نتایج جستجو برای: enterprise risk management
تعداد نتایج: 1726842 فیلتر نتایج به سال:
This paper starts from the viewpoint that enterprise risk management is a specific application of knowledge in order to control deviations from strategic objectives, shareholders’ values and stakeholders’ relationships. This study is looking for insights into how the application of knowledge management processes can improve the implementation of enterprise risk management. This article presents...
Governance, risk and compliance (GRC) as a marketplace can be broadly divided between GRC management (GRCM) products for the oversight and operation of risk management and compliance programs, and other GRC products for the automation and monitoring of controls. For a comprehensive description of the GRC marketplace, see "A Comparison Model for the GRC Marketplace, 2011 to 2013," which addresse...
This paper presents an innovative computer system that contributes to sustainable development of the enterprise. The research refers to a rethinking of traditional systems of collaboration and risk assessment, present in any organization, leading to a sustainable enterprise. This concept integrates emerging tools that allow the implementation and exploitation of the collective intelligence of t...
Today, most organisations are using packaged software for their key business processes. Enterprise resource planning (ERP), supply chain management (SCM), customer relationship management (CRM) and electronic commerce (EC) systems enable organisations to improve their focus of using information systems (IS) to support their operational and financial goals. This article argues that the need to i...
This chapter investigates opportunities to integrate mobile technologies within an organization’s enterprise architecture (EA), with an emphasis on supply chain management (SCM) systems. These SCM systems exist within the overall EA of the business. SCM systems are further influenced by the increasing modern-day need for information and communications technologies (ICTs) within a business, to b...
As virtualization technology gains a stronger foothold in IT departments, many questions are being raised: " How will this technology affect my existing security posture? " ; " What new concerns need to be addressed to mitigate this risk? " and " What elements of risk does virtualization share with physical deployments? " As you would expect, there is no one size fits all solution to security, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید