A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Incorporating Data Inaccuracy Considerations in Process Models
[chapter]
2017
Lecture Notes in Business Information Processing
In this paper we propose a conceptual framework for incorporating data inaccuracy considerations in process models to support an analysis of data inaccuracy at design time and empirically evaluate its ...
However, this assumption does not always hold, and situations of data inaccuracy might occur which bear substantial consequences to the process and to business goals. ...
Acknowledgement The first and the second authors are supported by the Israel Science Foundation under grant agreement no. 856/13. ...
doi:10.1007/978-3-319-59466-8_19
fatcat:ktazyb6pdraljikbosza6xql6i
Auditing Data Reliability in International Logistics - An Application of Bayesian Networks
english
2014
Proceedings of the 16th International Conference on Enterprise Information Systems
english
Data reliability closely relates to the risk management in international logistics. Unreliable data negatively affect the business in various ways. ...
Due to the competence specialization and cooperation among the business partners in a logistics chain, the business in a focal company is inevitably dependent on external data sources from its partner, ...
In such a case, data reliability analysis using business intelligence (BI) would be a useful instrument for detecting inaccuracies in the external source, regarding the latter as business exceptions in ...
doi:10.5220/0004987507070712
dblp:conf/iceis/LiuDT14
fatcat:5bupoldwqbefpk3intngximwky
Analysis of Compliance and Supply Chain Security Risks Based on ISO 28001 in a Logistic Service Provider in Indonesia
2021
International Journal of Safety and Security Engineering
Risk of goods and security incidents, such as theft, boycott, smuggling and terrorism are likely to occur in a shipping process, therefore risk controls are needed to reduce the adverse effects. ...
The purpose of this research is to analyse compliance & supply chain security risks and propose a mitigation based on ISO 28001 in a logistic service provider in Indonesia. ...
The 12 risks included the damage to the goods in the process of loading the goods (14) , the inaccuracy in the number of goods in the process of loading the goods (15) , the damage to the goods in the ...
doi:10.18280/ijsse.110202
fatcat:o4pqpweksnd5jav3xbnmhwcslu
AN EVALUATION OF INTERNAL CONTROL IMPLEMENTATION: A CASE STUDY OF EXHIBITION COMPANY
2022
Journal of Applied Finance & Accounting
The process of collecting data is through interviews and observation. Based on the evaluation, there are weaknesses in internal control in the revenue cycle applied by the company. ...
This study aimed to evaluate the revenue cycle implemented in the Exhibition Company to identify the weaknesses and limitations of internal controls related to revenue cycles by referring to the COSO's ...
Risk Assessment Risk Assessment is a dynamic process to identify and analyze risks in achieving the company's objectives. ...
doi:10.21512/jafa.v8i1.8122
fatcat:iofhekgrzrawxhupxah2wsus2a
A Review on Risk Management in Information Systems: Risk Policy, Control and Fraud Detection
2021
Electronics
Both the development and establishment of an information system within an organization contributes to mitigating business-related risks and also creates new types of risks associated with its establishment ...
Continuity planning and fraud detection policy development are among the many critically important practices conducted through risk management that aim to mitigate risk factors, their vulnerability, and ...
Simply, the fraud risks should be clearly identified in all aspects, directly-related and indirectly related, and further assessed concerning their impact and probability. ...
doi:10.3390/electronics10243065
fatcat:wzgzmtcv5bcp7oolxbvzssctn4
Security Risk Assessment Framework for Offshore Gas and Oil Platform in East Africa
2021
Zenodo
risk assessment approach via the research methodology process. ...
Surveys, visits, interviews, and questionnaires are among the data sources used to gather the information needed to test the model and conduct preliminary validation studies on offshore platform risk assessment ...
Following the risk assessment, the mitigation curve was relocated to the lower level of potential risks, and some related probability cost was added, as shown in Figure 1 . ...
doi:10.5281/zenodo.5787082
fatcat:6e2vo4b5pvfxrikqfz27jpz6c4
Global Supply Chain Risk Management
2019
American Journal of Engineering and Applied Sciences
As part of a systematic approach we will start our research by studying the supply chain risk assessments, evaluation and analyzing the different risks which impact the global performance of supply chain ...
and the way for good management and monitoring using one of the proven methods as Supply Chain Operations Reference (SCOR) which has been proposed for modeling and estimating intermittent demand data. ...
in the study and responsible for the manuscript as it moves through the entires punlication process. ...
doi:10.3844/ajeassp.2019.147.155
fatcat:h2jm7hcclrbhhhi4xkm3xm7gfe
Evaluation of PNT Error Limits Using Real World Close Encounters from AIS Data
2021
Journal of Marine Science and Engineering
This paper addresses the question to which extent inaccuracies in position (P), navigation (N), and timing (T) data impact the reliability of collision avoidance. ...
This study assumes that in these situations, erroneous data can lead to an incorrect assessment of the situation with regard to existing collision risks. ...
Data Availability Statement: The AIS data used for this analysis were provided by the German Waterways and Shipping Administration (WSV) for research purposes. ...
doi:10.3390/jmse9020149
fatcat:lnx4neceindidhwnlyidxy34jm
Managing Operational Risk Related to Microfinance Lending Process using Fuzzy Inference System based on the FMEA Method: Moroccan Case Study
2017
Scientific Annals of Economics and Business
Considering the limitation of traditional failure mode and effect analysis (FMEA) method in assessing and classifying risks, the methodology adopted in this study focuses on developing a fuzzy logic inference ...
The purpose of this paper is to identify, assess and prioritize the root causes of failure within the microfinance lending process (MLP) especially in Moroccan microfinance institutions. ...
Tarantino and Cernauskas (2009) note that ORM encompasses all the process of identifying, assessing, and developing strategies to manage and mitigate operational risk. ...
doi:10.1515/saeb-2017-0029
fatcat:hr3whrzwnngxvbrwu66iwgnage
Learning from Enforcement Cases to Manage GDPR Risks
2021
MIS Quarterly Executive
Organizational Processes and Measures Risks
Risk mitigation measures • Appoint a DPO and publish the DPO's contact details. • Devise a breach-detection process, carry out a risk-impact assessment and ...
managers to carry out proper risk assessments and identify risk mitigation measures. ...
Lessons for Data Access Risks Risk mitigation measures • Ensure that data access requests are processed within the predetermined deadline (within one month of receiving the request in most cases). • Inform ...
doi:10.17705/2msqe.00049
fatcat:xopjjpeawnhdzf3dxdepbzyvu4
Using FMEA for Supply Chain Risk Management
[chapter]
2015
Managing Supply Chain Risk
FMEA is a long-standing technique used to assess the risk failures in product and process designs. All potential failures are evaluated in terms of likelihood, severity, and detectability. ...
Kleindorfer and Saad (2005) presented a three-step process: (1) specifying sources of risks and vulnerabilities, (2) assessment, and (3) mitigation, while both Jüttner et al. (2003) and Hallikasa et. al ...
McCulloch, and Ms. Priyanka Parekh. ...
doi:10.1201/b18610-3
fatcat:v7v4zetwwjdgrgqfb54sftcqwy
RISK STUDY OF SUPPLY CHAIN OF LEARNING MODULE PROCUREMENT PROJECT (CASE STUDY: PT. XYZ)
2021
J@ti Undip: Jurnal Teknik Industri
XYZ does not yet have structured risk management to identify and mitigate risks that occur primarily in supply chain functions. ...
HOR is used to identify risk events, risk agents in the supply chain and design mitigation strategies for risk agents based on ARP (Aggregate Risk Potential) value. ...
The mapping process will facilitate the identification of risk agents and risk events that occur in business activities in interviews and observations with an expert. ...
doi:10.14710/jati.16.4.235-241
fatcat:xgv64hh565ec7horkrq26t23zm
Group support system and explanatory feedback: An experimental study of mitigating halo effect
2015
Journal of Economics, Business & Accountancy
Comprehensive assessment potentially leads to halo effect that will affect accuracy of auditors decision-making process. Biased initial audit decision will potentially influence final audit decision. ...
This re-search aims to empirically show that halo effect can be mitigated by explanatory feedback and Group Support System (GSS). ...
Holistic data assessment enables auditor to gain better understanding of client's business. ...
doi:10.14414/jebav.v18i3.511
fatcat:4mljn5mz5rak5gs4fy6jqp75lu
The Role of RFID Technology in Supply Chain Risk Management
[chapter]
2011
Designing and Deploying RFID Applications
These data would be useful in improving a firm's risk assessment in terms of estimating and updating the severity and likelihood of various supply disruptions. ...
examine the existing mitigation approaches for dealing with RFID's visibility-related risks. ...
Radio Frequency Identification (RFID), a method of remotely storing and receiving data using devices called RFID tags, brings many real business benefits to today world's organizations. ...
doi:10.5772/18253
fatcat:xqgf7pozcnethb6fdnvu74w54i
Risk and Supply Chain Mitigation Analysis Using House of Risk Method and Analytical Network Process (A Case Study on Palm Oil Company)
2021
Journal the Winners: Economics, Business, Management, and Information System Journal
Data analysis procedure involved Supply Chain Operations Reference (SCOR), House of Risk (HOR) 1 and Analytic Network Process (ANP). ...
Furthermore, the aim was to determine priority of risk agents and risk mitigation actions. ...
The next stage is the data processing stage which includes risk analysis. In data processing, there are several methods such as Failure Mode and Effect Analysis (FMEA) and HOR. ...
doi:10.21512/tw.v22i2.7056
fatcat:4pv2k5banngg7hszwaq7m25c3u
« Previous
Showing results 1 — 15 out of 4,850 results