نتایج جستجو برای: risk information
تعداد نتایج: 2013105 فیلتر نتایج به سال:
Recently security has became one of the major concern in Information System (IS) development. Different security modeling language or security extension is used to model security features of IS. Mal Activity Diagram (MAD) is used at the design stage to represent security aspect. But it cannot model all the security risk management concepts. Without full coverage of concepts, it is not possible ...
Risk management is the process that has to be applied to all areas of business. The paper sets out to discuss risk management primarily in the field of information systems. Numerous national and international standards have dealt with this field of work. American National Institute of Standards and Technology (NIST) has developed standards, instructions and guidelines for particular issues rela...
Enterprise systems have taken full advantage of Information Technology (IT) and Information Systems (IS) to innovate and to create business value. The principal business value for system is utility. System utility is a complex factor that has many contributing variables and the resultant of business value. The metrics of utility are measures such as up-time, customer satisfaction, and so on. In...
When risk managers develop firm-wide measures of risk, the efforts can impose substantial costs both of developing information systems and, on an ongoing basis, of computation and aggregation. These costs can lead risk managers to base risk measures on a set of risk factors (including asset prices) of lower dimension than the dimension of underlying sources of risk. Such truncation of the set o...
More than 4 million Indonesians live in tsunamiprone areas along the southern and western coasts of Sumatra, Java and Bali. Although a Tsunami Early Warning Center in Jakarta now exists, installed after the devastating 2004 tsunami, it is essential to develop tsunami risk knowledge within the exposed communities as a basis for tsunami disaster management. These communities need to implement ris...
Communicating seismic risk to individuals can be difficult for an institution because it involves providing technical and scientific information, including the low probability of adverse event, that is not always easy understand. One way facilitate understanding probabilities provide comparisons with occurrence other more familiar events. In a randomized trials experiment, we investigated effec...
The increasing dependence on information networks for business operations has focused managerial attention on managing risks posed by failure of these networks. In this paper, we develop models to assess the risk of failure on the availability of an information network due to attacks that exploit software vulnerabilities. Software vulnerabilities arise from software installed on the nodes of th...
Probabilistic retrieval models usually rank documents based on a scalar quantity. However, such models lack any estimate for the uncertainty associated with a document’s rank. Further, such models seldom have an explicit utility (or cost) that is optimized when ranking documents. To address these issues, we take a Bayesian perspective that explicitly considers the uncertainty associated with th...
Tujuan penelitian ini yaitu untuk mengetahui dampak financial risk, information interaction risk terhadap online purchase intention. Penelitian menggunakan pendekatan kuantitatif melalui penyebaran kuesioner online. Adapun populasi yang digunakan dalam keseluruhan konsumen melakukan transaksi media pemasaran berbasis digital. Ukuran sampel minimum diambil berdasarkan perhitungan 10 kali jumlah ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید