ISO 37001 :: an Introduction to Anti-Bribery Management Systems.
For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? This book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for co...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely :
IT Governance Ltd,
2017.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? This book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; and charitable and political donations. |
Beschreibung: | 1 online resource (72 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 1849289549 9781849289559 1849289557 9781849289542 1849289530 9781849289535 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1018239745 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 180106s2017 xx o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d UIU |d OCLCO |d OCLCF |d COO |d UAB |d YDX |d JSTOR |d K6U |d MERUC |d IDB |d D6H |d EZ9 |d LIV |d OCLCA |d OCLCQ |d LVT |d S9I |d C6I |d N$T |d MM9 |d UX1 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d DEGRU | ||
019 | |a 1011514868 |a 1019733723 |a 1175620607 | ||
020 | |a 1849289549 | ||
020 | |a 9781849289559 | ||
020 | |a 1849289557 | ||
020 | |a 9781849289542 |q (electronic bk.) | ||
020 | |z 9781849289535 | ||
020 | |z 1849289530 | ||
020 | |a 1849289530 | ||
020 | |a 9781849289535 | ||
024 | 3 | |a 9781849289535 | |
035 | |a (OCoLC)1018239745 |z (OCoLC)1011514868 |z (OCoLC)1019733723 |z (OCoLC)1175620607 | ||
037 | |a 22573/ctt1wpfxf0 |b JSTOR | ||
050 | 4 | |a HV6691 |b .F54 2017 | |
072 | 7 | |a BUS104000 |2 bisacsh | |
072 | 7 | |a BUS000000 |2 bisacsh | |
082 | 7 | |a 658.4/73 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Field, Alan. | |
245 | 1 | 0 | |a ISO 37001 : |b an Introduction to Anti-Bribery Management Systems. |
260 | |a Ely : |b IT Governance Ltd, |c 2017. | ||
300 | |a 1 online resource (72 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
588 | 0 | |a Print version record. | |
520 | |a For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? This book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; and charitable and political donations. | ||
505 | 0 | |a Cover -- Title -- Copyright -- Contents -- Introduction -- What is ISO 37001: 2016? -- What does ISO 37001 mean in terms of corporate policy? -- Risk-based approach to management -- Chapter 1: No Ostriches Allowed: An Overview of Anti-Bribery -- Ostriches and risk takers -- Chapter 2: An ABMS by any Other Name -- What is an ABMS? -- Reinventing the wheel? -- Chapter 3: Management Processes within an ABMS -- Top dogs? -- Top management -- Leadership -- Other roles -- Staff -- Chapter 4: Implementing an ABMS: One Key Issue -- What's a gift? -- On the record -- Chapter 5: Risk Assessment in Due Diligence -- Risk assessment in relation to due diligence -- Due diligence and facilitation payments -- Facilitation payments -- A practical example of due diligence management -- Conclusion -- Chapter 6: Who Do You Think They Are? -- What is an ABMS? -- Chapter 7: Blowing the Whistle -- What is a hotline? -- Chapter 8: Investigating Bribery -- The nuts and bolts -- Chapter 9: Internal Auditing and Corrective Action -- Where the action is -- Conclusions -- Chapter 10: Going for Gold -- The assessment -- The end game? -- ITG Resources. | |
504 | |a Includes bibliographical references. | ||
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
758 | |i has work: |a ISO 37001 (Text) |1 https://id.oclc.org/worldcat/entity/E39PD39KXFFHdxmThfTRr7YRH3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Field, Alan. |t ISO 37001 : An Introduction to Anti-Bribery Management Systems. |d Ely : IT Governance Ltd, ©2017 |z 9781849289535 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2332990 |3 Volltext |
938 | |a De Gruyter |b DEGR |n 9781849289542 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL5211339 | ||
938 | |a YBP Library Services |b YANK |n 14977456 | ||
938 | |a EBSCOhost |b EBSC |n 2332990 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1018239745 |
---|---|
_version_ | 1816882409821437953 |
adam_text | |
any_adam_object | |
author | Field, Alan |
author_facet | Field, Alan |
author_role | |
author_sort | Field, Alan |
author_variant | a f af |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6691 |
callnumber-raw | HV6691 .F54 2017 |
callnumber-search | HV6691 .F54 2017 |
callnumber-sort | HV 46691 F54 42017 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Cover -- Title -- Copyright -- Contents -- Introduction -- What is ISO 37001: 2016? -- What does ISO 37001 mean in terms of corporate policy? -- Risk-based approach to management -- Chapter 1: No Ostriches Allowed: An Overview of Anti-Bribery -- Ostriches and risk takers -- Chapter 2: An ABMS by any Other Name -- What is an ABMS? -- Reinventing the wheel? -- Chapter 3: Management Processes within an ABMS -- Top dogs? -- Top management -- Leadership -- Other roles -- Staff -- Chapter 4: Implementing an ABMS: One Key Issue -- What's a gift? -- On the record -- Chapter 5: Risk Assessment in Due Diligence -- Risk assessment in relation to due diligence -- Due diligence and facilitation payments -- Facilitation payments -- A practical example of due diligence management -- Conclusion -- Chapter 6: Who Do You Think They Are? -- What is an ABMS? -- Chapter 7: Blowing the Whistle -- What is a hotline? -- Chapter 8: Investigating Bribery -- The nuts and bolts -- Chapter 9: Internal Auditing and Corrective Action -- Where the action is -- Conclusions -- Chapter 10: Going for Gold -- The assessment -- The end game? -- ITG Resources. |
ctrlnum | (OCoLC)1018239745 |
dewey-full | 658.4/73 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/73 |
dewey-search | 658.4/73 |
dewey-sort | 3658.4 273 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04462cam a2200709Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-on1018239745</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">180106s2017 xx o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">UIU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">COO</subfield><subfield code="d">UAB</subfield><subfield code="d">YDX</subfield><subfield code="d">JSTOR</subfield><subfield code="d">K6U</subfield><subfield code="d">MERUC</subfield><subfield code="d">IDB</subfield><subfield code="d">D6H</subfield><subfield code="d">EZ9</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">S9I</subfield><subfield code="d">C6I</subfield><subfield code="d">N$T</subfield><subfield code="d">MM9</subfield><subfield code="d">UX1</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">DEGRU</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1011514868</subfield><subfield code="a">1019733723</subfield><subfield code="a">1175620607</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849289549</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849289559</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849289557</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849289542</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849289535</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849289530</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849289530</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849289535</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781849289535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1018239745</subfield><subfield code="z">(OCoLC)1011514868</subfield><subfield code="z">(OCoLC)1019733723</subfield><subfield code="z">(OCoLC)1175620607</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt1wpfxf0</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6691</subfield><subfield code="b">.F54 2017</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/73</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Field, Alan.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">ISO 37001 :</subfield><subfield code="b">an Introduction to Anti-Bribery Management Systems.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Ely :</subfield><subfield code="b">IT Governance Ltd,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (72 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? This book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; and charitable and political donations.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title -- Copyright -- Contents -- Introduction -- What is ISO 37001: 2016? -- What does ISO 37001 mean in terms of corporate policy? -- Risk-based approach to management -- Chapter 1: No Ostriches Allowed: An Overview of Anti-Bribery -- Ostriches and risk takers -- Chapter 2: An ABMS by any Other Name -- What is an ABMS? -- Reinventing the wheel? -- Chapter 3: Management Processes within an ABMS -- Top dogs? -- Top management -- Leadership -- Other roles -- Staff -- Chapter 4: Implementing an ABMS: One Key Issue -- What's a gift? -- On the record -- Chapter 5: Risk Assessment in Due Diligence -- Risk assessment in relation to due diligence -- Due diligence and facilitation payments -- Facilitation payments -- A practical example of due diligence management -- Conclusion -- Chapter 6: Who Do You Think They Are? -- What is an ABMS? -- Chapter 7: Blowing the Whistle -- What is a hotline? -- Chapter 8: Investigating Bribery -- The nuts and bolts -- Chapter 9: Internal Auditing and Corrective Action -- Where the action is -- Conclusions -- Chapter 10: Going for Gold -- The assessment -- The end game? -- ITG Resources.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">ISO 37001 (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD39KXFFHdxmThfTRr7YRH3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Field, Alan.</subfield><subfield code="t">ISO 37001 : An Introduction to Anti-Bribery Management Systems.</subfield><subfield code="d">Ely : IT Governance Ltd, ©2017</subfield><subfield code="z">9781849289535</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2332990</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781849289542</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5211339</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14977456</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2332990</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1018239745 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:28:10Z |
institution | BVB |
isbn | 1849289549 9781849289559 1849289557 9781849289542 1849289530 9781849289535 |
language | English |
oclc_num | 1018239745 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (72 pages) |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IT Governance Ltd, |
record_format | marc |
spelling | Field, Alan. ISO 37001 : an Introduction to Anti-Bribery Management Systems. Ely : IT Governance Ltd, 2017. 1 online resource (72 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Print version record. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? This book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; and charitable and political donations. Cover -- Title -- Copyright -- Contents -- Introduction -- What is ISO 37001: 2016? -- What does ISO 37001 mean in terms of corporate policy? -- Risk-based approach to management -- Chapter 1: No Ostriches Allowed: An Overview of Anti-Bribery -- Ostriches and risk takers -- Chapter 2: An ABMS by any Other Name -- What is an ABMS? -- Reinventing the wheel? -- Chapter 3: Management Processes within an ABMS -- Top dogs? -- Top management -- Leadership -- Other roles -- Staff -- Chapter 4: Implementing an ABMS: One Key Issue -- What's a gift? -- On the record -- Chapter 5: Risk Assessment in Due Diligence -- Risk assessment in relation to due diligence -- Due diligence and facilitation payments -- Facilitation payments -- A practical example of due diligence management -- Conclusion -- Chapter 6: Who Do You Think They Are? -- What is an ABMS? -- Chapter 7: Blowing the Whistle -- What is a hotline? -- Chapter 8: Investigating Bribery -- The nuts and bolts -- Chapter 9: Internal Auditing and Corrective Action -- Where the action is -- Conclusions -- Chapter 10: Going for Gold -- The assessment -- The end game? -- ITG Resources. Includes bibliographical references. Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) BUSINESS & ECONOMICS Corporate Governance. bisacsh Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast has work: ISO 37001 (Text) https://id.oclc.org/worldcat/entity/E39PD39KXFFHdxmThfTRr7YRH3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Field, Alan. ISO 37001 : An Introduction to Anti-Bribery Management Systems. Ely : IT Governance Ltd, ©2017 9781849289535 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2332990 Volltext |
spellingShingle | Field, Alan ISO 37001 : an Introduction to Anti-Bribery Management Systems. Cover -- Title -- Copyright -- Contents -- Introduction -- What is ISO 37001: 2016? -- What does ISO 37001 mean in terms of corporate policy? -- Risk-based approach to management -- Chapter 1: No Ostriches Allowed: An Overview of Anti-Bribery -- Ostriches and risk takers -- Chapter 2: An ABMS by any Other Name -- What is an ABMS? -- Reinventing the wheel? -- Chapter 3: Management Processes within an ABMS -- Top dogs? -- Top management -- Leadership -- Other roles -- Staff -- Chapter 4: Implementing an ABMS: One Key Issue -- What's a gift? -- On the record -- Chapter 5: Risk Assessment in Due Diligence -- Risk assessment in relation to due diligence -- Due diligence and facilitation payments -- Facilitation payments -- A practical example of due diligence management -- Conclusion -- Chapter 6: Who Do You Think They Are? -- What is an ABMS? -- Chapter 7: Blowing the Whistle -- What is a hotline? -- Chapter 8: Investigating Bribery -- The nuts and bolts -- Chapter 9: Internal Auditing and Corrective Action -- Where the action is -- Conclusions -- Chapter 10: Going for Gold -- The assessment -- The end game? -- ITG Resources. Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) BUSINESS & ECONOMICS Corporate Governance. bisacsh Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85035859 |
title | ISO 37001 : an Introduction to Anti-Bribery Management Systems. |
title_auth | ISO 37001 : an Introduction to Anti-Bribery Management Systems. |
title_exact_search | ISO 37001 : an Introduction to Anti-Bribery Management Systems. |
title_full | ISO 37001 : an Introduction to Anti-Bribery Management Systems. |
title_fullStr | ISO 37001 : an Introduction to Anti-Bribery Management Systems. |
title_full_unstemmed | ISO 37001 : an Introduction to Anti-Bribery Management Systems. |
title_short | ISO 37001 : |
title_sort | iso 37001 an introduction to anti bribery management systems |
title_sub | an Introduction to Anti-Bribery Management Systems. |
topic | Information technology Security measures. Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) BUSINESS & ECONOMICS Corporate Governance. bisacsh Computer networks Security measures fast Computer security Management fast Data protection fast Information technology Security measures fast |
topic_facet | Information technology Security measures. Computer security Management. Computer networks Security measures. Data protection. Technologie de l'information Sécurité Mesures. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. Protection de l'information (Informatique) BUSINESS & ECONOMICS Corporate Governance. Computer networks Security measures Computer security Management Data protection Information technology Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2332990 |
work_keys_str_mv | AT fieldalan iso37001anintroductiontoantibriberymanagementsystems |