Sciweavers

549 search results - page 31 / 110
» Belief-Based Risk Analysis
Sort
View
ECIS
2004
15 years 1 months ago
A study of information systems outsourcing risks
Despite the considerable growth of Information Systems (IS) outsourcing in recent years, this trend is still the object of strong criticism. This study has as its aim to show the ...
Reyes-G. Gonzalez, Jose Gasco, Juan Llopis
CTW
2002
75views more  CTW 2002»
14 years 11 months ago
The Use of a Formalised Risk Model in NHS Information System Development
: Information Systems (IS) and technology are used extensively throughout the NHS, and the 1998 national information strategy, "Information for Health", sets out how the ...
M. A. Jeffcott, C. W. Johnson
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 6 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
VOTEID
2007
Springer
15 years 6 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
RE
2001
Springer
15 years 4 months ago
Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model
Evolutionary prototyping focuses on gathering a correct and consistent set of requirements. The process lends particular strength to building quality software by means of the ongo...
Ryan A. Carter, Annie I. Antón, Laurie A. W...