Sciweavers

669 search results - page 2 / 134
» Managing the Risk of IT Outsourcing
Sort
View
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
13 years 11 months ago
Evaluating Offshore IT Outsourcing in India: Supplier and Customer Scenarios
This paper presents the findings from an ongoing research study on offshore IT outsourcing. Field work was carried out in India and in the UK to evaluate the scale and scope of ou...
Naureen Khan, Wendy Currie, Vishanth Weerakkody, B...
ER
2004
Springer
96views Database» more  ER 2004»
13 years 11 months ago
Risk-Driven Conceptual Modeling of Outsourcing Decisions
Abstract. In the current networked world, outsourcing of information technology or even of entire business processes is often a prominent design alternative. In the general case, o...
Pascal van Eck, Roel Wieringa, Jaap Gordijn
VLDB
2007
ACM
160views Database» more  VLDB 2007»
13 years 11 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
JSS
2007
76views more  JSS 2007»
13 years 5 months ago
Software development risk and project performance measurement: Evidence in Korea
As more US companies outsource their software projects overseas, they find that it is more challenging to control software development risk in countries with dissimilar IT capabi...
Kwan-Sik Na, James T. Simpson, Xiaotong Li, Tushar...
AMW
2011
12 years 9 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis