نتایج جستجو برای: it doesn

تعداد نتایج: 2839508  

1993
Soo-Jong Rey Joseph Henry

Kaplan recently proposed a novel lattice chiral gauge theory in which the bare theory is defined on (2n+1)-dimensions, but the continuum theory emerges in 2n-dimensions. We explore whether the resulting theory reproduces all the features of continuum chiral gauge theory in the case of two-dimensional axial Schwinger model. We find that one can arrange for the two-dimensional perturbation expans...

2001
Jane Ferris

The theme of this paper is the occurrence of risks within information technology and information systems investments. A taxonomy of the published classification frameworks of IT related risk is presented and a new comprehensive classification framework for IT investments (the TOPModel) is presented within the TRIP model of the risk factors and critical factors affecting IT investments. Risk man...

2010
Nicolas Racz Edgar Weippl Andreas Seufert

Governance, Risk, and Compliance (GRC) is an emerging topic in the world of business and information technology. However to date there is a lack of research on an integrated approach to GRC has hardly been researched. In this paper we construct an integrated process model for high-level IT GRC management. First, we discuss existing process models for integrated GRC. Then we set the scope of our...

1999
ROBERT N. CAHN

4 SUMMER/FALL 1999 T’S A RACE with no starting point, no fixed course, and really no rules at all: walk, run, ride, do anything you want. Form a team, as big as you like. Build any sort of machine you wish with whatever money you can get your hands on. Just get to the finish line first. That finish line isn’t a particular place but a new understanding of a symmetry (or rather, an almost symmetr...

2009
Louis Marinos Lutz Kirchner Stefan Junginger

This paper discusses the background and results of a research project which was conducted by ENISA (European Network and Information Security Agency) in cooperation with the BOC Information Technologies Consulting GmbH. The project was initiated with respect to the main task of ENISA: ensuring a high and effective level of network and information security within organisations in the European Un...

Journal: :ITM web of conferences 2021

Nowadays, a large network of cameras is predominantly used in public places which provide enormous video data. These data are monitored manually and may be utilized only when the need arises to ascertain facts. Automating system can improve quality surveillance useful for high-level tasks like person identification, suspicious activity detection or undesirable event prediction timely alerts. In...

2015
Mario Silic Andrea Back

Open source software (OSS) has reshaped and remodeled various layers of the organizational ecosystem, becoming an important strategic asset for enterprises. Still, many enterprises are reluctant to adopt OSS. Knowledge about technological risks and their importance for IT executives is still under researched. We aim to identify the technological risks and their importance for OSS adoption durin...

ژورنال: حقوق پزشکی 2013

To help the injured and eliminate physical risks is one of the issues that the legislator has emphasizes on it as a moral duty and has considered its violation as a crime. In this context the physician is exceptional, because not only the legislator has determined his/her responsibility but also the physician has taken over this duty as an ethical principle and he / she do the best efforts for ...

Journal: :MIS Quarterly 2000
Viswanath Venkatesh Michael G. Morris

Masalah Begitu banyak kemajuan telah terjadi pada kemampuan perangkat keras maupun perangkat lunak untuk membantu kehidupan manusia. Meskipun begitu, masih banyak sekali masalah sistem yang tidak digunakan dengan maksimal. Oleh karena itu, salah satu isu yang sangat penting adalah bagaimana cara untuk mengerti kondisi-kondisi di mana sistem informasi diterima atau tidak diterima di dalam suatu ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید