Sciweavers

669 search results - page 56 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ICDE
2006
IEEE
159views Database» more  ICDE 2006»
15 years 6 months ago
Replication Based on Objects Load under a Content Distribution Network
Users tend to use the Internet for “resource-hungry” applications (which involve content such as video, audio on-demand and distributed data) and at the same time, more and mo...
George Pallis, Konstantinos Stamos, Athena Vakali,...
JUCS
2006
74views more  JUCS 2006»
14 years 11 months ago
Pervasive Health Management and Health Management Utilizing Pervasive Technologies : Synergy and Issues
: Much development work is ongoing addressing technologies and their application in the health domain, in order to achieve solutions that are non-invasive to every day life and wor...
Jean Roberts
DEXAW
2007
IEEE
120views Database» more  DEXAW 2007»
15 years 6 months ago
Understanding enterprise integration project risks: A focus group study
The prerequisites of success and reasons for failure for enterprise integration projects are still not wellunderstood as evidenced by large failure rates, including cost or schedu...
Sandeep Purao, Sharoda Paul, Steven Smith
HICSS
2006
IEEE
90views Biometrics» more  HICSS 2006»
15 years 6 months ago
The Role of Perceived Control, Attention-Shaping, and Expertise in IT Project Risk Assessment
This study investigates how individuals assess risks in IT development projects under different conditions. We focus on three conditions: the perceived control over the IT project...
Stephen Du, Mark Keil, Lars Mathiassen, Yide Shen,...
IFIP13
2004
15 years 1 months ago
Toward A Human-Centered UML For Risk Analysis
: Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of t...
Jérémie Guiochet, Gilles Motet, Clau...