Browse the SRC




Search within: Entire SIG Website
  


A contract represents a meeting of the minds of both parties. Data breaches, patent infringement litigation and software implementation projects gone wrong are frequent challenges faced by...

Digital transformation, digital IQ, digitalization…all different buzzwords to describe the same phenomenon. It's undeniable that the enterprise IT landscape is shifting, and in addition to the...

The Era of Category Management is now. The humble procurement function has evolved from purchasing to strategic sourcing and now to strategic category management. To leverage the power and latent...

This article provides an overview of employee assistance programs (referred to as EAPs) and covers EAP delivery models and program components, the role of human resource departments, recent...

Original Source: Kathryn Dill, Forbes

"Earlier this year, Forbes released the 2015 list of The 100 Most Trustworthy Companies In America, culled from data provided by MSCI ESG Research. The...

Original Source: Simplicable  by John Spacey

"Reputational risk is the chance of a loss due to damage or a decline in your reputation.

Business reputation can be damaged by actions...

Original Source: Risk Management Monitor by Ward Ching

"The following article is part of a new blog series that will explore ideas, concepts, discussions, arguments and applications...

Original Source: LinkedIn by Chandan Lal Patary

"One of the major risks in any project is the tendency of its key project decision makers—especially the project manager— to overestimate...

Original Source: Journal of Accountancy

"The very name “internal control” poses a problem for companies when they deal with outsourced providers.

This internal responsibility for...

Original Source: IAPP

"In chapter seven of this ongoing series for The Privacy Advisor on the elements of a successful vendor-management program, K Royal, CIPP/E, CIPP/US, discusses the...

Pages