|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn932060248 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
150729s2015 ne ob 000 0 eng d |
040 |
|
|
|a NLE
|b eng
|e rda
|e pn
|c NLE
|d OCLCO
|d OCLCQ
|d OCLCF
|d EBLCP
|d IDB
|d MERUC
|d OCLCQ
|d WRM
|d OCLCQ
|d CUY
|d ZCU
|d ICG
|d DKC
|d OCLCQ
|d UKMGB
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBB5A6323
|2 bnb
|
016 |
7 |
|
|a 017472725
|2 Uk
|
019 |
|
|
|a 932328869
|
020 |
|
|
|a 9780128017883
|q (PDF ebook)
|
020 |
|
|
|a 0128017880
|q (PDF ebook)
|
020 |
|
|
|z 9780128016282
|q (pbk.)
|
029 |
1 |
|
|a DEBBG
|b BV043625616
|
029 |
1 |
|
|a UKMGB
|b 017472725
|
029 |
1 |
|
|a AU@
|b 000066754122
|
035 |
|
|
|a (OCoLC)932060248
|z (OCoLC)932328869
|
037 |
|
|
|a 9780128017883
|b Ingram Content Group
|
050 |
|
4 |
|a TH9705
|b .S663 2016eb
|
082 |
0 |
4 |
|a 658.47
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sondej, Allen,
|e author.
|
245 |
1 |
0 |
|a Operational policy making for professional security :
|b practical policy skills for the public and private sector /
|c Allen Sondej.
|
264 |
|
1 |
|a Amsterdam :
|b Butterworth-Heinemann,
|c 2015.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a CIP data; item not viewed.
|
504 |
|
|
|a Bibliography8 Surprise?; Unintended Consequences; Unintended Consequences of Others' Actions; Tunnel Vision and Unintended Consequences; Emerging Technology and Unintended Consequences; Structurally Driven Unintended Consequences; Bibliography; 9 Policy Construction; Directive Header; Directive Type; Policy Identification System; Date Issued; Author's Identification Number; Issuing Authority; Revision Date; Sources; Old Number; Appendix; page Numbers; Body of the Directive; Policy Statement; Purpose Statement; Definitions; Procedure; Crisis; Directive Format and Discipline; Writing Style.
|
505 |
0 |
|
|a Front Cover; Operational Policy Making for Professional Security; Copyright Page; Contents; Preface; About the Author; Acknowledgments; 1 Theory and Organization; Policy Development; Theoretical Policy Foundations; Public Policy; Tax Exemption as a Public Policy; Policy as a Colloquialism; Policy Confusion; Policy and Organization; Policy Systems; Informal and Formal Policy; Sensemaking; Academic Policy Theories; Rational Choice Theory; Multiple Streams Theory; The Problem Stream; The Political Stream; The Solution Stream; Organizational Structure; Simple Structure; Machine Bureaucracy.
|
505 |
8 |
|
|a Professional BureaucracyDivisionalized Form; Adhocracy; Rules and Structure; Bibliography; 2 Why Bother?; Overview; Purposeful Intent; Negligence; Policy and People; Bibliography; 3 Basic Training; Policy Tools; Policy; Procedure; Order; General Order; Special Order; Personnel Order; Rule or Regulation; Divisional, Departmental, or Unit Order; Management Memorandum; Plan; Buy-in, Cause and Effect, and Communication; Summary; Bibliography; 4 Incoming!; Organizational Role; Organizational Sensing; Noticing; Interpretation; Acting; Sensing Resources; Industry Groups; Human Resources Groups.
|
505 |
8 |
|
|a Anti-Industry GroupsPublic Relations Groups; News Searches; News Providers; Social Media; Research Sites; Meta Searches; Triggering Events; Internal Triggers; Management by Crisis; External Triggers; Summary; Bibliography; 5 Organizational Settings; Office Politics; Expectancy Theory; The Human Factor; Organizational Pecking Orders; Complacency; Bibliography; 6 The Analytical Process for Policy Makers; Risk Analysis; Strengths (Internal); Weaknesses (Internal); Opportunities (External); Threats (External); Seven Question Inquiry; Problem Stream; Policy Stream; Political Stream.
|
505 |
8 |
|
|a What is the Existing or Proposed Policy?What is the Purpose of the Policy or the Intended Outcome?; What is Driving This Policy?; Who are the Stakeholders?; What are the Unintended Consequences?; Are there Any Other Issues Not Expressed?; What are the Alternatives?; Bibliography; 7 Policy Influences; Identifying Stakeholders; Equity Stakeholders; Financial Motive Stakeholders; Commerce Stakeholders; Ego-Vested Stakeholders; Interest Group Stakeholders; Proximity Stakeholders; Opportunistic Stakeholders; Stakeholder Bias; Positive Bias; Negative Bias; Lukewarm Bias; Unidentified Bias.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Security systems.
|
650 |
|
0 |
|a Industries
|x Security measures.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
6 |
|a Industrie
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a Industries
|x Security measures
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
758 |
|
|
|i has work:
|a Operational Policy Making for Professional Security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFQMWmhjXdqC7xRYv44mFq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version
|z 9780128016282
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4003774
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4003774
|
994 |
|
|
|a 92
|b IZTAP
|