دانلود و نمایش مقالات مرتبط با Risk Management::صفحه 1

دانلود بهترین مقالات isi همراه با ترجمه فارسی

کارابرن عزیز، مقالات سایت ( همگی جزو مقالات isi می باشند) بالاترین کیفیت ترجمه را دارند، ترجمه آنها کامل و دقیق می باشد (حتی محتوای جداول و شکل های نیز ترجمه شده اند) و از بهترین مجلات isi مانند IEEE، Sciencedirect، Springer، Emerald و ... انتخاب گردیده اند.

پشتیبانی
اپلیکشن اندروید
آرشیو مقالات
ورود اعضا
توجه توجه توجه !!!!
تمامی مقالات ترجمه شده ، انگلیسی و کتاب های این سایت با دقت تمام انتخاب شده اند. در انتخاب مقالات و کتاب ها پارامترهای جدید بودن، پر جستجو بودن، درخواست کاربران ، تعداد صفحات و ... لحاظ گردیده است. سعی بر این بوده بهترین مقالات در هر زمینه انتخاب و در اختیار شما کاربران عزیز قرار گیرد. ضمانت ما، کیفیت ماست.
نرم افزار winrar

از نرم افزار winrar برای باز کردن فایل های فشرده استفاده می شود. برای دانلود آن بر روی لینک زیر کلیک کنید
دانلود

پیوندهای کاربردی
پیوندهای مرتبط
نتیجه جستجو - Risk Management

تعداد مقالات یافته شده: 77
ردیف عنوان نوع
1 Wind farm security: attack surface, targets, scenarios and mitigation
Wind farm security: attack surface, targets, scenarios and mitigation-2017
Article history:Received 28 December 2016Revised 3 February 2017Accepted 6 February 2017Available online 24 March 2017Keywords:Wind FarmsRenewable Energy Generation Industrial Control Systems Attack SurfaceAttack Targets Attack Scenarios Attack MitigationAs modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to myriad threats. This paper attempts to clarify the gaps in the understanding of wind farm threats and their implications. The paper describes the anatomy of a generic wind farm and the attack vectors that can be leveraged to target its information technol- ogy, industrial control and physical assets. It discusses attack scenarios involving unautho- rized wind turbine control, wind turbine damage, wind farm disruption and damage, and substation disruption and damage. Additionally, the paper highlights mitigation techniques that provide robust security coverage and reduce the negative cyber and physical impacts. The attack surface, targets, scenarios and mitigation techniques presented in this paper are common across wind farm deployments. However, it is still possible to add details about the unique aspects of wind farm assets, configurations and operations in order to develop a holistic risk management program geared for a specific wind farm deployment.© 2017 Elsevier B.V. All rights reserved.
Keywords:Wind Farms | Renewable Energy Generation | Industrial Control Systems | Attack Surface | Attack Targets | Attack Scenarios | Attack Mitigation
مقاله انگلیسی
2 Security analysis of an advanced metering infrastructure
تجزیه و تحلیل امنیت یک زیرساخت اندازه گیری پیشرفته-2017
Article history:Received 28 December 2016Revised 23 February 2017Accepted 25 February 2017 Available online xxxKeywords:Advanced Metering Infrastructure Smart MetersData Collectors Attack Vectors Targets Functionality Attacks ImpactsAn advanced metering infrastructure is an integrated system of smart meters, communica- tions networks and data management systems designed to support the safe, efficient and re- liable distribution of electricity while providing advanced functionality to energy customers. Unfortunately, sophisticated cyber attacks on advanced metering infrastructures are a clear and present danger. The most devastating scenario involves a computer worm that traverses advanced metering infrastructures and permanently disables millions of smart meters.This paper presents a security analysis of an advanced metering infrastructure com- prising more than one million smart meters, 100+ data collectors and two meter data man- agement systems. Specifically, it provides detailed evaluations of the attack surface, targets– especially the critical data collectors – and their functionality, and possible attacks and their impacts. The systematic identification of each target and its functionality, and possi- ble attacks and their direct impacts, are essential to understanding the security landscape as well as specifying and prioritizing mitigation efforts as part of a robust risk management program. Although this work is based on an analysis of one large advanced metering infras- tructure, strong attempts have been undertaken to extract and articulate the commonalities when describing the attack surface, targets, possible attacks and their impacts. Thus, the re- sults presented in this paper can be used as a foundation upon which the unique aspects of an advanced metering infrastructure can be added to create a robust risk management program geared for the specific deployment.© 2017 Elsevier B.V. All rights reserved.
Keywords:Advanced Metering Infrastructure | Smart Meters | Data Collectors | Attack Vectors | Targets | Functionality | Attacks | Impacts
مقاله انگلیسی
3 منحنی های شدت – مدت زمان – تناوب رسوب و عدم قطعیت های آنها برای فلات گاپ
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 22
زیرساخت های مهندسی مثل چاه های فاضلاب سطحی و پل ها معمولا" با استفاده از مفهوم منحنی های شدت – مدت زمان – تناوب، طراحی می شوند که فرض می کنند که اتفاق افتادن الگوها و توزیع های ته نشینی به ازنظر فضایی درداخل ناحیه آبریزگاه مشابه هستند و درسرتاسر بازه عمر زیرساخت های (ثابت و ساکن)، بی تغییر باقی می مانند. برمبنای این قضیه که تغییرات آب و هوایی، تغییرپذیری فضایی و موقتی الگوهای ته نشینی را تغییر خواهند داد و عدم دقت در تخمین منحنی های شدت – مدت زمان – تناوب، ممکن است اتفاق بیفتد. همینطور قبل از تولید منحنی های شدت – مدت زمان – تناوب، تحلیل گرایشات بیشینه ته نشینی سالانه، واجب است. هدف این مطالعه تخمین شدت های ته نشینی و عدم قطعیت های آنها (حدهای پایین و بالا) برای مدت زمان های 125/0، 25/0، 5/0، 1، 2، 4 و 6 ساعت و دوره های بازگشت 2، 10، 25، 50 و 100 ساله در فلات گاپ در شمال استان کیپ در آفریقای جنوبی با استفاده از توزیع مقدار نهایی تعمیم داده شده است. بیشینه ته نشینی سالانه از داده های بلند مدت ته نشینی (1918 تا 2014) برای چهار ایستگاه هواسنجی (پست ماسبرگ، دوگلاس، کورومان و گروبلرشوپ) که از خدمات آب و هوایی آفریقای جنوبی منبع می گیرند استخراج شد. به صورت میانگین، بالاترین شدت های ته نشینی تخمین زده شده برای این فلات دارای محدوده ای از 2/4 میلیمتر بر ساعت برای مدت زمان طوفان 6 ساعته تا 8/55 میلیمتر بر ساعت برای 125/0 ساعت در دوره زمانی بازگشت 2 ساله بود. در دوره بازگشت 100 ساله، این شدت دارای محدوده ای از 3/13 میلیمتر بر ساعت برای مدت زمان 6 ساعت تا 5/175 میلیمتر بر ساعت برای مدت زمان 125/0 ساعت بود. حد پایین عدم قطعیت دارای محدوده ای از 7/11% در دوره بازگشت 2 ساله تا 26% در دوره بازگشت 100 ساله و از 8/12% تا 4/58% برای حد بالایی برای دوره های بازگشت مربوطه بود. این روش می تواند به صورت فرمول سازی خط مشی برای طراحی فاضلاب سطحی و زیرساخت های مدیریت سیلاب در فلات گاپ یکپارچه سازی شود، جاییکه معدنکاری، فعالیت اقتصادی اصلی است.
کلیدواژه ها: منحنی های شدت | مدت زمان – تناوب رسوب | سطوح عدم قطعیت | تابع توزیع مقدار نهایی تعمیم داده شده | فلات گاپ
مقاله ترجمه شده
4 Exploring dependency based probabilistic supply chain risk measures for prioritising interdependent risks and strategies
بررسی اقدامات ریسک وابستگی بر اساس زنجیره تامین احتمالاتی برای اولویت بندی ریسک های وابسته و استراتژی-2017
In this paper, we introduce an integrated supply chain risk management process that is grounded in the theoretical framework of Bayesian Belief Networks capturing interdependency between risks and risk mitigation strategies, and integrating all stages of the risk management process. The proposed process is unique in four different ways: instead of mapping the supply network, it makes use of Failure Modes and Effects Analysis to model the risk network which is feasible for modelling global supply chains; it is driven by new dependency based risk measures that can effectively capture the network wide impact of risks for prioritisation; it utilises the concept of Shapley value from the field of cooperative game theory to determine a fair allocation of resources to the critical risks identified; and the process helps in prioritising potential risk mitigation strategies (both preventive and reactive) subject to budget and resource constraints. We demonstrate its application through a simulation study.
Keywords: Supply chain risk management | Bayesian Belief Networks | Failure Modes and Effects Analysis |Risk measures | Risk mitigation strategies
مقاله انگلیسی
5 Integrating information quality dimensions into information security risk management (ISRM)
ابعاد کیفیت اطلاعات تکمیلی در مدیریت ریسک امنیت اطلاعات (ISRM)-2017
Article history:Keywords: Information security Risk management Information qualityInformation Security Risk ManagementInformation security is becoming an important entity to most organizations due to current trends in information transfer through a borderless and vulnerable world. This gives more concerns and aware or- ganization to apply information security risk management (ISRM) to develop effective and economically- viable control strategies. Even though there are numerous ISRM methods that are readily available, most of the ISRM methods prescribe a similar process that leads to establish a scope of the assessment, col- lecting information, producing intermediary information, and finally using the collected information to identify their security risks and provide a measured, analyzed security profile of critical information as- sets. Based on the “garbage in-garbage out” phenomenon, the success of ISRM planning tremendously depends on the quality of input information. However, with the amount, diversity and variety of infor- mation available, practitioners can easily deflects with grown information and becoming unmanageable. Therefore this paper contribute as a stepping stone to determine which IQ dimensions constitute the quality of the information throughout the process of gathering information during ISRM. Seems to accu- rately define the attributes of IQ dimensions, IQ needs to be assessed within the context of its generation. Thus, papers on IQ web were assessed and comparative analysis was conducted to identify the possible dimensions for ISRM. Then, online survey using likert structured questionnaire were distributed among a group of information security practitioners in Malaysia (N = 150). Partial least square (PLS) analysis re- vealed that dimension accuracy, amount of data, objective, completeness, reliability and verifiability are significantly influence the quality of information gathering for ISRM. These IQ dimensions can guide prac- titioners in the process of gathering quality and complete information in order to make a plan that leads to a clear direction, and ultimately help to make decisions that lead to success.© 2017 Elsevier Ltd. All rights reserved.
Keywords: Information security | Risk management | Information quality | Information Security Risk Management
مقاله انگلیسی
6 Developing lean and responsive supply chains: A robust model for alternative risk mitigation strategies in supply chain designs
توسعه زنجیره های تامین پاسخگو و ضعیف: یک مدل قوی برای استراتژی های کاهش خطر در طرح های زنجیره تامین-2017
This paper investigates how organization should design their supply chains (SCs) and use risk mitigation strategies to meet different performance objectives. To do this, we develop two mixed integer nonlinear (MINL) lean and responsive models for a four-tier SC to understand these four strategies: i) holding back-up emergency stocks at the DCs, ii) holding back-up emergency stock for transshipment to all DCs at a strategic DC (for risk pooling in the SC), iii) reserving excess capacity in the facilities, and iv) using other facilities in the SC’s network to back-up the primary facilities. A new method for designing the network is developed which works based on the definition of path to cover all possible disturbances. To solve the two proposed MINL models, a linear regression approximation is suggested to linearize the models; this technique works based on a piecewise linear transformation. The efficiency of the solution technique is tested for two prevalent distribution functions. We then explore how these models operate using empirical data from an automotive SC. This enables us to develop a more comprehensive risk mitigation framework than previous studies and show how it can be used to determine the optimal SC design and risk mitigation strategies given the uncertainties faced by practitioners and the performance objectives they wish to meet.
Keywords: Supply chain management | Network design | Risk management | Robust optimization | Responsiveness
مقاله انگلیسی
7 مدیریت ریسک مالی
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 12
بررسی ماژول
موضوع مدیریت ریسک مالی همچنان موضوع غالب اخبار مالی جهانی است. عواقب بحران مالی جهانی سال 2008 در بازارهای مالی جهانی و محلی احساس خواهد شد و در وهله¬ی زمانی به طول می¬انجامد. درس اصلی این است که یادگیری درباره¬ی نقش و درک بالای مدیریت ریسک مالی برای همه نهادهای اقتصادی (شرکت های کوچک یا بزرگ) در بازارهای مالی بین المللی ضروری است. البته یک رویکرد مدیریتی برای کمک به کارآفرینان و مدیران جدید شناسایی، سنجش و مدیریت ریسک های القا شده در عملیات کسب و کار روزانه و معاملات بدست آمد. همچنین مطالعه مواد مورد بحث این دوره که برای آماده سازی مناسب هستند عبارتند از:
 گواهی مدیریت ریسک مالی ارائه شده توسط موسسه GARP (www.garp.org).
 منشور گواهی تحلیلگر مالی ارائه شده توسط موسسه (CFA (www.cfainstitute.org.
این راهنما امکان مرور کلی مدیریت ریسک مالی را برای شما فراهم می¬کند. اطلاعات دقیق در DLWO قابل دسترسی است (https://dlwo.dem.hva.nl).
مقاله ترجمه شده
8 Flexible supply chain planning based on variable transportation modes
برنامه ریزی زنجیره تامین انعطاف پذیر بر مبنای انواع حمل و نقل متغیر-2017
This paper investigates the application of diverse transportation modes for a global supply chain (SC) in stochastic environments. The motivation of our paper is to investigate the idea of enabling a global flexible SC with disruptive risks in making it less vulnerable by applying diverse transportation modes which is also our first contribution. The flexibility stems from the fact that transportation modes with a low-speed transportation contain latent time buffers that can be used by accelerating transport activities. This represents a promising approach to make supply chains (SCs) more flexible and to establish an additional degree of freedom in order to manage stochastic events like minor disruptions or serious catastrophes. In this paper, a stochastic programming model for a multi-stage multi-product SC is de veloped. SC partners, including multiple suppliers, a processing center, two assembling centers, multiple distribution centers and retailers, are incorporated into the model. The second contribution of this paper is that different types of possible future catastrophic disruptions are quantified and included in the model. SC catastrophic disruptions like transportation delays or the fact that a SC node is disrupted by a serious catastrophe are stochastic factors of our model. The model is solved by using PySP, a specific modeling and stochastic programming framework. In order to show the quality of solutions of the sto chastic programming model (SP solutions), a large amount of scenarios is generated to simulate the real case for each instance. The expected SC costs for these scenarios will be evaluated based on SP solutions and wait-and-see solutions, which are benchmarks. In addition, decision makers with neutral, optimistic and pessimistic attitudes regarding the occurrence of disruptions are also simulated and evaluated in the computational experiments. Managerial insights are concluded from computational results. The most important conclusion is that proper transportation mode planning enables a flexible global supply chain. Further conclusions like the quality of stochastic solutions and solutions of simulating decision makers with neutral, optimistic and pessimistic attitudes, as well as the most beneficial transportation modes in SCs with uncertain environments are proposed based on the computational results.
Keywords: Variable transportation mode | Supply chain risk management | Flexible supply chain | Progressive Hedging (PH) algorithm | Stochastic programming
مقاله انگلیسی
9 An information processing perspective on supply chain risk management: Antecedents, mechanism, and consequences
یک دیدگاه پردازش اطلاعات در مورد مدیریت ریسک زنجیره تامین: سابقه، مکانیزم و پیامدهای آن-2017
Although the extant literature recognizes that supply chain risk (SCR) information plays a fundamental and critical role in supply chain risk management (SCRM), little is known about how firms process SCR information for SCRM. Based on information processing theory, we propose an SCR information processing system comprising three components, namely risk information sharing, risk analysis and assessment, and risk sharing mechanism, to manage SCR. Drawing on the literature on organizational change, we consider three organizational, factors, namely SCRM culture diffusion, SCRM team support, and SCRM strategy alignment, being antecedents to the system. Furthermore, we examine the consequences of the system. Thus, we propose a conceptual model linking organizational antecedents, SCR information processing system, and operational performance. We collect data from 350 Chinese manufacturing firms to test the model and obtain the following findings: (1) SCRM culture diffusion and SCRM team support positively influence risk information sharing and risk analysis and assessment, while SCRM strategy alignment only positively influences risk information sharing. (2) Risk information sharing positively influences risk analysis and assessment, and in turn risk sharing mechanism; risk information sharing has a direct effect on risk sharing mechanism. (3) Risk sharing mechanism positively influences operational performance. We contribute to research and practice by offering an information processing perspective on SCRM.
Keywords: Supply chain risk management | Information processing theory | Supply chain management
مقاله انگلیسی
10 Rethinking the role of partnerships in global supply chains: A risk-based perspective
بازاندیشی نقش مشارکت در زنجیره تامین جهانی: دیدگاه مبتنی بر ریسک-2017
Growing global operations on one hand drive cost down substantially but on the other hand make the supply chain more vulnerable to numerous risks. Confronted with increased risks, companies are more inclined to form partnerships and engage in supply chain collaboration consciously. Such inclination for partnerships simulates thinking of its incentives behind in association with risk management. However, traditional literature, confining its focus to individual enterprise, echoes inadequately on the role of partnerships in supply chain risk management. To bridge this gap, this paper refines the notion of risk in supply chains and proposes a model of supply chain risk system which is able to convey a risk-based view of partnerships in global supply chains. Through analytical inference it is shown that the level of collaboration among partners contributes to the resilience of supply chains. This implies that partnerships can positively affect the integration of supply chain risk system, thus benefiting operations in supply chains. A simulation program has been developed with aim to demonstrate the practical feasibility of the proposed model. Implemented in simulation, two sets of experiments have been conducted for testing the model in actual business scenarios. The experimental results manifest high consistence with the analytical prediction.
Keywords: Partnerships | Supply chain risk management | Resilience | Modeling and simulation
مقاله انگلیسی
موضوعات
footer