نتایج جستجو برای: keywords risk sharing

تعداد نتایج: 2889943  

2011
Claudia NESSLER

Companies focus on knowledge management initiatives to fully derive business value from their employees’ knowledge. However, they emphasize individual or organizational knowledge sharing processes leaving out the team focus. As many companies organize their processes around projects, knowledge sharing between teams becomes vital to ensure organization-wide learning. This study focuses on cultur...

Journal: :iranian journal of public health 0
ammal metwally 1. community medicine research department, national research center , cairo, egypt. amira mohsen 1. community medicine research department, national research center , cairo, egypt. rehan saleh 1. community medicine research department, national research center , cairo, egypt. walaa foaud 1. community medicine research department, national research center , cairo, egypt. nihad ibrahim 1. community medicine research department, national research center , cairo, egypt. thanaa rabaah 1. community medicine research department, national research center , cairo, egypt.

the aim of this study was to identify and prioritize the risky behaviors and explore the newly emerging pi related to egyptian habits that may lead to hcv transmission.from january 2011 until january 2012, a case control study matched on socio demographic factors was conducted comparing 540 hepatitis c patients and their contacts who were hcv serologically negative (102 subjects). they were ran...

Abstract Background and Objective: The main index in resilience engineering is the management commitment index. In this study, a semi-quantitative risk assessment method based on the fuzzy hierarchical analysis method for management commitment index was implemented in evaluating the resilience level of two selected hospitals. Materials and methods: At first, evaluation tools including a 17-qu...

2012
Smriti Jain Maya Ingle

Attacks against networked system are common and increasing, therefore, IT practitioners need to secure the system. Hence, security is recognized as a key feature for sharing data among enterprises and the semantic web. Sharing increases the risk like viruses, fraud, and misuse of data. Data can be secured internally by a secured product and secure settings, as well as externally by using encryp...

Journal: :Community Literacy Journal 2012

Journal: :Osnabrücker Studien zur jüdischen und christlichen Bibel 2023

Free AccessImportant Keywordshttps://doi.org/10.14220/9783737013444.259SectionsPDF/EPUB ToolsAdd to favoritesDownload CitationsTrack Citations ShareShare onFacebookTwitterLinkedInRedditEmail About Previous chapter Next FiguresReferencesRelatedDetails Download book coverOsnabrücker Studien zur Jüdischen und Christlichen Bibel.Volume 8 1st editionISBN: 978-3-8471-1344-7 eISBN: 978-3-7370-1344-4Hi...

Journal: :international economics studies 0
hyung-suk byun hyeon-seung huh hyun-hoon lee

â â â â  kangwon national university, south korea â â yonsei university, south korea â â  [1] â  kangwon national university, south korea â â â  abstract â  t his paper aims to understand the structure and determinants of international bank l ending among apec economies. specifically, this paper first aims to analyze whether australia canada japan chinese taipei and the united states, which are...

Journal: :Journal of Political Economy 2023

Financial crises typically occur because firms and financial institutions are highly exposed to aggregate shocks. We propose a theory explain these exposures. study model where entrepreneurs can issue state-contingent claims consumers. Even though use instruments hedge negative shocks, they do not necessarily so insuring against shocks is expensive, as consumers also harmed by them. This effect...

Journal: :Journal of Public Economics 1988

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید