Sciweavers

8 search results - page 1 / 2
» Information Security Guidance for Enterprise Transformation
Sort
View
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
13 years 11 months ago
Assessment of Enterprise Information Security - The Importance of Information Search Cost
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
Erik Johansson, Mathias Ekstedt, Pontus Johnson
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
13 years 12 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
JDCTA
2008
160views more  JDCTA 2008»
13 years 5 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
MODELLIERUNG
2008
13 years 7 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel