Sciweavers

102 search results - page 6 / 21
» A study of information systems outsourcing risks
Sort
View
IJMI
2007
134views more  IJMI 2007»
13 years 7 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 17 days ago
CANDI: A System for Classifying the Security Risks in Network Appliances
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Joseph G. Tront, Randy C. Marchany
AOSE
2006
Springer
13 years 11 months ago
Using Risk Analysis to Evaluate Design Alternatives
Recently, multi-agent systems have proved to be a suitable approach to the development of real-life information systems. In particular, they are used in the domain of safety critic...
Yudistira Asnar, Volha Bryl, Paolo Giorgini
ACMDIS
2004
ACM
14 years 22 days ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
MM
2009
ACM
127views Multimedia» more  MM 2009»
14 years 1 months ago
A crowdsourceable QoE evaluation framework for multimedia content
Until recently, QoE (Quality of Experience) experiments had to be conducted in academic laboratories; however, with the advent of ubiquitous Internet access, it is now possible to...
Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, Chin-Lau...