نتایج جستجو برای: it studies individual
تعداد نتایج: 4113983 فیلتر نتایج به سال:
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
A risk inventory provides an integrated view on risk management artifacts, e.g., risks, risk controls, and performance indicators. In this paper, we show how adapting the enterprise architecture management processes (EAM) may provide a foundation for an integrated IT risk inventory. Based on a design research approach, we develop a systematic approach for integrating the disciplines of risk man...
Entrepreneurship, which is the process of identifying, evaluating and developing opportunities, has been recently identified as the most important element in the economic development of countries in various areas and industries, including banking industry. Since opportunity identification is the first step in entrepreneurship, the present research attempts to investigate and prioritize the indi...
abstract the present study was conducted to examine the effect of proficiency on students interaction while carrying out the grammar-based task(s) in collaboration. in particular, the study examines whether the level of proficiency affects the learners’ focus of attention to grammatical and lexical features. the study takes a further step and examines whether there is any difference in the use...
In this paper we propose a novel approach for the systematic assessment and analysis of IT related risks in organisations and projects. The approach is model-driven using an enterprise architecture as the basis for the security management process. Using an enterprise architecture it is possible to provide an integrated description of an organisation’s structure, processes and its underlying IT ...
IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [GLLR06] demonstrates. According to the survey, many companies consider it important to quantify the losses attacks against their IT systems cause but are unable to do so. In service-oriented architectures, we see a promi...
gol-e-gohar iron ore mine of sirjan in southern part of iran is a large open pit that operates below the groundwater table and during mining operation, dewatering is required to prevent operation processes from flooding. current operation is going on by digging wells in or out of the pit and pumping to prevent flooding. as a result of the former dewatering operation a vast deep cone of depressi...
The use of Information Technology (IT) in organizations is subject to various kinds of potential risks. Risk management is a key component of project management enables an organization to accomplish its mission(s). However, IT projects have often been found to be complex and risky to implement in organizations. The organizational relevance and risk of IT projects make it important for organizat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید