Sciweavers

3149 search results - page 156 / 630
» IT security risk management
Sort
View
ESEM
2007
ACM
15 years 4 months ago
Value-Based Empirical Research Plan Evaluation
Empirical studies are crucial to gain evidence on the effects of software engineering methods and tools in defined contexts. However, empirical studies can be costly and thus need...
Stefan Biffl, Dietmar Winkler
84
Voted
ECIS
2000
15 years 2 months ago
Rapid Knowledge Deployment in an Organizational-Memory-Based Workflow Environment
Abstract-- Knowledge management is becoming a fashion in many organizations. This entails the danger that large investments in knowledge externalization are made with little short-...
Ralf Klamma, Sylvia Schlaphof
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 7 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
80
Voted
ECIS
2001
15 years 2 months ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward
78
Voted
ISCC
2005
IEEE
15 years 6 months ago
Location Dependent Digital Rights Management
In this paper we present a concept and an architecture for a location dependent Digital Rights Management system. The solution is based on a trusted hardware which incorporates th...
Thomas Mundt