Sciweavers

669 search results - page 65 / 134
» Managing the Risk of IT Outsourcing
Sort
View
SAC
2002
ACM
14 years 11 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
MISQ
2000
123views more  MISQ 2000»
14 years 11 months ago
A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects
One of the most challenging decisions that a manager must confront is whether to continue or abandon a troubled project. Published studies suggest that failing software projects a...
Mark Keil, Bernard C. Y. Tan, Kwok Kee Wei, Timo S...
ACSD
2005
IEEE
114views Hardware» more  ACSD 2005»
15 years 5 months ago
Controlling Speculative Design Processes Using Rich Component Models
This paper elaborates on the application of some aspects of robust systems control theory to the management of uncertainty and risk in distributed and complex design processes, ha...
Werner Damm
CORR
2008
Springer
109views Education» more  CORR 2008»
14 years 11 months ago
EuSpRIG 2006 Commercial Spreadsheet Review
This management summary provides an outline of a commercial spreadsheet review process. The aim of this process is to ensure remedial or enhancement work can safely be undertaken ...
Simon Murphy
ICWE
2009
Springer
15 years 6 months ago
Tagging-Aware Portlets
A corporate portal supports a community of users on cohesively managing a shared set of resources. Such management should also include social tagging, i.e. the practice of collabor...
Oscar Díaz, Sandy Pérez, Crist&oacut...