Sciweavers

381 search results - page 65 / 77
» Business Informatics: An Engineering Perspective on Informat...
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
15 years 1 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
RE
2010
Springer
14 years 8 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
COOPIS
2002
IEEE
15 years 7 months ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai
KBSE
2003
IEEE
15 years 7 months ago
Analysis of Inconsistency in Graph-Based Viewpoints: A Category-Theoretic Approach
Eliciting the requirements for a proposed system typically involves different stakeholders with different expertise, responsibilities, and perspectives. Viewpoints-based approache...
Mehrdad Sabetzadeh, Steve M. Easterbrook
WEBI
2010
Springer
14 years 11 months ago
How to Improve Your Google Ranking: Myths and Reality
Abstract--Search engines have greatly influenced the way people access information on the Internet as such engines provide the preferred entry point to billions of pages on the Web...
Ao-Jan Su, Y. Charlie Hu, Aleksandar Kuzmanovic, C...