• No results found

risk information

"It won't happen to me:" optimism, biases, and recall of road-risk information

"It won't happen to me:" optimism, biases, and recall of road-risk information

... a risk factor and thus have a big influence over their own health ...to risk information is adaptive in relation to health risk information this may not be the case for road related ...

12

Does information form matter when giving tailored risk information to patients in clinical settings? A review of patients’ preferences and responses

Does information form matter when giving tailored risk information to patients in clinical settings? A review of patients’ preferences and responses

... tailored risk information as part of their care in clinical ...tailored risk information in one form with either usual care, verbal risk messages, or with a different form of ...

12

The Information Seeking Behavior of Private Investigators: A Study of Investigators in North Carolina and Georgia.

The Information Seeking Behavior of Private Investigators: A Study of Investigators in North Carolina and Georgia.

... high risk information (HRI). Hayden defines high risk information as information that may possibly cause harm within the context of certain external factors, which he terms ...

62

Information security risk management in a public institution: a case study

Information security risk management in a public institution: a case study

... and information security implementation requires not only cooperation across the organization, but also by managers (Da Veiga and Martins, 2015; Montesdioca and Maçada, ...2015).Various information security ...

7

Venture Recognition of Entrepreneurship Driven by Internet Crowdfunding Based on Bayesian Inference

Venture Recognition of Entrepreneurship Driven by Internet Crowdfunding Based on Bayesian Inference

... The risks of Internet crowdfunding mainly include technical risk cybersecurity risk, information leakage risk, new technology application risk, business risk operational risk, liquidity [r] ...

5

The information management risk construct: identifying the potential impact of information quality on corporate risk

The information management risk construct: identifying the potential impact of information quality on corporate risk

... between information risk, information quality and management of corporate risk is emphasised by McCaig (2002) who states that the incentive to take risk management more seriously comes ...

16

Generation of Contour for Tracking Surface to Manage Risk of any Injury

Generation of Contour for Tracking Surface to Manage Risk of any Injury

... or information unexpected to domain experts may be important to detect the possibility of large scale ...of information which are unexpected to domain experts is one of the important processes in ...

5

BUSINESS PROCESS REENGINEERING TO IMPROVE PROCESS ALIGNMENT & INFORMATION SYSTEM 
PLATFORM AT STAINLESS EQUIPMENT COMPANY

BUSINESS PROCESS REENGINEERING TO IMPROVE PROCESS ALIGNMENT & INFORMATION SYSTEM PLATFORM AT STAINLESS EQUIPMENT COMPANY

... the risk area: small (L), medium (M), high (H). By using the risk matrix method, it is important to identify the expected opportunity categories and categories of losses in relation to the scale of the ...

15

Peak Risk Assessing The Process of Information Epidemics Expansion

Peak Risk Assessing The Process of Information Epidemics Expansion

... of risk assessment is to determine the object of evaluation, that is, the boundaries of the analyzed information and telecommunications system, as well as resources and information, forming ...

5

Risk factors filariasis incident by geographic information systems approach in pasaman barat provinceof west sumatera

Risk factors filariasis incident by geographic information systems approach in pasaman barat provinceof west sumatera

... Geographic Information System approach ...individual risk factor variables (knowledge, education, ethnicity (native / immigrants), the use of wire netting, a habit out at night, the use of mosquito nets, ...

8

Fire in the Wildland-Urban Interface:  An Examination of the Effects of Wildfire on Residential Property Markets.

Fire in the Wildland-Urban Interface: An Examination of the Effects of Wildfire on Residential Property Markets.

... at risk of death and destruction from ...fire risk as well as the damage to forest amenities and property that accompanies a ...fire risk defined by higher fuel levels, which can be interpreted as a ...

148

Information Security Risk Assessment — A Practical Approach with a Mathematical Formulation of Risk

Information Security Risk Assessment — A Practical Approach with a Mathematical Formulation of Risk

...  Risk assessment. The first thing to do is make sense of the risk scores. Based on the results of the previous activity all we really have are a bunch of numbers. The challenge is to take these numbers, ...

7

An information security risk management model for smart industries

An information security risk management model for smart industries

... of information to unauthorised parties for any reason. Selling information for monetary benefit, getting revenge, satisfaction (by disgruntled employees), bayberry, embezzlement, and espionage are examples ...

7

Online consumer purchase behaviour : an experimental study on the effects of online reviews valence and information completeness on consumer’s trust, perceived risk and intention to purchase through Facebook in the Netherlands

Online consumer purchase behaviour : an experimental study on the effects of online reviews valence and information completeness on consumer’s trust, perceived risk and intention to purchase through Facebook in the Netherlands

... reviews, information completeness and price factor influences consumer; (1) Perceived risks such as process risk, financial risks and privacy risk, (2) Trust such as benevolence trust, competence ...

45

Conjectures between Two Cournot Firms with Symmetric Information and Their Risk-taking Behaviours

Conjectures between Two Cournot Firms with Symmetric Information and Their Risk-taking Behaviours

... of risk-taking behaviours and two classes of symmetric ...are risk neutral and the set of infor- mation of each firm changes from perfect to partial, we compare these firms’ optimal strategies for the ...

12

Supply Chain Risk Management: A Review of Thirteen Years of Research

Supply Chain Risk Management: A Review of Thirteen Years of Research

... Chain Risk Management Process (SCRMP) as an effective management technique for the risks related to the ...internal risk, while the proactive should be applied to external risks and demand ...effective ...

27

Managing Risk and Information Security, 2nd Edition

Managing Risk and Information Security, 2nd Edition

... business information with partners in order to develop, manufacture, and market new ...share information, they benefit from their partners’ insights and ...

208

An Information System for Risk Vulnerability Assessment to Flood

An Information System for Risk Vulnerability Assessment to Flood

... Flood Risk Mapping Program, New Brunswick, Canada, are sum- marized by Burrell and Keefe ...flood risk maps are outlined very clearly along with an assessment of the accuracy ...flood risk assessment ...

18

Network security: Risk assessment of information systems

Network security: Risk assessment of information systems

... APPENDIX CURRENT CONTROLS - Case Study Mitigative: PCF Prearranged fast Duplicate II delivery hardware of parts and components available for continuation for replacement and/or repair 0.[r] ...

117

Development of metamodel for information security risk management

Development of metamodel for information security risk management

... inferred information of its domain. Thus through the creation of Information Security Risk Management Metamodel (ISRMM) library the ambiguity problem of ISRM terminologies could be ...

27

Show all 10000 documents...

Related subjects