نتایج جستجو برای: renders it
تعداد نتایج: 2845758 فیلتر نتایج به سال:
This paper proposes a Cross Impact Analysis for supporting critical infrastructures risk analysis. This methodology contributes to decision-makers and planners with analytical tools for modeling complex situations. These features are generally useful in emergency management and particularly within the critical infrastructures scope, where complex scenarios for risk analysis and emergency plans ...
This paper reports the results of a study aimed at understanding and characterising IT management sophistication in small businesses. A multiple-case study approach was therefore used to explore the IT management practices of small businesses. Data collection involved four small-medium chartered accountancy (CA) firms and three IT firms closely associated with the CA industry. The case results ...
The risks posed by management are neither addressed by risk analysis nor included in safety cases. Yet they have been shown to be significant contributors to accidents. This paper argues for more attention to be paid to them and for the development of a risk-analysis method to address them. The paper examines the aspects of management risk that it might cover and offers a set of proposals for i...
This paper discusses some models of Imprecise Probability Theory obtained by propagating uncertainty in risk analysis when some input parameters are stochastic and perfectly observable, while others are either random or deterministic, but the information about them is partial and is represented by possibility distributions. Our knowledge about the probability of events pertaining to the output ...
Digital application marketplaces are increasingly relevant for digital platform owners seeking to reap the benefits of distributing, brokering, and operating applications by third-party developers. Owners of such marketplaces have two vital goals: address the needs of heterogeneous end-users and attract third-party developers. A key element in simultaneously accommodating these goals is value c...
At eSmart 2003, Kekicheff and Brewer [1] reported on the development of the GlobalPlatform Card Security Requirements Specification (CSRS) [2]. They pointed out not only that the CSRS presents a semi-formal security specification for the entire card platform, but also that it proposes a method for selecting the most appropriate card configuration based on risk analysis. Particular attention was...
This paper addresses the concept of model uncertainty within the context of risk analysis. Though model uncertainty is a topic widely discussed in the risk analysis literature, no consensus seems to exist on its meaning, how it should be measured, or its impact on the application of analysis results in decision processes. The purpose of this paper is to contribute to clarification. The first pa...
While security professionals have long talked about risk, moving an organization from a “security” mindset to one that thoughtfully considers information risk is a challenge. Managing information risk means building risk analysis into every business decision. In this panel, we will discuss how CISOs are working to move the conversation from security towards information risk. In particular, we w...
In order to explain how DIYbio knowledge and expertise is developed and shared the use of Practice Theory will help us gain a useful understanding of how working practices are sustained, reproduced and potentially changed. In addition, the development and sharing of thick, evocative, rich descriptions of these practices might contribute to the motivational knowledge of DIYbio practitioners.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید