نتایج جستجو برای: it couldn

تعداد نتایج: 2839432  

Journal: :JIPS 2006
YoonJung Chung InJung Kim DoHoon Lee

While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techn...

Journal: :Rel. Eng. & Sys. Safety 2003
Michael H. Faber Mark G. Stewart

The present paper should be seen as a basis for discussion of important aspects of risk analysis and assessment, as well as attempting to describe risk assessment in accordance with the present state of the art. Risk assessment is thus presented in an overview form from the viewpoint of being a means for decision-making and thus within the formal framework of decision theory. First the motivati...

2010
G. H. Kjølle I. B. Utne

Failures in critical infrastructures can cause major damage to society, and thus there is a need for a common approach to cross-sector risk analyses. This paper presents such an approach, which includes an extended preliminary hazard analysis and detailed risk analysis of electricity supply, carried out in a case study. The risk analysis approach constitutes an important basis for analyzing int...

2007
Wing Ho Andy Yuen

1 Macrodiversity against Shadowing So far, the diversity techniques that are discussed are used to mitigate the eeects of small scale fading. These techniques are often called microscopic diversity. Similar diversity techniques exist in literature with the objective to combat shadow fading, which is known as macroscopic diversity. With macroscopic diversity, signals that are received from a mob...

2011
Gyrd Brændeland Atle Refsdal Ketil Stølen

Risk analysis is an important tool for developers to establish the appropriate protection level of a system. Unfortunately, the shifting environment of components and component-based systems is not adequately addressed by traditional risk analysis methods. This paper addresses this problem from a theoretical perspective by proposing a denotational model for component-based risk analysis. In ord...

Journal: :Operations Research 2012
Tianyang Wang James S. Dyer

This paper presents a general framework based on copulas for modeling dependent multivariate uncertainties through the use of a decision tree. The proposed dependent decision tree model allows multiple dependent uncertainties with arbitrary marginal distributions to be represented in a decision tree with a sequence of conditional probability distributions. This general framework could be natura...

2014
Henry Been Maurice van Keulen

Fraud risk analysis on data from formal information sources, being a ‘paper reality’, suffers from blindness to false information. Moreover, the very act of providing false information is a strong indicator for fraud. The technology presented in this paper provides one step towards the vision of harnessing real-world data from social media and internet for fraud risk analysis. We introduce a no...

2004
Han Liyan

Contrast to identical rationality, non-identical rationality is laid as the basis for option pricing, realized by a family of non-additive fuzzy measures mathematically, which naturally induces the new concept and analyzing methods, fuzzy options. Then as demonstration, the paper applies the fuzzy options to default risk analysis for municipal bonds in China.

2015
Steffi Haag Christiane Bozoyan

Prior research argues that the effective usage of a mandatory system varies with users’ individual differences and engagement, the tasks carried out, and the system features applied. In this study, we analyze individual-level system usage to improve performance by adapting and expanding the number and configuration of systems in use. Thus, we address IT executives’ increasing challenge of users...

Journal: :IJISCRAM 2009
Murray Turoff Starr Roxanne Hiltz Connie White Linda Plotnick Art Hendela Xiang Yao

Emergency preparedness, planning, and response suffer from shortcomings that impede the potential for effectiveness. In this article, we provide an overview of Emergency Preparedness and Management that is based upon our research, including insights into the shortcomings of current practices, a discussion of relevant theories (e.g., High Reliability Organizations, muddling through) and recommen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید