The complete guide to business risk management:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Aldershot
Gower
2005
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Table of contents Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XIV, 329 S. Ill. |
ISBN: | 0566086611 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021538575 | ||
003 | DE-604 | ||
005 | 20060712 | ||
007 | t | ||
008 | 060404s2005 xxka||| |||| 00||| eng d | ||
010 | |a 2005001195 | ||
020 | |a 0566086611 |9 0-566-08661-1 | ||
035 | |a (OCoLC)57434302 | ||
035 | |a (DE-599)BVBBV021538575 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-1049 | ||
050 | 0 | |a HD61 | |
082 | 0 | |a 658.155 |2 22 | |
084 | |a QP 360 |0 (DE-625)141869: |2 rvk | ||
100 | 1 | |a Sadgrove, Kit |e Verfasser |4 aut | |
245 | 1 | 0 | |a The complete guide to business risk management |c Kit Sadgrove |
250 | |a 2. ed. | ||
264 | 1 | |a Aldershot |b Gower |c 2005 | |
300 | |a XIV, 329 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Risk management | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip056/2005001195.html |3 Table of contents | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014754809&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014754809 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804135288665014272 |
---|---|
adam_text | Contents
List of figures *
List of tables xiii
Preface â„¢
Acknowledgements xvl1
1. Risk Management: A Powerful Tool 1
History of risk management
Risk management standards
What are business risks?
What kinds of organizations are affected?
Risk management terms
Which risks are important?
The dangers of uncontrolled risk
Is risk management relevant to your organization?
The benefits of managing risk
Why risk management is growing in importance
Risk management lacks maturity
How much risk is acceptable?
Comparing risk and reward
How much should be spent on risk management?
Steps to take
Useful links
2. Denning and Assessing Risk
Define the revenue drivers
Key success factors
The four types of risk
Strategic risk 21
Operational risk 2,
The four steps in assessing risk
How likely is the risk? How severe would its impact be? ^
Doing the assessment _„
Simpler assessments „
Gathering the information
Useful links
41
3. Managing Corporate Risk 41
Getting corporate strategy right 42
RocnnniiV Ui« i7 fr r ri«k manaffement
vi The Complete Guide to Business Risk Management
Responsibility for risk assessment 47
Auditors 47
Training people to be aware of risk and to reduce error 49
Risk management qualifications 50
Devolving responsibility and a culture of openness 50
Avoiding groupthink 51
Manage the processes 52
Spread the risk 53
Monitor the risk 54
Setting a risk management budget 55
Using risk management consultants 56
Useful links 56
Risk assessment risk organization 58
4. Product and Service Problems: Operations and Production Risk 59
The consequences of mundane failures 59
Catastrophic failure 61
Product liability in Europe 62
Service failings 64
Financial risk for government bodies 66
How to achieve reliability and consistency 66
Using a management system to control your risks 67
People, technology and design 69
Useful links 71
Risk assessment operations and production 72
5. Purchasing Problems 73
Supplies risk 73
Useful links 84
Risk assessment purchasing 85
6. Managing Health and Safety 87
The real cost of accidents 87
Corporate risks in health and safety 88
Risk assessment in health and safety 89
Minimizing the risks 91
Workplace hazards 93
Safe systems of work 99
Useful links 99
Risk assessment health and safety 100
7. Preventing Environmental Damage 101
The seven penalties of environmental damage 101
Eight ways to pollute 102
Eight changes that will create environmental risk for some businesses and
opportunities for others 107
Does being green give a company an advantage? 109
Strategies for reducing environmental risk 109
Contents vii
Is environmental conformance a threat? 114
Animal rights 114
Useful links 115
Risk assessment environment 116
8. Protecting Against Fire 117
Fire as a commercial risk 117
Designing a fire risk strategy 117
Minimizing the effects of fire 122
Useful links 122
Risk assessment fire 123
9. Maintaining Security 125
What are security risks and what damage can they cause? 125
Conducting a security review 125
Natural threats to buildings 130
Public events I30
Retail security I30
Vandalism 132
Espionage 132
Recruitment I34
Safeguarding intellectual property I34
Tampering 134
Extortion 135
Terrorism ^5
Kidnap and ransom ^7
Murder and execution 1^8
International security 138
High risk regions for foreign businesses 139
Security services
Useful links 142
Risk assessment security 14
10. Pre empting Fraud 145
The scale of the problem 145
Why fraud takes place 146
Who commits fraud? 146
147
How fraud happens
Types of fraud 149
The indicators of fraud lS
Vulnerability analysis !
Preventing fraud
How to minimize fraud
What to do on discovering fraud
What companies do to prevent and report fraud
Useful links j*
Risk assessment fraud
viii The Complete Guide to Business Risk Management
11. Staying Financially Healthy 163
Pre empting financial risk 163
Seven ways to reduce financial risk 164
The need for healthy margins 164
Cutting overheads 165
Reducing production or operating costs 165
Unprofitable prices 171
Bad debt 171
Excessive borrowing 172
Selling or closing part of the business 173
Overseas investment 173
Financial management 175
What to do if a cash crisis happens 176
Reporting adverse results 176
Responding to a takeover bid 177
Reporting risk in financial accounts 177
How likely is the business to go bankrupt? 178
Useful links 178
Risk assessment finance 180
12. Avoiding IT Disaster 181
How prevalent is computer failure? 181
How serious is data loss? 181
What causes computer failure and data loss? 182
How easy is recovery? 182
The problems caused 182
The six main types of IT risk 184
Avoiding theft 185
Protecting the system against unauthorized access 185
How to avoid infection 186
Minimizing the effects of hardware failures and user error 188
Minimizing the effects of losing data 188
Spyware 188
Scams 189
Software piracy 189
Setting a policy 191
Contingency planning 191
BS EN ISO 17799 191
Outsourcing IT 192
Useful links 193
Risk assessment IT 194
13. Liability, Legal Risks and Intellectual Property 195
Litigation 195
Regulatory controls 197
Non executive directors 201
Diversification 201
Divestment 203
Contents ix
The legal risks of email 205
Useful links 207
Risk assessment legal risks 209
14. Market Leadership through Risk Management 211
Strategic marketing vision 211
Being in the right market 211
The causes of marketing failure 213
Problems caused by government policies 213
Problems caused by changes in the market 214
Problems caused by price wars 216
Counterfeiting 218
Mimicry 219
International market failure weak product performance 220
Poor promotion 221
Branding problems 222
Effective innovation 222
Over reliance on a few customers 225
Distribution failures 225
Superior performance 226
Loss of corporate reputation 227
Information 228
Focus on the customer 229
Useful links 230
Risk assessment marketing 231
15. People Risks and Corporate Ethics 233
Quality of the board 233
Managing succession 234
Key worker risks 235
Managing people 235
Stress and bad healthcare 239
Industrial relations and disputes 24^
Ethics 241
Useful links 25°
Risk assessment people and ethics 25 *
16. Contingency Planning, Crisis Management and Business Continuity 253
Sources of crisis
Slow burn versus sudden catastrophe
The causes: management or the unexpected? 255
Crises by industry 255
Taking steps to prevent a crisis
Forecasting and scenario planning
How to prepare an emergency plan
How a crisis develops
Dealing with disaster
How to handle the media 67
Re startinp thp hniinpsv after the crisis
x The Complete Guide to Business Risk Management
Useful links 270
Risk assessment business continuity 271
17. Introducing a Risk Management System 273
What is a management system? 273
Benefits of a risk management system 274
Disadvantages of a risk management system 274
Accounting for the unexpected 275
Assessing risk 275
Origins of the standards 276
A review of the major risk management systems 277
A plethora of standards 284
Documentation 285
Communication 285
Useful links 287
18. Minimizing Risk in Major Projects 289
Nine steps for managing project risk 289
Risk/reward contracts 292
Risk in IT projects 292
Useful links 296
19. What Risks will the Future Bring? 297
Linear change 297
Cyclical change 299
Major socio economic changes 300
Political change 301
Social change 301
Forecast job growth and decline 302
Technological changes 306
Climate and weather risks 309
Useful links 310
Appendix 311
Resources JlJ
Further reading 317
Glossary 319
Index 323
List of figures
1.1 The three ages of risk management 2
1.2 Percentage of respondents ranking a risk as very important to their company
today and tomorrow 6
1.3 Top hazards, as rated by CFOs and risk managers, US and Europe 7
1.4 Determining acceptable risk 13
1.5 The effect on cost of managing risk 14
1.6 A structure for managing risk 15
2.1 The four types of risk 20
2.2 Strategic risks 20
2.3 The widening effects of risk 22
2.4 The four stages of risk management 24
2.5 Flow diagram for risk assessment and treatment 25
2.6 Risk severity and probability 27
2.7 3 x 3 matrix for risk assessment 28
2.8 Risk assessment and management 32
2.9 Risk questionnaire 34
2.10 Pareto chart 35
2.11 Site by site action plan 38
3.1 Traditional management responsibilities for risk 42
3.2 To whom does risk management report in your company? 45
4.1 The three production modes 67
5.1 Number of suppliers used by large companies per item 74
5.2 Supplier assessment at Cow Gate 83
6.1 Non fatal major injuries to employees, 2004 96
7.1 Action to prevent environmental risk 109
7.2 The green grid m
8.1 Fire risk strategy 118
9.1 The five security zones
9.2 The four elements of a security strategy 127
9.3 Visibility and recovery 136
10.1 Reasons why business is more vulnerable to fraud I46
10.2 Preconditions for fraud 147
10.3 Companies which are less susceptible to fraud 148
10.4 Typical areas of fraud 15*
12.1 Causes of data loss
12.2 At what point does the loss of data threaten the survival of the business? 184
14.1 Strategic marketing vision
14.2 Price versus performance
14.3 New product development strategy
14.4 Public views on white collar crime
xii The Complete Guide to Business Risk Management
16.1 Escalating the response 259
16.2 Stages of a crisis 260
17.1 Predictability of risks 275
17.2 How risks are developed from corporate values, through the interaction of
company assets and external values 276
17.3 An overview of AS/NZS 4360 278
17.4 Risk management process diagram 280
17.5 COSO Framework objectives and components depicted in a three
dimensional matrix 283
19.1 Maslow s hierarchy of human needs 298
19.2 Linear change 299
19.3 The swing of the pendulum: cyclical change some themes 299
19.4 Moore s law as demonstrated in Intel microprocessors 307
List of tables
1.1 Some recent catastrophes 4
1.2 The results of uncontrolled risk 8
1.3 Advantages of managing risk proactively 9
1.4 Incidence of contingency plans for specific risks (UK) 12
1.5 Attitudes to risk, and their implications 12
2.1 Top revenue drivers 18
2.2 Key success factors 19
2.3 Operational hazards classified by time 21
2.4 Classifying risks by cause 23
2.5 Defining the scale of impact on the business (with some examples) 29
2.6 Sources of information 33
2.7 Heat map 35
2.8 Vulnerability audit 39
2.9 Risk register 39
3 • 1 Extract from NHS Clinical Negligence Scheme for Trusts (CNST) manual 51
3.2 Risk treatment plan 53
3.3 The organization s annual budget for business continuity management
products and services 55
4.1 Product and service risks and solutions 60
4.2 Types of services found in service organizations 64
51 Grading suppliers 76
61 Risk assessment chart 90
6 2 Strategies for minimizing risk 91
6 3 Hazardous substances assessment 95
6 4 Radiations: causes and effects 97
7 l EU list 1 dangerous substances 105
7 2 Register of significant aspects 113
8 l Causes of fires put out by fire extinguisher 118
91 Security review 126
9 2 Percentage losses caused by shrinkage 130
9 3 List of products and items most likely to be stolen 131
9 4 Risky locations throughout the world 139
9 5 Most and least corrupt countries 141
10.1 Vulnerability analysis 155
12.1 Most commonly identified consequences of computer disaster 183
13.1 Divestment strategy 203
!32 Number of UK patents granted 204
14 1 Fastest growing private label categories 218
14 2 Leaders and laggards 223
14.3 Benchmarking exercise small electrical goods 229
xiv The Complete Guide to Business Risk Management
15.1 Code of conduct structure 249
16.1 Crises reported in the media 254
16.2 Most crisis prone industries (USA) 255
16.3 Planning scenarios 257
16.4 Sample emergency form 264
16.5 Impact analysis 265
17.1 Elements of a risk management system 2 74
17.2 Risk description 281
17.3 Evaluating the quality of information on potential hazards in financial
statements 286
18.1 Project management nine steps 290
19.1 USA occupations with the largest forecast job growth, in thousands,
2002 2012 303
19.2 Fastest growing occupations, 2002 2012 304
19.3 Occupations with the largest job decline, 2002 2012 305
|
adam_txt |
Contents
List of figures *'
List of tables xiii
Preface â„¢
Acknowledgements xvl1
1. Risk Management: A Powerful Tool 1
History of risk management
Risk management standards
What are business risks?
What kinds of organizations are affected?
Risk management terms
Which risks are important?
The dangers of uncontrolled risk
Is risk management relevant to your organization?
The benefits of managing risk
Why risk management is growing in importance
Risk management lacks maturity
How much risk is acceptable?
Comparing risk and reward
How much should be spent on risk management?
Steps to take
Useful links
2. Denning and Assessing Risk
Define the 'revenue drivers'
Key success factors
The four types of risk
Strategic risk 21
Operational risk 2,
The four steps in assessing risk
How likely is the risk? How severe would its impact be? ^
Doing the assessment _„
Simpler assessments „
Gathering the information
Useful links
41
3. Managing Corporate Risk 41
Getting corporate strategy right 42
RocnnniiV Ui« i7 fr r ri«k manaffement
vi The Complete Guide to Business Risk Management
Responsibility for risk assessment 47
Auditors 47
Training people to be aware of risk and to reduce error 49
Risk management qualifications 50
Devolving responsibility and a culture of openness 50
Avoiding groupthink 51
Manage the processes 52
Spread the risk 53
Monitor the risk 54
Setting a risk management budget 55
Using risk management consultants 56
Useful links 56
Risk assessment risk organization 58
4. Product and Service Problems: Operations and Production Risk 59
The consequences of mundane failures 59
Catastrophic failure 61
Product liability in Europe 62
Service failings 64
Financial risk for government bodies 66
How to achieve reliability and consistency 66
Using a management system to control your risks 67
People, technology and design 69
Useful links 71
Risk assessment operations and production 72
5. Purchasing Problems 73
Supplies risk 73
Useful links 84
Risk assessment purchasing 85
6. Managing Health and Safety 87
The real cost of accidents 87
Corporate risks in health and safety 88
Risk assessment in health and safety 89
Minimizing the risks 91
Workplace hazards 93
Safe systems of work 99
Useful links 99
Risk assessment health and safety 100
7. Preventing Environmental Damage 101
The seven penalties of environmental damage 101
Eight ways to pollute 102
Eight changes that will create environmental risk for some businesses and
opportunities for others 107
Does being green give a company an advantage? 109
Strategies for reducing environmental risk 109
Contents vii
Is environmental conformance a threat? 114
Animal rights 114
Useful links 115
Risk assessment environment 116
8. Protecting Against Fire 117
Fire as a commercial risk 117
Designing a fire risk strategy 117
Minimizing the effects of fire 122
Useful links 122
Risk assessment fire 123
9. Maintaining Security 125
What are security risks and what damage can they cause? 125
Conducting a security review 125
Natural threats to buildings 130
Public events I30
Retail security I30
Vandalism 132
Espionage 132
Recruitment I34
Safeguarding intellectual property I34
Tampering 134
Extortion 135
Terrorism ^5
Kidnap and ransom ^7
Murder and execution 1^8
International security 138
High risk regions for foreign businesses 139
Security services
Useful links 142
Risk assessment security 14
10. Pre empting Fraud 145
The scale of the problem 145
Why fraud takes place 146
Who commits fraud? 146
147
How fraud happens
Types of fraud 149
The indicators of fraud lS
Vulnerability analysis !
Preventing fraud
How to minimize fraud
What to do on discovering fraud
What companies do to prevent and report fraud
Useful links j*
Risk assessment fraud
viii The Complete Guide to Business Risk Management
11. Staying Financially Healthy 163
Pre empting financial risk 163
Seven ways to reduce financial risk 164
The need for healthy margins 164
Cutting overheads 165
Reducing production or operating costs 165
Unprofitable prices 171
Bad debt 171
Excessive borrowing 172
Selling or closing part of the business 173
Overseas investment 173
Financial management 175
What to do if a cash crisis happens 176
Reporting adverse results 176
Responding to a takeover bid 177
Reporting risk in financial accounts 177
How likely is the business to go bankrupt? 178
Useful links 178
Risk assessment finance 180
12. Avoiding IT Disaster 181
How prevalent is computer failure? 181
How serious is data loss? 181
What causes computer failure and data loss? 182
How easy is recovery? 182
The problems caused 182
The six main types of IT risk 184
Avoiding theft 185
Protecting the system against unauthorized access 185
How to avoid infection 186
Minimizing the effects of hardware failures and user error 188
Minimizing the effects of losing data 188
Spyware 188
Scams 189
Software piracy 189
Setting a policy 191
Contingency planning 191
BS EN ISO 17799 191
Outsourcing IT 192
Useful links 193
Risk assessment IT 194
13. Liability, Legal Risks and Intellectual Property 195
Litigation 195
Regulatory controls 197
Non executive directors 201
Diversification 201
Divestment 203
Contents ix
The legal risks of email 205
Useful links 207
Risk assessment legal risks 209
14. Market Leadership through Risk Management 211
Strategic marketing vision 211
Being in the right market 211
The causes of marketing failure 213
Problems caused by government policies 213
Problems caused by changes in the market 214
Problems caused by price wars 216
Counterfeiting 218
Mimicry 219
International market failure weak product performance 220
Poor promotion 221
Branding problems 222
Effective innovation 222
Over reliance on a few customers 225
Distribution failures 225
Superior performance ' 226
Loss of corporate reputation 227
Information 228
Focus on the customer 229
Useful links 230
Risk assessment marketing 231
15. People Risks and Corporate Ethics 233
Quality of the board 233
Managing succession 234
Key worker risks 235
Managing people 235
Stress and bad healthcare 239
Industrial relations and disputes 24^
Ethics 241
Useful links 25°
Risk assessment people and ethics 25 *
16. Contingency Planning, Crisis Management and Business Continuity 253
Sources of crisis
Slow burn versus sudden catastrophe
The causes: management or the unexpected? 255
Crises by industry 255
Taking steps to prevent a crisis
Forecasting and scenario planning
How to prepare an emergency plan
How a crisis develops
Dealing with disaster
How to handle the media 67
Re startinp thp hniinpsv after the crisis
x The Complete Guide to Business Risk Management
Useful links 270
Risk assessment business continuity 271
17. Introducing a Risk Management System 273
What is a management system? 273
Benefits of a risk management system 274
Disadvantages of a risk management system 274
Accounting for the unexpected 275
Assessing risk 275
Origins of the standards 276
A review of the major risk management systems 277
A plethora of standards 284
Documentation 285
Communication 285
Useful links 287
18. Minimizing Risk in Major Projects 289
Nine steps for managing project risk 289
Risk/reward contracts 292
Risk in IT projects 292
Useful links 296
19. What Risks will the Future Bring? 297
Linear change 297
Cyclical change 299
Major socio economic changes 300
Political change 301
Social change 301
Forecast job growth and decline 302
Technological changes 306
Climate and weather risks 309
Useful links 310
Appendix 311
Resources JlJ
Further reading 317
Glossary 319
Index 323
List of figures
1.1 The three ages of risk management 2
1.2 Percentage of respondents ranking a risk as very important to their company
today and tomorrow 6
1.3 Top hazards, as rated by CFOs and risk managers, US and Europe 7
1.4 Determining acceptable risk 13
1.5 The effect on cost of managing risk 14
1.6 A structure for managing risk 15
2.1 The four types of risk 20
2.2 Strategic risks 20
2.3 The widening effects of risk 22
2.4 The four stages of risk management 24
2.5 Flow diagram for risk assessment and treatment 25
2.6 Risk severity and probability 27
2.7 3 x 3 matrix for risk assessment 28
2.8 Risk assessment and management 32
2.9 Risk questionnaire 34
2.10 Pareto chart 35
2.11 Site by site action plan 38
3.1 Traditional management responsibilities for risk 42
3.2 To whom does risk management report in your company? 45
4.1 The three production modes 67
5.1 Number of suppliers used by large companies per item 74
5.2 Supplier assessment at Cow Gate 83
6.1 Non fatal major injuries to employees, 2004 96
7.1 Action to prevent environmental risk 109
7.2 The green grid m
8.1 Fire risk strategy 118
9.1 The five security zones
9.2 The four elements of a security strategy 127
9.3 Visibility and recovery 136
10.1 Reasons why business is more vulnerable to fraud I46
10.2 Preconditions for fraud 147
10.3 Companies which are less susceptible to fraud 148
10.4 Typical areas of fraud 15*
12.1 Causes of data loss
12.2 At what point does the loss of data threaten the survival of the business? 184
14.1 Strategic marketing vision
14.2 Price versus performance
14.3 New product development strategy
14.4 Public views on white collar crime
xii The Complete Guide to Business Risk Management
16.1 Escalating the response 259
16.2 Stages of a crisis 260
17.1 Predictability of risks 275
17.2 How risks are developed from corporate values, through the interaction of
company assets and external values 276
17.3 An overview of AS/NZS 4360 278
17.4 Risk management process diagram 280
17.5 COSO Framework objectives and components depicted in a three
dimensional matrix 283
19.1 Maslow's hierarchy of human needs 298
19.2 Linear change 299
19.3 The swing of the pendulum: cyclical change some themes 299
19.4 Moore's law as demonstrated in Intel microprocessors 307
List of tables
1.1 Some recent catastrophes 4
1.2 The results of uncontrolled risk 8
1.3 Advantages of managing risk proactively 9
1.4 Incidence of contingency plans for specific risks (UK) 12
1.5 Attitudes to risk, and their implications 12
2.1 Top revenue drivers 18
2.2 Key success factors 19
2.3 Operational hazards classified by time 21
2.4 Classifying risks by cause 23
2.5 Defining the scale of impact on the business (with some examples) 29
2.6 Sources of information 33
2.7 Heat map 35
2.8 Vulnerability audit 39
2.9 Risk register 39
3 • 1 Extract from NHS Clinical Negligence Scheme for Trusts (CNST) manual 51
3.2 Risk treatment plan 53
3.3 The organization's annual budget for business continuity management
products and services 55
4.1 Product and service risks and solutions 60
4.2 Types of services found in service organizations 64
51 Grading suppliers 76
61 Risk assessment chart 90
6 2 Strategies for minimizing risk 91
6 3 Hazardous substances assessment 95
6 4 Radiations: causes and effects 97
7 l EU list 1 dangerous substances 105
7 2 Register of significant aspects 113
8 l Causes of fires put out by fire extinguisher 118
91 Security review 126
9 2 Percentage losses caused by shrinkage 130
9 3 List of products and items most likely to be stolen 131
9 4 Risky locations throughout the world 139
9 5 Most and least corrupt countries 141
10.1 Vulnerability analysis 155
12.1 Most commonly identified consequences of computer disaster 183
13.1 Divestment strategy 203
!32 Number of UK patents granted 204
14 1 Fastest growing private label categories 218
14 2 Leaders and laggards 223
14.3 Benchmarking exercise small electrical goods 229
xiv The Complete Guide to Business Risk Management
15.1 Code of conduct structure 249
16.1 Crises reported in the media 254
16.2 Most crisis prone industries (USA) 255
16.3 Planning scenarios 257
16.4 Sample emergency form 264
16.5 Impact analysis 265
17.1 Elements of a risk management system 2 74
17.2 Risk description 281
17.3 Evaluating the quality of information on potential hazards in financial
statements 286
18.1 Project management nine steps 290
19.1 USA occupations with the largest forecast job growth, in thousands,
2002 2012 303
19.2 Fastest growing occupations, 2002 2012 304
19.3 Occupations with the largest job decline, 2002 2012 305 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Sadgrove, Kit |
author_facet | Sadgrove, Kit |
author_role | aut |
author_sort | Sadgrove, Kit |
author_variant | k s ks |
building | Verbundindex |
bvnumber | BV021538575 |
callnumber-first | H - Social Science |
callnumber-label | HD61 |
callnumber-raw | HD61 |
callnumber-search | HD61 |
callnumber-sort | HD 261 |
callnumber-subject | HD - Industries, Land Use, Labor |
classification_rvk | QP 360 |
ctrlnum | (OCoLC)57434302 (DE-599)BVBBV021538575 |
dewey-full | 658.155 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.155 |
dewey-search | 658.155 |
dewey-sort | 3658.155 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01532nam a2200421zc 4500</leader><controlfield tag="001">BV021538575</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060712 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060404s2005 xxka||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005001195</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0566086611</subfield><subfield code="9">0-566-08661-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)57434302</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021538575</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD61</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.155</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 360</subfield><subfield code="0">(DE-625)141869:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sadgrove, Kit</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The complete guide to business risk management</subfield><subfield code="c">Kit Sadgrove</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Aldershot</subfield><subfield code="b">Gower</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 329 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip056/2005001195.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014754809&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014754809</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV021538575 |
illustrated | Illustrated |
index_date | 2024-07-02T14:27:34Z |
indexdate | 2024-07-09T20:38:08Z |
institution | BVB |
isbn | 0566086611 |
language | English |
lccn | 2005001195 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014754809 |
oclc_num | 57434302 |
open_access_boolean | |
owner | DE-1049 |
owner_facet | DE-1049 |
physical | XIV, 329 S. Ill. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Gower |
record_format | marc |
spelling | Sadgrove, Kit Verfasser aut The complete guide to business risk management Kit Sadgrove 2. ed. Aldershot Gower 2005 XIV, 329 S. Ill. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Risk management Risikomanagement (DE-588)4121590-4 gnd rswk-swf Risikomanagement (DE-588)4121590-4 s 1\p DE-604 http://www.loc.gov/catdir/toc/ecip056/2005001195.html Table of contents HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014754809&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Sadgrove, Kit The complete guide to business risk management Risk management Risikomanagement (DE-588)4121590-4 gnd |
subject_GND | (DE-588)4121590-4 |
title | The complete guide to business risk management |
title_auth | The complete guide to business risk management |
title_exact_search | The complete guide to business risk management |
title_exact_search_txtP | The complete guide to business risk management |
title_full | The complete guide to business risk management Kit Sadgrove |
title_fullStr | The complete guide to business risk management Kit Sadgrove |
title_full_unstemmed | The complete guide to business risk management Kit Sadgrove |
title_short | The complete guide to business risk management |
title_sort | the complete guide to business risk management |
topic | Risk management Risikomanagement (DE-588)4121590-4 gnd |
topic_facet | Risk management Risikomanagement |
url | http://www.loc.gov/catdir/toc/ecip056/2005001195.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014754809&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT sadgrovekit thecompleteguidetobusinessriskmanagement |