Mostrando 10,861 - 10,880 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.15s Limitar resultados
  1. 10861
    Tabla de Contenidos: “…Interrelated pathways: children at risk -- 3.3. Towards improved co-ordination and integration of Egyptian justice services -- 3.3.1. …”
    Libro electrónico
  2. 10862
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Architecting for Innovation -- Continuously delivering business value -- By the skin of our teeth -- Through high-velocity teamwork -- Dissecting lead time -- Risk mitigation -- Decision making -- Software development life cycle methodology -- Hardware provisioning -- Deployments -- Software structure -- Testing and confidence -- Dependencies and inter-team communication -- Dissecting integration styles -- Batch integration -- Spaghetti integration -- Real-time integration -- Enterprise application integration -- Shared database -- Service-oriented architecture -- Microservices -- Enabling autonomous teams with autonomous services -- Autonomous services - creating bulkheads -- Asynchronous inter-service communication -- Fortified boundaries -- Event-first - valuing facts -- Inversion of responsibility -- Events as first-class citizens -- Idempotence and ordered tolerance -- Serverless-first - creating knowledge -- Self-service -- Disposable architecture -- Data life cycle - fighting data gravity -- Micro frontends - equalizing tiers -- Observability - optimizing everything -- Organic evolution - embracing change -- Summary -- Chapter 2: Defining Boundaries and Letting Go -- Learning the hard way -- Building on proven concepts -- Domain-driven design -- Bounded context -- Domain aggregate -- Domain event -- SOLID principles -- Single Responsibility Principle -- Open-Closed Principle -- Liskov Substitution Principle -- Interface Segregation Principle -- Dependency Inversion Principle -- Hexagonal Architecture -- Function-level (nano) -- Service-level (micro) -- Subsystem-level (macro) -- Thinking about events first -- Start with event storming -- Focus on verbs instead of nouns -- Treat events as facts instead of ephemeral messages…”
    Libro electrónico
  3. 10863
    Publicado 2021
    Tabla de Contenidos: “…Approach -- Sample Output and Templates -- Step 3.12 Data Decay -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 3.13 Usability and Transactability -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 3.14 Other Relevant Data Quality Dimensions -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 3 Summary -- Step 4 Assess Business Impact -- Introduction to Step 4 -- Step 4.1 Anecdotes -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 4.2 Connect the Dots -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 4.3 Usage -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 4.4 Five Whys for Business Impact -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 4.5 Process Impact -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 4.6 Risk Analysis -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 4.7 Perception of Relevance and Trust -- Business Benefit and Context -- Approach -- Sample Output and Templates -- Step 4.8 Benefit vs. …”
    Libro electrónico
  4. 10864
    Publicado 2024
    Tabla de Contenidos: “…-- Port scanning issues -- Scanning countermeasures -- Introducing the Nmap network scanning tool -- Controlling Nmap scan speeds -- Outputting results -- The NSE -- The Nmap GUI -- Mapping the network -- Lab - Scanning and enumeration -- Summary -- Assessment -- Answer -- Chapter 4: Ethical Hacking Vulnerability Assessments and Threat Modeling -- Vulnerability assessment concepts -- Explaining vulnerability assessments -- Types of vulnerability assessments -- Vulnerability assessment life cycle -- Vulnerability scanning tools -- Introducing the Nessus vulnerability scanner -- Best practices for vulnerability assessments -- Vulnerability assessment reports -- The elements of threat modeling -- The finding -- The kill chain -- The single asset value -- The organizational asset value -- The estimated risk -- Threat modeling frameworks -- STRIDE -- PASTA -- VAST -- Attack trees -- CVSS -- Threat modeling tools -- Threat forecasting -- Phase 1 - Research -- Phase 2 - Implementation and analysis -- Phase 3 - Information sharing and building -- Threat model lab - personal computer security -- Summary -- Assessment -- Answer -- Part 2: Hacking Tools and Techniques -- Chapter 5: Hacking the Windows Operating System -- Technical requirements -- Exploiting the Windows OS -- Exploiting Windows device drivers -- Exploiting Windows networking -- Address Resolution Protocol -- Simple network management protocol -- Server Message Block -- NetBIOS -- Exploiting Windows authentication -- User authentication and movement -- Obtaining and extracting passwords -- Exploring password-cracking techniques -- Authentication spoofing -- Pulling Windows account names via null sessions -- Tools for pulling account names via null sessions -- Privilege elevation…”
    Libro electrónico
  5. 10865
    Tabla de Contenidos: “…Business rule beans -- Preparing to use Business Rule Beans -- Update the server properties -- Create the BRBean database -- Running the Rule Management Application -- Define business rules -- Spot Loan scenario -- qualifyForSpotLoan() method -- BankRules/LevelRule -- LevelAssessor.java -- Staff Assisted Loan scenario -- needManagerApproval() method -- BankRules/RiskRule -- RiskAssessor.java -- Extended Spot Loan scenario -- LevelAssessor.java -- Appendix C. …”
    Libro electrónico
  6. 10866
    Publicado 2023
    Tabla de Contenidos: “…12.3.1 Occupation taxes -- 12.3.2 Transfer and wealth taxes -- 12.3.3 Betterment taxation -- 12.4 Land and property taxation in England and Wales -- 12.4.1 Occupation taxes -- 12.4.2 Transfer and wealth taxes -- 12.4.3 Betterment taxation in England -- Notes -- References -- Chapter 13 Valuations for Expropriation -- 13.1 Introduction -- 13.2 Valuation for expropriation -- 13.2.1 Valuing property rights that are to be taken or extinguished -- 13.2.2 Valuing retained property rights -- 13.2.3 Valuing compensation for disturbance -- 13.2.4 Valuing customary and informal land for expropriation purposes -- 13.2.5 Expropriation and non-market value -- 13.3 Valuations for compulsory purchase and planning compensation in England -- 13.3.1 Legal background -- 13.3.2 Compensation for land2 taken (compulsorily acquired) -- 13.3.3 Identifying the planning position -- 13.3.4 Compensation for severance and injurious affection -- 13.3.5 Compensation for disturbance and other losses -- 13.4 Planning compensation in England -- 13.4.1 Revocation, modification and discontinuance orders -- 13.4.2 Purchase notices -- 13.4.3 Blight compensation -- Notes -- References -- Chapter 14 Valuation Variance, Risk and Optionality -- 14.1 Introduction -- 14.2 Valuation accuracy and valuation variance -- 14.3 Analysing risk -- 14.3.1 Sensitivity analysis -- 14.3.2 Scenario modelling -- 14.3.3 Simulation -- 14.4 Flexibility and options -- 14.5 Uncertainty -- References -- Appendix: Land Uses and Valuation Methods -- A.1 Agriculture and fisheries -- A.2 Forests and woodland -- A.3 Natural resource extraction - water, minerals and other materials -- A.4 Recreation and leisure -- A.5 Utilities and infrastructure -- A.6 Residential -- A.7 Community services -- A.8 Land and buildings with (Re)development potential -- Notes -- References -- Glossary -- Index -- EULA…”
    Libro electrónico
  7. 10867
    Publicado 2016
    Tabla de Contenidos: “…Capital ratios exceed thresholds but risks remain -- Table 2. Past OECD recommendations on monetary and financial policy -- Figure 9. …”
    Libro electrónico
  8. 10868
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…However, disability remains a risk factor for early school leaving -- 2.3. Labour market outcomes have changed little in the past 15 years -- 2.3.1. …”
    Libro electrónico
  9. 10869
    Tabla de Contenidos: “…General Assessment of the Macroeconomic Situation -- Introduction -- Economic prospects and risks -- Figure 1.1. Global GDP growth is set to remain subdued -- Figure 1.2. …”
    Libro electrónico
  10. 10870
    Publicado 2017
    Tabla de Contenidos: “…-- Create PGP Keypair Certificate -- Prerequisites to Send and Receive Encrypted Emails Using Gpg4win -- Encrypting Emails in MS Outlook® Using the GpG4win Component (GpgOL) -- How to Decrypt an Encrypted Message Sent to You -- Making Sure You Are Talking With the Correct Person -- Open PGP Encryption for Webmail Using the Mailvelope Browser Extension -- Secure Web Mail Providers -- ProtonMail -- GhostMail -- ENCRYPT INSTANT MESSAGING, VIDEO CALLS, AND VOIP SESSIONS -- What Are the Risks? -- Off-the-Record-Messaging and Pidgin -- Generating Our Private Key -- Practice Using OTR by Initiating a Secure Chat Session -- Authenticate the Identity of Your Contacts…”
    Libro electrónico
  11. 10871
    por Mullennex, Lauren
    Publicado 2023
    Tabla de Contenidos: “…Creating a labeling workforce -- Setting up an A2I human review workflow or flow definition -- Initiating a human loop -- Leveraging Amazon A2I with Amazon Rekognition to review images -- Step 1 - Collecting your images -- Step 2 - Creating a work team -- Step 3 - Creating a human review workflow -- Step 4 - Starting a human loop -- Step 5 - Checking the human loop status -- Step 6 - Reviewing the output data -- Summary -- Chapter 12: Best Practices for Designing an End-to-End CV Pipeline -- Defining a problem that CV can solve and processing data -- Developing a CV model -- Training -- Evaluating -- Tuning -- Deploying and monitoring a CV model -- Shadow testing -- A/B testing -- Blue/Green deployment strategy -- Monitoring -- Developing an MLOps strategy -- SageMaker MLOps features -- Workflow automation tools -- Using the AWS Well-Architected Framework -- Cost optimization -- Operational excellence -- Reliability -- Performance efficiency -- Security -- Sustainability -- Summary -- Chapter 13: Applying AI Governance in CV -- Understanding AI governance -- Defining risks, documentation, and compliance -- Data risks and detecting bias -- Auditing, traceability, and versioning -- Monitoring and visibility -- MLOps -- Responsibilities of business stakeholders -- Applying AI governance in CV -- Types of biases -- Mitigating bias in identity verification workflows -- Using Amazon SageMaker for governance -- ML governance capabilities with Amazon SageMaker -- Amazon SageMaker Clarify for explainable AI -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  12. 10872
    Publicado 2013
    Tabla de Contenidos: “…(i) Internal System Auditor -- (j) IT -- (k) Collection‐Device Administrator -- (l) Managing Roles: The Big Picture -- 8.3 UNIQUE ASPECTS OF TIMEKEEPING SECURITY AND CONTROL CONFIGURATION -- (a) Securing Personally Identifiable Information -- (b) Configuring Security -- (c) Flexible Controls -- (d) Change Control -- (e) User Passwords -- (f) Single Sign‐On -- (g) Automatic Time‐Out -- (h) Badge Information -- 8.4 RECORD‐KEEPING REGULATIONS -- 8.5 LEGAL AND STATISTICAL ISSUES -- (a) Fair Labor Standards Act -- (b) Wage and Hour Issues -- (c) Statistics -- (d) Use of Data in Wage and Hour Cases -- 8.6 SSAE 16, SOC2, ISO, AND SOX -- (a) Audit Formats -- (b) Audit Reports -- (c) Audit Management -- (d) Role of the WAM‐Pro -- 8.7 INTEGRATION WITH REPORTING STRUCTURES AND BUSINESS SYSTEMS -- (a) Chart of Accounts -- (b) Aligning to the General Ledger and Business Systems -- 8.8 FRAUD, ABUSE, AND PAYROLL LEAKAGE -- (a) Leakage Principle -- (b) System Vulnerabilities -- (c) Symptoms -- (d) Leading Practices -- NOTES -- CHAPTER NINE Industry‐Specific Workforce Management Business Needs -- 9.1 REGULATIONS AND RECOMMENDED PRACTICES ON FITNESS FOR DUTY AND FATIGUE RISK MITIGATION -- (a) Purpose of Fitness for Duty and Fatigue Risk Mitigation Regulations and Recommended Practices -- (b) Current FRMS Regulations/Recommended Practices -- (c) Future FRMS Practices -- (d) Implications for Workforce Asset Management -- 9.2 HEALTHCARE PAY PRACTICES -- 9.3 RETAIL AND RESTAURANT INDUSTRY -- 9.4 GOVERNMENT CONTRACTING -- (a) Common Contracting Questions and Concerns -- (b) Common Tools for Department of Defense Reporting -- 9.5 K-12 EDUCATION INDUSTRY -- (a) Complexities of the Education Industry -- (b) Benefits of WFM System -- (c) Challenges for Implementation in the Education Industry -- 9.6 MANAGING A GLOBAL WORKFORCE…”
    Libro electrónico
  13. 10873
    Tabla de Contenidos: “…Several of Korea's strengths risk widening industry gaps even further -- 1.3.4. …”
    Libro electrónico
  14. 10874
    Publicado 2019
    Tabla de Contenidos: “…-- 3.7 Polysaccharides are long chains of sugar units -- Lipids -- 3.8 Fats are lipids that are mostly energy-storage molecules -- 3.9 Scientific Thinking Scientific studies document the health risks of trans fats -- 3.10 Phospholipids and steroids are important lipids with a variety of functions -- 3.11 Connection Anabolic steroids pose health risks -- Proteins -- 3.12 Proteins have a wide range of functions and structures -- 3.13 Proteins are made from amino acids linked by peptide bonds -- 3.14 Visualizing The Concept A Protein's functional shape results from four levels of structure -- Nucleic Acids -- 3.15 The nucleic acids DNA and RNA are information-rich polymers of nucleotides…”
    Libro electrónico
  15. 10875
    Publicado 2019
    Tabla de Contenidos: “…Cohorts -- 6.1 Interpreting the cohort figures -- 6.2 Median household assets -- 6.3 Ownership of risky assets: business, equity, and housing -- 6.4 Business ownership -- 6.5 Equity ownership -- 6.6 Home-ownership -- 6.7 Mortgage holding -- 6.7.1 The risky asset share -- 6.8 Business share -- 6.9 Equity share -- 6.10 Housing share -- 6.11 Combined risk asset share -- 7. Financial vulnerability, shocks, and the health of the household balance sheet -- 7.1 Risk from asset price shocks…”
    Libro electrónico
  16. 10876
    por Thomas, Jacob
    Publicado 2015
    Tabla de Contenidos: “…Monitoring Strategy Implementation -- Strategy Show: Aditya Birla Group-Growing Deeper in Multinational Character -- 12.1 Balanced Scorecard and Other Techniques of Strategy Success -- 12.2 Superior Performance Measures -- 12.3 Monitoring Risks and Assumptions of a Strategy -- 12.4 Establishing Strategic Controls and Operational Control -- 12.5 Disruptive Strategies and Alternate Strategies…”
    Libro electrónico
  17. 10877
    por Brandsen, Taco
    Publicado 2018
    Tabla de Contenidos: “…New Perspectives on Leading Service Co-Production / chapter 9.1 Case Study—Leading Co-Production -- The Case of Hertfordshire Fire and Rescue Service’s Community Volunteer Scheme / chapter 9.2 Case Study—Enhancing Co-Creation Through Linking Leadership -- The Danish ‘Zebra City’ Project / chapter 10 The Increasing Role of Digital Technologies in Co-Production and Co-Creation / chapter 10.1 Case Study—How Public Services in Sweden Help Newcomers to Integrate in the Labour Market and Society Through the Digital Platform Mobilearn / chapter 10.2 Case Study—ICT and Empowerment of Frail Elderly in Flemish Municipalities / chapter 10.3 Case Study—Remote Health Monitoring with Wearable Sensors and Smartphones / chapter 11 Legal Dilemmas of Co-Production and Co-Creation / chapter 11.1 Case Study—The European Disability Card / part, 3 Co-Production and Co-Creation in Different Domains -- chapter 12 Co-Production in Healthcare / chapter 12.1 Case Study—Co-Producing Recommendations to Reduce Diagnostic Error / chapter 12.2 Case Study—Co-Production of Secondary Health Services in Nigeria and Ghana / chapter 13 Parents as Co-Producers in Primary Education / chapter 13.1 Case Study—Partners for Possibility -- Co-Production of Education / chapter 13.2 Case Study—Co-Creating School Meals Services / chapter 14 Co-Production and the Environment / chapter 14.1 Case Study—Balade Verte et Bleue and Ilôt d’eau -- Co-Creation and Co-Production for the Environment / chapter 14.2 Case Study—Co-Producing Flood Risk Governance in England, the Netherlands and Flanders / chapter 15 Co-Production in Community Development / chapter 15.1 Case Study—Co-Production and Community Development in France / chapter 16 Providing Public Safety and Public Order Through Co-Production / chapter 16.1 Case Study—The Blue and You Police-Community Forum -- Co-Production of a Community Conversation / chapter 16.2 Case Study—Dutch and Belgian Citizens’ Motivations to Engage in Neighbourhood Watch Schemes / part, 4 The Effects of Co-Production and Co-Creation -- chapter 17 Co-Production, Co-Creation, and Citizen Empowerment / chapter 17.1 Case Study—Co-Creation and Empowerment -- The Case of DR Congo in Agricultural and Rural Sector / chapter 18 Democratic Co-Production -- Concepts and Determinants / chapter 18.1 Case Study—Co-Production of New Immigrant Services in Hong Kong -- Facilitating the Integration of New Immigrants into Community / chapter 18.2 Case Study—The Rabot Neighbourhood -- Co-Production in Community Development / chapter 19 The Effects of Co-Production on Trust / chapter 19.1 Case Study—Building Trust in Work Corporations / chapter 20 Assessing the Effect of Co-Production on Outcomes, Service Quality and Efficiency / chapter 20.1 Case Study—Amadiba Adventures -- Co-Creating Community-Based Tourism / chapter 21 The Dark Side of Co-Creation and Co-Production -- Seven Evils / chapter 21.1 Case Study—Experts-by-Experience in Finnish Social Welfare / part, 5 Concluding Chapter -- chapter 22 How to Encourage Co-Creation and Co-Production -- Some Recommendations…”
    Libro electrónico
  18. 10878
    Publicado 2020
    Tabla de Contenidos: “…A META-ANALITIC REVIEW] -- ANÁLISIS DE SENTENCIAS DE DELITOS CONTRA LA LIBERTAD SEXUAL CON AGRESORES MÚLTIPLES / [JUDICIAL SENTENCES ANALYSIS OF SEXUAL OFFENCES WITH MULTIPLE OFFENDERS] -- MITOS SOBRE AGRESIÓN SEXUAL EN UNA MUESTRA DE POBLACIÓN PENITENCIARIA / [MYTHS ABOUT SEXUAL AGGRESSION IN A SAMPLE OF PRISON INMATES] -- VICTIMIZACIÓN PRIMARIA Y SECUNDARIA EN LA VIOLENCIA SEXUAL CONTRA MUJERES ADULTAS EN SENTENCIAS PENALES / [PRIMARY AND SECONDARY VICTIMIZATION IN SEXUAL VIOLENCE AGAINST ADULT WOMEN IN CRIMINAL SENTENCES] -- CREENCIAS Y PENSAMIENTOS DISTORSIONADOS HACIA LA VIOLENCIA EN HOMBRES Y MUJERES: AGRESIVIDAD, AUTOESTIMA Y CONTROL DEL SESGO DE RESPUESTA /[BELIEFS AND DISTORTED THINKING ABOUT VIOLENCE IN MEN AND WOMEN: AGGRESSIVENESS, SELF-ESTEEM EVALUATION OF RESPONSE BIAS] -- INADAPTACIÓN SOCIAL DE VÍCTIMAS DE VIOLENCIA FILIOPARENTAL DE MENORES CON MEDIDAS JUDICIALES / [SOCIAL MALADJUSTMENT OF VICTIMS OF CHILD-TO-PARENT VIOLENCE OF UNDERAGES WITH JUDICIAL MEASURES] -- VIOLENCIA FILIO-PARENTAL INSTRUMENTAL Y REACTIVA: EL PAPEL PREDICTIVO DEL MALTRATO PARENTO-FILIAL /[INSTRUMENTAL AND REACTIVE CHILD-TO-PARENT VIOLENCE: THE PREDICTIVE ROLE OF PARENT-TO-CHILD MALTREATMENT] -- PREVALENCIA Y RAZONES PARA LA VIOLENCIA FILIO-PARENTAL EN ADOLESCENTES ESPAÑOLES: DIFERENCIAS DE GÉNERO EN VÍCTIMAS Y AGRESORES / [PREVALENCE AND REASONS FOR CHILD-TO-PARENT VIOLENCE IN SPANISH ADOLESCENTS: GENDER DIFFERENCES IN VICTIMS AND AGGRESSORS] -- FACTORES PSICOSOCIALES ASOCIADOS A MENORES CON DELITO DE MALTRATO FAMILIAR / [PSYCHOSOCIAL FACTORS RELATED TO CHILDS OFFENDERS WITH FAMILY ABUSE VIOLENCE] -- CONDUCTAS EN LA RED Y DIFERENCIAS DE GÉNERO EN POBLACIÓN ADOLESCENTE / [INTERNET BEHAVIOURS AND GENDER DIFFERENCES IN ADOLESCENT POPULATION] -- AUTOENGAÑO Y MENTIRA EN ADOLESCENTES: PERSONALIDAD Y AUTOESTIMA / [SELF-DECEPTION AND LYING IN ADOLESCENTS: PERSONALITY AND SELF-ESTEEM] -- FACTORES DE RIESGO PARA LA REITERACIÓN DELICTIVA EN MENORES / [RISK FACTORS FOR RECIDIVISM IN JUVENILE OFFENDERS] -- CUESTIONARIO DE ACTITUDES HACIA LA VIOLENCIA (CAHV-10) EN MENORES: VERSIÓN REDUCIDA / [ATTITUDES TOWARDS VIOLENCE QUESTIONNAIRE (CAHV-10) IN MINORS: REDUCED VERSION] -- ACTITUDES HACIA LAS LEYES Y COMPORTAMIENTOS DESVIADOS: UN ESTUDIO CON ADOLESCENTES EN SÃO PAULO, BRASIL. / [ATTITUDES TOWARDS LAWS AND DEVIANT BEHAVIORS: A STUDY WITH ADOLESCENTS IN SÃO PAULO, BRAZIL.] -- EXPOSICIÓN A LA VIOLENCIA Y VIOLENCIA FILIOPARENTAL EN MENORES INFRACTORES Y RECLUSOS / [EXPOSURE TO VIOLENCE AND CHILD-TO-PARENT VIOLENCE IN JUVENILE OFFENDERS AND PRISONERS] -- ESTRATEGIAS MOTIVACIONALES EN INTERVENCIÓN CON AGRESORES DE PAREJA: EL PLAN MOTIVACIONAL INDIVIDUALIZADO / [MOTIVATIONAL STRATEGIES IN INTIMATE PARTNER VIOLENCE OFFENDER INTERVENTION: INDIVIDUALIZED MOTIVATIONAL PLANS] -- SÍNTOMAS PREFRONTALES EN DELINCUENTES Y NO DELINCUENTES CON UN MISMO NIVEL EDUCATIVO / [PREFRONTAL SYMPTOMS IN OFFENDERS AND NON-OFFENDERS WITH THE SAME EDUCATION LEVEL] -- VECINDARIOS Y PROBLEMAS SOCIALES: UN ACERCAMIENTO DESDE LA ESTADÍSTICA ESPACIAL / [NEIGHBORHOODS AND SOCIAL PROBLEMS: A SPATIAL STATISTICS APPROACH] -- ¿DIFIERE LA CAPACIDAD DE CLASIFICACIÓN DE RESPUESTAS SIMULADAS DE LA ESCALA DE F DEL MMPI-2 CUANDO SE CONTRASTA CON UN GRUPO CONTROL Y CON LA POBLACIÓN NORMATIVA? …”
    Libro electrónico
  19. 10879
    Publicado 2017
    Tabla de Contenidos: “…Cross-country empirical studies / chapter 10 Player’s value, field performance, financial performance and stock performance of European football clubs / chapter 11 Portfolio formation using the Fama-French five-factor model with modification of a profitability variable: An empirical study on the Indonesian stock exchange / chapter 12 Analysing the impact of the double taxation treaty on foreign direct investment in Indonesia / chapter 13 The determinants of working capital requirements of manufacturing firms in Indonesia / chapter 14 Audit opinion, internal control system, bureaucracy reform, political background and the level of corruption in government institutions / chapter 15 The effect of corporate governance mechanisms and managerial incentives on corporate tax avoidance in Indonesia / chapter 16 CEO tenure period and earnings management in the banking industry in Indonesia / chapter 17 Factors affecting business lending of regional development banks in Indonesia / chapter 18 The impact of competition on bank stability in ASEAN-5 / chapter 19 Making sense of an airline’s logo makeover: The case of garuda Indonesia / chapter 20 Reminiscent bundling and product type influence on intention to purchase: A case in music industry / chapter 21 The measurement of operational risk capital costs with an advanced measurement approach through the loss distribution approach (A case study in one of the Indonesia’s state-owned banks) / chapter 22 Hijab phenomenon in Indonesia: Does religiosity matter? …”
    Electrónico
  20. 10880
    Publicado 2018
    Tabla de Contenidos: “…4.1.3 Classification of the Currency Board Crises Model -- 4.2 The Standard Model -- 4.2.1 Model Outline -- 4.2.2 Discretionary Exchange Rate Policy -- 4.2.3 Fixed Exchange Rate and Time-Inconsistency -- 4.2.4 Political Cost of Devaluation and Incomplete Information -- 4.2.5 Possible Equilibria -- 4.2.5.1 FC equilibrium -- 4.2.5.2 ZC equilibrium -- 4.2.5.3 PC equilibria -- 4.2.5.4 Graphical Representation and Multiple Equilibria -- 4.2.5.5 Model Parameters and Types of Equilibria -- 4.2.6 Inter-temporal Linkages and Dynamic Effects -- 4.2.7 Stability of the Currency Board -- 4.2.7.1 Gains from Increased Credibility -- 4.2.7.2 Destabilization through Unemployment -- 4.2.7.3 Destabilization through a Sequence of PC Equilibria -- 4.2.7.4 Employment-Decreasing Shocks -- 4.2.7.5 Conclusion -- 4.2.8 Loss from Exit -- 4.3 The Model with Debt -- 4.3.1 Possible Effects of Foreign-Currency Debt on the Model Economy -- 4.3.2 Unemployment -- 4.3.3 Discretionary and Fixed Exchange Rate Policy -- 4.3.4 Model Equilibria -- 4.3.5 Graphical Representation and Interpretation of the Modified Model -- 4.3.6 Model Dynamics and Resilience to Shocks -- 4.3.7 Loss from Exit and Conclusion -- 5 Conclusion -- 5.1 Currency Board Selection -- 5.2 Currency Board Stability -- 5.3 The Risks -- 5.4 Outlook -- Appendices -- A Currency Boards 1849-2002 Overview -- B Currency Board Design Features -- C Derivation of Equations -- C.1 The Standard Model -- C.1.1 Derivation of Devaluation and Loss Equations (4.6) and (4.7) -- C.1.2 Proof that (4.9) Greater than (4.11) -- C.1.3 Difference Loss Fixed and Loss Discretionary Exchange Rate -- C.1.4 Derivation of Equation (4.19), Expected Devaluation -- C.1.5 Derivation of Unemployment Equation (4.24) -- C.1.6 Derivation of Unemployment Equation (4.28) -- C.1.7 Derivation of critical value for c (4.30)…”
    Libro electrónico