Sciweavers

331 search results - page 7 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
15 years 29 days ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
COMPSEC
2004
115views more  COMPSEC 2004»
14 years 10 months ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
ICSM
2003
IEEE
15 years 4 months ago
Source-Based Software Risk Assessment
The paper reports on a method for software risk assessments that takes into account “primary facts” and “secondary facts”. Primary facts are those obtained through automat...
Arie van Deursen, Tobias Kuipers
EUSFLAT
2001
116views Fuzzy Logic» more  EUSFLAT 2001»
15 years 10 days ago
Risk assessment in natural disasters with fuzzy probabilities
Risk assessment in regions with low earthquake activity is important for reinsurance companies and governmental building authorities. They need a complete picture of the possible ...
Uwe Wagner
BDIM
2007
IEEE
99views Business» more  BDIM 2007»
15 years 5 months ago
Model-Based Mitigation of Availability Risks
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...
Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, ...