Sciweavers

4033 search results - page 28 / 807
» Design patterns in enterprise
Sort
View
CNSM
2010
13 years 8 months ago
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel approach to assess the information assurance delivered by ...
Amy Fedyk, Michael Atighetchi, Partha Pratim Pal
CHI
2008
ACM
14 years 11 months ago
Results from deploying a participation incentive mechanism within the enterprise
Success and sustainability of social networking sites is highly dependent on user participation. To encourage contribution to an opt-in social networking site designed for employe...
Rosta Farzan, Joan Morris DiMicco, David R. Millen...
HICSS
2011
IEEE
235views Biometrics» more  HICSS 2011»
13 years 2 months ago
What Are the Business Benefits of Enterprise Mashups?
Enterprise mashups (EMs) are a new technology that enables the automation of situational needs of knowledge workers. EMs imply a new development paradigm based on the peer product...
Volker Hoyer, Katarina Stanoevska-Slabeva, Simone ...
ACSAC
1998
IEEE
14 years 3 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
JDCTA
2008
160views more  JDCTA 2008»
13 years 10 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...