Sciweavers

669 search results - page 89 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ECBS
2008
IEEE
121views Hardware» more  ECBS 2008»
15 years 4 months ago
Agile Release Planning: Dealing with Uncertainty in Development Time and Business Value
Release planning is a critical activity in the software development process. The creation of a clear and realistic plan is extremely difficult, as key factors such as time and cos...
Kevin Logue, Kevin McDaid
RE
2007
Springer
15 years 4 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
SEC
2007
14 years 11 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
EUROMED
2010
14 years 7 months ago
A Sustainable Repository Infrastructure for Digital Humanities: The DHO Experience
Abstract. The Digital Humanities Observatory was created to support the longterm management of electronic cultural heritage resources for the digital humanities in Ireland. However...
Donald Gourley, Paolo Battino Viterbo
IEEESCC
2007
IEEE
15 years 4 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung