نتایج جستجو برای: internal controls
تعداد نتایج: 482320 فیلتر نتایج به سال:
The document describes an innovative way to assess the effectiveness of internal IT controls where the control framework is first captured in the models and then the models are used to analyse the evidence gathered from the IT environment. The aim is to lift the risk and control management lifecycle from a series of people based processes to one where model based technology enhances, connects a...
This paper studies the relationship of parental resources to the marital transitions of children. It extends past research by explicitly distinguishing various dimensions of parental resources and by taking parental preferences directly into account. We test models in which parental resources have additive effects on the timing of marriage and models in which parental resources interact with pa...
The Advanced Compton Telescope (ACT) has been suggested to be the optimal next-generation instrument to study nuclear gammaray lines. In this work, we investigate the potential of three hypothetical designs of the ACT to perform SN science. We provide estimates of 1) the SN detection rate, 2) the SN Ia discrimination rate, and 3) which gamma-ray lines would be detected from specific supernova r...
Current discussions of offspring begging typically assume either that it is a signal directed at parents or that it represents a form of scramble competition to gain access to them. However, offspring might also display to inform nest mates that they will contest the next food item to be delivered; in other words, begging (possibly in the absence of parents) might serve purely as a form of nego...
We present a framework for non-prioritised belief revision i.e., belief revision in which newly acquired information is not always fully accepted in which the result of revision is arrived at via a kind of negotiation between old information and new. We show how both ordinary par t ia l meet revision and Fermd and Hansson's selective revision can be captured in this framework, and also how it s...
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the detected threats. However, the existing socio-technical models are too abstract to represent all security controls recommended by practitioners...
This study examined the effects of parental monitoring in order to discover specific ways that their re1ationships with their parents affect ado1escents' delinquent behaviour. Data were taken from the National Survey of Youth 1972, a survey of a representative samp1e of 1395 Americans in the age range 11-18 years. Conditions such as the age and sex of the respondents, their affectiona1 re1ation...
Data from 752 Bahamian youth and their parents were analyzed to examine the relationship of youth depression with youth risk involvement, parental monitoring, and parent-youth communication. Depressed youth were older, more likely to engage in risk behaviors, and they perceived significantly lower levels of parental monitoring and higher levels of SOCIAL BEHAVIOR AND PERSONALITY, 2006, 34(10), ...
-This study focuses on the parental perception of their children’s viewership of violence in television programmes with respect to risk behaviour factors such as Explicit ‘Aggression’, ‘Identification’, ‘Imitation’, ‘Isolation’ and ‘Behaviour contingency’ as well as on other factors such as ‘Parental Mediation’ and ‘Parent-Child
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید