Sciweavers

960 search results - page 38 / 192
» Business Value Game
Sort
View
CAISE
2007
Springer
14 years 2 months ago
Assessing Feasibility of IT-Enabled Networked Value Constellations: A Case Study in the Electricity Sector
Innovative networked value constellations, such as Cisco or Dell, are often enabled by Information Technology (IT). The same holds for the Distributed Electricity Balancing Service...
Zsófia Derzsi, Jaap Gordijn, Koen Kok, Hans...
KBSE
2009
IEEE
14 years 3 months ago
Understanding the Value of Software Engineering Technologies
SEESAW combines AI search tools, a Monte Carlo simulator, and some software process models. We show here that, when selecting technologies for a software project, SEESAW out-perfo...
Phillip Green II, Tim Menzies, Steve Williams, Ous...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ICMAS
1998
13 years 10 months ago
Simulating Value Chain Coordination with Artificial Life Agents
The increasing use of information technology within and between companies yields changes in the predominant coordination mechanisms. On one hand it is argued that we witness an ov...
Torsten Eymann, Boris Padovan, Detlef Schoder
AIM
2006
13 years 8 months ago
Toward developing web based support systems for enhanced trust among value web chains
: This paper explores the use of the web to build trust among value web chains. Businesses tend to concentrate on the traditional tangible elements of the supply chain and ignore t...
Mokhtar Amami, Jacques Thevenot