نتایج جستجو برای: it structure

تعداد نتایج: 3988278  

2006
Frank Innerhofer-Oberperfler Ruth Breu

In this paper we propose a novel approach for the systematic assessment and analysis of IT related risks in organisations and projects. The approach is model-driven using an enterprise architecture as the basis for the security management process. Using an enterprise architecture it is possible to provide an integrated description of an organisation’s structure, processes and its underlying IT ...

2008
Lutz Lowis

IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [GLLR06] demonstrates. According to the survey, many companies consider it important to quantify the losses attacks against their IT systems cause but are unable to do so. In service-oriented architectures, we see a promi...

Journal: :Int. Arab J. Inf. Technol. 2016
Morteza Hatefi Mehdi Fasanghari

The use of Information Technology (IT) in organizations is subject to various kinds of potential risks. Risk management is a key component of project management enables an organization to accomplish its mission(s). However, IT projects have often been found to be complex and risky to implement in organizations. The organizational relevance and risk of IT projects make it important for organizat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - پژوهشکده فنی و مهندسی 1388

asymmetric polyethersulfone (pes) microfiltration flat sheet membranes were composed by the phase inversion method (pim) and were used as supports. composite membranes were fabricated by coating silicone rubber as selective layer. effect of different concentrations of pes and pdms and different solvent such as nmp, dmf and dms effects as pes solvents and support thickness and different coagulat...

Journal: :J. Symb. Log. 2015
Merlin Carl

Exploring further the properties of ITRM -recognizable reals started in [Ca], we provide a detailed analysis of recognizable reals and their distribution in Gödels constructible universe L. In particular, we show that new unrecognizables are generated at every index γ ≥ ω ω . We give a machine-independent characterization of recognizability by proving that a real r is recognizable iff it is Σ1-...

2012
G. Petruzzelli F. Pedron G. Gorini B. Pezzarossa E. Tassi M. Barbafieri

Phytoextraction may be applied at field scale when the removal of bioavailable metals is the specific target of the technology. Residual metals in soil can be considered substantially inert or to be evaluated by site specific risk analysis.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم پایه 1392

یک فضای خطی متناهی بر v نقطه با b خط یک فضا است که در آن از هر دو نقطه درست یک خط عبور می کند. در این پایان نامه ما مقالات زیر را که مربوط به فضاهای خطی ایت را بررسی می کنیم. melone, n. (1991). a structure theorem for finite linear spaces. lecture notes math, 2, 231-241. bridges, w.g. (1972). near 1-designs. j. combinatorial theory (a), 13, 116-126. varga, l.e. (1985). a note on the structu...

2014
Steffi Haag Andreas Eckhardt

Employees increasingly use cloud services of third party providers to efficiently perform their job. Interestingly, the majority adopts the cloud without approval of the organization. IT resources like that are commonly referred to as shadow IT. Although widespread in practice, the present literature on shadow IT is scarce lacking a clear definition of the phenomenon and exclusively focusing on...

2007
Ian Robertson

It is very difficult to get a realistic picture of organizational activity. Yet without such a picture it is well nigh impossible to design Information Technology (IT) systems to properly support the work of the healthcare professional. This article reports on a study undertaken in conjunction with Mancunian Community Health Trust to model certain Trust processes. A number of different professi...

Journal: :Organization Science 2011
Giacomo Negro Michael T. Hannan Hayagreeva Rao

When two groups of market actors differ in how to interpret a common label, each can make claims over the label. One categorical interpretation and the group that supports it risk disappearance if the rival interpretation gains ground. We argue that when members of the endangered category become partial defectors that span categories, their history presents challenges to the identity of nondefe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید