نتایج جستجو برای: Asset Protection

تعداد نتایج: 203353  

Journal: :Seminars in cutaneous medicine and surgery 2013
Jay D Adkisson Lawrence B Keller

Asset protection planning is a highly technical area of legal planning. Because of the fraudulent transfer laws, asset protection planning must be done in advance of any claim, be technically sound, not rely upon secrecy, and avoid any number of critical mistakes including keeping personal and business assets separate. Physicians who engage in asset protection planning must avoid critical mista...

Journal: :SSRN Electronic Journal 2016

2004
Rui Albuquerque Neng Wang

Corporations in most countries are run by controlling shareholders, who have substantially smaller cash flow rights than their control rights in the firm. This separation of ownership and control allows the controlling shareholders to pursue private benefits at the cost of outside minority investors by diverting resources away from the firm and distorting corporate investment and payout policie...

2005
Caroline Moser

In the past two decades poverty focused policy has changed remarkably in the South. This can be summarized as a shift from residual welfare poverty-alleviation strategies, commonly associated with ‘safety nets’, to social protection poverty-reduction policies. The latter in principle has a far broader mandate incorporating risk prevention and mitigation strategies, as well as the perennially ne...

Journal: :J. Network and Computer Applications 2015
Adnan Akhunzada Mehdi Sookhak Nor Badrul Anuar Abdullah Gani Ejaz Ahmed Muhammad Shiraz Steven Furnell Amir Hayat Muhammad Khurram Khan

Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: firstly, the attacker is human and, therefore, utilizes motivation, creativity, and ingenuity. Secondly, the attacker has limitless and authorized access to the target. Thirdly, all major protections stand up to a determined attacker till a certain period of time. Digi...

Journal: :CoRR 2013
Mahimn Pandya Hiren Joshi Ashish Jani

The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the protection of digital assets is of priority in research. The threat of current focus is unauthorized copying of digital assets which give boost to piracy. This under t...

2006
Imad Abbadi

This paper develops an approach for assessing Digital Rights Management (DRM) systems based on an ideal list of DRM requirements from the points of view of users, content providers and copyright law. In addition, it analyses the most recently discussed schemes for protecting digital assets in home networks. The assessment of these solutions focuses on protecting content while being exchanged be...

2011
Shu Schiller Jeffrey W. Merhout

Enterprise IT asset disposition is one important contributing dimension to green IT initiatives adopted by organizations. IT asset disposition services aim to maximize the value of the IT asset investment of enterprises over its entire lifecycle while guaranteeing data security and protecting against environmental liability. The purpose of this paper is to introduce the practice of IT asset dis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید