Sciweavers

669 search results - page 55 / 134
» Managing the Risk of IT Outsourcing
Sort
View
SCP
2002
77views more  SCP 2002»
14 years 11 months ago
Quantitative IT portfolio management
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
SACMAT
2011
ACM
14 years 2 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
98
Voted
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 6 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
SIGSOFT
2008
ACM
14 years 11 months ago
Efficient online monitoring of web-service SLAs
If an organization depends on the service quality provided by another organization it often enters into a bilateral service level agreement (SLA), which mitigates outsourcing risk...
Franco Raimondi, James Skene, Wolfgang Emmerich
CORR
2010
Springer
136views Education» more  CORR 2010»
14 years 9 months ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena