Sciweavers

1422 search results - page 47 / 285
» Information security and risk management
Sort
View
TITS
2011
150views more  TITS 2011»
14 years 6 months ago
Online Spatio-Temporal Risk Assessment for Intelligent Transportation Systems
—Due to modern pervasive wireless technologies and high-performance monitoring systems, spatio-temporal information plays an important role in areas such as intelligent transport...
Ondrej Linda, Milos Manic
ISI
2006
Springer
14 years 11 months ago
Personal Information Management (PIM) for Intelligence Analysis
The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are rele...
Antonio Badia
SCP
2002
77views more  SCP 2002»
14 years 11 months ago
Quantitative IT portfolio management
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 6 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
AISM
2004
15 years 1 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria