Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Despite the fact that integrated approaches for Corporate Governance, Risk and Compliance Management (GRC-Management) are increasingly demanded, GRC is still used as a catchword for a wide range of topics whereas it is to a large extend unclear how the area of topics could be structured and which needs of research exist. Therefore this article analyses the state of research on the basis of strategic...
Recent high-profile incidents with record high penalties on international banking groups for noncompliance of the AML regulations send a strong message to the CEOs of financial institutions: it is high time to review and refine their AML program thoroughly in all of their operations in different jurisdictions to ensure compliance before it is too late. This paper discusses about the major components...
As part of an evening master's degree program, we need to teach software processes in nine weekly sessions to professionals who work in software development but who have no formal education in software engineering. We have done this successfully for the past few years by a) dividing class time into lectures, supervised student work, and student presentations; and b) evaluating the students based on...
ERP systems are complex software systems that organizations use to manage their resources. From the beginning of ERP system life cycle to its end it faces lots of risks that have to be identified and appropriate measures should be taken to reduce or avoid these risks throughout project life cycle. The ERP system risk expands to all major risk dimensions majorly six which are 1) control & plan...
Notice of an entity's personal information collection and usage practices is considered to be a prerequisite to an online user being able to make informed decisions on personal information disclosure. Notice is typically provided in privacy policies that are often characterized as vague, lengthy, and misleading. As such, notice typically does not equate to awareness of privacy threats. This study...
Knowledge has been recognized as a critical asset for companies that want to compete in today's turbulent business environment. Researchers and practitioners recognize that the loss of knowledge due to loss of employees that hold valuable knowledge can have grave consequences to an organization. This paper provides a methodology for assessing potential risk of losing knowledge when employees retire...
This paper addresses a problem to identify risks in project plan documents written by project managers. Because some project managers express risks without negative words, risk identification method by negative expressions is not enough to identify them. In this paper, we propose a risk identification method by automatic acquisition of risk expressions. The proposed method acquires the risk expressions...
Nowadays, risk-based asset management is commonly adopted throughout electricity utilities as a business model. Potential risks are registered, and after selection the influence of the risk is assessed. This paper discusses the possible shortcomings with regard to current risk assessment methods. Based on an improved risk assessment approach, it is shown that risk might be underestimated when the...
Software Product Line Engineering (SPLE) is a paradigm in software development that enables rapid development of new applications, by means of systematically reusing assets. To take effect and deliver the promised benefits, SPLE demands for substantial upfront investments, and manageable processes. Such a scenario leads to the need of a rigorous risk management, to be employed with the aim of decreasing...
In Malaysia, the Risk Based Capital (RBC) framework was issued by Bank Negara Malaysia (BNM) in April 2007. It was fully implemented on 1 January 2009. The purpose of this study was to examine the impact of the RBC implementation on an insurance company in Malaysia. Subsequently, further analysis was conducted by stress testing the company's capital impact given the adverse plausible event that the...
Effective from year 2001, the Bursa Malaysia made it mandatory for companies seeking listing to furnish a disclosure on the state of internal control system (ICS) to their shareholders The main objective of this study is to examine, under signaling and agency theories, whether board and audit committee independence as governance oversight mechanism on the voluntary disclosure of ICS able to improve...
Financial information that has being deteriorated by fraud will misled users. Hence, the main objective of this paper is to identify the association between five ratios of financial reporting risks to predict fraud. Furthermore, this paper also investigates the impacts of fraud detection on audit fee. Thus, sample of 10 of fraudulent companies and sample of 40 non fraudulent companies are being identified...
Developments in supply chain management have dramatically increased within the past few years to cover a wide range of cross-disciplinary topics that have utilized a number of heuristic analyses and quantitative modeling tools. With significant developments in both technologies and business marketing environments, a service system is required that can work optimally even under complex, globalised...
Software risk management is a multi-phase process. An effective risk management approach leads to an optimum risk mitigation plan. However, the high rate of failures in IT projects shows the unsuccessfulness of the activities of risk mitigation. The reason is the existence of hidden and unseen threats and risks in the process, which are ignored in most of the models. The proposed model considered...
Chinese large logistics enterprises have carried out the business of pledge by warehouse receipts for more than ten years while many problems emerged in the process of business implementation. A lot of risks such as customer credit risk, the risk of bad delivery and regulatory risk have emerged in the business. In particular, customer credit risk is very important. Therefore, it is necessary to study...
The ERP project implementation process is to determine its characteristics. It is a process of transferring knowledge. On the analysis of the ERP project implementation, the process of transferring knowledge will arouse risks. Based on the knowledge-transferred risk evaluation index system and the analytic hierarchy process (AHP), the knowledge-transferred risk evaluation model of the executive ERP...
In recent years, Ambient service has attracted attention as a ubiquitous, future intelligence infrastructure. The Ambient service provides service suitable for user needs automatically by making a sensor and a computer cooperate, and gathering and analyzing the information about each user. However, with the Ambient service, in order to manage personal information, various risks, such as an information...
The lack of risk management, communication and understanding of the requirements are actually the main factors related to the low rate of success in software development, more specifically in distributed projects given the characteristics of this type of development. Considering distributed software projects, the main goal of this paper is to show communication inherent risks empirically identified...
Software Product Lines (SPL) adoption can affect several aspects of an organization and it involves significant investment and risk. This way, SPL risk management is a crucial activity of SPL adoption. This study aims to identify SPL risks during the scoping and requirement disciplines to provide information to better understand risk management in SPL. In order to achieve the previous stated goal,...
Information in mobile devices is an asset like other important business assets, is essential to an organization's business and consequently needs to be suitably protected. The use of mobile devices involves the sharing of its functions between the official and personal use of the data in the same device. The organization needs to perform a risk assessment in order to determine the organization's mobile...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.