نتایج جستجو برای: کسبوکارهای نوپای حوزۀ it

تعداد نتایج: 2842778  

2007
HENRY H. WILLIS

The study and application of risk analysis provides a set of tools with a strong methodological foundation. This chapter describes how risk analysis can be integrated into the intelligence cycle for producing terrorism threat assessments and warnings. Intelligence professionals can use the risk analyst’s toolbox to sharpen conclusions that are made in intelligence products by providing support ...

2002
Susan K. Schroeder

2 Abstract This paper provides a framework for examining developing-country financial crisis. It is based upon Hyman Minsky's financial fragility thesis and applied to the case of Thailand 1984-1999. There is empirical evidence for the evolution of the Thai economy through the Minskian regimes (hedged through speculative to Ponzi) in the period prior to the onset of the 1997 Asian crisis. Evide...

2010
Alessandro Colantonio Roberto Di Pietro Alberto Ocello Nino Vincenzo Verde

We propose a framework to evaluate the risk incurred when managing users and permissions through RBAC. The risk analysis framework does not require roles to be defined, thus making it applicable before the role engineering phase. In particular, the proposed approach highlights users and permissions that markedly deviate from others, and that might consequently be prone to error when roles are o...

Journal: :Software Process: Improvement and Practice 2008
Ahmed Al-Emran Dietmar Pfahl

Journal: :Rel. Eng. & Sys. Safety 2007
François Pérès Leïla Bouzaïene Jean-Claude Bocquet François Billy André Lannoy Philippe Haïk

This paper presents a methodology for anticipating failures in a component up to the end of its life cycle. Often, feedback data is not sufficient and must be complemented by the analysis of expert judgment. The methodology developed aims at anticipating the degradation mechanisms responsible for aging, and evaluating their relevance and related uncertainties. This is necessary information for ...

2005
Brian Monahan

utility computing, reachability, security modelling, object oriented logical models, security properties, risk analysis In this paper we consider how logic-based object modelling techniques may be used to help Utility Providers and their customers obtain insight concerning the security characteristics of utility infrastructure and networked systems. We briefly describe two modelling tool protot...

2012

The objective of this article is to discuss the potential of economic analysis as a tool for identification and evaluation of corruption in legislative acts. We propose that corruption be perceived as a risk variable within the legislative process. Therefore we find it appropriate to employ risk analysis methods, used in various fields of economics, for the evaluation of corruption in legislati...

2009
T. Aven

This paper reviews and discusses some key concept and principles of risk analysis and risk management, based on a set of statements, formulated as myths about risk. Examples of such myths are: risk is equal to the expected value, risk equals uncertainty, risk can be expressed by probabilities, risk is equal to an event, risk acceptance criteria contribute to obtaining a high safety standard, an...

Journal: :IEEE Trans. Information Theory 1999
Boris Ryabko Marina P. Sharova

The problem of coding low-entropy information sources is considered. Since the run-length code was offered about 50 years ago by Shannon, it is known that for such sources there exist coding methods much simpler than for sources of a general type. However, known coding methods of low-entropy sources do not reach the given redundancy. In this correspondence, a new method of coding low-entropy so...

2006
Kim E. Lowell Kurt K. Benke

The characterisation of uncertainty and risk analysis are two research domains that have many common elements. Specifically, they are both based on an acknowledgment that decisions are never made using perfect knowledge and therefore always have some degree of associated risk or uncertainty. Research in uncertainty addresses this by seeking to understand the causes of uncertainty, and to quanti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید