Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
4361Publicado 2015Tabla de Contenidos: “…Liquid Alts versus Traditional Mutual FundsAssets and Net Flows; IPOs and Liquidations; Risk and Return; Summary; Questions; Chapter 3 Absolute Return Funds; Definition; Total Net Assets and Net Flows; Risk and Return; Factor Exposures; Asset Allocation and Fund Selection; Top Ten Funds; Blockbuster and Spotlight; Summary; Problems; References; Chapter 4 Alternative Active Extension Funds; Definition; Total Net Assets and Net Flows; Risk and Return; Factor Exposures; Asset Allocation and Fund Selection; Top Ten Funds; Blockbuster and Spotlight; Summary; Problems…”
Libro electrónico -
4362Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Risk Assessment Machine Learning Frameworks in a Global Landscape -- Chapter 1: Risks and Attacks on ML Models -- Technical requirements -- Discovering risk elements -- Strategy risk -- Financial risk -- Technical risk -- People and processes risk -- Trust and explainability risk -- Compliance and regulatory risk -- Exploring risk mitigation strategies with vision, strategy, planning, and metrics -- Defining a structured risk identification process -- Enterprise-wide controls -- Micro-risk management and the reinforcement of controls -- Assessing potential impact and loss due to attacks -- Discovering different types of attacks -- Data phishing privacy attacks -- Poisoning attacks -- Evasion attacks -- Model stealing/extraction -- Perturbation attacks -- Scaffolding attack -- Model inversion -- Transfer learning attacks -- Summary -- Further reading -- Chapter 2: The Emergence of Risk-Averse Methodologies and Frameworks -- Technical requirements -- Analyzing the threat matrix and defense techniques -- Researching and planning during the system and model design/architecture phase -- Model training and development -- ML model live in production -- Anonymization and data encryption -- Data masking -- Data swapping -- Data perturbation -- Data generalization -- K-anonymity -- L-diversity -- T-closeness -- Pseudonymization -- Homomorphic encryption -- Secure Multi-Party Computation (MPC/SMPC) -- Differential Privacy (DP) -- Sensitivity -- Properties of DP -- Hybrid privacy methods and models -- Adversarial risk mitigation frameworks -- Model robustness -- Summary -- Further reading -- Chapter 3: Regulations and Policies Surrounding Trustworthy AI -- Regulations and enforcements under different authorities -- Regulations in the European Union…”
Libro electrónico -
4363por Cossin, DidierTabla de Contenidos: “…Chapter 8 Four Areas of Board Failure -- Chapter 9 Risks and Ensuring the Right Board Risk Philosophy -- Chapter 10 A Board Member's Practical Guide to Risk Thinking -- The Physical Health Check: Technical Risks -- Identify your Risks -- Assess your Risks -- Manage your Risks -- Structure your Risks -- The Mental Health Check: Behaviours -- The Strategic Risk Check -- Typical Strategies -- Strategic Risk Assessment -- The Governance Risk Check -- Chapter 11 Elements of Advanced Risk Techniques for Board Members: From Quants to Cyber -- The Why and How of Quantitative Risk Assessment for Boards -- Classical Quantitative Techniques -- Integration of Risks -- The Outcome of Risk Assessment -- Cyber Risk -- Chapter 12 Crisis Management -- Crisis as a Turning Point -- There is Work to be Done in Peaceful Times -- Communication Principles -- Another Powerful Weapon: Gathering Information -- A Crisis Will Shed Light on Boardroom Fissures -- Procedure vs Authenticity -- Communicate Your Way to Rebuilding Trust -- Chapter 13 The Four Tiers of Conflicts of Interest -- Tier-I Conflicts: Individual Directors vs Company -- Tier-II Conflicts: Directors vs Stakeholders -- The Institutional Loyalty of Board Directors -- The Influence of Domineering Board Members on Others -- Board Directors Organised as a Self-interested Stakeholder Group -- Tier-III Conflicts: Stakeholders vs Other Stakeholders -- Conflicts of Interest between Stakeholders and the Company -- Conflicts of Interest between Different Classes of Stakeholders -- Conflicts of Interest within a Group of Stakeholders -- Tier-IV Conflicts: Company vs Society -- Chapter 14 High-level Fraud and Active Board Oversight -- Why Does High-level Fraud Happen? …”
Publicado 2024
Libro electrónico -
4364Publicado 2011“…Use covered calls to safeguard your returns while reducing your risk! There is no foolproof recipe for investment success, but there are strategies that can decrease the risk you might expect, without compromising potential returns. …”
Libro electrónico -
4365
-
4366Publicado 1993Tabla de Contenidos: “…""Common Diseases Clearly Related to Allergy and IgE Antibody""""ALLERGIC ASTHMA""; ""Definition and Diagnosis""; ""Attributable Fraction""; ""Prevalence""; ""Incidence""; ""Impact""; ""Trends Over Time""; ""Risk factors""; ""Demographics""; ""ALLERGIC RHINITIS""; ""Prevalence and Incidence""; ""Risk Factors""; ""ECZEMA""; ""Atopic Dermatitis""; ""Allergic Contact Dermatitis""; ""Less Common Diseases Clearly Related to Allergy""; ""ALLERGIC BRONCHOPULMONARY ASPERGILLOSIS""; ""Prevalence""; ""HYPERSENSITIVITY PNEUMONITIS""; ""Prevalence""; ""Disease Severity""; ""Risk Factors""…”
Libro electrónico -
4367
-
4368
-
4369Publicado 2014Tabla de Contenidos: “…; Notes; PART TWO-Information Governance Risk Assessment and Strategic Planning; CHAPTER 4 Information Risk Planning and Management; Step 1: Survey and Determine Legal and Regulatory Applicability and Requirements; Step 2: Specify IG Requirements to Achieve Compliance; Step 3: Create a Risk Profile…”
Libro electrónico -
4370Publicado 2012Tabla de Contenidos:Libro electrónico
-
4371Publicado 2019“…How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology…”
Libro electrónico -
4372
-
4373por Knight, Frank Hyneman, 1885-1972
Publicado 1947Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra)Libro -
4374Publicado 2020Tabla de Contenidos: “…ALM of the Banking Book -- Methods of Measurement and Management of the Interest Rate Risk and Liquidity Risk -- Customer Behaviour and Its Impact on Interest Rate and Liquidity Risk -- Formulation of the Optimisation Process and Articulation of the Decision Model -- Practical Example of the Optimisation Process and Quantification of the Economic Impact under Base and Stress Scenarios…”
Libro electrónico -
4375Publicado 2021Tabla de Contenidos: “…Introduction -- Part 1: Choice under certainty -- Rational choice under certainty -- Decision-making under certainty -- Part 2: Judgment under risk and uncertainty -- Probability judgment -- Judgment under risk and uncertainty -- Part 3: Choice under risk and uncertainty -- Rational choice under risk and uncertainty -- Decision-making under risk and uncertainty -- Part 4: Intertemporal choice -- The discounted utility model -- Intertemporal choice -- Part 5: Strategic interaction -- Analytical game theory -- Behavioral game theory -- Part 6: Concluding remarks -- Behavioral policy -- General discussion…”
Libro -
4376Publicado 2005Tabla de Contenidos: “…Mental Health Disorders: The Neglected Risk Factor in Juvenile Delinquency; 6. Risk Factors and Intervention Outcomes: Meta-Analyses of Juvenile Offending; 7. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4377Publicado 2015Tabla de Contenidos: “…Models and the Value of Information Creation Regulatory Regimes and Guidance; SR 11-7; Basel II and Solvency II; Comprehensive Capital Analysis and Review (CCAR); The Sarbanes-Oxley Act (SOX); Principles-Based Reserving (PBR) for Insurance Products; Notes; Chapter 4 Model Risk Measurement; Three Phases of Model Management; Model Governance; Defining Model Risk; Objectifying the Downside; Risk Identification; Model Risk Exposure; Model Risk Attribution: An Information Entropy Approach; Notes; Chapter 5 The Return on Analytic Assets; Measuring the Productivity of Models…”
Libro electrónico -
4378por Damodaran, AswathTabla de Contenidos: “…ConclusionQuestions and Short Problems; CHAPTER 4 The Basics of Risk; What is Risk?; Equity Risk and Expected Return; Alternative Models for Equity Risk; A Comparative Analysis of Equity Risk Models; Models of Default Risk; Conclusion; Questions and Short Problems; CHAPTER 5 Option Pricing Theory and Models; Basics of Option Pricing; Determinants of Option Value; Option Pricing Models; Extensions of Option Pricing; Conclusion; Questions and Short Problems; CHAPTER 6 Market Efficiency-Definition, Tests, and Evidence; Market Efficiency and Investment Valuation; What Is an Efficient Market?…”
Publicado 2012
Libro electrónico -
4379Publicado 2022Tabla de Contenidos: “…Audit -- Information system -- Information system audit -- Legal risks -- Operational risks -- IT processes -- Human uncertainties -- IT risks -- Confidence -- Risks management -- Information system audit strategy -- Performing audits…”
Libro electrónico -
4380Publicado 2015Tabla de Contenidos: “…Behavioral Mythbuster #1-3: Can't Buy Me Love (or a Return, It Turns Out)Fallacy 2: Investors Have a Single, Static Level of Risk Tolerance; Behavioral Mythbuster #2-1: Our Risk Tolerance Is A-Changing; Behavioral Mythbuster #2-2: We Have Multiple, Simultaneous Risk Preferences; Fallacy 3: One Man's Risk Is Another Man's Reasonable Probability; Behavioral Mythbuster #3-1: It's Not the Bogeyman, It's Just Volatility-Based Risk; Behavioral Mythbuster #3-2: Okay, This is the Bogeyman-Variance Drain and Risk…”
Libro electrónico