Organizational risk using network analysis
Business organizations are held together not only by formal reporting and authority networks but also by informal networks that connect people across numerous layers of hierarchical organizational structures. People form networks of contacts and communications and through these networks they 'g...
| Main Authors: | Armstrong, Helen, McCulloh, I. |
|---|---|
| Other Authors: | Nathan Clarke |
| Format: | Conference Paper |
| Published: |
Centre for Security, Communications & Network Research
2010
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/45381 |
Similar Items
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Spectral analysis of social networks to identify periodicity
by: McCulloh, Ian, et al.
Published: (2012)
by: McCulloh, Ian, et al.
Published: (2012)
Network Analysis in Tourism Distribution Channels
by: Jeeva, Ananda, et al.
Published: (2014)
by: Jeeva, Ananda, et al.
Published: (2014)
Towards supply chain excellence using network analysis
by: Alexander, Paul, et al.
Published: (2011)
by: Alexander, Paul, et al.
Published: (2011)
Social Network Analysis with Applications
by: McCulloh, Ian, et al.
Published: (2013)
by: McCulloh, Ian, et al.
Published: (2013)
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
by: Natsheh, Essam Fathi
Published: (2006)
by: Natsheh, Essam Fathi
Published: (2006)
Tension in a value co-creation context: a network case study
by: Tóth, Zsófia, et al.
Published: (2018)
by: Tóth, Zsófia, et al.
Published: (2018)
New Complexity Weights for Function Point Analysis Using Artificial Neural Networks
by: Mohammed Abdullah, Hasan Al-Hagri
Published: (2004)
by: Mohammed Abdullah, Hasan Al-Hagri
Published: (2004)
Dispersion of PM₁₀ from industrial and road transportation network emissions in the Klang Valley, Malaysia
by: Jamalani, Mohd Asrul
Published: (2019)
by: Jamalani, Mohd Asrul
Published: (2019)
OFDPv2 : an efficient protocol for topology discovery in openflow-based software defined networking
by: Tanko, Abubakar Musa AlKali
Published: (2017)
by: Tanko, Abubakar Musa AlKali
Published: (2017)
Social Networking Trends: An Analysis Into The Evolution Of The Social Networking Phenomena
by: Ong, Te-Jin
Published: (2003)
by: Ong, Te-Jin
Published: (2003)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Managing configuration history in domestic networks
by: Spencer, Robert
Published: (2018)
by: Spencer, Robert
Published: (2018)
Applications of neural networks in market risk
by: Mostafa, Fahed.
Published: (2011)
by: Mostafa, Fahed.
Published: (2011)
Enhanced Mobility Solution In Mobile Ipv6 Network
by: David, Adeniji Oluwashola
Published: (2008)
by: David, Adeniji Oluwashola
Published: (2008)
Networked Teacher Professional Development: Applying the Networked Learning Framework to Online Teacher Professional Development
by: Ostashewski, Nathaniel, et al.
Published: (2010)
by: Ostashewski, Nathaniel, et al.
Published: (2010)
Performance analysis of OSPF and EIGRP protocols in a very dynamic network
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
by: Zarafshan, Faraneh
Published: (2015)
by: Zarafshan, Faraneh
Published: (2015)
Local interactions and the emergence of a Twitter small-world network
by: Ch’ng, Eugene
Published: (2015)
by: Ch’ng, Eugene
Published: (2015)
Gene expression network analysis of the routes to pluripotency
by: Amaral, Fabio M R
Published: (2018)
by: Amaral, Fabio M R
Published: (2018)
Social information landscapes: automated mapping of
large multimodal, longitudinal social networks
by: Ch'ng, Eugene
Published: (2015)
by: Ch'ng, Eugene
Published: (2015)
Remote laboratory access and network simulation tools for students with vision impairment
by: Murray, Iain, et al.
Published: (2009)
by: Murray, Iain, et al.
Published: (2009)
Speaker Independent Speech Recognition Using Neural Network
by: Tan, Chin Luh
Published: (2004)
by: Tan, Chin Luh
Published: (2004)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)
by: Enshaei, Mehdi
Published: (2015)
Estimating the risk–return profile of new venture investments using a risk-neutral framework and ‘thick’ models
by: Reber, Beat
Published: (2014)
by: Reber, Beat
Published: (2014)
Performance study of the coexistence of Wireless Sensor Networks (WSN) and Wireless Local Area Networks (WLAN) / Muhammad Adib Haron … [et al.]
by: Haron, Muhammad Adib, et al.
Published: (2008)
by: Haron, Muhammad Adib, et al.
Published: (2008)
Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach
by: Kandasamy, Saravanan
Published: (2004)
by: Kandasamy, Saravanan
Published: (2004)
The effects of perceived organizational support, perceived supervisor support and intra-organizational network resources on turnover intentions: A study of Chinese employees in multinational enterprises
by: Newman, A., et al.
Published: (2012)
by: Newman, A., et al.
Published: (2012)
Totally opportunistic routing algorithm for underwater wireless sensor network
by: Rahman, Ziaur
Published: (2019)
by: Rahman, Ziaur
Published: (2019)
Modeling And Optimization Of Lipase-Catalyzed Synthesis Of Adipate Esters Using Response Surface Methodology And Artificial Neural Network
by: Langroodi, Naz Chaibakhsh
Published: (2010)
by: Langroodi, Naz Chaibakhsh
Published: (2010)
A Dynamic Programming Algorithm for Reliable Network Design
by: Elshqeirat, Basima, et al.
Published: (2014)
by: Elshqeirat, Basima, et al.
Published: (2014)
Delivering a MOOC using a social networking site: The SMOOC design model
by: Ostashewski, Nathaniel, et al.
Published: (2012)
by: Ostashewski, Nathaniel, et al.
Published: (2012)
Performance analysis of network monitoring software in wireless network / Mohd Firdaus Mohd Mahdzir
by: Mohd Mahdzir, Mohd Firdaus
Published: (2019)
by: Mohd Mahdzir, Mohd Firdaus
Published: (2019)
Risk, networks and privateering in Liverpool during the Seven Years War, 1756-1763
by: Haggerty, Sheryllynne
Published: (2018)
by: Haggerty, Sheryllynne
Published: (2018)
The application of data envelopment analysis and queuing models to large scale computer networks
by: Najmeh, Malekmohammadi, et al.
Published: (2010)
by: Najmeh, Malekmohammadi, et al.
Published: (2010)
Topology Design with Minimal Cost Subject to Network Reliability Constraint
by: Elshqeirat, Basima, et al.
Published: (2015)
by: Elshqeirat, Basima, et al.
Published: (2015)
Hexagonal grid-based dynamic routing adjustment for optimising network lifetime in wireless sensor network
by: Jarallah, Zaid Fawaz
Published: (2017)
by: Jarallah, Zaid Fawaz
Published: (2017)
Reducing supply risk caused by the stockwhip effect in supply chains
by: Jeeva, Ananda
Published: (2011)
by: Jeeva, Ananda
Published: (2011)
Energy-efficient two-stage chain protocol routing algorithm for wireless sensor networks
by: Farhan, Husam Kareem
Published: (2014)
by: Farhan, Husam Kareem
Published: (2014)
Managers' perceptions of modern slavery risk in a UK health-care supply network
by: Emberson, Caroline Anne, et al.
Published: (2018)
by: Emberson, Caroline Anne, et al.
Published: (2018)
Similar Items
-
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010) -
Spectral analysis of social networks to identify periodicity
by: McCulloh, Ian, et al.
Published: (2012) -
Network Analysis in Tourism Distribution Channels
by: Jeeva, Ananda, et al.
Published: (2014) -
Towards supply chain excellence using network analysis
by: Alexander, Paul, et al.
Published: (2011) -
Social Network Analysis with Applications
by: McCulloh, Ian, et al.
Published: (2013)