نتایج جستجو برای: it

تعداد نتایج: 2839407  

Journal: :Rel. Eng. & Sys. Safety 2009
Michael Jones-Lee Terje Aven

Social cost–benefit analysis is a well-established method for guiding decisions about safety investments, particularly in situations in which it is possible to make accurate predictions of future performance. However, its direct applicability to situations involving large degrees of uncertainty is less obvious and this raises the question of the extent to which social cost–benefit analysis can ...

2007
Michael M. Richter

In this paper we discuss a rigorous foundation of similarity reasoning based on the concept of utility. If utility is formulated in mathematical terms it can serve as a formal specification for a similarity system. However, utility can also be formulated in informal ways. We consider subjective versions, competing ones and those that change dynamically over time. These are illustrated by exampl...

2006
Hans Weigand Paul Johannesson Birger Andersson Maria Bergholtz Ananda Edirisuriya Tharaka Ilayperuma

It is increasingly recognized that business models offer an abstraction that is useful not only in the exploration of new business networks but also for the design and redesign of operational business processes. Among others, they can be used as input for a risk analysis that is crucial in cross-organizational business process design. However, the notion of value object is up till now not clear...

2010
Yoshinori Koizumi Yoshifumi Nishida Yoichi Motomura Yusuke Miyazaki Hiroshi Mizoguchi

Injury prevention is one of the most important and urgent issues in children’s health since the primary cause of death of children is unintentional injury. Injury prevention requires making safe products as well as safe environments by evaluating the risks. This paper proposes a system for presenting and evaluating potential risk of injury by using a biomechanical simulation based on bodygraphi...

2011
Viral V. AchAryA Viral V. Acharya

Derivatives exposures across large financial institutions often contribute to – if not necessarily create – systemic risk. Current reporting standards for derivatives exposures are nevertheless inadequate for assessing these systemic risk contributions. In this paper, the author explains how a transparency standard, in contrast to the current standard, would facilitate such risk analysis. He al...

2014
James L. Worrell

The authors employ a seeded, ranking type Delphi to answer the following research question: how do each of the major stakeholder groups within organizations (representing both strategic and operational levels) conceptualize the risks associated with IT in operations? Using three expert panels drawn from Big 4 IT audit groups and Fortune 1000 business/IT managers, we identify the IT risks most s...

2013
Stefan Bauer Edward Bernroider

This research in progress paper introduces a research initiative focusing on bank employee risk behaviour to mitigate IT operational risks in Austrian banks. The study focuses on the role of IT risk culture and internal controls in relation to employee risk behaviour and the effectiveness of different awareness building practices in banking companies in response to international banking regulat...

2006
Matthijs Kalmijn

Contrary to previous studies treating divorce as a couple’s decision, we make a distinction between ‘his’, ‘her’, and ‘their’ divorce by using information about who initiated divorce. Using competing risk analysis, we re-examine four well-known determinants of divorce: (i) the wife’s employment, (ii) the financial situation of the household, (iii) the presence of children, and (iv) the quality ...

2016
Luc Longpré Olga Kosheleva Vladik Kreinovich

Traditional Shannon’s information theory describes the overall amount of information, without distinguishing between useful and unimportant information. Such a distinction is needed, e.g., in privacy protection, where it is crucial to protect important information while it is not that crucial to protect unimportant information. In this paper, we show how Shannon’s definition can be modified so ...

2005
Atsushi Fujii Tetsuya Ishikawa

This paper describes our system participated in the Document and Passage Retrieval Subtasks at the NTCIR-5 Patent Retrieval Task. The purpose of these subtasks was the invalidity search, in which a patent application including a target claim is used to search documents that can invalidate the demand in the claim. Our system is characterized by the structure analysis for both target claim and en...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید