نتایج جستجو برای: it requires non

تعداد نتایج: 3956510  

2013
Ling Xue Gautam Ray Xia Zhao

This study examines how the risk-taking incentive of top executives drives the strategic risk-taking in corporate IT implementation. We use the risk incentive provided in executive compensation to capture top executives’ risk-taking incentive, and develop measures of aggressive IT implementation to capture strategic risk-taking in IT implementation. Our analysis provides empirical evidence that...

2005
Ernest Jordan

The worldwide concern with corporate governance concerns itself, inter alia, with the risks that an organisation faces; for many, IT is significant among those risks. This paper examines the audit approach, and others, to dealing with risks in IT-based systems. This paper summarises the findings of research in IT-related areas of risk and then draws together a charter for IT governance that mee...

Journal: :Rel. Eng. & Sys. Safety 2009
Michael Jones-Lee Terje Aven

Social cost–benefit analysis is a well-established method for guiding decisions about safety investments, particularly in situations in which it is possible to make accurate predictions of future performance. However, its direct applicability to situations involving large degrees of uncertainty is less obvious and this raises the question of the extent to which social cost–benefit analysis can ...

2007
Michael M. Richter

In this paper we discuss a rigorous foundation of similarity reasoning based on the concept of utility. If utility is formulated in mathematical terms it can serve as a formal specification for a similarity system. However, utility can also be formulated in informal ways. We consider subjective versions, competing ones and those that change dynamically over time. These are illustrated by exampl...

2006
Hans Weigand Paul Johannesson Birger Andersson Maria Bergholtz Ananda Edirisuriya Tharaka Ilayperuma

It is increasingly recognized that business models offer an abstraction that is useful not only in the exploration of new business networks but also for the design and redesign of operational business processes. Among others, they can be used as input for a risk analysis that is crucial in cross-organizational business process design. However, the notion of value object is up till now not clear...

2010
Yoshinori Koizumi Yoshifumi Nishida Yoichi Motomura Yusuke Miyazaki Hiroshi Mizoguchi

Injury prevention is one of the most important and urgent issues in children’s health since the primary cause of death of children is unintentional injury. Injury prevention requires making safe products as well as safe environments by evaluating the risks. This paper proposes a system for presenting and evaluating potential risk of injury by using a biomechanical simulation based on bodygraphi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1390

abstract: advertisements are the most accessible type of authentic materials, and this is one reason why they are used more and more in english teaching classes. for this cause, studies in the field of advertisements are very widespread nowadays. for pun is one aspect which makes advertisements more interesting, it is used more than before in advertisements. use of puns makes an advertisement m...

Journal: :Current Directions in Psychological Science 2023

Why are some fields and occupations more diverse than others? In this review, we describe a conceptual framework—the field-specific ability beliefs (FAB) model—that provides promising answer to question. This model proposes that gender racial/ethnic imbalances in field or occupation result part from the confluence of two beliefs: (a) belief success context requires high levels intellectual (“br...

2011
Viral V. AchAryA Viral V. Acharya

Derivatives exposures across large financial institutions often contribute to – if not necessarily create – systemic risk. Current reporting standards for derivatives exposures are nevertheless inadequate for assessing these systemic risk contributions. In this paper, the author explains how a transparency standard, in contrast to the current standard, would facilitate such risk analysis. He al...

2014
James L. Worrell

The authors employ a seeded, ranking type Delphi to answer the following research question: how do each of the major stakeholder groups within organizations (representing both strategic and operational levels) conceptualize the risks associated with IT in operations? Using three expert panels drawn from Big 4 IT audit groups and Fortune 1000 business/IT managers, we identify the IT risks most s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید