Showing 1 - 10 of 1,025
has critical importance to drive empirical vulnerability methods. The purpose of this paper is to evaluate the damage …Empirical, theoretical or hybrid methods can be used for the vulnerability analysis of structures to evaluate the … seismic damage data and to obtain probability damage matrices. The information on observed structural damage after earthquakes …
Persistent link: https://www.econbiz.de/10010996580
Quantitative risk assessments of debris flows and other hydrogeological hazards require the analyst to predict damage …
Persistent link: https://www.econbiz.de/10010780109
Persistent link: https://www.econbiz.de/10008775679
flood extent and pattern which helps in the vulnerability assessment and also to find out the intensity of damages to … method was used to delineate flood extent which was used for calculating flood duration and depth. Further, vulnerability … assessment of the paddy crop was done to obtain intensity of damage in the area from the 2003 and 2008 floods. Field survey was …
Persistent link: https://www.econbiz.de/10011241140
Although there is good reason to expect that the growth of information work and information technology will significantly affect the trade-offs inherent in different structures for organizing work, the theoretical basis for these changes remains poorly understood. This paper seeks to address...
Persistent link: https://www.econbiz.de/10009214186
Over the past few years, the implementation of IT governance concept has increasingly gained the attention of the Romanian companies’ senior management. IT governance is a comprehensive term that encompasses IT processes, IT resources, information, business and legal issues, and all concerns...
Persistent link: https://www.econbiz.de/10010542055
This paper develops empirical proxy measures of information technology (IT) risk and incorporates them into the usual empirical models for analyzing IT returns: production function and market value specifications. The results suggest that IT capital investments make a substantially larger...
Persistent link: https://www.econbiz.de/10009209236
risk tolerance across different units or processes, while operational managers examine how the weakness and vulnerability …
Persistent link: https://www.econbiz.de/10009350639
The concept of governance has an already old contour: the system by which business corporations are directed and controlled. The most praised principles regarding shareholder rights, transparency and board accountability now constitute the foundation for new tendencies evolved from such ground....
Persistent link: https://www.econbiz.de/10009386003
The continuous development of the new IT technologies was followed up by a rapid integration of them at the organization level. The management of the organizations face a new challenge: structural redefinition of the IT component in order to create plus value and to minimize IT risks through an...
Persistent link: https://www.econbiz.de/10009416367