Political Science

Business process management is usually treated from two different perspectives: business administration and computer science. While business administration professionals tend to consider information technology as a subordinate aspect in business process management for experts to handle, by contrast computer science professionals often consider business goals and organizational regulations as terms that do not deserve much thought but require the appropriate level of abstraction.

Matthias Weske argues that all communities involved need to have a common understanding of the different aspects of business process management. To this end, he details the complete business process lifecycle from the modeling phase to process enactment and improvement, taking into account all different stakeholders involved. After starting with a presentation of general foundations and abstraction models, he explains concepts like process orchestrations and choreographies, as well as process properties and data dependencies. Finally, he presents both traditional and advanced business process management architectures, covering, for example, workflow management systems, service-oriented architectures, and data-driven approaches. In addition, he shows how standards like WfMC, SOAP, WSDL, and BPEL fit into the picture.

This textbook is ideally suited for classes on business process management, information systems architecture, and workflow management. This 2nd edition contains major updates on BPMN Version 2 process orchestration and process choreographies, and the chapter on BPM methodologies has been completely rewritten. The accompanying website www.bpm-book.com contains further information and additional teaching material.

The term homeland security hardly existed before September 11, 2001, yet today it dominates public policy and the economic agendas of world governments. The transportation industries have been subjected to unprecedented scrutiny and regulatory mandates in recent years, and the port and maritime sector are no exception. Port Security Management reflects this altered landscape of the post-9/11 era, providing real-world guidelines for strategic security planning and implementation processes.

Balance security with business needs

The book begins with a historical and organizational perspective on maritime and port security. It then discusses the management of risk assessment, presenting it within the context of the unique vulnerabilities within the maritime and port environments. The important relationships between risk analysis, facility security planning, and coordination among port stakeholders—including the public and private sector businesses—provide the framework for understanding the pivotal role of security managers, security personnel, and law enforcement in ensuring the safety and security of port users and their interests.

Work cohesively with governmental and private entities

The text also addresses the ground-level issues, tasks, and responsibilities that must be managed by the security manager in concert with the port director and federal and local law enforcement agencies. The author explores the growth of multiuse port facilities for recreation, hospitality, and external business and commercial interests and offers perspectives on the role of technology in security. Finally, the book examines the need to develop contingency and emergency operations plans and work effectively with federal, state, local, and private enterprises in coordinating both routine and emergency response mechanisms.

This book is positioned as a rst in a series of books on enterprise architecture needed for a Master of Enterprise Architecture program, and is targeted both at university students and practitioners with a drive to increase their understanding of these elds. As an introductory book, this book aims to explore the concept of enterprise architecture. At rst glance, writing such an introductory book might seem as a straight forward task of setting up a structure and lling in “the blanks. ” However, writing this book turned out to be a pleasant journey of discovery. Based on our past experiences, each of us had a clear understanding of enterprise architecture, based on several years of experience and insight in the eld. However, when we started writing this book, and each of us exposed our individual understandings, it became apparent that our understanding of the eld differed in several ways. This prompted several discussions leading to an abundance of new insights. Without exception, thesediscussionstookplaceina pleasantandopenatmosphere,fueledbyourshared driveforunderstandingandincreasedinsight. Wearenowevenmoreconvincedthan before, that the eld enterprise architecture is a true multi-disciplinary profession. In the resulting book, we would like to share our insights, while also hoping to continue our discussions, now also involving you as a reader. We also realise that the journey is still far from complete. While this introductory book provides an overview of the eld of enterprise architecture from the perspective of our insights, many aspects need further re nement.
Since the attacks of 9/11, the United States Intelligence Community (IC) has undergone an extensive overhaul. Perhaps the greatest of these changes has been the formation of the Office of the Director of National Intelligence. As a cabinet-level official, the Director oversees the various agencies of the IC and reports directly to the President. The IC today faces challenges as it never has before; everything from terrorism to pandemics to economic stability has now become an intelligence issue. As a result, the IC is shifting its focus to a world in which tech-savvy domestic and international terrorists, transnational criminal organizations, failing states, and economic instability are now a way of life.

Introduction to Intelligence Studies provides a comprehensive overview of intelligence and security issues, defining critical terms, and reviewing the history of intelligence as practiced in the United States. Designed in a practical sequence, the book begins with the basics of intelligence, progresses through its history, describes best practices, and explores the way the IC looks and operates today. Each chapter begins with objectives and key terms and closes with questions to test reader assimilation.

The authors examine the "pillars" of the American intelligence system—collection, analysis, counterintelligence, and covert operations—and demonstrate how these work together to provide "decision advantage." The book provides equal treatment to the functions of the intelligence world—balancing coverage on intelligence collection, counterintelligence, information management, critical thinking, and decision-making. It also covers such vital issues as laws and ethics, writing and briefing for the IC, and the emerging threats and challenges that intelligence professionals will face in the future.

A thorough exploration of diversity and social justice within the field of social work

Multicultural Social Work Practice: A Competency-Based Approach to Diversity and Social Justice, 2nd Edition has been aligned with the Council on Social Work Education's 2015 Educational Policy and Standards and incorporates the National Association of Social Workers Standards of Cultural Competence. New chapters focus on theoretical perspectives of critical race theory, microaggressions and changing societal attitudes, and evidence-based practice on research-supported approaches for understanding the influence of cultural differences on the social work practice.

The second edition includes an expanded discussion of religion and spirituality and addresses emerging issues affecting diverse populations, such as women in the military. Additionally, Implications for Multicultural Social Work Practice' at the end of each chapter assist you in applying the information you have learned. Multicultural Social Work Practice, 2nd Edition provides access to important guidance regarding culturally sensitive social work practice, including the sociopolitical and social justice aspects of effective work in this field. This thoroughly revised edition incorporates new content and pedagogical features, including:

Theoretical frameworks for multicultural social work practice Microaggressions in social work practice Evidence-based multicultural social work practice New chapter overviews, learning objectives, and reflection questions

Multicultural Social Work Practice, 2nd Edition is an integral guide for students and aspiring social workers who want to engage in diversity and difference.

Enterprises, from small to large, evolve continuously. As a result, their structures are transformed and extended continuously. Without some means of control, such changes are bound to lead to an overly complex, uncoordinated and heterogeneous environment that is hard to manage and hard to adapt to future changes. Enterprise architecture principles provide a means to direct transformations of enterprises. As a consequence, architecture principles should be seen as the cornerstones of any architecture.

In this book, Greefhorst and Proper focus on the role of architecture principles. They provide both a theoretical and a practical perspective on architecture principles. The theoretical perspective involves a brief survey of the general concept of principle as well as an analysis of different flavors of principles. Architecture principles are regarded as a specific class of normative principles that direct the design of an enterprise, from the definition of its business to its supporting IT. The practical perspective on architecture principles is concerned with an approach to the formulation of architecture principles, as well as their actual use in organizations. To illustrate their use in practice, several real-life cases are discussed, an application of architecture principles in TOGAF is included, and a catalogue of example architecture principles is provided.

With this broad coverage, the authors target students and researchers specializing in enterprise architecture or business information systems, as well as practitioners who want to understand the foundations underlying their practical daily work.

This fully updated third edition of The Handbook of International Humanitarian Law sets out an international manual of humanitarian law accompanied by case analysis and extensive explanatory commentary by a team of distinguished and internationally renowned experts. The new edition takes account of recent developments in the law, including the 2010 amendments to the ICC Statute, the progressive evolution of customary law, and new jurisprudence from national and international courts and tribunals. It sheds light on controversial topics like direct participation in hostilities; air and missile warfare; belligerent occupation; operational detention; and the protection of the environment in armed conflict. The book also addresses the growing need to consider the interface between international humanitarian law and human rights, as well as other branches of international law, both during armed conflicts and in post-conflict situations. The commentary both deepens reflection on such innovations, and critically reconsiders views expressed in earlier editions to provide a contemporary analysis of this changing field. Renowned international lawyers offer a broad spectrum of legal opinions, restating the law in this area, which is applicable worldwide. Particular attention is paid to problems of application of the law in recent military campaigns, which are assessed and interpreted in a practice-oriented manner. Based on best-practice rules of global importance, this book gives invaluable guidance to practitioners and scholars of this important body of law.
Over the last few years, financial statement scandals, cases of fraud and corruption, data protection violations, and other legal violations have led to numerous liability cases, damages claims, and losses of reputation. As a reaction to these developments, several regulations have been issued: Corporate Governance, the Sarbanes-Oxley Act, IFRS, Basel II and III, Solvency II and BilMoG, to name just a few. In this book, compliance is understood as the process, mapped not only in an internal control system, that is intended to guarantee conformity with legal requirements but also with internal policies and enterprise objectives (in particular, efficiency and profitability).

The current literature primarily confines itself to mapping controls in SAP ERP and auditing SAP systems. Maxim Chuprunov not only addresses this subject but extends the aim of internal controls from legal compliance to include efficiency and profitability and then well beyond, because a basic understanding of the processes involved in IT-supported compliance management processes are not delivered along with the software. Starting with the requirements for compliance (Part I), he not only answers compliance-relevant questions in the form of an audit guide for an SAP ERP system and in the form of risks and control descriptions (Part II), but also shows how to automate the compliance management process based on SAP GRC (Part III). He thus addresses the current need for solutions for implementing an integrated GRC system in an organization, especially focusing on the continuous control monitoring topics.

Maxim Chuprunov mainly targets compliance experts, auditors, SAP project managers and consultants responsible for GRC products as readers for his book. They will find indispensable information for their daily work from the first to the last page. In addition, MBA, management information system students as well as senior managers like CIOs and CFOs will find a wealth of valuable information on compliance in the SAP ERP environment, on GRC in general and its implementation in particular.

Ukraine dominated international headlines as the Euromaidan protests engulfed Ukraine in 2013–2014 and Russia invaded the Crimea and the Donbas, igniting a new Cold War. Written from an insider's perspective by the leading expert on Ukraine, this book analyzes key domestic and external developments and provides an understanding as to why the nation's future is central to European security. In contrast with traditional books that survey a millennium of Ukrainian history, author Taras Kuzio provides a contemporary perspective that integrates the late Soviet and post-Soviet eras.

The book begins in 1953 when Soviet leader Joseph Stalin died during the Cold War and carries the story to the present day, showing the roots of a complicated transition from communism and the weight of history on its relations with Russia. It then goes on to examine in depth key aspects of Soviet and post-Soviet Ukrainian politics; the drive to independence, Orange Revolution, and Euromaidan protests; national identity; regionalism and separatism; economics; oligarchs; rule of law and corruption; and foreign and military policies.

Moving away from a traditional dichotomy of "good pro-Western" and "bad pro-Russian" politicians, this volume presents an original framework for understanding Ukraine's history as a series of historic cycles that represent a competition between mutually exclusive and multiple identities. Regionally diverse contemporary Ukraine is an outgrowth of multiple historical Austrian-Hungarian, Polish, Russian, and especially Soviet legacies, and the book succinctly integrates these influences with post-Soviet Ukraine, determining the manner in which political and business elites and everyday Ukrainians think, act, operate, and relate to the outside world.

William Roberts Clark, Matt Golder, and Sona Nadenichek Golder’s groundbreaking Principles of Comparative Politics offers the most comprehensive and up-to-date introduction to comparative inquiry, research, and scholarship. In this thoroughly revised Third Edition, readers have an even better guide to cross-national comparison and why it matters. Readers are offered a new intuitive take on statistical analyses and a clearer explanation of how to interpret regression results; a thoroughly-revised chapter on culture and democracy that now includes a more extensive discussion of cultural modernization theory and a new overview of survey methods for addressing sensitive topics; and a revised chapter on dictatorships that incorporates a principal-agent framework for understanding authoritarian institutions.

Examples from the gender and politics literature have been incorporated into various chapters and empirical examples and data on various types of institutions have been updated. The book's outstanding pedagogy includes more than 250 tables and figures, numerous photos and maps, end of chapter exercises and problem sets, and a broader set of works cited.

New to this Edition

A new intuitive take on statistical analyses and a clearer explanation of how to interpret regression results are included. A thoroughly-revised chapter on culture and democracy includes a more extensive discussion of cultural modernization theory and a new overview of survey methods for addressing sensitive topics. A revised chapter on dictatorships incorporates a principal-agent framework for understanding authoritarian institutions. Examples from the gender and politics literature have been incorporated into various chapters. Empirical examples and data on various types of institutions have been updated. Online videos and tutorials guide students through some of the methodological components addressed in the book.
©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.