The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building company-wide safety programs to overcome the challenges of multiple plants, multiple regions, differing standards and differing technologies in the forest products industry.
The purpose of this study contributes to safe improvement in consideration of security in addition to convenience by the social media utilization in the company. The company uses the marketing using social media, but a lot of risks exist. We contribute to safe improvement by performing an example investigation in this study, and doing risk assessment. In this study, in order to extract a risk event,...
Security decision-making is a critical task in tackling security threats affecting a system or process. It often involves selecting a suitable resolution action to tackle an identified security risk. To support this selection process, decision-makers should be able to evaluate and compare available decision options. This article introduces a modelling language that can be used to represent the effects...
This paper is mainly to examine the economic consequences of the financial restatement based on the auditor's perspective. We find that auditors tend to issued more severe financial audit restatement opinions to companies which made financial restatement and the more risks inherent in the nature of the financial restatement, the more severe audit opinions are likely to make. These results indicate...
Risk management maturity index should be measured to determine whether the application of risk management within the organization succeed or not. Assessment of risk management maturity index is very important because it allows the identification of strengths and weaknesses of the organization that can be used to improve corporate governance and organization risk managementt. Many measurement methods...
Todays increased interest in enterprise risk management is motivated by decision making in reaction to change and complex compliance requirements as well as the need to minimize business losses and improve business outcomes. It is therefore important to help business stakeholders become fully aware of applicable risks and their possible impact on other business constituents. This paper represents...
Presently, all organizations are facing by various types of risk. The risk can be occurred anywhere and to anyone. Therefore, they need to manage risk properly to reduce cost and other consequences. Enterprise Risk Management (ERM) was introduced many years ago and currently implemented by many countries as well as organizations due to positive impact especially in their performances. In Malaysia,...
Risk assessment has always been the most challenging part of the risk management process for aviation operations. This paper investigates the risks involved in the Tripoli and Mitiga International Airport in Tripoli, Libya. This case study addresses the risks that may occur during aircraft flight operations. It also investigates the human performance during the ground and flight operations. The paper...
This article introduces a framework for assessing IT integration risk in acquisitions. We illustrate the framework's merits for the management of high-risk acquisitions and identification of low-risk acquisitions with the experience of Trelleborg AB, a global industrial company with acquisitions as integrated components of its corporate strategy. Based on the insights gained from Trelleborg, we provide...
Outsourcing the processing of sensitive data is problematic and leads the implementation of procedures and specific authorizations. In this paper we examine the implementation of the decentralization of data in the case of bank data printing and review proposed safeguards to ensure the availability, integrity and confidentiality.
Improving the efficiency of the risk management process in highly complex environments such as the software development industry has been drawing the attention of researchers that seek to understand how knowledge can help reduce those risks, and how it can help in the decision-making processes related to them. The present study was developed to contribute to understanding the role of knowledge management...
This article discusses experiences from case studies conducted at product developing departments in four multinational companies. All organizations are outstanding product developing companies with a long and successful historical background within product development. Therefore it is interesting to understand how these companies deal with risks in their product development processes. The aim of the...
Challenges of technical risk assessment is difficult to address, while its success can benefit software organizations appreciably. Classical definition of risk as a "combination of probability and impact of adverse event" appears not working with technical risk assessment. The main reason of this is the nature of adverse event's outcome which is rather continuous than discrete. The objective...
Risk management (RM) has always been the focus of software project management studies. The abilities to monitor and control the software project risks are among the critical issues examined by various researchers. This paper discusses steps in the RM process based on Boehm model. A survey was conducted to know the perceptions of respondents on their practices of managing project risks. This paper...
Outsource software development approach has been recognized as an important practice in government agencies as well as in private sectors. It includes third parties role and involvement in IT implementation and thus this approach has certain level of risks that need to be identified, measured and managed. The benefits and reasons associated with outsourcing implementation are operation and development...
Today, challenges and adventures caused by of risks on IT service providers that are the producers or suppliers of diverse IT services are burdensome. On the contrary, the advantages of using risks prediction and analysis is so high that many of IT service providers are seeking a way to predict, analyze and reduce the effects of risks. In this article, an application oriented model is presented using...
ICT systems have been investigated for achieving flexible systems configuration, systems operation cost reduction, environmental impact reduction, etc. Cloud computing has attracted attention as technology that solves these. In the U.S., business cloud services, such as Amazon EC2/S3, Google Apps, Force.com, and Windows Azure, are gaining more and more users. Additionally, study on cloud computing,...
Security issues are still preventing wider adoption of cloud computing, especially for businesses which are handling sensitive information. Indeed, by outsourcing its information system (IS), a company can lose control over its infrastructure, its software or even its data. Therefore, new methods and tools need to be defined to respond to this challenge. In this paper we propose to integrate Security...
Today, to deal with the rapidly evolving needs of the market and its increased competitiveness, more and more companies operating in the field of construction use the risk management approach to improve their project's control.
The design and realization of a international trade management system with risk control is discussed in this paper. During the research project, besides the basic functions like requirements analysis, system design, system testing, and several phases of work, we add management to trade risk according to the special demand for trade risk. Actual EDI standard is also considered to provide an interface...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.