-
161by Karafa, Paul A.“...) acquisition program, development of a risk management methodology is the responsibility of the Direct...”
Published 2013
Get full text
-
162“... has increased risk exposure. Traditional tools and technologies used in the process of risk management...”
Get full text
Others -
163“... studies in depth of credit activities and current procedure of credit risks management at Agribank HCMC...”
Get full text
Others -
164“..., this paper recommends that investors pay attention to risk and that fund managers should fulfill...”
Get full text
Others -
165“... in the view of behavioral finance. An idea similar to Value at Risk is used to decide the reference point...”
Get full text
Others -
166“... to simulate the risks of investing in real estate and analyze it, and put forward the risk management method...”
Get full text
Others -
167“...碩士 === 國立臺灣大學 === 土木工程學研究所 === 100 === No construction project is risk free. Risk can be managed...”
Get full text
Others -
168“... management, in fact the risk management capacity of branches is limited, this is the biggest weakness. Facing...”
Get full text
Others -
169“... becomes more international and, unfortunately, more vulnerable. Hence, issues about supply chain risk...”
Get full text
Others -
170“... of the project depends on the ability to predict events that may occur. Risk management is expected to propose...”
Get full text
Others -
171“... of companies about Supply Chain Risk Management (SCRM) and the most common supply chain risks that companies...”
Get full text
Others -
172
-
173
-
174
-
175
-
176“...) models to measure spillover, risk, and leverage effects of active, passive, and smart beta management...”
Get full text
Others -
177“... of the monetary policy which was proposed by the Mongolian trading banks risk management the after the financial...”
Get full text
Others -
178“... to provide liquidity and earn the spread. For market makers, risk control is the most important part...”
Get full text
Others -
179
-
180by Smith, Clifford Keith“... from which terrorism risk management policies can be developed. This study utilized the Delphi method...”
Published 2007
Get full text
Others