نتایج جستجو برای: lack of investment security

تعداد نتایج: 21191484  

2005
Jingguo Wang Abhijit Chaudhury H. Raghav Rao

Information technology security investment is receiving increasing attention in recent years. Various methods have been proposed to determine the effective level of security investment. In this paper, we introduce an extreme value approach to address the issues of effective budgeting and investing in IT security. In our model, the security status of a system depends on two factors: system secur...

The present paper measures the risk perception of the bank employees in respect of investment in mutual fund and to identify the factors affecting risk perception. The paper also attempts to find out the impact of these factors on overall risk perception. The study is based on primary data collected by using questionnaire from the bank employees in Tripura state of India. For the analysis of da...

2008
Rolf Hulthén

The information and data security communities and their individual practitioners have long experienced the pedagogical difficulties in communicating to management or funding bodies the importance and relevance of sufficient investments in information and data security. Inside these communities there is almost universal agreement that companies under invest in security. One reason for this pedag...

Journal: :international journal of information science and management 0
n. naghshineh ph.d. student, faculty of psychology and educational sciences, tehran university

digital preservation refers to an important aspect that most iranian digital library initiatives lack. this component is security. while a digital library may be misconceived as an information supply space without a physical form, the same security concerns in force for operation of physical library are valid. unlike the analog materials, all digital copies of digital materials are original. a ...

2002
R. MESERVEY

MESERVEY, R., 1971. The coastline fit of Africa and South America. Palaeogeography, Palaeoclimatol., Palaeoecol., 9: 233-243. It has become axiomatic that the pre-drift reconstruction of Africa and South America is to be made by fitting together the continental shelves. Although this procedure is very plausible, actually the detailed fit of the coastlines is better than that of the shelves and ...

Journal: :تحقیقات اقتصادی 0
لطفعلی عاقلی کهنه شهری استادیار دانشگاه تربیت مدرس، پژوهشکده اقتصاد حسین صادقی استادیار دانشگاه تربیت مدرس، گروه اقتصاد گل جمال نظری قوجق دانشجوی کارشناسی ارشد رشتة اقتصاد انرژی دانشگاه تربیت مدرس،

in this paper, we analyze the effect of lack of capital investment on energy projects using game theory in the guise of cooperative games. we focus on the energy projects in the provincial level as case study during 2010-2011. therefore, we design a theoretical model of the lack of capital investment as a factor influencing the implement of energy projects. in the experimental section, we deter...

Nowadays, the lack of attachment is a significant point in the construction of towns, which is demonstrated with criteria such as lack of environmental attraction and visual qualities, lack of readability, security, and so on. These factors will affect peoplechr('39')s relationship with the environment around them and thus their satisfaction. Golha Town faces numerous problems including lack of...

2008
José Rodrigues-Filho

Brazil became the first country in the world to conduct a large-scale national election using e-voting technology. What does it mean for democracy to hold an electronic election for millions of poor people, most of them living under the poverty line? Is the high investment in e-voting technologies designed to the benefit of millions of illiterate people? The discussions about the lack of securi...

Journal: :International journal of law and policy 2023

Purpose: The aim of the study was to investigate Agricultural Investment and Food Security.
 Methodology: This adopted a desk methodology. A research design is commonly known as secondary data collection. basically collecting from existing resources preferably because its low cost advantage compared field research. Our current looked into already published studies reports easily accessed t...

2011
Christos Ioannidis David J. Pym Julian Williams

This paper addresses the question of determining the optimal timing of interventions in information security management. Using utility theory, we derive the limiting condition under which, given a potential or realized risk, a decision to invest, delay, or abandon can be justified. Our primary focus is on the decision to defer costly deterministic investments, such as the removal of a service o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید