![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature review, Q-sorting, expert interviews, and analysis of data collected from 356 organizations. Additionally, the effects of security risks on negative and positive attitudinal evaluations in IT executives' Cloud Computing adoption decisions are examined. The book s second part presents a mathematical risk quantification framework that can be used to support the IT risk management process of Cloud Computing users. The results support the risk management processes of (potential) adopters, and enable providers to develop targeted strategies to mitigate risks perceived as crucial.
This book analyses the multi-faceted impact armed conflict has on investment treaties. Refuting the common association of the outbreak of hostilities with the termination or suspension of treaties, it not only makes a case for the continuity of investment treaties. The book argues that the impact of armed conflict on such agreements goes far beyond these questions: Changed factual circumstances and public interests as well as international humanitarian law heavily influence the application and interpretation of investment protection standards. The book argues that investment treaties can and must channel these effects to remain effective during armed conflict and strike a fair balance between investor and public interests. It shows ways in which contextual and systemic interpretation, respect for reasonable state action, and careful treaty design can ensure that investment treaties continue to fulfil their purpose of strengthening compliance with legal rules also in times of armed conflict.
|
![]() ![]() You may like...
Fiddle Time Joggers Piano Accompaniment…
Kathy Blackwell, David Blackwell
Sheet music
R351
Discovery Miles 3 510
|