4,850 Hits in 5.5 sec

Incorporating Data Inaccuracy Considerations in Process Models [chapter]

Yotam Evron, Pnina Soffer, Anna Zamansky
2017 Lecture Notes in Business Information Processing  
In this paper we propose a conceptual framework for incorporating data inaccuracy considerations in process models to support an analysis of data inaccuracy at design time and empirically evaluate its  ...  However, this assumption does not always hold, and situations of data inaccuracy might occur which bear substantial consequences to the process and to business goals.  ...  Acknowledgement The first and the second authors are supported by the Israel Science Foundation under grant agreement no. 856/13.  ... 
doi:10.1007/978-3-319-59466-8_19 fatcat:ktazyb6pdraljikbosza6xql6i

Auditing Data Reliability in International Logistics - An Application of Bayesian Networks

Lingzhe Liu, Hennie A. M. Daniels, Ron Triepels
2014 Proceedings of the 16th International Conference on Enterprise Information Systems  
Data reliability closely relates to the risk management in international logistics. Unreliable data negatively affect the business in various ways.  ...  Due to the competence specialization and cooperation among the business partners in a logistics chain, the business in a focal company is inevitably dependent on external data sources from its partner,  ...  In such a case, data reliability analysis using business intelligence (BI) would be a useful instrument for detecting inaccuracies in the external source, regarding the latter as business exceptions in  ... 
doi:10.5220/0004987507070712 dblp:conf/iceis/LiuDT14 fatcat:5bupoldwqbefpk3intngximwky

Analysis of Compliance and Supply Chain Security Risks Based on ISO 28001 in a Logistic Service Provider in Indonesia

Elisa Kusrini, Kholida Hanim
2021 International Journal of Safety and Security Engineering  
Risk of goods and security incidents, such as theft, boycott, smuggling and terrorism are likely to occur in a shipping process, therefore risk controls are needed to reduce the adverse effects.  ...  The purpose of this research is to analyse compliance & supply chain security risks and propose a mitigation based on ISO 28001 in a logistic service provider in Indonesia.  ...  The 12 risks included the damage to the goods in the process of loading the goods (14) , the inaccuracy in the number of goods in the process of loading the goods (15) , the damage to the goods in the  ... 
doi:10.18280/ijsse.110202 fatcat:o4pqpweksnd5jav3xbnmhwcslu


Yanti Yanti
2022 Journal of Applied Finance & Accounting  
The process of collecting data is through interviews and observation. Based on the evaluation, there are weaknesses in internal control in the revenue cycle applied by the company.  ...  This study aimed to evaluate the revenue cycle implemented in the Exhibition Company to identify the weaknesses and limitations of internal controls related to revenue cycles by referring to the COSO's  ...  Risk Assessment Risk Assessment is a dynamic process to identify and analyze risks in achieving the company's objectives.  ... 
doi:10.21512/jafa.v8i1.8122 fatcat:iofhekgrzrawxhupxah2wsus2a

A Review on Risk Management in Information Systems: Risk Policy, Control and Fraud Detection

Hamed Taherdoost
2021 Electronics  
Both the development and establishment of an information system within an organization contributes to mitigating business-related risks and also creates new types of risks associated with its establishment  ...  Continuity planning and fraud detection policy development are among the many critically important practices conducted through risk management that aim to mitigate risk factors, their vulnerability, and  ...  Simply, the fraud risks should be clearly identified in all aspects, directly-related and indirectly related, and further assessed concerning their impact and probability.  ... 
doi:10.3390/electronics10243065 fatcat:wzgzmtcv5bcp7oolxbvzssctn4

Security Risk Assessment Framework for Offshore Gas and Oil Platform in East Africa

Mohamed Kadar Abdiaziz, Zi Jun Feng, Ammar Mohammed Hussain Al-Nahari, Hashem Musaed Ahemd Al-Qarwaei
2021 Zenodo  
risk assessment approach via the research methodology process.  ...  Surveys, visits, interviews, and questionnaires are among the data sources used to gather the information needed to test the model and conduct preliminary validation studies on offshore platform risk assessment  ...  Following the risk assessment, the mitigation curve was relocated to the lower level of potential risks, and some related probability cost was added, as shown in Figure 1 .  ... 
doi:10.5281/zenodo.5787082 fatcat:6e2vo4b5pvfxrikqfz27jpz6c4

Global Supply Chain Risk Management

Mouad Ben-Faress, Abdelmajid Elouadi, Driss Gretete
2019 American Journal of Engineering and Applied Sciences  
As part of a systematic approach we will start our research by studying the supply chain risk assessments, evaluation and analyzing the different risks which impact the global performance of supply chain  ...  and the way for good management and monitoring using one of the proven methods as Supply Chain Operations Reference (SCOR) which has been proposed for modeling and estimating intermittent demand data.  ...  in the study and responsible for the manuscript as it moves through the entires punlication process.  ... 
doi:10.3844/ajeassp.2019.147.155 fatcat:h2jm7hcclrbhhhi4xkm3xm7gfe

Evaluation of PNT Error Limits Using Real World Close Encounters from AIS Data

Evelin Engler, Paweł Banyś, Hans-Georg Engler, Michael Baldauf, Frank Sill Torres
2021 Journal of Marine Science and Engineering  
This paper addresses the question to which extent inaccuracies in position (P), navigation (N), and timing (T) data impact the reliability of collision avoidance.  ...  This study assumes that in these situations, erroneous data can lead to an incorrect assessment of the situation with regard to existing collision risks.  ...  Data Availability Statement: The AIS data used for this analysis were provided by the German Waterways and Shipping Administration (WSV) for research purposes.  ... 
doi:10.3390/jmse9020149 fatcat:lnx4neceindidhwnlyidxy34jm

Managing Operational Risk Related to Microfinance Lending Process using Fuzzy Inference System based on the FMEA Method: Moroccan Case Study

Youssef Lamrani Alaoui, Mohamed Tkiouat
2017 Scientific Annals of Economics and Business  
Considering the limitation of traditional failure mode and effect analysis (FMEA) method in assessing and classifying risks, the methodology adopted in this study focuses on developing a fuzzy logic inference  ...  The purpose of this paper is to identify, assess and prioritize the root causes of failure within the microfinance lending process (MLP) especially in Moroccan microfinance institutions.  ...  Tarantino and Cernauskas (2009) note that ORM encompasses all the process of identifying, assessing, and developing strategies to manage and mitigate operational risk.  ... 
doi:10.1515/saeb-2017-0029 fatcat:hr3whrzwnngxvbrwu66iwgnage

Learning from Enforcement Cases to Manage GDPR Risks

Saeed Akhlaghpour, The University of Queensland (Australia), Farkhondeh Hassandoust, Farhad Fatehi, Andrew Burton-Jones, Andrew Hynd, Auckland University of Technology (New Zealand), Monash University (Australia), The University of Queensland (Australia), Holding Redlich Lawyers (Australia)
2021 MIS Quarterly Executive  
Organizational Processes and Measures Risks Risk mitigation measures • Appoint a DPO and publish the DPO's contact details. • Devise a breach-detection process, carry out a risk-impact assessment and  ...  managers to carry out proper risk assessments and identify risk mitigation measures.  ...  Lessons for Data Access Risks Risk mitigation measures • Ensure that data access requests are processed within the predetermined deadline (within one month of receiving the request in most cases). • Inform  ... 
doi:10.17705/2msqe.00049 fatcat:xopjjpeawnhdzf3dxdepbzyvu4

Using FMEA for Supply Chain Risk Management [chapter]

2015 Managing Supply Chain Risk  
FMEA is a long-standing technique used to assess the risk failures in product and process designs. All potential failures are evaluated in terms of likelihood, severity, and detectability.  ...  Kleindorfer and Saad (2005) presented a three-step process: (1) specifying sources of risks and vulnerabilities, (2) assessment, and (3) mitigation, while both Jüttner et al. (2003) and Hallikasa et. al  ...  McCulloch, and Ms. Priyanka Parekh.  ... 
doi:10.1201/b18610-3 fatcat:v7v4zetwwjdgrgqfb54sftcqwy


Rheza Aulia Ramadhan, Ananda Vania Arisa Putri, Bambang Purwanggono Sukarsono
2021 J@ti Undip: Jurnal Teknik Industri  
XYZ does not yet have structured risk management to identify and mitigate risks that occur primarily in supply chain functions.  ...  HOR is used to identify risk events, risk agents in the supply chain and design mitigation strategies for risk agents based on ARP (Aggregate Risk Potential) value.  ...  The mapping process will facilitate the identification of risk agents and risk events that occur in business activities in interviews and observations with an expert.  ... 
doi:10.14710/jati.16.4.235-241 fatcat:xgv64hh565ec7horkrq26t23zm

Group support system and explanatory feedback: An experimental study of mitigating halo effect

Intiyas Utami, Sutarto Wijono
2015 Journal of Economics, Business & Accountancy  
Comprehensive assessment potentially leads to halo effect that will affect accuracy of auditors decision-making process. Biased initial audit decision will potentially influence final audit decision.  ...  This re-search aims to empirically show that halo effect can be mitigated by explanatory feedback and Group Support System (GSS).  ...  Holistic data assessment enables auditor to gain better understanding of client's business.  ... 
doi:10.14414/jebav.v18i3.511 fatcat:4mljn5mz5rak5gs4fy6jqp75lu

The Role of RFID Technology in Supply Chain Risk Management [chapter]

May Tajima
2011 Designing and Deploying RFID Applications  
These data would be useful in improving a firm's risk assessment in terms of estimating and updating the severity and likelihood of various supply disruptions.  ...  examine the existing mitigation approaches for dealing with RFID's visibility-related risks.  ...  Radio Frequency Identification (RFID), a method of remotely storing and receiving data using devices called RFID tags, brings many real business benefits to today world's organizations.  ... 
doi:10.5772/18253 fatcat:xqgf7pozcnethb6fdnvu74w54i

Risk and Supply Chain Mitigation Analysis Using House of Risk Method and Analytical Network Process (A Case Study on Palm Oil Company)

Shelvy Kurniawan, Denny Marzuky, Rio Ryanto, Vanny Agustine
2021 Journal the Winners: Economics, Business, Management, and Information System Journal  
Data analysis procedure involved Supply Chain Operations Reference (SCOR), House of Risk (HOR) 1 and Analytic Network Process (ANP).  ...  Furthermore, the aim was to determine priority of risk agents and risk mitigation actions.  ...  The next stage is the data processing stage which includes risk analysis. In data processing, there are several methods such as Failure Mode and Effect Analysis (FMEA) and HOR.  ... 
doi:10.21512/tw.v22i2.7056 fatcat:4pv2k5banngg7hszwaq7m25c3u
« Previous Showing results 1 — 15 out of 4,850 results