نتایج جستجو برای: keywords it system

تعداد نتایج: 5678161  

Journal: :Acta academica 2022

Acta Academica is an accredited, open access South African journal dedicated to scholarship in the humanities. The publishes independently refereed research articles It promotes perspectives of critical social theory and engagements with postcolonial post-developmental debates special references (Southern) Africa. thereby support scholarly work that examines how humanities twenty-first century ...

Journal: :Decision Support Systems 2005
Eric W. T. Ngai F. K. T. Wat

This paper describes the development of a fuzzy decision support system (FDSS) for the assessment of risk in e-commerce (EC) development. A Web-based prototype FDSS is designed and developed to assist EC project managers in identifying potential EC risk factors and the corresponding project risks. A risk analysis model for EC development using a fuzzy set approach is proposed and incorporated i...

Journal: :International Journal of Advanced Computer Science and Applications 2021

This paper proposed the Keyword Movement Disclose System (KMDS), which allows a facilitator of discussion to watch record moving keywords in Discussion Board (DBS). In DBS, participants place each keyword box made for item be discussed. The were expected show participant’s opinion and intention, because individual display was not disclosed other participants. Therefore, if can see true opinions...

2011
Hamid Tohidi

In this century, information, along with other factors of production, is a valuable and vital component of the organizations. With increasing technology advances, organizations have realized the undeniable benefits of Information Technology (IT) to increase the quality, accuracy and speed of affairs and most managers have become aware of the importance of its use in increasing efficiency and ef...

2013
Le Minh Sang Tran Bjørnar Solhaug Ketil Stølen

Security risk analysis should be conducted regularly to maintain an acceptable level of security. In principle, all risks that are unacceptable according to the predefined criteria should be mitigated. However, risk mitigation comes at a cost, and only the countermeasures that cost-efficiently mitigate risks should be implemented. This paper presents an approach to integrate the countermeasure ...

Journal: :JIPS 2006
YoonJung Chung InJung Kim DoHoon Lee

While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techn...

Journal: :IJISCRAM 2009
Murray Turoff Starr Roxanne Hiltz Connie White Linda Plotnick Art Hendela Xiang Yao

Emergency preparedness, planning, and response suffer from shortcomings that impede the potential for effectiveness. In this article, we provide an overview of Emergency Preparedness and Management that is based upon our research, including insights into the shortcomings of current practices, a discussion of relevant theories (e.g., High Reliability Organizations, muddling through) and recommen...

2009
Sarah S. Khan Ram L. Kumar

Given the importance of IT investments in today’s organization, firms tend to spend increasing amounts of time and resources to better manage IT projects. However these projects continue to have high failure rates thus highlighting the need for improved risk management. A stream of IS research has focused on identifying several causes of managerial risks. The theory base that has been used in t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و - پژوهشکده علوم نانو 1392

among the low–dimensional allotropes of carbon, nanotubes and graphene have attracted very much attention from nano–science and nanotechnology specialists. they have been proposed as building blocks in nanometer device engineering. however, these structures are not defect–free. in this thesis, we focused on defective carbon nanotubes and graphene, and studied the effect of couple of very common...

2009
Wolter Pieters

In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk. In this paper, we use actor-network theory to analyse the socio-technical origins of the Dutch tempest issue in e-voting, and its consequences for e-voting beyond the Netherlands. W...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید