Skip to main content
    • by 
    •   52  
      MarketingClimate ChangeNutritionNatural Resources
How do police respond to and manage complaints of stalking? To answer this question, we conducted a 3-phase study. First, we reviewed the literature to identify risk management tactics used to combat stalking. Second, we asked a group of... more
    • by  and +1
    •   7  
      CriminologyPsychologyRisk ManagementLaw Enforcement
This paper examines the risk externalities stemming from the size of institutions. The problem of excessive risk taking and their potential external consequences are taken as a case example. Assuming (conservatively) that a firm risk... more
    • by 
    • Risk Management
Cardiovascular risk is poorly managed in women, especially during the menopausal transition when susceptibility to cardiovascular events increases. Clear gender differences exist in the epidemiology, symptoms, diagnosis, progression,... more
    • by 
    •   34  
      CardiologyGynaecologyObesityAtherosclerosis
This article examines dynamics of financial surveillance and risk-based regulation in the context of ongoing activities to combat money laundering and terrorist financing. Close analysis of the situation in the UK reveals entangled forms... more
    • by 
    •   10  
      International RelationsRegulatory ComplianceCritical Security StudiesInternational Political Economy
Stay ahead of the game: do not wait to be told to implement a risk-savvy culture by a regulator or governing body. Combined with a healthy culture, good risk documentation can save time, money and energy. But how can this be implemented?
    • by 
    •   11  
      Operations ManagementCorporate GovernanceCultureFinancial Risk Management
Large transportation projects such as highways are expensive, complex, and dynamic in nature. Acquiring large investment capitals for these projects is always a major challenge for every nation. To solve this problem, Vietnamese... more
    • by 
    •   6  
      TransportationRisk ManagementVietnamPublic Private Partnerships
Co-authored with Jonathan B. Wiener
    • by  and +1
    •   3  
      TerrorismRisk ManagementTerrorism and Counterterrorism
    • by 
    •   6  
      LogisticsRisk ManagementSupply ChainSupply Chain Risk Management
The Journal on Information Technology in Healthcare aims to improve the quality and safety of patient care, by encouraging and promoting the use of information technology (IT) in healthcare. The journal acts as a medium for the... more
    • by 
    •   3  
      Information SystemsRisk ManagementLibrary and Information Studies
The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data... more
    • by 
    •   9  
      Information SystemsInformation TechnologyInformation SecurityNetwork Security
this exceptionally clear and lucid book quickly became the standard overview of what are now called 'governmentality studies'.
    • by 
    •   11  
      International RelationsGovernmentPower (social)Governmentality
Megaprojects are large, they are constantly growing ever larger, and more and more are being built in what has been called the biggest investment boom in history. This chapter serves as an introduction to megaprojects, and to The Oxford... more
    • by 
    •   32  
      BusinessOrganizational BehaviorManagementBusiness Administration
This paper offers a joint estimation approach for forecasting probabilities of default and loss rates given default in the presence of selection. The approach accommodates fixed and random risk factors. An empirical analysis identifies... more
    • by  and +1
    • Risk Management
Actualmente las organizaciones que buscan permanecer en el futuro, deben hacer planeación estratégica en virtud de los cambio es que ocurren y lo vertiginoso de los mismos, es así que todas las organizaciones, llámense empresas privadas o... more
    • by 
    •   140  
      BusinessManagementBusiness AdministrationManagement Information Systems
The ambition for this inaugural edition of The Oxford Handbook of Megaproject Management is to become the ultimate source for state-of-the-art scholarship in the emerging field of megaproject management. The book offers a rigorous,... more
    • by 
    •   32  
      Organizational BehaviorManagementGeographyHuman Geography
The recent attention to the situatedness and spatiality of finance has consequences for understanding financial risks. The focus on geofinance and financial ecology requires investigation in risk interdependences at all levels... more
    • by 
    •   3  
      Risk ManagementBehavioural FinanceFinancial Geography
Woods, M. (2011). Risk Management in Organizations-An integrated case study approach. New York: Routledge.
    • by 
    •   19  
      Business AdministrationProject ManagementRisk GovernanceHuman Resource Management
    • by 
    • Risk Management
Nowadays, access to reliable information has become an essential factor leading to success in business. In this regard, adequate security of information and systems that process it is critical to the operation of all organizations.... more
    • by 
    •   9  
      Information SystemsRisk ManagementRisk assessmentInvestment
This Paper explores and summarises the Director's Duties of the UK Companies Act 2006 with emphasis on "the duty to promote the success of the company. Tags: Companies Act 2006 model articles, Companies Act 2006 summary companies act... more
    • by 
    •   146  
      Critical TheoryBusinessOrganizational BehaviorManagement
Structural models for pricing credit risk can be used to forecast the spread on risky bonds and for hedging credit risk. This article examines the forecasting accuracy of the Black -Scholes -Merton (BSM) model of risky debt using a data... more
    • by 
    •   8  
      LawRisk ManagementFinancial AnalysisStandard Deviation
The ISO/IEC 17020 and 17025 standards both include requirements for impartiality and the freedom from bias. Meeting these requirements for implicit cognitive bias is not a simple matter. In this article, we address these international... more
    • by  and +1
    •   10  
      ForensicsForensic AnthropologyForensic ScienceStandards
Company data became more complicated and vulnerable with the increase in the number of users. In spite of company policies and procedures being implemented, it is still not enough to address the access control gaps stated in ISO 27002... more
    • by 
    •   4  
      Risk ManagementBPORisk Based ApproachIdentity and Access Management
    • by 
    •   21  
      Human FactorsBehaviorRisk ManagementHealth Services Research
This article deals with the discipline of Business Continuity Planning and management. To secure a business, today it is important to have a holistic risk management program that includes protection from major disasters. Operational Risk... more
    • by  and +1
    •   7  
      Disaster risk managementBusiness Continuity PlanningRisk ManagementDisaster Management
Most of the tension resides between 1) Embedded, complexity-minded, multiscale/fractal localism (politics as an ecology/complex adaptive system), and 2) Abstract one-dimensional universalists and monoculturalism (politics as a... more
    • by 
    •   4  
      Complexity TheoryPoliticsRisk ManagementLocalism
Background. Business Continuity Management (BCM) is a response of management practitioners to the risk appearing in a turbulent environment. Recent publications consider BCM in pragmatic categories often deprived of its embedding in... more
    • by 
    •   5  
      ManagementOrganizational TheoryRisk ManagementBusiness Continuity Management
This Handbook / Guidance Note has been prepared to identify and flag issues a prudent underwriter ought to consider and evaluate relating to the steel industry risk selection, determination and calculation of loss estimates when deciding... more
    • by 
    •   12  
      Supply Chain ManagementRisk ManagementRISK MANAGEMENT (Engineering)Insurance and reinsurance
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their... more
    • by 
    •   8  
      Information WarfareSecurity StudiesSociology of RiskRisk Management
Puji syukur kami penjatkan kehadirat Allah SWT, yang atas rahmat-Nya sehingga kami dapat menyelesaikan penyusunan makalah yang berjudul "Pengendalian Kualitas Sebagai Strategi Menghadapi Risiko Operasional ". Penulisan makalah ini... more
    • by 
    • Risk Management
The study was conducted to assess the level of compliance with regulatory guidelines on anti-money laundering (AML) in the scheduled commercial banks in India, and to understand the bottlenecks in AML... more
    • by  and +2
    •   2  
      Regulatory ComplianceRisk Management
This paper discusses business continuity management (BCM) and its role in contemporary financial institutions. BCM is a nascent disaster preparedness and recovery strategy that seeks to protect vital business operations from disruptions.... more
    • by 
    •   6  
      GovernmentalityResilienceCritical Security StudiesRisk Management
The construction project management is about quality, timely, and costly managing construction inputs and outputs. However, its achievement continues to present a major challenge to most large construction projects all over the world due... more
    • by 
    •   6  
      Monte Carlo SimulationRisk ManagementRegression ModelsActivity Duration
The ART of Risk Management Nicht erst seit dem 11. September haben Lösungen des alternativen Risikotransfers /der alternativen Risikofinanzierung stark an Bedeutung gewonnen. Wir sprachen mit Chris Fischer Hirs von Allianz Risk Transfer... more
    • by 
    • Risk Management
Honolulu is susceptible to coastal flooding hazards. Like other coastal cities, Honolulu&s long-term economic viability and sustainability depends on how well it can adapt to changes in the natural and built environment. While there is a... more
    • by 
    •   17  
      Environmental ScienceTransportationRisk ManagementEmergency Management
In this article we discuss the medical diagnoses underlying the most common lawsuits involving pediatricians in the United States. Where applicable, specific and general risk-management techniques are noted as a means of increasing... more
    • by 
    •   10  
      PediatricsPatient SafetyRisk ManagementMedicine
In 1950 Markowitz first formalized the portfolio optimization problem in terms of mean return and variance. Since then, the mean-variance model has played a crucial role in single-period portfolio optimization theory and practice. In this... more
    • by 
    •   15  
      Computational EconomicsEconometricsModeling and SimulationRisk Management
    • by 
    •   12  
      Computer ScienceDecision MakingEnvironmental ManagementEnvironmental Monitoring
Abstract: In the context of the crisis of industrial modernity, adaptive capacity to new climatic and social-economic risks depends on the study of the perceptions and understan- ding that the involved actors have of those risks. Through... more
    • by 
    •   7  
      GeographyPerceptionClimate ChangeClimate Change Adaptation
Purpose-The purpose of this paper is to understand whether firms evolve towards more comprehensive postures of CSR and what strategic factors drive the change. Design/methodology/approach-The approach is deductive-inductive research based... more
    • by 
    •   7  
      Corporate Social ResponsibilityCorporate GovernanceChange ManagementRisk Management
However, such differences between countries may be due more to differences in the medical systems rather than differences in the quality of patient care. The United States has a very different medical environment, partly because of the... more
    • by 
    •   12  
      International CooperationRisk ManagementMedical errorsCanada
As modern information systems become increasingly business-and safety-critical, it is extremely important to improve both the trust that a user places in a system and their understanding of the risks associated with making a decision.... more
    • by 
    •   7  
      Data AnalysisCognitionRiskWeb Services
Location-Based Services (LBS) are becoming more prevalent. While there are many benefits, there are also real privacy risks. People are unwilling to give up the benefits - but can we reduce privacy risks without giving up on LBS entirely?... more
    • by  and +1
    •   9  
      Location Based ServicesPrivacyRisk ManagementMobile Computing
Groundwater resources are traditionally overexploited in arid and drought-prone regions with profitable irrigated agriculture, and the depletion of this groundwater results from a combination of the physical scarcity of surface sources... more
    • by 
    •   9  
      Ecological EconomicsRisk ManagementRisk assessmentApplied Economics
As the power business is moving into new territory with market deregulation, there is a need for expressing a view on financial and physical risks. By means of an example published earlier in this magazine, we discuss what could be... more
    • by 
    •   3  
      Risk ManagementDecision making processPower Market
This article reflects on my thoughts about what CEO"s make and how much effort they provide their company that they oversee vs how much money they make.
    • by 
    •   5  
      Corporate GovernanceCEO compensationRegulationRisk Management
Managing risks in construction projects has been recognised as a very important management process in order to achieve the project objectives in terms of time, cost, quality, safety and environmental sustainability. However, until now... more
    • by 
    •   15  
      Civil EngineeringProject ManagementConstruction ManagementRisk
The concept of covert channels has been visited frequently by academia in a quest to analyse their occurrence and prevention in trusted systems. This has lead to a wide variety of approaches being developed to prevent and identify such... more
    • by 
    •   11  
      Information SecurityRisk ManagementCovert ChannelsInformation Assurance