نتایج جستجو برای: risk control

تعداد نتایج: 2149199  

2010
J. Haman

This paper is intended as a literature retrieval. In the first part we introduce Kelly criterion and show some of its basic properties. Then we define general HARA (Hyperbolic Absolute Risk Aversion) utility function and investment consumption problem. By stochastic optimal control we demonstrate solution to this problem for special class of HARA utility and show basic model with proportional t...

Journal: :JoWUA 2010
Debin Liu L. Jean Camp XiaoFeng Wang Lusha Wang

The insider threat has been framed as protection of the network from insiders whose threat level may be unknown to the organization. In this paper, we propose a Budget-Based Access Control Model to mitigate the insider threat. We provide an order of magnitude price for every access right and assign each individual user a risk budget. The price for access is then personalized based on the observ...

Journal: :Decision Support Systems 2002
J. Christopher Westland

Electronic commerce business models can add value by elimination of control and risk-bearing borne by channel intermediaries. But such markets may be less robust encouraging risky behavior. We explore a model of transaction risk in the migration from broker-mediated to electronic markets. The research finds that: (1) the risk of falsely accepting ‘bad’ orders is the critical risk measure for op...

Journal: :Math. Meth. of OR 2001
Gino Favero

We consider the problem of minimizing the shortfall risk when the aim is to hedge a contingent claim in a binomial market model and the initial capital is insufficient for a perfect hedge. This problem has been solved under complete information on the underlying model in [3]. We present two possible solutions to the same problem in the case of incomplete information, namely when the underlying ...

2015
Fabrizio Baiardi Federico Tonelli Alessandro Bertolini

CyVar extends the Value-At-Risk statistics to ICT systems under attack by intelligent, goal oriented agents. CyVar is related to the time it takes an agent to acquire some access privileges and to the one it owns these privileges. To evaluate the former time, we use the security stress, a synthetic measure of the robustness of an ICT system. We approximate this measure through the Haruspex suit...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور مرکز - دانشکده زبانهای خارجی 1391

the primary goal of the current project was to examine the effect of three different treatments, namely, models with explicit instruction, models with implicit instruction, and models alone on differences between the three groups of subjects in the use of the elements of argument structures in terms of toulmins (2003) model (i.e., claim, data, counterargument claim, counterargument data, rebutt...

2017
Hany F. Atlam Ahmed Alenezi Robert John Walters Gary B. Wills

The Internet of Things (IoT) represents a modern approach where boundaries between real and digital domains are progressively eliminated by changing over consistently every physical device to smart object ready to provide valuable services. These services provide a vital role in different life domains but at the same time create new challenges particularly in security and privacy. Authenticatio...

2012
Christoph Brandt Francesco Santini Natallia Kokash Farhad Arbab

International banks need to estimate their operational risks due to external regulations. Based on their estimations they need to provide private capital to cover potential losses caused by these risks. Therefore, operational risks need to be properly measured and managed in order to reduce the required private capital. In this paper we discuss operational risks related to a typical banking bus...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید