‘Value for Whom, by Whom’: Investigating Value Constructs in Non-Profit Project Portfolios

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Value to Whom? The Patient Voice in the Value Discussion.

BACKGROUND Professional societies and other organizations have recently taken a visible role trying to define treatment value via value frameworks and assessments, providing payer or provider recommendations, and potentially impacting patient access. Patient perspectives routinely differ from those of other stakeholders. Yet, it is not always apparent that patients were engaged in value framewo...

متن کامل

Optimal strategies for selecting project portfolios using uncertain value estimates

The document can be stored and made available to the public on the open internet pages of Aalto University. All other rights are reserved.

متن کامل

For whom the desert bell tolls: heat stroke or stroke

       Heat stroke is the most complicated and dangerous amongst heat injuries that can lead to irreversible injury and even death with itself or with creating predisposibility to different diseases. The following case report depicts a patient who presented primarily with impairment of consciousness after walking 45 km in the summer heat to cross the Syria-Turkey border and la...

متن کامل

Value at Risk bounds for portfolios of non-normal returns

This paper studies Value at Risk (VaR) bounds for sums of stochastically dependent random variables, i.e. portfolios of correlated financial assets. The bounds hold under no restrictions on the dependence or on the marginal distributions of returns. An improvement of the bounds is given for positive (quadrant) dependent rvs. Both sets of bounds are computed for portfolios of 6 international ind...

متن کامل

Security For Whom?

Pervasive computing will introduce hundreds of computing devices per user. This change is of such magnitude that it is qualitative as well as quantitative. Old solutions may not scale when the size of the problem grows by such a factor—passwords, for example, will no longer be a suitable user authentication method. In this paper we examine new security issues for pervasive computing including a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Project Management Research and Practice

سال: 2016

ISSN: 2207-1415

DOI: 10.5130/pmrp.v3i0.5038