Tags » Risk

SAFER - Lets Talk Self Defence Pt1 of 6

I’ve been meaning to write something for a while, since the attacks in London, but self defence is such a vast and tricky subject. Many people have written better and more in depth posts. 1,107 more words

Women

Drone pictures raise concerns over surface water at Cuadrilla’s Lancashire fracking site

Drone pictures taken this morning show surface water at Cuadrilla’s shale gas site at Preston New Road near Blackpool. 505 more words

Fracking

Thrash Early - Some Thoughts on Taking the Plunge

I had a conversation this morning with a soon-to-be-graduate. (Soon-to-be, as in, tonight at approximately 9:30 p.m), and she told me something remarkable. She’s going to college this fall in Delaware, and immediately heading overseas to study at university in Madrid. 405 more words

Dreams

Dad, Phone Down! Mom, Stop Texting! Many Parents Set Bad Examples For Teen Drivers (WBUR)

Parents, is this scenario familiar? You’re driving the kids home from school. As always, there’s plenty to do, plenty on your mind. You stop at a red light, grab your phone, and check your email, scrolling as fast as you can before the light turns green. 40 more words

Risk

How to reduce subjectivity in risk analysis?

Alex Sidorenko from RISK-ACADEMY talks about 3 rules for reducing subjectivity in quantitative risk analysis.

DOWNLOAD THE FREE RISK MANAGEMENT BOOK: https://www.risk-academy.ru/en/download/risk-management-book/

Watch more free risk management videos on  18 more words

Risk Management

Tournament-Based Incentives, Corporate Cash Holdings and the Value of Cash

In a new paper, we examine how tournament-based incentives affect corporate cash holdings and the value of those holdings for shareholders.

Before a firm selects a new CEO, it may run a tournament within the firm to rank its vice-presidents (VPs) as candidates. 517 more words

Corporate Governance

#Android Devices at Risk to #Cloak and Dagger Attack

“Cloak and Dagger” is a cyber attack class that exploits Android device vulnerabilities, allowing apps from the Google Play Store complete control of the host phone. #CyberAttack
https://goo.gl/eoY7sD