نتایج جستجو برای: earned duration management and risk management
تعداد نتایج: 17113777 فیلتر نتایج به سال:
One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...
Projects include activities that must be carried out at certain dates, with specified costs and determined qualities in order to satisfy the stakeholders. Project control is one of the most important and widely used issues in project-based organizations and it has attracted a lot of attention. So far, in the field of project control, there have been a lot of research that were done in different...
the present study sought to investigate the impact of using mind-mapping technique instruction on female elementary efl learners reading comprehension; it also investigated their attitudes towards using mind-mapping technique as a tool to improve their reading comprehension. this study followed a quasi-experimental design with two intact groups as experimental, and control groups. the participa...
Today, enterprises have reached to understanding that Information Technology (IT) is more than just a technical issue. Disciplines such as IT governance, (IT) risk management and (IT) compliance have been established to steer it. Though, there has been some improvements, these domains are usually focused separately in silos, which raises a problem of performance and efficiency, where less busin...
in recent years, risk management in respect of enterprise-wide risk management (ewrm) has become more important and highly critical to major corporations worldwide including malaysia. in fact, it is interesting to note that when the government of malaysia passed the code of corporate governance in the year 2000, most of the public limited companies (plcs) in malaysia was struggling to implement...
the build-operate-transfer (bot) projects are a popular method of privatization of public infrastructure development. there are several risks which might affect a bot project negatively. concession period is one of the most important decision variables in arranging a bot-type contract which should be determined considering the existing risks and uncertainties. a longer concession period is more...
According to the nature of their activities, banks are exposed to various types of risks. Hence, risk management is at the heart of financial institutions management. In this study, we intend to summarize the information content of bank financial statements on diverse risks faced by banks and then determine how stock markets react to bank's risk management behavior. The methodology used in this...
The growing importance of enterprise risk management and the resulting integration efforts put the need for separate IT risk management frameworks in question. In this research we analyse common and distinct elements of the COSO enterprise risk management and ISACA Risk IT frameworks. The analysis affirms the hypothesis that separate IT risk management frameworks are redundant.
knowledge management is a process of using a source of strategic knowledge in organizations in order to find key information and organize and transfer it. many organizations adopted knowledge management systems to maintain their stability and usefulness. since there is occupational similarity between informatics experts and librarians, librarians can change to knowledge managers by being inform...
Background and Aim: Hospital disaster risk management accreditation standards have been developed since 2016. However, the country's hospitals are still not well prepared in this regard. This study aimed to identify the implementation challenges of the disaster Risk Management Program in the country's hospitals and provide solutions to improve it. Methods: This study was conducted as qualitativ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید