"Preventing high risk gambles in securities" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 38 of 50 - About 500 Essays
  • Powerful Essays

    Political Risk

    • 1573 Words
    • 7 Pages

    POLITICAL RISK Abstract How companies could face political risk? We decided to investigate many study cases of political risk based on what we have learnt in class and trying to focus in distant regions such as Eastern Europe and Southeast Asia for not being redundant on the already well-known cases of Latin America. To achieve it‚ we used the data base of ProQuest and we found many articles about it. The references of this investigation are included in the bibliography of this work at the end

    Premium Communism Risk Communist Party of China

    • 1573 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    Checkpoint: Cyber Security Checkpoint: Cyber Security I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace‚ prevention always has been my goal. I have security protection in place against attacks such as viruses‚ spam‚ malware‚ spyware‚

    Premium Password Computer security Authentication

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    paper will provide a brief history of the two companies‚ as well as a financial analysis and a summary to conclude whether this merger was a success or a failure. Proctor & Gamble is a fortune 500 company. William Procter‚ a candlemaker‚ founded the company and James Gamble a soap maker‚ formed the company known as Procter & Gamble (P & G) in 1837. The two men emigrated from England and Ireland and settled early in Cincinnati. They might never have met had they not married sisters: Olivia and Elisabeth

    Premium Mergers and acquisitions Corporation Types of business entity

    • 3253 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    Network Security

    • 495 Words
    • 2 Pages

    Network Security Imandi kheerthi Pandranki Divya Revathi III/IV B.E. CSE III/IV B.E. CSE Department Of Computer Science Engineering‚ Department Of Computer Science Engineering‚ Dr. L. Bullayya College of Engineering For Women‚ Dr. L. Bullayya College of

    Free Internet Computer security Software engineering

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Risk and Return

    • 3586 Words
    • 15 Pages

    the context of a portfolio‚ the risk of an asset is divided into two parts: diversifiable risk (unsystematic risk) and market risk (systematic risk). Diversifiable risk arises from company-specific factors and hence can be washed away through diversification. Market risk stems from general market movements and hence cannot be diversified away. For a diversified investor what matters is the market risk and not the diversifiable risk. (4)In general‚ investors are risk-averse. So‚ they want to be compensated

    Premium Normal distribution Variance Investment

    • 3586 Words
    • 15 Pages
    Better Essays
  • Better Essays

    Information Security

    • 1359 Words
    • 4 Pages

    Information Security American Public University Professor Michael Brown August 10‚ 2012 One of the biggest issues in the Information Technology field these days is information security. Today almost anything can be found on the internet. Even like how to videos on how to put in a window‚ break-into a house‚ or even hack computers. The digital age has many perks but it also has many down falls to it as well. The perks that we enjoy so much from the internet also leaves us open to identity

    Premium Security Information security Computer security

    • 1359 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    SECURITY OF WIRELESS COMMUNICATIONS Introduction Wireless devices‚ like all technologies that provide external access to corporate networks‚ present security challenges. With wireless standards and practices still rapidly evolving‚ it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices

    Premium Wireless IP address Bluetooth

    • 3481 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk and Return

    • 1752 Words
    • 8 Pages

    Risk and Return: Portfolio Theory and Asset Pricing Models Portfolio Theory Capital Asset Pricing Model (CAPM) Efficient frontier Capital Market Line (CML) Security Market Line (SML) Beta calculation Arbitrage pricing theory Fama-French 3-factor model Portfolio Theory • Suppose Asset A has an expected return of 10 percent and a standard deviation of 20 percent. Asset B has an expected return of 16 percent and a standard deviation of 40 percent. If the correlation between A and B is 0.6

    Premium

    • 1752 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Internet Security

    • 474 Words
    • 2 Pages

    Research Problem: Internet security and privacy‚ what you can do to make it more efficient‚ and what software you can buy to protect yourself. Research Question: What is Internet security and privacy and what we can do protect ourselves? If you have access to a computer and a modem‚ you are licensed to drive on the information superhighway. And you are one of a growing number of online participants. The Internet offers many benefits. Web sites provide a vast world of information‚ entertainment

    Premium Computer security Computer software Computer program

    • 474 Words
    • 2 Pages
    Good Essays
  • Better Essays

    System Security

    • 1174 Words
    • 5 Pages

    Definition of the Following terms: 1. System Security a system that enforces boundaries between computer networks 2. Threat A threat‚ in the context of computer security‚ refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen‚ but has the potential to cause serious damage. Threats can lead to attacks on computer systems‚ networks and more. Threats are potentials for vulnerabilities to turn into attacks on computer

    Premium Computer security Computer Security

    • 1174 Words
    • 5 Pages
    Better Essays
Page 1 35 36 37 38 39 40 41 42 50