Sciweavers

669 search results - page 42 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ECUMN
2007
Springer
15 years 4 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
MKWI
2008
246views Business» more  MKWI 2008»
14 years 11 months ago
Assessing the effects of IT changes on IT risk - A business process-oriented view
Abstract: The economic relevance of IT risk is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and risi...
Stefan Sackmann
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 2 months ago
Situational method engineering for governance, risk and compliance information systems
Against the background of the current financial crisis and an aftermath of increasing regulation, companies enhance and integrate information systems in the areas of risk manageme...
Anke Gericke, Hans-Georg Fill, Dimitris Karagianni...
MSR
2006
ACM
15 years 3 months ago
A lightweight approach to technical risk estimation via probabilistic impact analysis
An evolutionary development approach is increasingly commonplace in industry but presents increased difficulties in risk management, for both technical and organizational reasons...
Robert J. Walker, Reid Holmes, Ian Hedgeland, Pune...
JSW
2008
99views more  JSW 2008»
14 years 9 months ago
Using Data Mining in MURA Graphic Problems
The MURA phenomenon will result lots of problems in Photomask and TFT-LCD industries as well. In this paper, we designed and developed a MURA related association rules which suitab...
Wen-Hsing Kao, Jason C. Hung, Victoria Hsu