Sciweavers

669 search results - page 45 / 134
» Managing the Risk of IT Outsourcing
Sort
View
IAT
2010
IEEE
14 years 7 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
DSS
2006
104views more  DSS 2006»
14 years 10 months ago
Supply chain information sharing in a macro prediction market
This paper aims to address supply chain partners' incentives for information sharing from an information systems design perspective. Specifically, we consider a supply chain ...
Zhiling Guo, Fang Fang, Andrew B. Whinston
ISF
2008
92views more  ISF 2008»
14 years 10 months ago
Information technology workforce skills: The software and IT services provider perspective
It is now commonplace for an organization to turn to external firms for the provision of IT services and software. As technology advances and the business environment continues to ...
Tim Goles, Stephen Hawk, Kate M. Kaiser
FINANCECOM
2007
Springer
209views Finance» more  FINANCECOM 2007»
15 years 4 months ago
Information Risk in Financial Institutions: Field Study and Research Roadmap
Abstract. Large financial firms with thousands of employees face many challenges ensuring workers have access to the right information, yet controlling access to unneeded data. We ...
Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M...
ITRUST
2005
Springer
15 years 3 months ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...