The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The design and realization of a international trade management system with risk control is discussed in this paper. During the research project, besides the basic functions like requirements analysis, system design, system testing, and several phases of work, we add management to trade risk according to the special demand for trade risk. Actual EDI standard is also considered to provide an interface...
IT governance, compliance and auditing are becoming as important pedagogical subjects as long-established financial control and financial auditing. Designing sound IT governance, compliance and auditing curriculum is a rewarding as well as challenging task. In this paper, we share our experiences from teaching IT governance, compliance and auditing both in the undergraduate and graduate level and...
Despite international patenting can be a costly and risky investment, an increasing number of firms patent proprietary technologies in foreign countries. This paper explores trends of global patenting in a new domain of technology characterized by rapid globalization. The research setting consists of the population of U.S.-based Large and Small and Mid-Sized firms (SMEs) filing nanotechnology-related...
The architecture tradeoff analysis method (ATAM) is an architecture evaluation technique for analyzing risks, tradeoffs, and sensitivity points of architectures. In this paper we describe an experience of evaluating and improving the architecture of VAN-Core system which requires running 24 hours a day, 365 days a year, for online credit card transaction services. The goal of the architecture evaluation...
Literature survey proved that risk identification is the first and most important step of software project risk management. Research is still in progress to introduce best methods for managing software project risks to increase the success ratio. This paper presents the results of industry survey based on the opinion from different software houses regarding the facts that could provide the foundation...
This paper emerges from research by (Alter, S. et al., 2004), (Dillard, K. et al., 2004), (Landoll, D.J., 2006) and (Soliman, K., 2006), and it draws on real-world examples so as to underline some limits of quantitative risk assessment. The paper is a case study and emphasized that theoretical formulas used in information security risk assessments do not contain the time dimension of the analysis...
The calculation and exhibition of risk management techniques will be more efficient and flexible by business intelligence(BI) tools. However, there are few researches on BI for securities companies' risk management(SCRM). After reviewing the business and technique problems, this paper analyzed the BI system framework of SCRM and discussed key issues of BI system construction. It also addressed the...
The construction project environment is fraught with risks of every conceivable nature and high levels of uncertainty. A research project was therefore initiated to define the most important construction risks from the insurance stakeholders' point of view. The risk management functionality in terms of the formal risk culture, risk framework and risk practices within the participating construction...
In resent years, many companies engender fraudulences and affairs, and affront several crises. Such situations are defined as risks and are classified with some parts and hierarchies. Low-leveled risk does not relate with company management directly, however, it sometimes develops the high-leveled risk, such as the company bankruptcy and the matter of controversy. Studies on risk management attract...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.