نتایج جستجو برای: farm investment security
تعداد نتایج: 281821 فیلتر نتایج به سال:
Simplification of Quantified SWOT Analysis in the Example of the Intensive Breeding of Common Elands
The Czech University of Life Sciences Farm at Lany began farming common eland with the aim of achieving full economic self-sufficiency through animal production for breeding and meat. Alternative goals were to verify production technology for farming common eland in captivity and the utilization of this species as an alternative for meat production in mild climatic zones. The model farm was pri...
Over the course of 15 years, between 1992 and 2007, Mexico carried out a major land titling program that handed out certificates over usage rights for more than 90% of its communally held land (ejidos). Importantly, formally specifying usage rights through certification can reduce ambiguity in claims to property. This paper analyzes the long run impact of this program using data from 1991 and 2...
This paper addresses the question of determining the optimal timing of interventions in information security management. Using utility theory, we derive the limiting condition under which, given a potential or realized risk, a decision to invest, delay, or abandon can be justified. Our primary focus is on the decision to defer costly deterministic investments, such as the removal of a service o...
Decision support systems are generally geared to short-term tactical decision makkrg. As an alternative, this paper develops a mathematical progrming model to evaluate long-term strategic alternatives in the context of farm-level agricultural production where a broiler farm considers long-term implications of diversification into commercial aquiculture. The model considers a ten-year strategic ...
The interdependency of information security risks poses a significant challenge for firms to manage security. Firms may overor under-invest in security because security investments generate network externalities. In this paper, we explore how firms can use three risk management approaches, third-party cyberinsurance, managed security service (MSS) and risk pooling arrangement (RPA), to address ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید