Sciweavers

669 search results - page 36 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ISW
2009
Springer
15 years 4 months ago
Risks of the CardSpace Protocol
Sebastian Gajek, Jörg Schwenk, Michael Steine...
IAW
2003
IEEE
15 years 3 months ago
Methodology of Risk Assessment in Mobile Agent System Design
Ingo McLean, Boleslaw K. Szymanski, Alan Bivens
MKWI
2008
168views Business» more  MKWI 2008»
14 years 11 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
ECIS
2003
14 years 11 months ago
Assessing the business consequences of systems risk
Both public media and IS research have produced a detailed view of different risks associated with computers. Measures to prevent systems risks from occurring are also well docume...
Hannu Salmela
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
15 years 4 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen