نتایج جستجو برای: security arrangements
تعداد نتایج: 198305 فیلتر نتایج به سال:
The interdependency of information security risks often induces firms to invest inefficiently in information technology security management. Cyberinsurance has been proposed as a promising solution to help firms optimize security spending. However, cyberinsurance is ineffective in addressing the investment inefficiency caused by risk interdependency. In this paper, we examine two alternative ri...
Small-scale fisheries (SSFs) in developing countries are expected to play a significant role in poverty alleviation and enhancing food security in the decades to come. To realize this expectation, a better understanding of their informal self-governance arrangements is critical for developing policies that can improve fishers' livelihoods and lead to sustainable ecosystem stewardship. The goal ...
The paper emphasises the important role that learning the lesson from accidents and incidents play in the cyclical process of improving operational safety and security of sources and emergency response arrangements. It reviews events that have provided “awakenings” and the initiatives that have stemmed from them particularly in respect of orphan sources, source security and emergency preparedne...
Protecting national infrastructure such as airports, is a challenging task for police and security agencies around the world; a challenge that is exacerbated by the threat of terrorism. Such protection of these important locations includes, but is not limited to, tasks such as monitoring all entrances or inbound roads and checking inbound traffic. However, limited resources imply that it is typ...
Medical influence on health service management at district level could be eroded as the new Griffiths management arrangements are introduced by district health authorities. Most districts are changing the composition and functions of the district management team to accommodate their new general managers. District general managers are required to prepare new management arrangements for their dis...
Corporates are entering the brave new world of the internet and digitization without much regard for the fine print of a growing regulation regime. More traditional outsourcing arrangements are already falling foul of the regulators as rules and supervision intensifies. Furthermore, ‘shadow IT’ is proliferating as the attractions of SaaS, mobile, cloud services, social media, and endless new ‘a...
Under the supplemental security income program, federally administered payments amounting to $24.7 million were made in March 1976 to 107,000 persons who were residing in domiciliary care facilities and under other supervised living arrangements. These persons were unable to function under totally independent living arrangements but did not require medical or nursing care on a regular basis. Of...
This paper constructs a quantitative lifecycle model with uninsurable labor income and aggregate housing return risk to assess how Korean households make saving and portfolio allocation decisions. The model incorporates the special roles housing plays in the portfolio of households: collateral, a source of service flows, as well as a source of potential capital gains or losses. In the model, a ...
The realization that cyber threats can cause the same devastation to a country as physical security risks has taken the long route towards acceptance. Governments and businesses have thrown the glove of responsibility back and forth on numerous occasions, with government agencies citing the need for private enterprise to take up the mantle, and Business returning the gesture by proposing a ‘nat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید