Sciweavers

14 search results - page 2 / 3
» Improving information security compliance - A process-orient...
Sort
View
ECIS
2004
13 years 6 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
JODS
2007
138views Data Mining» more  JODS 2007»
13 years 4 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
HASE
2008
IEEE
13 years 6 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
SEW
2007
IEEE
13 years 11 months ago
Mapping CMMI Project Management Process Areas to SCRUM Practices
- Over the past years, the Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) have been broadly used for assessing organizational maturity and process...
Ana Sofia C. Marcal, Felipe Santana Furtado Soares...
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
13 years 11 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter