نتایج جستجو برای: it
تعداد نتایج: 2839407 فیلتر نتایج به سال:
Deriving value judgements about threat rankings for large and entangled systems, such as those of urban smart grids, is a challenging task. Suitable approaches should account for multiple threat events posed by different classes of attackers who target system components. Given the complexity of the task, a suitable level of guidance for ranking more relevant and filtering out the less relevant ...
The rising popularity of large-scale real-time analytics applications (real-time inventory/pricing, mobile apps that give you suggestions, fraud detection, risk analysis, etc.) emphasize the need for distributed data management systems that can handle fast transactions and analytics concurrently. Efficient processing of transactional and analytical requests, however, require different optimizat...
Risk analysis is a tool for investigating and reducing uncertainty related to outcomes of future activities. Probabilities are key elements in risk analysis, but confusion about interpretation and use of probabilities often weakens the message from the analyses. Under the predictive, epistemic approach to risk analysis, probabilities are used to express uncertainty related to future values of o...
Most organizations in all sectors of industry, commerce and government are fundamentally dependent on their information systems (IS) and would quickly cease to function should the technology (preferably information technology – IT) that underpins their activities ever come to halt [15]. The IT developments may have enormous implications for the operation, structure and strategy of organizations...
As virtualization technology gains a stronger foothold in IT departments, many questions are being raised: " How will this technology affect my existing security posture? " ; " What new concerns need to be addressed to mitigate this risk? " and " What elements of risk does virtualization share with physical deployments? " As you would expect, there is no one size fits all solution to security, ...
How good is “good”? Based on the assumption that asymmetric information exists between decentralized relationship managers who create soft information in credit rating systems and a bank’s management, this study deals theoretically and empirically with the existence of rater effects in bank internal credit ratings. If relationship managers have an incentive to manipulate credit ratings, the rat...
The economic relevance of IT risk is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and rising dependability on IT require continuous risk assessment, challenging current methods of risk management. Extending these methods by a business process-oriented view is a promising approach for taking the occurring dynamics an...
why some learners are willing to communicate in english, concurrently others are not, has been an intensive investigation in l2 education. willingness to communicate (wtc) proposed as initiating to communicate while given a choice has recently played a crucial role in l2 learning. it was hypothesized that wtc would be associated with language learning orientations (llos) as well as social suppo...
The major goal of a pre-sales phase is to provide customers with a compelling offer that exactly fits their needs. For its creation not only sales but also requirements engineering activities take place. The latter are needed to translate the customers’ needs to features, to efforts, and eventually to costs. Although this sounds like business as usual, compared to conventional requirements engi...
1.1 Case Study overview including organizational diagram.....................................3 1.2 Motivation and justification........................................................................................4 1.3 Why risk assessment is important (impact)....................................................4 2. The scope of Risk assessment in compliance with ISO27001.........................
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید