نتایج جستجو برای: for application or operational risk management process
تعداد نتایج: 12040732 فیلتر نتایج به سال:
As outsourcing is becoming mandate for today’s business, there has been a variety of researches taking place. This paper discusses on managing operational risks in an organization where one or more business processes are being outsourced. We first review on changing nature of operational risks not only in outsourced process itself, but also among any other interrelated processes. Then a concept...
Due to the new regulatory guidelines known as Basel II for banking and Solvency 2 for insurance, the financial industry is looking for qualitative approaches to and quantitative models for operational risk. Whereas a full quantitative approach may never be achieved, in this paper we present some techniques from probability and statistics which no doubt will prove useful in any quantitative mode...
One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...
Operational risk management is the process of monitoring, evaluating, and changing courses of actions with potential detrimental consequences in real time. In this paper, we extend the decision models proposed in the literature for individual risk managers to account for situations where multiple risk managers are involved. For this purpose, two dynamic and adaptive preference aggregation model...
the rise and stublishment of safavid dynasty was depend on triangle of tasavof, tashayo and royalty, kings legitimized their power upon these. therefore for the understanding the functions of that period we must explore the role of this elements. although application and emphsise upon dignities such as; complete mentor (morshede kamel), deputy of absent imam (nayebe imame ghayeb), and god’s sha...
Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of new management techniques is selectively proposed, promoted, and propagated by different stakeholders. This research on management fashions has yielded a number of insightful research questions and a set of methods for i...
To enhance Patient’s safety, we need effective methods for risk management. This work aims to propose an integrated approach to risk management for a hospital system. To improve patient’s safety, we should develop flexible methods where different aspects of risk and type of information are taken into consideration. This paper proposes a fuzzy Bayesian network to model and analyze risk in the op...
Background & Aims: The operational planning is a process that by it managers regular the actions for receiving to goals. One of The problems in Management of Iranian hospitals is the lack of native model for operational planning. This study has been conducted to designing a model for operational planning in Hospitals affiliated to the Ministry of Health and Medical Education of Iran. Materials ...
feminine voice and narratology in wuthering heights wuthering heights as a general "bronte" work has extraordinary dimensions to it which can make it focal to different ways of interpretation. among other differences the issue of narrative voice is essential in understanding the ultimate purpose of wuthering heights. emily bronte uses different narrators from various focal points speaking of m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید