Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
8161por Dewey, SusanTabla de Contenidos: “…A Politically Charged Environment: Anti-Trafficking Campaigns, Abolitionism, and Police RaidsImpact on Researchers: Institutional Review Board Approval; Impact on Researchers: Access to the Sex Industry; Impact on Researchers: Danger, Risks, and Stigma; Ethical Practice of Reciprocity; Ethical Practice of Reflexivity; Conclusion; 4 Between Research and Activism: Identifying Pathways to Inclusive Research; Anchor 2; Envisioning Participatory Sex Work Research; Participatory Research Design; Participatory Methodologies; Participatory Dissemination; Conclusion; Susan Dewey; Works Cited…”
Publicado 2013
Libro electrónico -
8162Publicado 2006Tabla de Contenidos: “…Europen Primarily Internet Banks; -- 14. Bank Risks and the Business Cycle; -- 15. House Prices and Consumer Lending; -- 16. …”
Libro electrónico -
8163por García-Iglesias, JaimeTabla de Contenidos: “…Navigating dating and sexual intimacy in viral times: How people adapt their sexual relationships to pandemic risk -- Method -- The transformation of sexual and romantic relationships in a time of crisis -- Coronamonogamy: Unconventional intimate arrangements and the moralisation of sex -- The new intensity of intimate couples' spaces -- Finding new partners during pandemic distancing -- Pandemic self-reliance and the dangers of female outdoor dating -- For whom is the public space a safe space? …”
Publicado 2024
Libro electrónico -
8164por Topham, ShaunTabla de Contenidos: “…Peril on the Road to Utopia - Opportunities and Risks of Infusing Personal Data into the Smart City Ecosystem 2. …”
Publicado 2023
Libro electrónico -
8165Publicado 2023Tabla de Contenidos: “…Cover -- Half Title -- Series -- Title -- Copyright -- Contents -- List of figures -- List of tables -- Acknowledgments -- 1 Conceptualisation leadership, sustainability, and knowledge management: An individual and organisational perspective -- 2 The self-actualized leader and organizational sustainability -- 3 Leadership and fitness: Influence of nutrition and physical activity -- 4 High culture in leadership: A theoretical analysis -- 5 The importance of ethics and morals in a leader's development -- 6 The impact of the leader's emotional intelligence on psychosocial risks -- 7 Transformational leadership through the human development of the leader -- 8 Evolution of leadership and its impact on knowledge management: Knowledge in the history of leadership -- 9 The leadership styles of intellectual capital management in a consortium of Mexican universities -- 10 Knowledge management and technological prospective -- 11 Innovation in coffee production and distribution of economic benefits among value chain actors -- 12 The impact of sustainability on economic, social, and environmental actions as reflected in food systems -- 13 Knowledge management of sustainability for self-realization -- Index…”
Libro electrónico -
8166por Lacity, Mary C.Tabla de Contenidos: “…Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measures -- Chapter 5. …”
Publicado 2024
Libro electrónico -
8167Publicado 2017Tabla de Contenidos: “…EU data protection and "treaty-base games" : when fundamental rights are wearing market-making clothes / Laima Janciute -- The "risk revolution" in EU data protection law : we can't have our cake and eat it, too / Claudia Quelle -- No privacy without transparency / Roger Taylor -- Machine learning with personal data / Dimitra Kamarinou, Christopher Millard, and Jatinder Singh -- Bridging regulation and practice : a legal-technical analysis of the three types of data in the GDPR / Runshan Hu, Sophie Stalla-Bourdillon, Mu Yang, Valeria Schiavo, and Vladimiro Sassone -- Are we prepared for the 4th industrial revolution : data protection and data security challenges of industry 4.0 in the EU context / Carolin Moeller -- Reasonable expectations of data protection in telerehabilitation : a legal and anthropological perspective on intelligent orthoses / Martina Klausner and Sebastian Golla -- Considering the privacy design implications of conversation as platform / Ewa Luger and Gilad Rosner -- CPDP 2017 closing speech / Giovanni Butarelli…”
Libro -
8168Publicado 2016Tabla de Contenidos: “…PART I, Anatomy of a Hunch: Being Productively Wrong -- Prototyping a Real World Problem -- PART II, Exploring in Foresight: Learning from Parts and People -- Interacting with Parts -- Interfacing with People -- At a Small Scale Nonlinearity is Your Ally -- A Kit to Drive Innovation Anywhere -- Operating on the Problem Through Trial and Error -- PART III, Organizing What You've Learned: Exploring Impact -- Practicing Advocacy -- Risk, Doing, Learning and Uncertainty -- Scaling Up and Organization -- Managing Innovation Continuously -- The World is your Lab: You Need a Notebook to Converse With Yourself -- Epliogue: Academic Commentary -- Bounded Rationality and Behavioral Decision Making -- Bridging with artificial intelligence -- Iterations and the induction argument -- Kits DIY and experimentation -- Kuhn versus Popper -- Learning and innovating -- No thing is new -- The nonlinear nature of innovation -- Organizational theory and computation -- Parts and Modularity -- People and teams -- Problem solving -- The Relationship among Scale, Execution, and Organization Building…”
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
8169Publicado 2015Tabla de Contenidos: “…Exotic Instruments; 2.3 Risks Affecting Equity Derivatives; 2.3.1 Market Risks; 2.3.2 Other Risks; 2.4 Hedging; 2.5 Market-Based Valuation as a Process; 3 Market Stylized Facts; 3.1 Introduction; 3.2 Volatility, Correlation and Co.; 3.3 Normal Returns as the Benchmark Case; 3.4 Indices and Stocks…”
Libro electrónico -
8170Publicado 2023Tabla de Contenidos: “…-- Types of mediators -- When to consider mediation services -- Benefits of vulnerability mediation -- Resolving disputes through vulnerability mediation -- The vulnerability mediation process -- Mediator resources -- The CERT/CC -- The US-CERT -- The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) -- Other CERT organizations -- Bug bounty programs -- Legal support -- Other mediation options -- Summary -- Chapter 7: Independent Vulnerability Publishing -- Independent disclosures and their place in a vulnerability life cycle -- The benefits of independent publishing -- Risks of independent publishing -- How to independently publish while avoiding risks…”
Libro electrónico -
8171Publicado 2015Tabla de Contenidos: “…Chapter 3 - Fundamentals of Financial Instruments Pricing -- 3.1 - Decision-making process -- 3.2 - Arbitrage -- 3.3 - Accounting and economic value -- 3.4 - Group of instruments -- 3.5 - Valuation - DCF -- 3.6 - Equity: fundamental analysis of share values -- 3.7 - Theories of share price behavior -- 3.8 - Fixed income: the loan, debentures, and loan stock valuation -- 3.9 - Derivatives -- 3.10 - Option -- 3.10.1 - Classification of Options -- 3.11 - Forwards/futures -- 3.12 - Swaps -- 3.13 - Other derivatives -- 3.14 - Summary -- Further reading -- Y/N questions -- Discussions -- Situation -- Solution -- Y/N Questions' answers -- Chapter 4 - Hypothesis of Informational Efficiency of Financial Markets -- 4.1 - Efficient market -- 4.2 - Weak form hypothesis -- 4.3 - Semistrong form of efficiency -- 4.4 - Strong form of efficiency -- 4.5 - The coherent market hypothesis -- 4.6 - Behavioral finance -- 4.7 - Summary -- Further reading -- Y/N Questions -- Discussions -- Situation -- Solution -- Chapter 5 - Financial Information -- 5.1 - Sources -- 5.2 - Indexes -- 5.3 - Data usage -- 5.4 - General economy -- 5.5 - Industry analysis -- 5.6 - Company analysis -- 5.7 - Financial statements -- 5.8 Elements of financial statments -- 5.9 - Accounting standards -- 5.10 - Auditing -- 5.11 - Individual and group financial statements -- 5.12 - Ratio analysis -- 5.13 - Summary -- Further reading -- Y/N Questions -- Discussions -- Situation -- Solution -- Chapter 6 - Return and Risk Appraisal -- 6.1 - Return -- 6.2 - Accounting rate of return -- 6.3 - Simple project assessment -- 6.3.1 - The Payback Method -- 6.3.2 - Discounted Cash Flow (DCF) Method -- 6.3.3 - NPV Method -- 6.4 - Risk -- 6.4.1 - Risk and Uncertainty -- 6.5 - Summary -- Further reading -- Y/N Questions -- Discussions -- Situation -- Solution…”
Libro electrónico -
8172por Guidetti, OliverTabla de Contenidos: “…5.16.2 Advocacy for victims' rights -- 5.17 Conclusion -- 5.17.1 Developing comprehensive policies and legal frameworks -- 5.17.2 Continuous technological vigilance and adaptive detection mechanisms -- 5.17.3 Global collaboration, standards, and cooperation -- 5.17.4 Public awareness, education, and evolving educational programmes -- 5.17.5 Ethical considerations in AI development -- 5.17.6 Proactive approach to emerging threats and evolving tactics -- References -- 6 Trust and risk: psybersecurity in the AI era -- 6.1 Introduction -- 6.1.1 The emerging importance of securing mental health in the digital age -- 6.2 Trust and risk in AI -- 6.2.1 Psychological foundations of trust -- 6.2.2 Context and significance of trust and risk in the AI era -- 6.2.3 Benefits of trust in AI -- 6.3 Risks stemming from trust in AI -- 6.3.1 Over-trust in AI products: abuse and misuse -- 6.3.2 Under-trust in AI products: disuse -- 6.4 Psybersecurity risk framework -- 6.4.1 Mass impact -- 6.4.2 Direct AI impact -- 6.4.3 Malicious use of AI -- 6.5 Discussion -- 6.5.1 Awareness training -- 6.5.2 Transparency in AI -- 6.5.3 Industry regulations -- 6.5.4 Legal frameworks -- 6.6 Conclusion -- References -- 7 Security through influence over mandate -- 7.1 Introduction -- 7.1.1 Make security tangible, not another compliance slideshow -- 7.1.2 Ease, not pain, should be synonymous with security -- 7.1.3 Resistance is necessary and good -- 7.1.4 Security is achieved through continuous, small steps -- 7.1.5 Security is enablement, not gatekeeping -- 7.2 Pattern 1: make security tangible, not another compliance slideshow -- 7.2.1 Adding to the cultural fabric -- 7.2.2 Accelerating the spread of knowledge -- 7.2.3 The difference between reading and knowing the incident response plan -- 7.2.4 The discipline of security chaos engineering -- 7.2.5 Summary…”
Publicado 2024
Libro electrónico -
8173Publicado 2014“…The internet may be a utopia for free expression, but it also harbours nihilistic groups and individuals spreading bizarre creeds, unhindered by the risk-averse gatekeepers of the mass media -- and not all are as harmless as the Virtual Church of the Blind Chihuahua or Sexastrianism. …”
Libro -
8174
-
8175Publicado 2016“…Train to perform at the highest level with the lowest risk of injury. New Functional Training for Sports, Second Edition produces the best results on the court, field, track, and mat, not just in the weight room. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro -
8176por Lowe, Ben, 1984-Tabla de Contenidos: “…God's -- Uplink: Will Samson, author of Justice in the burbs -- Prodigal treehuggers : our place in God's plan -- Uplink: Fred Van Dyke, director of environmental studies program, Wheaton College -- From insulation to incarnation : the journey back to God's plan -- Uplink: Peter Harris, founder, A Rocha -- Changing our communities -- The heat is on : the current Creation Care Movement and the climate crisis that sparked it -- Uplink: Vince Morris, risk manager, Wheaton College -- Spheres of change : where this movement is germinating -- Uplink: Paul Corts, president, Council for Christian Colleges and Universities -- Transformation : a movement of change -- Uplink: Bettie Ann Brigham, vice president for student development, Eastern University -- Mustard seed organizing : how this movement grows -- Uplink: Janel Curry, dean of research, Calvin College, and chair, Evangelical Environmental Network -- Molehills : overcoming obstacles to growth -- Uplink: Ed Johnson, president, Au Sable Institute of Environmental Studies -- Sustaining sustainability : keeping the movement alive -- Uplink: Jeff Greenberg, professor of geology, Wheaton College -- A bigger vision -- Synthesis : connecting into the bigger picture -- Uplink: Dorothy Boorse, professor of biology, Gordon College -- Red, blue, or green? …”
Publicado 2009
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
8177Publicado 2015“…They not only identified gene variants segregating with familial forms of PD but also genetic risk factors of sporadic PD via genome-wide association studies (GWAS). …”
Libro electrónico -
8178Publicado 2019“…The volume has aimed to gather contributions and to compare results derived from various experiences of research groups regarding NOA minerals as a source of possible environmental risks for population. Case studies from various geological contexts are presented. …”
Libro electrónico -
8179Publicado 2011“…Students will get solid grounding in real-life applications of risk assessment, screening, and diagnostic testing…”
Libro electrónico -
8180por Wohlgensinger, Corinne“…By describing the specific risk situations of people with disabilities, the author creates the basis for a reflection on the claims of justification and validity on the part of philosophy and points of departure for the special educational discussion. …”
Publicado 2014
Electrónico