Sciweavers

331 search results - page 20 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
JIPS
2011
66views more  JIPS 2011»
14 years 6 months ago
A Method of Risk Assessment for Multi-Factor Authentication
Jae-Jung Kim, Seng-Phil Hong
IJGHPC
2011
47views more  IJGHPC 2011»
14 years 2 months ago
Risk Assessment for Cloud-Based IT Systems
Yuyu Chou, Jan Oetting
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
15 years 5 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo
ACSW
2004
15 years 12 days ago
Belief-Based Risk Analysis
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Audun Jøsang, Daniel Bradley, Svein J. Knap...