1
by Cecchetti, Stephen
Published 2017
International Monetary Fund
...Using firm-level data for approximately 1,000 bank and nonbank financial institutions in 22...

2
by Jobert, Arnaud
Published 2004
International Monetary Fund
...We measure bank vulnerability in emerging markets using the distance-to-default, a risk-neutral...

3
by Herrera, Santiago
Published 1999
The World Bank
... the macroeconomic vulnerability before December 1994. This paper - a product of the Economic Policy Sector Unit...

4
by Mesly, Olivier
Published 2017
CRC Press
Table of Contents: ...2.6 The parametric frame2.6.1 Points of vulnerability and the parametric frame; 2.7 Frame of key...

5
by Hemmerlé, Yannick
Published 2023
OECD Publishing
...Governments rapidly provided large support to help households and firms face the 2021-22 energy...

6
by Allard, Celine
Published 2009
International Monetary Fund
... competitiveness position, the crisis also exposed the vulnerability of its heavy reliance on global demand to a...

7
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ...Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10...

8
Published 2012
The World Bank
...After they achieved 2.2 percent growth in 2011, early indications are that the economies of the six...

9
by Shamsudduha, Mohammad
Published 2019
The World Bank
... that are vulnerable to public health. This paper develops, for the first time, groundwater risk maps at the national...

10
Published 2017
The World Bank
...Risk and Vulnerability Assessment...

11
Published 2022
Edward Elgar Publishing
Table of Contents: .... Marshall, Bhagyashree Katare and Corinne B. Valdivia -- 22. Disaster challenges and entrepreneurial...

12
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...Chapter 14: VulnerabilitiesChapter 15: Planning and Resources; Chapter 16: Conduct an Intelligence...

13
by Calder, Alan
Published 2023
IT Governance Ltd
Table of Contents: ...Chapter 25: Supply chain security -- Chapter 26: System security -- Chapter 27: Vulnerability...

15
Published 2020
Springer International Publishing
Table of Contents: ...11. Small-scale fisheries in Romania: Transformation, vulnerability and change in a sturgeon...

16
Published 2023
Routledge
Table of Contents: ... -- The Appearance of Mathematics in Corporate Management -- 2.2 Proposed Model -- Decisions, Sustainability...

17
Published 2018
Edward Elgar Pub., Inc.
Table of Contents: ... Economic Review, 96 (1), March, 280-8 -- 8. Christian Gollier and John W. Pratt (1996), 'Risk Vulnerability...

18
by Feuer, Michael J.
Published 2011
Wiley
Table of Contents: ... Precious Resource -- 22. Lesson #22: How to Avoid Analysis Paralysis by Learning When to Make "Battlefield...

19
by Shivakumar, Shailesh Kumar
Published 2015
Morgan Kaufmann, an imprint of Elsevier
Table of Contents: .... Ensuring High Availability for Your Enterprise Web Applications -- 2.1. Introduction -- 2.2. High...

20
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ...The Automated Audit, Assertion, Assessment, and Assurance API 22 Recommended Controls 22 Risk...