Regulatory Risk and the Cost of Capital: Determinants and Implications for Rate Regulation

buy now


Austrian Controller Award 2005 This book develops a comprehensive concept of regulatory risk integrating existing theoretical and empirical research. The focus is on explaining how the design of the regulatory system influences the risk of a rate-regulated firm, as well as on elaborating appropriate methods for the determination of the regulatory rate base and the allowed rate of return. Regarding the regulatory rate base, the question of whether market value of capital or book value of assets should be employed and the choice of the depreciation scheme are at the center of the discussion. Specific methodical issues concerning cost of capital assessment for rate-regulated firms are analyzed, i.e. the circularity of rate regulation, the sharing of risks between capital owners and rate payers, the length of the regulatory review period, the regulation of the capital structure as well as the conversion of a post-tax to pre-tax weighted average cost of capital.

The Art of Asking the Right Questions: A People Manager’s Toolkit

buy now


THE ART OF ASKING THE RIGHT QUESTIONS: A PEOPLE MANAGER’S TOOLKIT should be on your desk as a ‘go to guide’ that you can dip into as needed to remind you of the key questions you should ask in different situations throughout the employment journey. By asking the right questions, you will enhance your team’s skills to maximise their own talent and you will make your business or department more successful by engaging your team’s knowledge and skills. This book is a summary of Caroline McEnery’s top tips to help make your journey of people management run more smoothly so you can maximise your very best resource – your team. And it will help you to be the best you can be yourself!

Human Resources Legal Requirements (Licensed Retail) E-Learning Programme

buy now


This engaging module covers the key underpinning knowledge regarding human resources (HR) legal requirements within the UK’s Licensed retail sector. By completing this module, learners will be able to understand the key HR legal requirements of a business.

It has been developed in partnership with BII/BIIAB – the professional and awarding body for the licensed retail industry.

This programme consists of the following modules:

Module 1: Introduction

Module 2: Statement of Terms and Conditions of Employment

Module 3: National Minimum Wage

Module 4: Itemised Pay Statements

Module 5: Tax and National Insurance

Module 6: The Working Time Regulations 1998

Module 7: Employment of Children and Young Persons

Module 8: Sickness Benefit

Module 9: Time off Work

Module 10: Maternity & Paternity Rights

Module 11: Equality Act 2010

Module 12: Grievance Procedures

Module 13: Disciplinary Procedures

Module 14: Termination of Employment

Module 15: Transfer of Undertakings Regulations (TUPE)

Module 16: Summary

Module 17: End Test

It highlights the key areas of legislation to ensure your business is compliant with the law. It can also be used as comprehensive training tool for staff members to ensure they understand the law and procedures to follow.

The innovative programme is based on highly interactive multimedia screens comprised of text, 3D graphics, 2D/3D animation, audio, an interactive knowledge test and an end test. The programme is for a single user license.

Enables the learner to state the law with regard to national minimum wage.
Learner will be able to identify the law with regard to the issue of a statement of terms and conditions of employment.
Developed in partnership with BII/BIIAB (the professional and awarding body for the licensed retail industry.
Aimed at those running a business as we as managers and supervisors working within larger organisations.
Learners will be able to state the rights of staff to time off work and sickness benefit.

Bank Loan Classification and Provisioning Practices in Selected Developed and Emerging Countries (World Bank Working Paper)

buy now


This report reviews loan classification and provisioning practices prevailing in the 23 jurisdictions represented in the Basel Core Principles Liaison Group at the end of 2001. It covers classification of individual and multiple loans, treatment of guarantees and collateral, bank loan review processes, restructured troubled loans, loan loss provisioning, tax treatment of loan loss provisions, disclosure standards, and external auditors’ role. Differences in provisioning and classification approaches have often made a comparison of bank and banking system weaknesses across regulatory regimes difficult, and such differences have made peer pressure and market discipline less effective. Poor classification and provisioning practices have led to solvency ratios that gave a false sense of security, as occurred as financial system failed in the 1990s.

Risk-Based Tax Audits: Approaches and Country Experiences (Directions in Development – Finance)

buy now


Risk-Based Tax Audits This book serves as a toolkit on risk-based audits and brings together country experiences for implementing risk-based audit systems. Risk management is an important element of effective and efficient compliance management in revenue administration. It is impossible for any revenue administration to control and check every single taxpayer and an unnecessary waste of scarce enforcement resources on routinely examining low-risk compliant taxpayers. The opportunity costs for such roving examinations are high. Just as a private business allocates its resources to areas they feel have the most potential for generating revenues and profits a modern revenue adminis…

Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges

buy now


Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about:

  • Secure proxies – the necessary extension of the endpoints
  • Application identification and control – visualize the threats
  • Malnets – where is the source of infection and who are the pathogens
  • Identify the security breach – who was the victim and what was the lure
  • Security in Mobile computing – SNAFU

With this book, you will be able to:

  • Identify the relevant solutions to secure the infrastructure
  • Construct policies that provide flexibility to the users so to ensure productivity
  • Deploy effective defenses against the ever evolving web threats
  • Implement solutions that are compliant to relevant rules and regulations
  • Offer insight to developers who are building new security solutions and products