نتایج جستجو برای: risk information
تعداد نتایج: 2013105 فیلتر نتایج به سال:
It is envisaged that genetic information will be used, together with other types of information, to assess individuals' risks of developing a variety of common conditions. Such risk assessments will involve providing probabilistic information partly based upon results of genetic tests in order to facilitate behaviour change without causing excessive anxiety. The behaviours targeted for change a...
Security breaches on the socio-technical systems organizations depend on cost the latter billions of dollars of losses each year. Although information security is a growing concern, most organizations deploy technical security measures to prevent security attacks, overlooking social and organizational threats and the risks faced because of them. In this paper, we propose a method to information...
The volatility of its share price reflects the volatility of the market value of a bank’s assets. We present data for the volatilities of individual banks’ shares that are implied by the prices of options on the banks’ shares. We present evidence that implied volatilities (IV’s) better forecast actual, future volatilities of share prices than historical volatilities do. Banks’ IV’s are correlat...
probability of private information based trade (pin) has introduced as information risk measure. this paper is going to estimate probability of private information based trade (pin) in tehran stock exchange using microstructure models. our results show that pin is significantly different from zero for tehran stock exchange.
چکیده امروزه در بسیاری از سازمانها، طرح های برون سپاری و واگذاری فعالیت ها با هدف تمرکز بر قابلیت های پایه ای، کوچک سازی، دستیابی به بهترین عملکرد و کنترل و شفاف سازی هزینه ها پیگیری می گردد. از طرفی با مطرح شدن فناوری اطلاعات به عنوان یک عامل کلیدی موفقیت، سازمانها با تمرکز بر این فعالیتها، تلاش در کسب مزیت رقابتی بین رقبا را دارند و فعالیتهای این حوزه یکی از پرطرفدارترین فعالیت هایی است که س...
Process support for knowledge work is far from being mastered in existing information systems. Predominant workflow management solutions are too rigid and provide no means to deal with unpredictable situations. Various case management approaches have been proposed to support this flexibility for unstructured processes. Recently the Object Management Group published the Case Management Model and...
Information Security (IS) practitioners face increasingly unanticipated challenges in IS risk management, often pushing them to act extemporaneously. Few studies have been dedicated to examining the role these extemporaneous actions play in mitigating IS risk. Studies have focused on clear guidelines and policies as sound approaches to ISRM (functionalist approaches). When IS risk incidents occ...
Some current utility models presume that people are concerned with their relative standing in a reference group. If this is true, do certain types care more about this than others? Using simple binary decisions and self-reported happiness, we investigate both the prevalence of “difference aversion” and whether happiness levels influence the taste for social comparisons. Our decision tasks disti...
identification of risk factors of acute hepatitis c virus (hcv) infection in egypt is crucial for developing appropriate prevention strategies. there are few community-based studies on the epidemiology and risk factors of hepatitis c infection in egypt, which could not provide enough information. clear identification of past and current risk factors for infection is of utmost importance so that...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید