نتایج جستجو برای: it wouldn
تعداد نتایج: 2839413 فیلتر نتایج به سال:
Using data from a large, U.S. federal job training program, we investigate whether enrolment incentives that exogenously vary the ‘shadow prices’ for serving different demographic subgroups of clients influence case workers’ intake decisions. We show that case workers enroll more clients from subgroups whose shadow prices increase but select at the margin weaker-performing members from those su...
Shadow IT is relatively new and emerging phenomenon which is bringing number of concerns and risks to the organizational security. Past literature has mostly explored the “negative” effects of the Shadow IT phenomenon, including, for example, the security aspect where Shadow systems are said to undermine the official systems and endanger organizational data flows. But, they are also said to inc...
We present, compare and contrast new directions in long term digital preservation as covered by the four large European Community funded research projects that started in 2011. The new projects widen the domain of digital preservation from the traditional purview of memory institutions preserving documents to include scenarios such as health-care, data with direct commercial value, and webbased...
The Integrated Technical Reference Model (ITRM) provides guidelines and design principles for development of Wireless Sensor Networks (WSN). This paper describes an approach to implement a localization application for WSN using the I-TRM. It also provides a comparison between a typically organized WSN, the I-TRM and the Moteworks software platform.
The market for derivatives with payoffs contingent on the credit quality of a number of reference entities has grown considerably over recent years. The risk analysis and valuation of such multi-name structures often relies on simulating the performance of the underlying credits. In this paper we discuss the simulation of correlated unpredictable default arrival times. Our algorithm is based on...
In this paper we propose the codification of argument and event structures in wordnets, providing information on selection properties, semantic incorporation phenomena and internal properties of events, in what we claim to be an affordable procedure. We propose an explicit expression of argument structure, including default and shadow arguments, through three new relations and a new order featu...
Information Technology (IT) used for business processes is not only provided by the organization’s IT department. Business departments and users autonomously implement IT solutions, which are not embedded in the organizational IT service management. This increasingly occurring phenomenon is called Shadow IT. The various opportunities and risks of Shadow IT challenge organizations and call for a...
Risk analysis is one of many tools for security improvement. The main idea of it is based on analysis of gathered information about an observed company and following searching for some group of countermeasures which can reduce a risk. The paper discuss inference mechanisms in the process of Risk Analysis called Risk Management. The progress is demonstrated by one example.
Recently, a novel approach towards semi-quantitative IT security risk assessment has been proposed in the draft IEC 62443-3-2. This approach is analyzed from several different angles, e.g. embedding into the overall standard series, semantic and methodological aspects. As a result, several systematic flaws in the approach are exposed. As a way forward, an alternative approach is proposed which ...
An overview is given of recent problems with food-borne enteric human pathogens originating from contaminated agricultural animals. The need for risk analysis is indicated, and the generally accepted procedure for risk assessment is outlined. Two main approaches to probability and risk calculations, namely the “frequentist” and Bayesian approaches, are described. Examples are given of microbial...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید