نتایج جستجو برای: lack of investment security
تعداد نتایج: 21191484 فیلتر نتایج به سال:
China formally adopted its national security review regime of foreign investment in 2011, which has been updated by the ‘Measures for National Security Review Foreign Investment’ 2020. The mechanism developed context China’s attempt at, and practice of, a radical reform direct (FDI) regulatory at large market access liberalisation particular, inter alia, transition from previous case-by-case al...
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing the IT security spending decisions and this is a key contribution of the paper. We introduce the notions of directand cross-risk elasticity to describe the customer response to adverse IT security e...
We examine how different investment horizons, and consequently the number of hands through which a security passes during its life, affect prices in a laboratory market populated by overlapping generations of investors. We find that (i) price deviations are larger in markets populated only by shorthorizon investors compared to markets with long-horizon investors; (ii) for a given maturity of se...
Constructivism theory by employing a humanistic vision to issues has provided the the opportunity of considering the special characters of human in political studies. Therefore factors such as identity, benefits, purposes, intentions, and many other issues found important role in security Studies. Ontological Security employed this approach to security matters. This theory seeks to clarify...
This paper presents an approach enabling economic modelling of information security risk management in contemporaneous businesses and other organizations. In the world of permanent cyber attacks to ICT systems, risk management is becoming a crucial task for minimization of the potential risks that can endeavor their operation. The prevention of the heavy losses that may happen due to cyber atta...
Coordinated expansion planning of power plants has always attracted the attention of power industry planners to arrive at the optimal mix that assures adequacy of energy supply. Here, we model the coordinates for expansion of electricity and gas networks while considering technical constraints, in order to minimize the total cost of investment and operation of electricity and gas networks for a...
Public lighting networks are constructed and maintained to provide social security and traffic safety. Due to the expansion of cities, the development in public lighting is inevitable. In addition to new investment, the public lighting service and maintenance program imposes high costs on distribution companies. Since performance assessment methods focus on a combination of key performance indi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید