The performance of corporate social responsibility is conducive to the con- tinuous improvement of their profitability, and promotes the upgrading of corporation value. However, it is difficult to confirm, calculate a...The performance of corporate social responsibility is conducive to the con- tinuous improvement of their profitability, and promotes the upgrading of corporation value. However, it is difficult to confirm, calculate and check the costs and benefits brought by the implementation of corporate social responsibility under the current ac- counting theory system, so it is difficult to estimate whether the fulfillment of corpo- rate social responsibility has any effects on the corporation value assessment. Therefore, based on corporate social responsibility, the correction mode of corpora- tion value assessment is put forward.展开更多
In this paper, we consider the risk assessment problem under multi-levels and multiple mixture subpopulations. Our result is the generalization of the results of [1-5].1 Finite Mixture Normal ModelsIn dose-response s...In this paper, we consider the risk assessment problem under multi-levels and multiple mixture subpopulations. Our result is the generalization of the results of [1-5].1 Finite Mixture Normal ModelsIn dose-response studies, a class of phenomena that frequently occur are that experimental subjects (e.g., mice) may have different responses like ’none, mild, severe’ after a toxicant experiment, or ’getting worse, no change, getting better’ after a medical treatment, etc. These phenomena have attracted the attention of many researchers in recent years. Finite展开更多
In solving a response function by the boundary element method, the use of the singular valued method and the Laplace transform in a time domain makes the solving process be simplified and the result be accurate. The r...In solving a response function by the boundary element method, the use of the singular valued method and the Laplace transform in a time domain makes the solving process be simplified and the result be accurate. The restricted condition matrix formed by the response matrix method is much smaller than that by embedding method. In addition, the response function may realize directly the management decision making. So it is efficient for establishing and solving hydraulics management models.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
文摘The performance of corporate social responsibility is conducive to the con- tinuous improvement of their profitability, and promotes the upgrading of corporation value. However, it is difficult to confirm, calculate and check the costs and benefits brought by the implementation of corporate social responsibility under the current ac- counting theory system, so it is difficult to estimate whether the fulfillment of corpo- rate social responsibility has any effects on the corporation value assessment. Therefore, based on corporate social responsibility, the correction mode of corpora- tion value assessment is put forward.
文摘In this paper, we consider the risk assessment problem under multi-levels and multiple mixture subpopulations. Our result is the generalization of the results of [1-5].1 Finite Mixture Normal ModelsIn dose-response studies, a class of phenomena that frequently occur are that experimental subjects (e.g., mice) may have different responses like ’none, mild, severe’ after a toxicant experiment, or ’getting worse, no change, getting better’ after a medical treatment, etc. These phenomena have attracted the attention of many researchers in recent years. Finite
文摘In solving a response function by the boundary element method, the use of the singular valued method and the Laplace transform in a time domain makes the solving process be simplified and the result be accurate. The restricted condition matrix formed by the response matrix method is much smaller than that by embedding method. In addition, the response function may realize directly the management decision making. So it is efficient for establishing and solving hydraulics management models.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].