Sciweavers

405 search results - page 10 / 81
» Avatar-centric Risk Evaluation
Sort
View
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 4 months ago
Evaluating Offshore IT Outsourcing in India: Supplier and Customer Scenarios
This paper presents the findings from an ongoing research study on offshore IT outsourcing. Field work was carried out in India and in the UK to evaluate the scale and scope of ou...
Naureen Khan, Wendy Currie, Vishanth Weerakkody, B...
HICSS
2003
IEEE
221views Biometrics» more  HICSS 2003»
14 years 4 months ago
"Applying TAM to E-Services Adoption: The Moderating Role of Perceived Risk"
Consumer adoption of e-services is an important goal for many service providers, however little is known about how different consumer segments perceive and evaluate them for adopt...
Mauricio Featherman, Mark A. Fuller
KES
2007
Springer
14 years 5 months ago
Credal Networks for Operational Risk Measurement and Management
According to widely accepted guidelines for self-regulation, the capital requirements of a bank should relate to the level of risk with respect to three different categories. Amon...
Alessandro Antonucci, Alberto Piatti, Marco Zaffal...
TII
2011
206views Education» more  TII 2011»
13 years 5 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
IFIP12
2008
14 years 9 days ago
Addressing Risk Assessment for Patient Safety in Hospitals through Information Extraction in Medical Reports
: Hospital Acquired Infections (HAI) is a real burden for doctors and risk surveillance experts. The impact on patients' health and related healthcare cost is very significant...
Denys Proux, Frédérique Segond, Solw...