نتایج جستجو برای: keywords it system
تعداد نتایج: 5678161 فیلتر نتایج به سال:
Acta Academica is an accredited, open access South African journal dedicated to scholarship in the humanities. The publishes independently refereed research articles It promotes perspectives of critical social theory and engagements with postcolonial post-developmental debates special references (Southern) Africa. thereby support scholarly work that examines how humanities twenty-first century ...
This paper describes the development of a fuzzy decision support system (FDSS) for the assessment of risk in e-commerce (EC) development. A Web-based prototype FDSS is designed and developed to assist EC project managers in identifying potential EC risk factors and the corresponding project risks. A risk analysis model for EC development using a fuzzy set approach is proposed and incorporated i...
This paper proposed the Keyword Movement Disclose System (KMDS), which allows a facilitator of discussion to watch record moving keywords in Discussion Board (DBS). In DBS, participants place each keyword box made for item be discussed. The were expected show participant’s opinion and intention, because individual display was not disclosed other participants. Therefore, if can see true opinions...
In this century, information, along with other factors of production, is a valuable and vital component of the organizations. With increasing technology advances, organizations have realized the undeniable benefits of Information Technology (IT) to increase the quality, accuracy and speed of affairs and most managers have become aware of the importance of its use in increasing efficiency and ef...
Security risk analysis should be conducted regularly to maintain an acceptable level of security. In principle, all risks that are unacceptable according to the predefined criteria should be mitigated. However, risk mitigation comes at a cost, and only the countermeasures that cost-efficiently mitigate risks should be implemented. This paper presents an approach to integrate the countermeasure ...
While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techn...
Emergency preparedness, planning, and response suffer from shortcomings that impede the potential for effectiveness. In this article, we provide an overview of Emergency Preparedness and Management that is based upon our research, including insights into the shortcomings of current practices, a discussion of relevant theories (e.g., High Reliability Organizations, muddling through) and recommen...
Given the importance of IT investments in today’s organization, firms tend to spend increasing amounts of time and resources to better manage IT projects. However these projects continue to have high failure rates thus highlighting the need for improved risk management. A stream of IS research has focused on identifying several causes of managerial risks. The theory base that has been used in t...
among the low–dimensional allotropes of carbon, nanotubes and graphene have attracted very much attention from nano–science and nanotechnology specialists. they have been proposed as building blocks in nanometer device engineering. however, these structures are not defect–free. in this thesis, we focused on defective carbon nanotubes and graphene, and studied the effect of couple of very common...
In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk. In this paper, we use actor-network theory to analyse the socio-technical origins of the Dutch tempest issue in e-voting, and its consequences for e-voting beyond the Netherlands. W...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید