 _a9780124172432 (electronic bk.)
020 _a0124172431 (electronic bk.)
035 _a(OCoLC)862831013
035 _a596596
040 _aEBLCP
_beng
_epn
_cEBLCP
_dOCLCQ
_dYDXCP
_dN$T
049 _aN$TA
050 4 _aHD61
072 7 _aBUS
_x082000
_2bisacsh
072 7 _aBUS
_x041000
_2bisacsh
072 7 _aBUS
_x042000
_2bisacsh
072 7 _aBUS
_x085000
_2bisacsh
082 0 4 _a658.15/5
_223
100 1 _aD'Addario, Francis J.
245 1 0 _aInfluencing Enterprise Risk Mitigation
_h[electronic resource].
250 _a2nd ed.
260 _aBurlington :
_bElsevier Science,
_c2013.
300 _a1 online resource (160 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aFront Cover; Influencing Enterprise Risk Mitigation; Copyright Page; Dedication; Contents; Acknowledgments; Foreword; Interdependent Communities Require Protection; Introduction; 1 The Psychology of Security; 1.1 Begin at Home; 1.2 People are the Tipping Point; 1.3 Brand Reputation; 1.4 Safety and Security Sustainability; 1.5 We are Survivors; 2 The Geography of Risk; 2.1 Assessing Priorities and the Strategic Game Plan; 2.2 All-Hazards Mitigation; 2.3 Just-In-Time Preparedness; 2.4 Mapping Strategy to Stakeholder Requirements; 3 Who's Who in the Zoo?; 3.1 Insider and Outsider Risks.
505 8 _a3.2 Layered and Integrated Security Solutions3.3 Inspect Who You Expect; 4 Prioritizing Risk Mitigation; 4.1 Prioritizing Prevention; 4.2 Piloting New Security; 4.3 Integration; 4.4 Galvanizing Resources; 4.5 Documenting Pilot Results; 5 Estimating Return on Security Investment; 5.1 Charting a Course for Prevention and Mitigation Investment; 5.2 Communicating the Big Picture; 5.3 Charter Summary: The Elevator Speech; 5.4 Costs, Losses, and Benefits Determine Return on Investment; 5.5 Measure Twice, Cut Once, and Report; 5.6 Exception Detection Enables the Core Business.
505 8 _a5.7 Estimating Net Return on Investment6 Leveraging Data to Lead with Good Practices; 6.1 Surveys and Benchmarks; 6.2 Case Study: Using Benchmarks to Support a Security Proposal; 6.3 Leadership Courage and Collaboration; 6.4 Identifying Good Practices; 6.5 A Converged Approach; 7 Governance for Sustainability; 8 Resilience; 8.1 Responsibility Ensures Resilience; 8.2 Resilience Requires Preparedness; 8.3 Learning Our Way; 8.4 The Value Opportunity; 8.5 Evolving Individual and Organizational Behavior; Epilogue; About the Author.
505 8 _aAbout Elsevier's Security Executive Council Risk Management PortfolioReferences; Index.
520 _aIn Influencing Enterprise Risk Mitigation, author Francis J. D'Addario draws on his many years of impressive security experience to describe business risk prevention and mitigation strategies. D'Addario, former security manager at Starbucks, Hardee's, and Jerrico, shares stories of risk mitigation successes and failures-including natural disasters, a triple murder, and multimillion dollar fraud schemes-to help explain the need for an all-hazard risk mitigation approach. In this book, the author discusses the psychology of security, the geography of risk, and baseline identity authenticatio.
588 _aDescription based on print version record.
650 0 _aRisk management.
650 7 _aBUSINESS & ECONOMICS / Industrial Management
_2bisacsh
650 7 _aBUSINESS & ECONOMICS / Management
_2bisacsh
650 7 _aBUSINESS & ECONOMICS / Management Science
_2bisacsh
650 7 _aBUSINESS & ECONOMICS / Organizational Behavior
_2bisacsh
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aD'Addario, Francis J.
_tInfluencing Enterprise Risk Mitigation.
_dBurlington : Elsevier Science, �2013
_z9780124172333
850 _aVJRL-AP
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=596596
910 _acpp1723AUTO
942 _2nlm
_cEBK
999 _c36014
_d36014