Sciweavers

102 search results - page 3 / 21
» A study of information systems outsourcing risks
Sort
View
AMW
2011
12 years 11 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
FSKD
2008
Springer
128views Fuzzy Logic» more  FSKD 2008»
13 years 8 months ago
Applying Fuzzy PROMETHEE Method for Evaluating IS Outsourcing Suppliers
The demand for outsourcing in the information systems (IS) field has become a part of basic corporate strategy and has experienced a considerable growth in recent years. The proce...
Tien-Chin Wang, L. Y. Chen, Ying-Hsiu Chen
ECIS
2004
13 years 8 months ago
Risk Mitigation and Risk Absorption in IOS: A Proposed Investigative Study
This study examines the risk consequences of participation in inter-organisational information systems (IOS). The research aims to identify the risk mitigation and risk absorption...
Martin Hughes, Philip Powell, Niki Panteli, Willia...
COMPSAC
2002
IEEE
14 years 7 days ago
A Shared Information System Architecture for Integrating Risk Management Tools: A Case Study
Many organizations would benefit from enterprise-wide, shared information systems. It is common for these organizations to have in place a number of smaller information systems, e...
Shaosong Xu, Hoh Peter In, Martin S. Feather
CAISE
2006
Springer
13 years 11 months ago
An Efficient Approach to Support Querying Secure Outsourced XML Information
Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...
Yin Yang, Wilfred Ng, Ho Lam Lau, James Cheng