Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
5001Publicado 2013“…The Silver Lining of Project Uncertainties provides readers with a critical foundation for how to differentiate the management of project risks and uncertainties, how to differentiate project success from project value and how to clearly identify the key elements of project risk, uncertainty and value opportunity…”
Libro electrónico -
5002Publicado 2018“…The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices…”
Libro electrónico -
5003por IARC Working Group on the Evaluation of Carcinogenic Risks to Humans
Publicado 1988Libro electrónico -
5004Publicado 2022“…Chapters cover such topics as new techniques in bovine science and development, health and risk factors and diagnosis of disease in bovines, and production and reproductive technologies and advancements…”
Libro electrónico -
5005por OECD“…Special attention is given to risk management instruments and environmental measures. …”
Publicado 2017
Libro electrónico -
5006
-
5007por Bartneck, Christoph, 1973- author, Lütge, Christoph. author, Wagner, Alan. author, Welsh, Sean. authorTabla de Contenidos: “…-- 3.1 Descriptive Ethics -- 3.2 Normative Ethics -- 3.2.1 Deontological Ethics -- 3.2.2 Consequentialist Ethics -- 3.2.3 Virtue Ethics -- 3.3 Meta-ethics -- 3.4 Applied Ethics -- 3.5 Relationship Between Ethics and Law -- 3.6 Machine Ethics -- 3.6.1 Machine Ethics Examples -- 3.6.2 Moral Diversity and Testing -- 4 Trust and Fairness in AI Systems -- 4.1 User Acceptance and Trust -- 4.2 Functional Elements of Trust -- 4.3 Ethical Principles for Trustworthy and Fair AI -- 4.3.1 Non-maleficence -- 4.3.2 Beneficence -- 4.3.3 Autonomy -- 4.3.4 Justice -- 4.3.5 Explicability -- 4.4 Conclusion -- 5 Responsibility and Liability in the Case of AI Systems -- 5.1 Example 1: Crash of an Autonomous Vehicle -- 5.2 Example 2: Mistargeting by an Autonomous Weapon -- 5.2.1 Attribution of Responsibility and Liability -- 5.2.2 Moral Responsibility Versus Liability -- 5.3 Strict Liability -- 5.4 Complex Liability: The Problem of Many Hands -- 5.5 Consequences of Liability: Sanctions -- 6 Risks in the Business of AI -- 6.1 General Business Risks -- 6.1.1 Functional Risk -- 6.1.2 Systemic Risk -- 6.1.3 Risk of Fraud -- 6.1.4 Safety Risk -- 6.2 Ethical Risks of AI -- 6.2.1 Reputational Risk -- 6.2.2 Legal Risk -- 6.2.3 Environmental Risk -- 6.2.4 Social Risk -- 6.3 Managing Risk of AI -- 6.4 Business Ethics for AI Companies -- 6.5 Risks of AI to Workers -- 7 Psychological Aspects of AI -- 7.1 Problems of Anthropomorphisation…”
Publicado 2021
Libro electrónico -
5008por Ho, Lok-sangTabla de Contenidos: “…The theory of public policy design -- pt. 2. Risk management -- pt. 3. Resource allocation and redistribution -- pt. 4. …”
Publicado 2012
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
5009Publicado 2013Tabla de Contenidos: “…Why? -- Literary risk and moral peril -- Taking a breath -- Fantastic narrative strategies -- Amy, meet Molly -- The great redraft -- Triangulation of memory -- Beyond the kingdom of night…”
Libro electrónico -
5010por Müller, Birgit, 1957-Tabla de Contenidos: “…General Introduction Cross-Country Composite Capital Share Risk in International Asset Pricing The Pricing of European Non-Performing Real Estate Loan Portfolios Concluding Remarks…”
Publicado 2021
Libro electrónico -
5011por Field, SimonTabla de Contenidos: “…A Look at Inequities in Education -- The Ten Steps – Executive Summary -- Introduction: Setting the Agenda -- School and Out-of-school Practices -- Resources and Outcomes -- Structures and Pathways -- Groups at Risk…”
Publicado 2007
Libro electrónico -
5012Publicado 2009Tabla de Contenidos: “…The portfolios of the poor -- The daily grind -- Dealing with risk -- Building blocks : creating usefully large sums -- The price of money -- Rethinking microfinance : the Grameen II diaries -- Better portfolios…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
5013por Chandramouli, SubramanianTabla de Contenidos: “…Defect Detection Rate -- Escaped Defects -- Chapter 7 Agile Analysis and Design -- Introduction -- Collecting and Validating Requirements of Agile Projects -- Participatory Decision Model -- Product Vision -- Product Roadmap -- Backlog -- Story Maps -- Agile Modeling -- Business Case Development -- Chartering -- Chapter 8 Product Quality and Process Improvement -- Introduction -- Frequent Verification and Validation -- Test-Driven Development (TDD) -- Definition of Done -- Incremental Delivery -- Feedback Techniques for Product -- Continuous Improvement Process -- Process Analysis and Improvement Techniques -- Value Stream Mapping -- Five Whys -- Cause and Effect/Fishbone Diagrams -- Control Limits -- Chapter 9 Interpersonal Skills -- Emotional Intelligence Quotient (EQ) -- Collaboration -- Adaptive Leadership -- Negotiations -- Conflict Resolution -- Quick Quiz on Conflict Management -- Servant Leadership -- Brainstorming Techniques -- Building Empowered Team -- Coaching and Mentoring -- Team Motivation and Knowledge Sharing -- Leadership Styles -- Problem-solving Steps -- Culture and Team Diversity -- Chapter 10 Value-based Prioritization -- Introduction -- Definition of Value -- ROI, NPV, IRR -- Value-driven Delivery -- Elicit Non-functional Requirements -- Relative Prioritization and Ranking -- Value-based Prioritization -- Minimally Marketable Feature (MMF) -- Agile Compliance -- Regulatory Compliance -- Chapter 11 Agile Project Risk Management -- Introduction -- Approaching risk in Agile Projects -- Identify Risks -- Risk Adjusted Backlog -- Risk Burn-down Graphs -- Perform Qualitative Risk Analysis -- Risk-based Spike -- Architectural Spike -- Plan Risk Responses -- Monitoring and Control Risks -- Checkpoints in Agile Projects -- Chapter 12 PMI Code of Ethics and Professional Conduct -- Introduction -- Structure of the Code…”
Publicado 2016
Libro electrónico -
5014por Nolop, Bruce, 1950-Tabla de Contenidos: “…Media Training Note; Chapter 3: Assessing Enterprise Risks; Enterprise Risk Management; Implementation of ERM; Risk Identification; Risk Quantification; Major Exposures; Mitigation Strategies; Rewarded versus Unrewarded Risks; Governance of ERM; CFO's Role in ERM; PART II: CAPITAL ALLOCATIONS; Chapter 4: Estimating the Cost of Capital; WACC Formula; Hurdle Rates; Risk Premiums; Acquisition Cost of Capital; Chapter 5: Prioritizing Capital Investments; Cash Flow Projections; Investment Budget; Evaluating Projects; Categorizing Projects; Monitoring Projects; Pension Fund Contributions…”
Publicado 2012
Libro electrónico -
5015Publicado 2014Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Introduction; Chapter 1 Measuring and Weighing Risk; Risk Assessment; Computing Risk Assessment; Acting on Your Risk Assessment; Risks Associated with Cloud Computing; Risks Associated with Virtualization; Developing Policies, Standards, and Guidelines; Implementing Policies; Understanding Control Types and False Positives/Negatives; Risk Management Best Practices; Disaster Recovery; Tabletop Exercise; Summary; Exam Essentials; Review Questions; Chapter 2 Monitoring and Diagnosing Networks; Monitoring Networks; Network Monitors; Understanding Hardening…”
Libro electrónico -
5016por Clarke, JacquelineTabla de Contenidos: “…; Options versus shares; Chapter summary; Chapter 2: Advantages and risks; Advantages of option trading; Risks of option trading; Chapter summary; Chapter 3: Types of options; Summary of call options and put options; Option buyers (takers); Option sellers (writers); Call options; Put options; Company issued options; Index options; Chapter summary; Chapter 4: Option pricing; Stock pricing versus option pricing; Intrinsic value…”
Publicado 2012
Libro electrónico -
5017por McDonough, Bart R.Tabla de Contenidos: “…Intro -- Table of Contents -- Title Page -- Preface: What to Expect from This Book -- Chapter 1: Introduction -- Summary of a Board's Incident Response -- Checklist for a Board's Incident Response -- Chapter 2: Cybersecurity Basics -- CIA Framework -- Key Cybersecurity Concepts and Terminology for Board Members -- Common Cyber Threats and Risks Faced by Companies -- Key Technologies and Defense Strategies -- Threat Intelligence -- Threat Actors -- MITRE ATT& -- CK Framework -- Chapter 2 Summary -- Chapter 3: Legal and Regulatory Landscape -- Overview of Relevant Cybersecurity Regulations and Laws -- Discussion of Compliance Requirements and Industry Standards -- Individual Director Liability -- Chapter 3 Summary -- Chapter 4: Board Oversight of Cybersecurity -- The Board's Role in Overseeing Cybersecurity Strategy -- Developing an Effective Cybersecurity Governance Framework -- Best Practices for Board Engagement and Reporting -- Overcoming Objections to Effective Cybersecurity Oversight -- Promoting a Cybersecurity Culture -- Chapter 4 Summary -- Chapter 5: Board Oversight of Cybersecurity: Ensuring Effective Governance -- The Role of the Board in Overseeing Cybersecurity -- Developing an Effective Cybersecurity Governance Framework -- Strategies for Identifying, Assessing, and Prioritizing Cyber Risks -- Conducting Cybersecurity Risk Assessments -- How to Develop and Promote a Culture of Cybersecurity -- Chapter 5 Summary -- Chapter 6: Incident Response and Business Continuity Planning -- Implementing Cybersecurity Policies and Procedures -- Incident Response and Business Continuity Planning -- Incident Response Planning -- Defining the Types of Assessments -- Chapter 6 Summary -- Chapter 7: Vendor Management and Third-Party Risk -- The Importance of Third-Party Risk Management for Board Members…”
Publicado 2023
Libro electrónico -
5018Publicado 1993Tabla de Contenidos: “…8 Human Laboratory and Clinical Evidence of Effects of Electromagnetic Fields -- CUTANEOUS PERCEPTION -- PHOSPHENES -- PACEMAKER INTERFERENCE -- MICROWAVE AUDITORY EFFECT -- CIRCADIAN RHYTHMS -- BRAIN-EVOKED POTENTIALS -- HEART RATE -- REACTION TIME -- MOOD AND COGNITIVE FUNCTION -- BLOOD COMPOSITION -- BONE REPAIR AND GROWTH STIMULATION -- CONCLUSIONS -- REFERENCES -- 9 Epidemiological Research Relevant to Identification of Health Hazards Associated with GWEN Fields -- STUDIES OF GENERAL ENVIRONMENTAL EXPOSURE -- OCCUPATIONAL STUDIES -- EPIDEMIOLOGIC STUDIES OF HEALTH EFFECTS OF MICROWAVE EXPOSURE -- RADIO BROADCAST STATIONS -- AMATEUR RADIO OPERATORS -- CONCLUSIONS -- REFERENCES -- 10 Standards and Guidelines for Exposure to Radiofrequency and Extremely-Low-Frequency Electromagnetic Fields -- REFERENCES -- 11 Risk Analysis and Management -- RISK ASSESSMENT -- GENERAL DESCRIPTION OF GWEN FIELDS -- COUPLING OF ELECTROMAGNETIC FIELDS TO HUMAN BODY -- SHIELDING BY BUILDINGS -- POPULATION DISTRIBUTION AROUND GWEN SITES -- LF AND UHF EXPOSURES OF POPULATION AROUND SITES -- EXPOSURE COMPARISONS WITH EXISTING STANDARDS -- EXPOSURE COMPARISONS WITH OTHER SOURCES -- BOUNDING GWEN RISKS -- HISTORICAL GROWTH IN BROADCAST ACTIVITY -- PUBLIC HEALTH SURVEILLANCE AROUND BROADCAST FACILITIES -- MEADOWLANDS SPORTS COMPLEX -- BOUNDS ON EXCESS POPULATION RISK FROM GWEN FIELDS -- LIMITATIONS OF GWEN RISK ASSESSMENT -- RISK PERCEPTION -- EXPOSURE REDUCTION -- RESEARCH NEEDS -- REFERENCES…”
Libro electrónico -
5019Publicado 2003Tabla de Contenidos: “…Listeria monocytogenes -- Pt. 7. Risk assessment. Microbial risk assessment. Sampling techniques for foodborne pathogens in animals and animal products. …”
Libro electrónico -
5020Publicado 2016Tabla de Contenidos: “…Figure 4.2 Comparison of NPV profiles for traditional (dashed) and Agile (solid) projects -- Figure 4.3 Decision point analysis of Agile projects -- 4.4 Worked example -- Table 4.4 Anticipated project costs and revenues -- Table 4.5 Discounted cash flows for Agile and phased project approaches -- 4.4.1 Net present value -- Figure 4.4 Discounted Agile cash flows -- 4.4.2 Profitability index -- 4.4.3 Payback period -- 4.4.4 Financial performance summary -- Table 4.6 Summary of financial performance metrics -- 4.5 Concluding remarks -- 5 Value and benefits realization -- 5.1 Understanding value -- 5.2 Social value -- 5.3 Communicating value -- 5.4 Earned value management -- Figure 5.1 Example of a burn-up chart showing schedule variance during an iteration -- Table 5.1 Project tracking metrics -- 5.5 Benefits realization and assessment -- 5.6 Concluding remarks -- 6 Managing uncertainty -- 6.1 Understanding risk -- 6.2 Agile risk management -- Figure 6.1 Mapping of risk exposure (including ranges) to risk response strategies -- Figure 6.2 Illustrative risk burn-down chart -- 6.3 Costing risk -- 6.4 Sensitivity analysis -- Table 6.1 Scenario-based project and operational cash flows -- Table 6.2 Sensitivity analysis of project cash flows -- 6.5 Foreign exchange risk -- Figure 6.3 Hedging against foreign currency risk -- Table 6.3 Transaction costs and exchange rates -- Table 6.4 Strategies for managing exchange rate risk -- 6.6 Credit risk -- 6.7 Decision point analysis -- 6.8 Concluding remarks -- Appendix A Analytical treatment of cash flows -- A.1 Project NPV and operational annuities -- A.2 Incremental rates of return -- Glossary -- Bibliography -- Index…”
Libro electrónico