Showing 1 - 10 of 27,944
vulnerability of the nation's complex infrastructures, in prioritizing resources to reduce risk, and in planning strategies for …
Persistent link: https://www.econbiz.de/10009436813
The author describes a novel time-series analysis technique called maximum likelihood continuity mapping (MALCOM), and focuses on one application of MALCOM: detecting fraud in medical insurance claims. Given a training data set composed of typical sequences, MALCOM creates a stochastic model of...
Persistent link: https://www.econbiz.de/10009437054
produce a mix of outputs. This paper uses this theoretical view of the joint production process to implement a methodology and …
Persistent link: https://www.econbiz.de/10009437343
The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the...
Persistent link: https://www.econbiz.de/10009435924
from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence …
Persistent link: https://www.econbiz.de/10009436110
For more than two decades, risk analysts have relied on powerful logic-based models to perform their analyses. However, the applicability of these models has been limited because they can be complex and expensive to develop. Analysts must frequently start from scratch when analyzing a new (but...
Persistent link: https://www.econbiz.de/10009436695
. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability … criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all … hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It …
Persistent link: https://www.econbiz.de/10009436565
disruption of strategic activities, or for making a nuisance. The current situation regarding the vulnerability of the …
Persistent link: https://www.econbiz.de/10009437002
The Government Services Information Infrastructure (GSII) is that portion of the NII used to link Government and its services, enables virtual agency concepts, protects privacy, and supports emergency preparedness needs. The GSII is comprised of the supporting telecommunications technologies,...
Persistent link: https://www.econbiz.de/10009435387
There is a current trend for manufacturing enterprises in a supply chain of a particular industry to join forces in an attempt to promote efficiencies and improve competitive position. Such alliances occur in the context of specific legal and business agreements such that each enterprise retains...
Persistent link: https://www.econbiz.de/10009435618