×
10% Discount on All E-Books through IGI Global’s Online Bookstore Extended
(10% discount on all e-books cannot be combined with most offers. Discount is valid on purchases made directly through IGI Global Online Bookstore (
www.igi-global.com
)
and may not be utilized by booksellers and distributors. Offer does not apply to e-Collections and exclusions of select titles may apply. Offer expires June 30, 2022.)
Browse Titles
Login/Create Account
Language:
English
US
China
Cart
0
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
10% Discount on All E-Books through IGI Global’s Online Bookstore
With the continued paper shortages and supply chain issues, we have been informed by our partners that there will be substantial delays in printing and shipping publications, especially as we approach the holiday season. To help incentive the electronic format and streamline access to the latest research, we are offering a 10% discount on all our e-books through IGI Global’s Online Bookstore. Hosted on the InfoSci
®
platform, these titles feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Browse Titles
IGI Global to Convert an Additional 30 Journals to Full Gold Open Access for the 2022 Volume Year
IGI Global is to convert an additional 30 journals to full gold open access (OA) for their 2022 volume year, which will expand their OA collection to contain 60 gold open access and one (1) platinum open access journal.
Learn More
All IGI Global Scholarly Journals Shift to "Digital Preferred" Format
In response to the overwhelming demand for electronic content coupled with the mission to decrease the overall environmental impacts of print production and distribution, all IGI Global journals will shift into a digital preferred model for the 2022 volume year. Under this model, journals will become primarily available under electronic format and articles will be immediately available upon acceptance. Print subscriptions and print + electronic subscriptions will still be available, but for the print version, all articles that are published during the volume year will become available at the end of the year in a single (1) printed volume.
Learn More
IGI Global’s New DEI e-Book Collection
Acquire Over 320+ E-Books on Diversity, Equity, and Inclusivity from a publisher that has been dedicated to DEI since its inception over 30 years ago. Now, benefit from a collection of all of our DEI e-Books at a 90% Discount.
Learn More
Offering a
5% Pre-Publication Discount
on
All Reference Books Ordered Through IGI Global’s Online Bookstore*
To support customers with accessing the latest research, IGI Global is offering a 5% pre-publication discount on all hardcover, softcover, e-books, and hardcover + e-books titles.
*5% discount offer is eligible on hardcover, softcover, e-books, and hardcover + e-books titles and is automatically applied directly to the shopping cart. Discount offer only valid on purchases made directly through IGI Global’s Online Bookstore and offer expires 30 days after the publication’s release. This automatic discount is not intended for use by book distributors or wholesalers.
Browse Titles
Books
Books
Open Access Books
OnDemand Book Chapters
Journals
Journals
Open Access Journals
OnDemand Journal Articles
e-Collections
e-Collections
Transformative Open Access (Read & Publish)
Open Access
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
Author Services
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Risk Management
1.
Risk management
has been defined as the systematic implementation of
management
policies and practices for the purpose of establishing the perspectives of
risk
scenarios. Further it is a process of identifying, analyzing, evaluating, treating, monitoring, communicating and reviewing
risk
.
Learn more in: Reinvigorating Organizational Effectiveness and Sustainability Through Risk Assessment Tools Within the Construction Industry
2.
The practice of identifying and analyzing potential
risk
s in advance and taking precautionary steps to limit
risk
.
Learn more in: A Composite Risk Model for Optimizing Information System Security
3.
Refers to a systematic approach for identifying
risk
and defining the impact on an enterprise’s ability to provide goods and services ( Davis, 2008 ).
Learn more in: Activity: Initializing the IT Audit Report
4.
Activity linked to the
Management
Projects which deals with the monitoring and eventual combat to the
risk
s involved in a software project.
Learn more in: eRiskGame: A Persistent Browser-Based Game for Supporting Project-Based Learning in the Risk Management Context
5.
The range of activities that may be taken to avoid the occurrence of an undesirable event or to modify, minimize, or eliminate the consequences should the event occur (e.g., an insurance policy against particular
risk
s would not prevent the occurrence, but would compensate for the financial and other consequences of the outcome).
Learn more in: Risk Management in the Digital Economy
6.
Is the identification, assessment, and prioritization of
risk
s followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events
Learn more in: CAMCE: A Framework for Climate Adaptation and Mitigation
7.
The implementation and updating of methods and tools to minimize
risk
s associated with the information system of an organization, such as the Information Security policies, procedures and practices associated formalized and adopted other means in order to bring these
risk
s to acceptable levels.
Learn more in: Information Security Threats in Public and Private Organizations: Evidence From Romania
8.
The act of handling the
risk
exposure through mitigation, acceptance, sharing and avoidance.
Learn more in: Using Blockchain for Smart Contracts
9.
The implementation and updating of methods and tools to minimize
risk
s associated with the information system of an organization, such as the Information Security policies, procedures and practices associated formalized and adopted other means in order to bring these
risk
s to acceptable levels.
Learn more in: Cybersecurity Risks in Romanian Companies
10.
The implementation and updating of methods and tools to minimize
risk
s associated with the information system of an organization, such as the Information Security policies, procedures and practices associated formalized and adopted other means in order to bring these
risk
s to acceptable levels.
Learn more in: Cyberaccounting for the Leaders of the Future
11.
Risk management
is the process of doing what-if scenarios to enable
risk
mitigation strategies so as to minimize the impact of unfortunate events.
Learn more in: Cognitive Integrated Business Planning
12.
Procedure to avoid and minimize
risk
s.
Learn more in: Concept and Practices of Cyber Supply Chain in Manufacturing Context
13.
The responding practices to better mitigate hazards or recover from any associated adversary impact. Typically, effective
risk management
includes pre-disaster mitigation planning by means of insurance, land use regulation, and technology; rapid and effective emergency responses during the emergency; post-disaster recovery and rebuilding
management
; and increased public awareness education.
Learn more in: GIS and Remote Sensing in Environmental Risk Assessment
14.
The identification, assessment, and prioritization of vulnerability
risk
s followed by coordinated and application of measures to minimize, monitor, and control the probability and/or impact of threats and attacks.
Learn more in: ICT Security Policy: Challenges and Potential Remedies
15.
A process that includes activities for the identification, estimation, evaluation, and treatment of
risk
s.
Learn more in: Information Security Management and Security Reporting
16.
A system designed to avoid “problems during a project, which can lead to deviation from project goals, timetables, and cost estimations (Zafiropoulos et al., 2005).
Learn more in: Enterprise Resource Planning System Risks and Rewards
17.
A set of planned actions - projects and programs, and tools used to reduce disaster
risk
or mitigate damage.
Learn more in: Natural Disasters and Risk Management: A Theoretical Overview
18.
The process of identifying
risk
, assessing
risk
and taking steps to manage
risk
by reducing
risk
s to an acceptable level (NIST SP 800-37 rev 2, 2018).
Learn more in: Knowledge Systems and Risk Management: Towards a Risk and Threat Assessment Framework
19.
A process to identify and quantify sources of technical
risk
s and their program impacts and find ways to avoid or control them. (Babcock, 2007, p. 217)
Learn more in: Technical Risk Management
20.
Is the identification, analysis, assessment, control, and avoidance, minimization, or elimination of unacceptable
risk
s. An organization may use
risk
assumption,
risk
avoidance,
risk
retention,
risk
transfer, or any other strategy (or combination of strategies) in proper
management
of future events.
Learn more in: Intentional Food Contamination in the Food Supply Chain: Proposal of a Management System for its Prevention
21.
The process of managing the uncertainty in investment decision-making.
Learn more in: Artificial Intelligence and Investing
22.
The responding practices to better mitigate hazards or recover from any associated adversary impact. Typically, effective
risk management
includes pre-disaster mitigation planning by means of insurance, land use regulation, and technology; rapid and effective emergency responses during the emergency; post-disaster recovery and rebuilding
management
; and increased public awareness education.
Learn more in: GIS and Remote Sensing in Environmental Risk Assessment and Management
23.
Risk management
is a managerial process that includes identification, analysis, assessment and control of
risk
s which are exposed.
Learn more in: The Operational Risk Assessments in Manufacturing Industry
24.
Process of identifying and assessing
risk
s in order to develop strategies to manage
risk
s.
Learn more in: A Framework for Risk Management in AI System Development Projects
25.
The techniques of minimizing and preventing loss.
Learn more in: Security of Infrastructure Systems: Infrastructure Security Assessment
26.
The act of handling the
risk
exposure through mitigation, acceptance, sharing and avoidance. It includes the ability to handle information and technology
risk
s based on stakeholders’
risk
parameters.
Learn more in: Risk Management for Traditional and Innovative Contracts
27.
Identify, evaluate, and assign priority to the potential
risk
s with the goal of defining the methods, resources to minimize or mitigate the outcomes from the
risk
. Closely related with
Risk
Assessment.
Learn more in: Threat and Risk Assessment Using Continuous Logic
28.
The processes to manage information security
risk
to organizational functionality and assets, individuals, other organizations, etc.
Risk management
includes
risk
analysis, assessing
risk
,
risk
strategy choosing, security measurements implementation and monitoring
risk
over time.
Learn more in: Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems
29.
It refers to the set of processes through which a company identifies, analyzes, quantifies, eliminates, and monitors the
risk
s associated with a given production process.
Learn more in: Future of Jobs and Humans in a Tech-Centric World
30.
Decisions to accept exposure or to reduce vulnerabilities by either mitigating the
risk
s or applying cost effective controls.
Learn more in: Decision Support Software
31.
A form of decision-making technique that involves identification and assessment of possible
risk
events, then generating a response plan to reduce and/or control these
risk
s to an acceptable level.
Learn more in: Web-Based Information Systems in Construction Industry: A Case Study for Healthcare Projects
32.
The process by which a company evaluates and reduces its
risk
exposure. This includes actions, policies, and procedures that
management
implements to reduce the likelihood and severity of adverse outcomes and to increase the likelihood and benefits of positive outcome.
Learn more in: HRIS Readiness Among Faculties in B Schools for Human Development
33.
It involves prediction of bankruptcy of a firm (i.e., credit
risk
), detection of fraud (i.e., operational
risk
), or prediction of future stock returns (i.e., market
risk
).
Learn more in: Review of Big Data Applications in Finance and Economics
34.
Risk management
is a process of simplifying the decision problem aiming at reforming it in certain way that allows excluding the
risk
.
Learn more in: Knowledge Sharing and IT/Business Partnership: An Integrated View of Risk Management
35.
A general process to handle
risk
s as it serves to identify, assess, prioritize, mitigate, and track them.
Learn more in: Dynamic Risk Assessment in IT Environments: A Decision Guide
36.
The concept involves actions aimed at maintaining an adequate profitability (return on investments), solvency margin (assets in excess of liabilities), increase of the company’s shareholder value, as well as
risk
reduction (for example by hedging and diversification). The conceptual term ‘
risk management
’ is to be distinguished from the technical term ‘
risk
measurement’. For example, in the Value-at-
Risk
setting, the latter term describes the construction of a portfolio profit and loss distribution and the calculation of certain percentile.
Learn more in: Estimating Risk with Copulas
37.
An organization’s
risk
assessment and
risk
mitigation
Learn more in: Information Security and Risk Management
38.
The process of evaluating and selecting alternative responses to
risk
.
Learn more in: Managing E-Collaboration Risks in Business Process Outsourcing
39.
Managing the uncertainty of components in such a way that either they are eliminated or reduced.
Learn more in: Internal Audit Structure and Fraud Risk Assessment From a Regulatory Perspective: An Insight Into the Turkish Financial Services Sector
40.
Is the culture, processes and structures that are directed towards realizing potential opportunities whilst managing adverse effects.
Learn more in: A Process Architecture Approach to Manage Health Process Reforms
41.
The disciple of managing
risk
s using strategies such as planning, assessment, analysis, and control of
risk
s.
Learn more in: Project-Based Software Risk Management Approaches
42.
The act of handling the
risk
exposure through mitigation, acceptance, sharing and avoidance. It includes the ability to handle information and technology
risk
s based on stakeholders’
risk
parameters.
Learn more in: Risk and Governance Considerations in Cloud Era
43.
A set of activities that are undertaken to recognize
risk
s and to plan for their avoidance, reduction, or removal.
Learn more in: A Knowledge-Based Risk-Driven Model Supporting Collaborative Online Course Creation
44.
Includes all measures which reduce disaster related losses of life, property, or assets by either reducing the hazard or vulnerability of the elements at
risk
.
Learn more in: Strategic Disaster Management: The Case of Turkey
45.
Refers to a continuous process of identifying, assessing, and reducing a
risk
factor to an acceptable level, and implementing the right mechanisms to maintain that level of
risk
. Established
risk management
strategies include avoiding the
risk
, reducing the negative effect of the
risk
, accepting some or all of the consequences of the
risk
, or transferring the
risk
to another party through insurance.
Learn more in: IT-Enabled Reengineering: Productivity Impacts
46.
A systematic approach to identifying threats and controlling the impact of uncertain events as a consequence of their realization.
Learn more in: Assurance for Change Management With COBIT 2019 and CMMC Maturity Frameworks
47.
A methodology to identify, measure, classify, and compare
risk
s.
Learn more in: Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents
48.
The implementation and updating of methods and tools to minimize
risk
s associated with the information system of an organization, such as the Information Security policies, procedures and practices associated formalized and adopted other means in order to bring these
risk
s to acceptable levels.
Learn more in: Proactive Information Security Strategy for a Secure Business Environment
49.
Is the culture, processes and structures that are directed towards realizing potential opportunities whilst managing adverse effects.
Learn more in: A Process Architecture Approach to Manage Health Process Reforms
50.
Procedure to avoid and minimize
risk
s.
Learn more in: Concept and Practices of Cyber Supply Chain in Manufacturing Context
51.
A system designed to avoid “problems during a project, which can lead to deviation from project goals, timetables, and cost estimations” ( Zafiropoulos et al., 2005 , p. 213).
Learn more in: Assessing ERP Risks and Rewards
52.
The main focus on the
risk
control of the enterprise, transparency about the significant
risk
s.
Learn more in: From Information Governance to IT Governance: An Overview of Issues and Frameworks for Large Organizations
53.
An overall
risk management
process involving both
risk
assessment and
risk
reduction through technical and organizational barriers.
Learn more in: Industry Process Safety: Major Accident Risk Assessment
54.
The overall process that a financial institution follows to define a business strategy to identify the
risk
s to which it is exposed, to quantify those
risk
s and to understand and control the nature of the
risk
s it faces. (Cumming & Hirtle, 2001) A specific application of knowledge in order to control deviations from strategic objectives, shareholders’ values and stakeholders’ relationships.
Learn more in: Knowledge Management and Risk Management
55.
Process of identifying, analyzing, defining strategies to deal with the more concerning
risk
s, which can be threats or opportunities to project objectives. In the process, it is included the control of the
risk
s throughout the life cycle of the project.
Learn more in: Are Risks in IT Global and Local Projects the Same?: Systematic Literature Review of the Last 20 Years
56.
Process of identifying, assessing, and controlling the internal and external
risk
s faced by a company.
Learn more in: Financial Literacy and Innovation Performance in SMEs: The Mediating Effect of Risk-Taking
57.
A process of making and implementing decisions that will minimize the negative effects of a
risk
.
Learn more in: Health Communication Strategies: Crisis Management and Infodemic During COVID-19
58.
A process conducted by the board of directors, the managers and others within an organization, in order to identify potential events that may affect the organization to manage the
risk
s to the organization and to provide reasonable assurance regarding the achievement of organizational objectives.
Learn more in: The International Experience in Security Risk Analysis Methods
59.
Identification, evaluation, and prioritization of followed by application of resources able to minimize, monitor, and control the probability or impact of unfortunate events and health accidents.
Learn more in: Image Processing and Post-Data Mining Processing for Security in Industrial Applications: Security in Industry
60.
Risk management
is the systematic identification and evaluation of
risk
s at every level with a certain method to achieve the objectives of the organisations, monitoring this process in a way that ensures effective operation.
Learn more in: Dynamics of Sustainable Supply Chain Management in the Post-COVID-19 Era: A Bibliometric Literature Review
61.
Risk management
is the identification, assessment, and prioritization of
risk
s (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.
Learn more in: Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare: National Cyber Defense and Cyber Attack Capabilities
62.
Risk management
covers the implementation of information security in practice.
Risk management
is how information security is performed in modern organizations through the analysis and evaluation of vulnerabilities against threats to determine
risk
and the mitigation of that
risk
based on organizational priorities ( Fenz et al., 2011 ; Schuesster, 2013 ; Tohidi, 2011 ). This is primarily a preventive framework designed to prevent information security incidents from occurring in secure networks.
Learn more in: Turning Weakness into Strength: How to Learn From an IT Security Incident
63.
Consists of
risk
identification,
risk
assessment, selection and application of
risk management
strategies, and evaluation and reporting of the process.
Learn more in: Importance of Risk Management and Risk Management Process
64.
The process of managing the uncertainty in investment decision-making.
Learn more in: Applying Artificial Intelligence to Financial Investing
65.
A tactic to minimize the susceptibility of the KM strategy to
risk
and subsequent failure or ineffectiveness.
Risk
must be analyzed to assess the potential exposure to the chance of human or infrastructural barriers. Example of these
risk
s may include: (1)
management
culture in the organization that hinders KM, (2) the philosophy of KM is not understood in the organization and (3) conflicts of organizational priorities (4) the development of criterion for knowledge collection is clouded.
Risk
may also threaten operational or to financial elements of the strategy. Examples of
risk
s to processes may include: (a) an understanding of the knowledge types and artefacts associated with specific business functions (b) current informal organic knowledge transfer strategies and systems (c)
risk
s associated with system development (d) managing the changes and their implementation and additionally managing the expectations if staff and of executive
management
.
Learn more in: Governance of Knowledge Management
66.
The process of managing the uncertainty in investment decision-making.
Learn more in: Applying Artificial Intelligence to Financial Investing
67.
The process of identifying, analysing, assessing, and communicating
risk
and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken.
Learn more in: National Security Policy and Strategy and Cyber Security Risks
68.
This includes the process of assigning priority to, budgeting, implementing and maintaining the appropriate
risk
-reducing measures.
Learn more in: Enterprise Information System Security: A Life-Cycle Approach
69.
Is the identification, assessment, and prioritization of
risk
s (as the effect of uncertainty on objectives, whether positive or negative) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.
Learn more in: Robust Supply Chain Risk Management
70.
Identifying, investigating, valuating, controlling, avoiding, minimizing, or eliminating offensive
risk
s.
Learn more in: Default Probability Prediction of Credit Applicants Using a New Fuzzy KNN Method with Optimal Weights
71.
Ongoing process of identifying, assessing, prioritizing, and reducing
risk
.
Learn more in: How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
72.
The process of managing the uncertainty in investment decision-making.
Learn more in: Artificial Intelligence and Investing
73.
A process of forecasting and evaluation of financial
risk
s together with the identification of procedures to avoid or minimize their impact.
Learn more in: Big Data Analytics in Retail Supply Chain
74.
Is one of the IT governance focus areas that require
risk
awareness by senior corporate officers, a clear understanding of the enterprise’s appetite for
risk
, understanding of compliance requirements, transparency about the significant
risk
s to the enterprise, and embedding of
risk management
responsibilities in the organization.
Learn more in: IT Governance in the Public Sector in a Developing Country
75.
This refers to the identification, analysis, acceptance, and
management
of
risk
in order to reduce any adverse effect from a decision or venture.
Learn more in: Sustainable Value Chains: A Critical Analysis of Sustainable Supply Chain Failures in Developing and Developed Economies
76.
is a methodical approach that aims to control
risk
through developing systems and procedures allowing managers to anticipate, identify, estimate and effectively dealing with
risk
s inherent to any project.
Learn more in: Management and Cost Estimation of Security Projects
77.
Risk management
identifies, assesses, treats, and monitors
risk
s during the entire life cycle, responding to each
risk
in terms of appropriate treatment and acceptance (ISO/IEC 15288, an industry standard).
Learn more in: Exploring the Risks That Affect Community College Decision Makers
78.
Risk management
is the identification, assessment, and prioritization of
risk
s (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.
Risk management
’s objective is to assure uncertainty does not deflect the endeavor from the business goals.
Learn more in: A Fuzzy Group Decision-Making Approach to Construction Project Risk Management
79.
An iterative process including the steps of
risk
identification and analysis,
risk
assessment and prioritization,
risk
treatment,
risk
monitoring and control, and
risk
capitalization and documentation.
Learn more in: E-Government and Digital Transformation: A Conceptual Framework for Risk Factors Identification
80.
An ongoing process of activities aimed towards safeguarding an organization from uncertainties which can negatively impact its objectives
Learn more in: Business Continuity of Critical Infrastructures for Safety and Security Incidents
81.
The act of handling the
risk
exposure through mitigation, acceptance, sharing and avoidance.
Learn more in: The Effect of Innovative Contracts on the Business Behaviors in the Context of IoT
82.
The overall process of
risk
avoidance, mitigation and / or control, encompassing
risk
assessment, which in turn encompasses
risk
analysis.
Learn more in: Industrial Occupational Safety: Industry 4.0 Upcoming Challenges
83.
The process of identifying different types of
risk
s, assessing their relative importance for the project, and implementing strategies for managing
risk
.
Learn more in: Telecommunication Investments Analysis: A Multi-Criteria Model
84.
The process of identifying, assessing, and controlling threats.
Learn more in: Health Risk Communication and Media
85.
Identification of
risk
s and determining precautions to the identified
risk
s.
Learn more in: Lean Thinking via Business Intelligence Technologies and Innovation Process
86.
The process of anticipating, preventing, and minimizing potential costs, losses or problems for the event, organizer, the participants, and the audience.
Learn more in: Health, Safety, and Security as a Part of Events Management
87.
The act of handling the
risk
exposure through mitigation, acceptance, sharing and avoidance.
Learn more in: Artificial Intelligence Effects on Contracts and Contracting
88.
The process of identifying and analyzing and proposing ways of mitigating
risk
s.
Learn more in: Information Security Policies
89.
It is usually the financial interpretation that refers to the practice of identifying potential
risk
s in advance, analyse them and take precautionary measures to reduce or to eliminate those possible
risk
s.
Learn more in: Inclusive Entrepreneurship for the Micro, Small, and Medium Enterprises: The Economic Perspective
Find more terms and definitions using our
Dictionary Search
.
Risk Management
appears in:
Remote Work and Sustainable Changes for the...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Risk Management
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 165,400 titles for
Risk Management
to find related research papers.
Learn More About Risk Management in These Related Titles
Critical Perspectives on Social Justice in S...
Social Sciences & Humanities
Copyright 2021. 355 pages.
There is very little discussion of socially just a...
In Stock
$37.50 Individual Chapters
Handbook of Research on Clinical Application...
Medicine & Healthcare
Copyright 2020. 1356 pages.
In the past, individuals in the dentistry field ha...
In Stock
$37.50 Individual Chapters
Theory and Practice of Business Intelligence...
Medicine & Healthcare
Copyright 2020. 322 pages.
Business intelligence supports managers in enterpr...
In Stock
$37.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$37.50 Individual Chapters
Police Psychology and Its Growing Impact on...
Social Sciences & Humanities
Copyright 2017. 345 pages.
Police psychology has become an integral part of p...
In Stock
$37.50 Individual Chapters
Handbook of Research on Computerized Occlusa...
Medicine & Healthcare
Copyright 2015. 973 pages.
Modern medicine is changing drastically as new tec...
In Stock
$37.50 Individual Chapters
Modern Societal Impacts of the Model Minorit...
Social Sciences & Humanities
Copyright 2015. 403 pages.
The model minority stereotype is a form of racism...
In Stock
$37.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$37.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$37.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$37.50 Individual Chapters