Sciweavers

1969 search results - page 2 / 394
» Financial Theory 1
Sort
View
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
13 years 12 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
14 years 2 days ago
Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of Constraints
Anti-money laundering is a pressing issue in today’s economy. With the newly launched Chinese anti-money laundering regulation, this issue has drawn more and more attention from...
Xuan Liu, Pengzhu Zhang
EOR
2006
104views more  EOR 2006»
13 years 5 months ago
Financial networks with intermediation: Risk management with variable weights
: In this paper, we develop a framework for the modeling, analysis, and computation of solutions to multitiered financial network problems with intermediaries in which both the sou...
Anna Nagurney, Ke Ke

Lecture Notes
384views
15 years 4 months ago
Financial Theory 2
These notes cover several topics such as Interest Rate Calculations, More Details on Bond Conventions, Bond Portfolios, Basic Option Pricing, The Binomial Option Pricing Model, The...
Paul Söderlind
WSC
1998
13 years 7 months ago
Implementing the Theory of Constraints Philosophy in Highly Reentrant Systems
A significant challenge in implementing the Theory of Constraints in the semiconductor industry is the complex and reentrant nature of the manufacturing process. Managing a constr...
Clay Rippenhagen, Shekar Krishnaswamy