نتایج جستجو برای: lack of investment security

تعداد نتایج: 21191484  

Journal: :Erasmus law review 2022

China formally adopted its national security review regime of foreign investment in 2011, which has been updated by the ‘Measures for National Security Review Foreign Investment’ 2020. The mechanism developed context China’s attempt at, and practice of, a radical reform direct (FDI) regulatory at large market access liberalisation particular, inter alia, transition from previous case-by-case al...

Journal: :KIPS Transactions on Computer and Communication Systems 2012

Journal: :Decision Sciences 2010
Bora Kolfal Raymond A. Patterson M. Lisa Yeo

Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing the IT security spending decisions and this is a key contribution of the paper. We introduce the notions of directand cross-risk elasticity to describe the customer response to adverse IT security e...

2015
Shinichi Hirota Juergen Huber Thomas Stöck Shyam Sunder Thomas Stöckl

We examine how different investment horizons, and consequently the number of hands through which a security passes during its life, affect prices in a laboratory market populated by overlapping generations of investors. We find that (i) price deviations are larger in markets populated only by shorthorizon investors compared to markets with long-horizon investors; (ii) for a given maturity of se...

Constructivism theory by employing a humanistic vision to issues has provided the  the opportunity of considering the special characters of human in political studies.  Therefore factors such as identity, benefits, purposes, intentions, and many other issues  found important role in  security Studies. Ontological Security employed this approach to  security matters. This theory seeks to clarify...

Journal: :Int J. Information Management 2008
Rok Bojanc Borka Jerman-Blazic

This paper presents an approach enabling economic modelling of information security risk management in contemporaneous businesses and other organizations. In the world of permanent cyber attacks to ICT systems, risk management is becoming a crucial task for minimization of the potential risks that can endeavor their operation. The prevention of the heavy losses that may happen due to cyber atta...

Coordinated expansion planning of power plants has always attracted the attention of power industry planners to arrive at the optimal mix that assures adequacy of energy supply. Here, we model the coordinates for expansion of electricity and gas networks while considering technical constraints, in order to minimize the total cost of investment and operation of electricity and gas networks for a...

Public lighting networks are constructed and maintained to provide social security and traffic safety. Due to the expansion of cities, the development in public lighting is inevitable. In addition to new investment, the public lighting service and maintenance program imposes high costs on distribution companies. Since performance assessment methods focus on a combination of key performance indi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید