Sciweavers

381 search results - page 65 / 77
» Business Informatics: An Engineering Perspective on Informat...
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
15 years 10 days ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
RE
2010
Springer
14 years 7 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
133
Voted
COOPIS
2002
IEEE
15 years 5 months ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai
108
Voted
KBSE
2003
IEEE
15 years 5 months ago
Analysis of Inconsistency in Graph-Based Viewpoints: A Category-Theoretic Approach
Eliciting the requirements for a proposed system typically involves different stakeholders with different expertise, responsibilities, and perspectives. Viewpoints-based approache...
Mehrdad Sabetzadeh, Steve M. Easterbrook
111
Voted
WEBI
2010
Springer
14 years 10 months ago
How to Improve Your Google Ranking: Myths and Reality
Abstract--Search engines have greatly influenced the way people access information on the Internet as such engines provide the preferred entry point to billions of pages on the Web...
Ao-Jan Su, Y. Charlie Hu, Aleksandar Kuzmanovic, C...