Sciweavers

331 search results - page 27 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
HICSS
2008
IEEE
161views Biometrics» more  HICSS 2008»
15 years 5 months ago
A Methodological Proposal to Assess the Feasibility of ERP Systems Implementation Strategies
Continuous failures in ERP systems implementation project are today the main challenge in the feasibility of integrated information systems. Failure can be determined by different...
Guido Capaldo, Pierluigi Rippa
FS
2006
66views more  FS 2006»
14 years 11 months ago
Generalized deviations in risk analysis
General deviation measures are introduced and studied systematically for their potential applications to risk management in areas like portfolio optimization and engineering. Such...
R. Tyrrell Rockafellar, Stan Uryasev, Michael Zaba...
CSREASAM
2007
15 years 14 days ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
IAT
2010
IEEE
14 years 9 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
RE
2005
Springer
15 years 4 months ago
Modelling Assumptions and Requirements in the Context of Project Risk
The importance of assumptions in Requirements Engineering has long been recognised. However, to the best of our knowledge, no quantitative models for the relation between assumpti...
Andriy V. Miranskyy, Nazim H. Madhavji, Matthew Da...