• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 2
  • Tagged with
  • 5
  • 5
  • 5
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Building a semantics-assisted risk analysis (SARA) framework for vendor risk management. / CUHK electronic theses & dissertations collection / ProQuest dissertations and theses

January 2007 (has links)
Although there are several solutions available in the industry to manage the vendor risk confronting corporate purchasers in their practices of traditional procurement mechanism, they are not widely accepted among industries practicing the traditional procurement mechanism. Moreover, they are unfeasible to be implemented in the eProcurement mechanism. They rely heavily on self-assessment data provided by vendors or transaction records from purchasing departments, and there is a lack of a systematic approach to accumulate the collective experience of the corporation in vendor risk management. / Moreover, the risk cause taxonomy identified in this study lays out the theoretical grounds for the development of any software applications relating to the deployment of risk perceptions held by procurement professionals and practitioners. / Recently, electronic procurement or eProcurement has gradually acquired wide acceptance in various industries as an effective, efficient, and cost-saving mechanism to search for and contact potential vendors over the Internet. However, it is also a common situation that purchasers do not have handy and reliable tools for the evaluation of the risk deriving from their choices of selecting seemingly promising but unfamiliar vendors, identified through the eProcurement mechanism. The purchasing corporations need to implement a systematic framework to identify, and assess the risks associated with their vendor choices, that is, the vendor risk, and even to memorize their collective experience on risk analysis, while they try to gain benefits from the practice of the eProcurement strategy. / The structure for the establishment of the semantic application identified in this study can be generalized as the common framework for developing an automatic information extractor to acquire Internet content as the support for making important business decisions. The structure is composed of three basic components: (1) an information collection method to identify specific information over the Internet through the deployment of semantic technology, (2) an ontology repository to associate the collected data and the specific data schema, and (3) a scheme to associate the data schema with the analytical methods which would be deployed to provide decision support. / This study proposes the establishment of the Vendor Risk Analysis (VRA) system to assist procurement officers in vendor risk analysis as a support to their decision of seeking promising vendors over the Internet. The VRA system adopts a Semantic-Assisted Risk Analysis (SARA) framework to implement an innovative approach in the implementation of risk assessment. The SARA framework deploys the collaboration of a knowledge-based Expert System and several emerging semantic technologies, including Information Extraction, a Community Template Repository, and a Semantic Platform for Information Indexing and Retrieval, to enhance the capability of the VRA system in the capability of acquiring sufficient risk evidence over the Internet to provide timely and reliable risk assessment support to vendor choice decisions. / Chou, Ling Yu. / "July 2007." / Advisers: Vincent Sie-king Lai; Timon Chih-ting Du. / Source: Dissertation Abstracts International, Volume: 68-12, Section: A, page: 5128. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2007. / Includes bibliographical references (p. 178-186). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. Ann Arbor, MI : ProQuest dissertations and theses, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
2

Risk management in information technology projects

Antony, Tessy 01 August 2012 (has links)
M.Ing. / Information Technology (IT) projects are typically accompanied by a wide variety of complex risks. The rapid rate at which technology is currently changing requires the use of updated processes for project risk management in the IT industry. This paper investigates the active management of risk by focusing on the causes of such risk and developing indicators to track project risk throughout all project phases. The current research focuses on Project Risk Management as described in the Guide to the Project Management Body of Knowledge (PMBoK®) Fourth Edition, detailing the tools and techniques needed to make risk management work in IT projects. This Project Management Institute (PMI) Standard has been adopted for the current research as it is widely accepted by many organisations in order to ensure greater return on investment and other benefits from projects. The PMI’s PMBoK® details an approach to project risk management which includes the process concerned with identifying, analysing, prioritising and mitigating risk at regular intervals. Specifically, it focuses on budget-related risks in order to reduce IT project failure due to budget overruns. Risk measurement and risk control are also incorporated to achieve a sustainable risk management system for IT projects. Finally, a private sector IT project is used as case study in order to apply the research in practice. This case study makes use of Accenture's maturity model concept, which helps us to understand this organisation’s benchmarking in recent years.
3

Audit risks in a database environment with specific reference to Oracle7

Wiid, Liné Cornette 13 February 2014 (has links)
M.Com. (Computer Auditing) / The objective of an independent audit of financial statements is to express an opinion on the fair presentation of the financial statements. The auditor should obtain sufficient audit evidence to enable him to draw conclusions to support the content of his report. The auditor should obtain an understanding of the entity's accounting system and related internal controls to assess their adequacy as a basis for the preparation of financial information and to assist in the designing of his audit procedures. If the auditor intends to rely on any internal controls, he should study and evaluate those controls. If a database system is used, it is logical that all the financial data reside in the database. In order for an auditor to express an opinion on the financial statements, he has to determine to what extent he can rely on the integrity of the financial data that resides in the database. The objective of this research was to identify the risks and controls present in a general database environment as well as those present in the Oracle? database management system environment, to develop a comparison table between these environments and to develop an Oracle? internal control questionnaire.
4

The Zachman Framework applied to construction engineering risk management

03 July 2012 (has links)
M.Ing. / The research is based on the complexity of project management and risk management fields and how applying each field on its own can be problematic. This poses an everyday challenge to project managers when implemented simultaneously and such a problem predominantly exists in the engineering construction field.The challenge faced by project managers is approached throughout the research study by introducing a commonly used six order matrix framework with a high success rate in analysing and dissecting complex fields into small fragments. The framework is known as the Zachman Framework for Enterprise Architecture. However this is only done once a thorough literature review of both project and risk management as well as the limitations of the Zachman Framework have been well documented.Once the Zachman Framework for Construction adaptation is complete, it is then applied to an inner city construction case study. The results of the case study are used to determine if throughout the project lifecycle it has been possible to analyse and implement all project and risk management requirements simultaneously with little or no correction of project constraints.Using a developed integrated risk management tool which graphically tracks aggregate risk( s) in cost and time together with the Zachman Framework for Construction, the case study results reveal that it is possible to increase the ability to simultaneously manage risk and normal activities by concluding that the project constraints (i.e. cost) are accurately estimated and accomplished. In conclusion the research study,discussion and recommendations are made in order to implement all cells within the Zachman Framework for Construction therefore increasing the success of any project and risk management construction field.
5

Supply contract management with information updates. / CUHK electronic theses & dissertations collection

January 2002 (has links)
Huang Hongyan. / "February 2002." / Thesis (Ph.D.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (p. 134-142). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Mode of access: World Wide Web. / Abstracts in English and Chinese.

Page generated in 0.1578 seconds