The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are large, medium, and small enterprises which develop software projects that can be influenced by a risk. Identifying risk is first step of perfectly assessing and controlling risks in a project. In the literature, a lot of researchers identified risk factors in software projects but none of these can be generalized as base of risk factors in the software projects as they differ in time, culture,...
A supply chain is a set of economic elements cooperating together to achieve the same objectives. Riskiness being the main obstacle in supply chains, companies needs to pay attention to risk management. It is the nature of the business activity that determines the degree of required risk management. For example, risk management is one of the pillars of activities related to hazardous materials or...
Cloud computing has recently emerged compelling paradigm by introducing several characteristics such as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Despite the fact that cloud computing offers huge cost benefits for companies, the unique security challenges have been introduced in a cloud environment that make risk assessment challenging...
Intuition suggests that a set of companies mentioned in the same news article are more likely to be related than unrelated. For instance, an article discussing a retailer would more probably mention its competitors or supply chain partners than mention other companies with no economic connection. Correspondingly, we consider using news article co-occurrences as a means to determine company relatedness...
In recent decades, companies across the world have implemented enterprise recourse planning (ERP) systems. Proper ERP implementation has been a more explored issue. Specifically, numerous papers have presented the critical success factors in these projects. But even when the implementation finished satisfactorily, success in ERP adoption is not guaranteed. It also depends on the effectiveness process...
In today's dynamic business situation, the management of risk becomes very complicated. Making right and appropriate strategies to manage risk in accomplishing the wealth maximization objective of the corporate is utmost important. In the post liberalization era the drastic changes have been taken place in the policies concerning business of corporate which gives the paradigm shift to manage the business...
IT governance has become an important concern for business, receiving great attention from both practitioners and academics. Although some authors have stated that effective IT governance is crucial for any organization to achieve its corporate goals, little academic research is available that empirically supports the assumptions about the factors that determine the effectiveness of IT governance...
The world today is full of risks and we had to deal with besides assessing them. We are forced to identify and estimate their consequences. Organizations are making large investments in information technology (IT) projects. Effective management of risks in projects is therefore extremely important. The objective of this research is design of Artificial Neural Network (ANN) model for ranking risk of...
Risk assessment is important for ranking risks properly and allocating limited resources to mitigate critical risks. The paper reviews the risk assessment approaches with a focus on the advantages, limitations and applications of the Risk Matrix Approach (RMA). The paper then proposes an extended risk matrix approach (ER-MA) for supply chain risk assessment. The purpose is to overcome the limitations...
With the rapid increase of online social network users worldwide, social media feeds have become a rich and valuable information resource and attract great attention across diversified domains. In social media data, there are abundant contents of two-way and interactive communication about products, demand, customer services and supply. This makes social media a valuable channel for listening to the...
In these recent years, the complexity of supply chain has been increasing with globalisation and as such, disruptions are happening more frequently with the impacts getting more severe. Thus, there is a growing need to deal with such risks arising from disruptions to the supply chain. The objective of this paper is to present a practical method for supply chain risk management using Value at Risk...
Ports all over the world faced a lot of challenges in daily operation. These challenges lead to risk and adverse effects to the companies. The management, the culture of the company and the risk item being faced constitute the difference in focuses when making the corresponding responses. This paper aims to reveal the effect of such factors on the decision making process in operational risk management...
For the low efficiency and high risk of real estate enterprises in China, we design incentives-supervision model of a real estate enterprise based on principal-agent theory and on some characteristics of the real estate enterprises. Subsequently, in order to improve business performance and lower the risks, we study that how the clients of the real estate enterprises design the compensation for agents...
Hong Kong and mainland China, being the places with most important container terminals among the world, have not carried out any studies in relation to risk and safety management. Countries around the two places like Taiwan have already devoted some efforts on the issue. Operational risks in terminal operation can lead to many bad consequences like incurring high cost for recovering the losses if...
Presidential Policy Directive 8 (PPD-8) was signed by the President of the United States on March 30, 2011. It deals with the subject of developing a National Preparedness System for security and resiliency for businesses to endure a disaster or catastrophe. These disasters can be caused by anything from natural disasters to terrorism. The overall purpose of this directive is for the Dept. of Homeland...
At every step in creating an enterprise design, architects encounter risks and opportunities. In most cases, risk assessment and treatment is done using the company's internal methodology or based on some best-practices known by the architect. We propose a method that can combine both qualitative and quantitative risk analysis and also incorporate risk mitigation solutions. In IT security, attack-defence...
Nowadays organizations in the business world and government apply technology to improve its internal business process. One phase of the business process is logistics. Seaports, as one of the centers of logistic flows in a country, contain a wide range of problems in its internal processes. The seaport is a place that connects logistic distribution between city and country ports. By viewing distribution...
Internal control is necessary to avoid fraudulent practices that occurred several times in the institutions, both domestic and abroad. The fraudulent practices not only make the image of the institution to be contaminated but also detrimental to stakeholders. Many institutions implementing controls for business processes that considered significant, but they neglected to monitor and update it every...
With increased complexity, supply chain networks (SCNs) of modern era face higher risks and lower efficiency due to limited visibility. Hence, there is an immediate need to provide end-to-end supply chain visibility for efficient management of complex supply chains. This paper proposes a visualization scheme based on multi-hierarchical modular design and develops a supply chain visualization platform...
E-commerce has rapid growth in the last two decades due to the development of information technologies, mobile network services and application of big data. Nowadays, e-commerce has reached a stage in which e-businesses are far beyond the online trading of buy-pay-deliver, but covers a much broader spectrum of line business activities, such as financing, which indicates that e-commerce has been transited...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.