The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
This paper deals with the Change Management process within IT Service Management. Change Management includes several activities, some of which need to evaluate the risk exposure as...
—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
As a new and complex form of research, which combines very heterogeneous activities requiring different skills, Design Science Research (DSR) in IS has new and difficult areas of ...
Richard Baskerville, Jan Pries-Heje, John R. Venab...