Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
4661Publicado 2017Tabla de Contenidos: “…Review Questions for Section 4.3 -- Exercises for Section 4.3 -- 4.4 Using R in Data Analysis in Financial Engineering -- Review Questions for Section 4.4 -- 4.5 Univariate, Bivariate, and Multivariate Data Analysis -- Review Questions for Section 4.5 -- Exercise for Section 4.5 -- Chapter 5: Assets Allocation Using R -- 5.1 Risk Aversion and the Assets Allocation Process -- 5.2 Classical Assets Allocation Approaches -- 5.3 Allocation with Time Varying Risk Aversion -- 5.4 Variable Risk Preference Bias -- 5.5 A Unified Approach for Time Varying Risk Aversion -- 5.6 Assets Allocation Worked Examples -- Review Questions and Exercises -- Chapter 6: Financial Risk Modeling and Portfolio Optimization Using R -- 6.1 Introduction to the Optimization Process -- 6.2 Optimization Methodologies in Probabilistic Calculus for Financial Engineering -- 6.3 Financial Risk Modeling and Portfolio Optimization -- 6.4 Portfolio Optimization Using R1 -- Review Questions and Exercises -- References -- Index -- End User License Agreement…”
Libro electrónico -
4662Publicado 2021Tabla de Contenidos: “…Chapter 11 Management Accounting and Performance Management/Improvement in Public Services -- Introduction -- Nature of Performance in Public Services -- Dimensions of Performance -- Systems of Performance Management -- Performance Information -- Improving Performance in Public Services -- Management Accounting Contribution -- Chapter 12 Management Accounting and Risk Management in Public Services -- Introduction -- Distinction between Risk and Uncertainty -- Risk and Risk Management in Public Service Organisations -- Risk Management Features In Public Services -- Importance of Organisational Resilience -- Management Accounting in an Environment of Risk and Uncertainty -- Chapter 13 Contemporary Aspects of Management Accounting in Public Services -- Introduction -- Modern Costing Developments -- Inter-Organisational Cost Management (IOCM) -- Environmental Management Accounting (EMA) -- Management Accounting and Modern Operational Processes -- Technology and Management Accounting -- Impact on Management Accounting -- References -- Index…”
Libro electrónico -
4663Publicado 1995Tabla de Contenidos: “…PRIVATE ACTIVITIES AND HABITAT CONSERVATION PLANNING -- Habitat-Conservation Plans -- RECOVERY PLANNING -- NATURAL COMMUNITY CONSERVATION PROGRAM AND COASTAL SAGE SCRUB COMMUNITY OF SOUTHERN CALIFORNIA -- HABITAT-RELATED STANDARDS -- Public and Private Lands and Actions -- Survival and Recovery -- CONCLUSIONS AND RECOMMENDATIONS -- REFERENCES -- 5 Modern Perspectives of Habitat -- LANDSCAPES AND POPULATIONS -- SOURCES AND SINKS -- METAPOPULATIONS -- SPATIALLY EXPLICIT MODELS -- A SPATIAL PERSPECTIVE AND POPULATION VIABILITY ANALYSIS -- CONCLUSIONS -- REFERENCES -- 6 Conservation Conflicts Between Species -- INTERACTIONS OF SPECIES IN NATURE -- NORTHERN GOSHAWK AND MEXICAN SPOTTED OWL -- WINTER-RUN CHINOOK SALMON AND DELTA SMELT -- BACHMAN'S SPARROW AND RED-COCKADED WOODPECKER -- MARINE MAMMALS AND SALMONIDS -- CONCLUSIONS -- RECOMMENDATIONS -- REFERENCES -- 7 Estimating Risk -- ESTIMATING THE RISK OF EXTINCTION -- SOURCES OF RISK -- Random Demographic Changes -- Random Environmental Changes -- Catastrophes -- Accumulation of Deleterious Genetic Factors -- Loss of Adaptive Variation Within Populations -- Habitat Fragmentation -- Supplementation -- FOCUSING CONSERVATION EFFORTS -- DISTRIBUTION OF EXTINCTION TIMES -- LIMITATIONS OF OUR ABILITY TO ESTIMATE RISK -- CONCLUSIONS AND RECOMMENDATIONS -- REFERENCES -- 8 Making ESA Decisions in the Face of Uncertainty -- DECISIONS REQUIRED UNDER THE ESA -- THE NEED FOR NEW APPROACHES TO DECISION MAKING -- PROVIDING OBJECTIVE RISK STANDARDS -- Developing Quantitative Risk Standards -- Time Frame for Estimating Risk of Extinction -- Listing Systems Based on Objective Criteria and Rules -- Limitations on Estimates of Risk -- Limits of Models -- Poor Understanding of Cumulative Effects and Thresholds -- Should Different Risk Standards Apply to Different ESA Decisions? …”
Libro electrónico -
4664por Institute of Medicine (U.S.).Tabla de Contenidos: “…""5 Creating an Integrated Information Infrastructure for a Risk-Based Food Safety System""""6 Creating a Research Infrastructure for a Risk-Based Food Safety System""; ""7 Integrating Federal, State, and Local Government Food Safety Programs""; ""8 Enhancing the Efficiency of Inspections""; ""9 Improving Food Safety and Risk Communication""; ""10 Modernizing Legislation to Enhance the U.S. …”
Publicado 2010
Libro electrónico -
4665Publicado 2011Tabla de Contenidos: “…Globalisation -- Risk -- Tradition -- Family -- Democracy…”
Libro electrónico -
4666por Vladimirov, AndrewTabla de Contenidos: “…Relevant vulnerability categoriesGauging attacker skill; Weighting vulnerability impact; Contemplating the vulnerability remedy; Defining vulnerability risk level; Risks faced by large components; Compound risks, systempunkts and attacker logic; Total risk summary utilisation and dissection; Chapter 7: Presenting the Outcome and Follow-Up Acts; The report audience and style; The report summary; The report interpretation chapter; The bulk of the report; Explaining the overall security state; Elaborating on breakdown of risks; Using vulnerability origin investigations…”
Publicado 2015
Libro electrónico -
4667Mastering anti-money laundering and counter-terrorist financing a compliance guide for practitionersPublicado 2012Tabla de Contenidos: “…Acknowledgements How to use this book Introduction Chapter 1: Fundamental Concepts Background and definitions Key processes in money laundering and terrorist financing Money laundering Terrorist financing Further differences between terrorist financing and classical money laundering Suspicion recognition Chapter 2: The International AML and CFT Framework Key components of the international Legal and institutional and legal framework A developing framework to combat tax evasion A developing framework to combat proliferation financing The Financial Action Task Force (FATF) FATF regional style bodies and associate members Other relevant international bodies Key requirements for financial institutions Key components of a national AML/CFT framework Chapter 3: The Role, Structure and Position of the AML/CFT Compliance Function Structure and culture AML/CFT best practice Best practice in higher-risk products and services IT systems Training and communication A '-pro-business' approach Management of internal suspicion reporting Chapter 4: KYC and the Risk-Based Approach Background to the Risk-Based Approach Components of the Risk-Based Approach Mitigating controls Regulatory environment Special categories: PEPs Constructing a Risk-based Approach for your organisation The Core components of CDD CDD processes and tools Example risk assessment frameworks Constructing a CDD framework for financial institutions Constructing a CDD framework for retail/consumer banking business Constructing a CDD framework for private banking Chapter 5: Reputational risk Managing a reputational risk When banks go wrong: cases of punishment and penalties Managing reputational risk: the experience of the Multilateral Development Banks MDBs The integrity 'red flags' checklist and the due diligence investogation tools Practical application Chapter 6: Suspicion recogntion Background and general principles Money laundering typologies Terrorist financing typologies Account analysis examples 'Accumulation of evidence' cases Chapter 7: International Cooperation Background Modern structures of organised crime and terrorism Mechanisms and tools of international cooperation International cooperative bodies Chapter 8: Modern Money Laundering and Terrorist Financing: Two Case Studies Introduction Smoke and Mirrors: AlnaBank and the Messengers of God Too Good to be True: AlnaBank and the laundering of the Kransky millions Index…”
Libro electrónico -
4668Publicado 2011Tabla de Contenidos: “…-- Introduction -- Adjustments to cashflow -- The clarity of cash -- Liquidity -- Shareholder value -- The efficient market hypothesis -- Why accounts don't help in valuation -- Profit improvement -- Capital allocation -- Financial risk -- Why do it? The risks and rewards -- Cashflow -- Liquidity -- Shareholder value -- Profit improvement -- Capital allocation -- Financial risk -- Who's doing it and who has done it? …”
Libro electrónico -
4669Publicado 2012Tabla de Contenidos: “…/ 38 -- Leverage and investment restrictions -- Fees -- The subscription and redemption forms in the prospectus -- Corroboration and gap analysis with marketing material -- Governance -- Key individuals -- Organisation of employees -- Directors' independence -- Management dedication -- Service providers -- The missing link - the investor -- Administrator -- Prime broker and custodian -- Other key providers -- Front and back office operations -- Internal operational policies -- Verifying the application of policies -- Front office workflow -- Back office workflow -- The future balance of power between front and back office -- Investment process and products -- Investment process -- Key strategies -- A disciplined approach -- Dependence on research -- Using statistics and data -- Benchmarks -- Leverage -- Portfolio turnover and trading volume -- Market conditions and competitors -- Products traded and assets in your portfolio -- Capacity and AUM -- Investors analysis -- Principals' own investments -- Risk management -- Risk management processes -- Key man risk -- Market risk -- Valuation risk -- Liquidity risk -- Counterparty risk -- Compliance -- Compliance status -- Compliance officer -- Systems and controls -- Financial promotion -- Financial reporting -- Insurance -- Business continuity plan -- Dealing and managing -- Anti-money laundering…”
Libro electrónico -
4670Publicado 2010Tabla de Contenidos: “…Black swan Octobers -- Japan: the setting sun -- The root causes: leveraging and excess -- The new economic reality -- Bulls and bears: the long cycles -- Investment paradigms: beliefs and reality -- Investing in markets upside down -- Beware of the risks -- Absolute return: manage risks and build wealth -- Absolute return and alpha -- Beyond the traditional…”
Libro electrónico -
4671por Schooner, Heidi M.Tabla de Contenidos: “…The changing nature of banks -- Panics, bank runs, and coordination problems -- Collapsing dominos and asset price spirals -- The financial safety net and moral hazard -- Sources of financial regulation -- Bank licensing and corporate governance -- Bank in corporate groups : ownership and affiliation -- The rationale for bank capital regulation -- The new capital adequacy framework : Basel II and credit risk -- The new capital adequacy framework : Basel II and other risks -- Direct limits on banks' risk taking -- Consolidated supervision and financial conglomerates -- Anti-money laundering -- Bank insolvency -- Institutional structures of regulation -- Regulation after the global financial crisis…”
Publicado 2010
Libro electrónico -
4672
-
4673
-
4674por Kauffmann, Céline“…Limited access to finance is a major obstacle to development of SMEs in Africa as their inherent higher perceived risk makes financial institutions reluctant to lend to them and adequate financial instruments lack…”
Publicado 2005
Capítulo de libro electrónico -
4675
-
4676
-
4677Publicado 2018Tabla de Contenidos: “…Psychology and finance -- Overconfidence -- Pride and regret -- Risk perceptions -- Decision frames -- Mental accounting -- Forming portfolios -- Representativeness and familiarity -- Social interaction and investing -- Emotion and investment decisions -- Self-control and decision making -- Physiology of investing…”
Libro -
4678por Arbach, Karin“…The SARA-V3 User Manual is a comprehensive guide on assessing the risk of intimate partner violence (IPV), also known as spousal assault. …”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4679Publicado 2014Tabla de Contenidos: “…Cover; Title Page; Copyright; Preface; Contents; Figures; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Forces at Work on the Louisiana Coast; A Modified River Runs Through It; Business as Usual Will Not Halt the Land Loss; The Risk of Coastal Flooding Is Rising; Economic and Social Implications of a Coast at Risk; Challenges in Creating a Master Plan; Diverse Range and Large Number of Possible Solutions; The Future Is Uncertain; A Diverse Region Seeking Different and Sometimes Conflicting Outcomes; Need for Coordination Across Jurisdictions…”
Libro electrónico -
4680por Phillips, JosephTabla de Contenidos: “…Creating the Project ScheduleSequencing Activities; Developing the Schedule; Compressing the Schedule; Controlling the Schedule; CHAPTER 6: CONTROLLING THE PROJECT; Protecting the Project Scope from Changes; Controlling Costs; Managing the Schedule; Creating a Project Change Control System; Controlling Project Quality; CHAPTER 7: MANAGING PROJECT RISK; Exploring Risk and Reward; Identifying and Documenting Project Risk; Analyzing Risk Events; Creating Risk Responses; Monitoring and Controlling Project Risks; CHAPTER 8: COMMUNICATING WITH PROJECT STAKEHOLDERS; Identifying Project Stakeholders…”
Publicado 2012
Libro electrónico