Sciweavers

3149 search results - page 156 / 630
» IT security risk management
Sort
View
ESEM
2007
ACM
14 years 1 months ago
Value-Based Empirical Research Plan Evaluation
Empirical studies are crucial to gain evidence on the effects of software engineering methods and tools in defined contexts. However, empirical studies can be costly and thus need...
Stefan Biffl, Dietmar Winkler
ECIS
2000
13 years 10 months ago
Rapid Knowledge Deployment in an Organizational-Memory-Based Workflow Environment
Abstract-- Knowledge management is becoming a fashion in many organizations. This entails the danger that large investments in knowledge externalization are made with little short-...
Ralf Klamma, Sylvia Schlaphof
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 3 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
ECIS
2001
13 years 10 months ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward
ISCC
2005
IEEE
14 years 2 months ago
Location Dependent Digital Rights Management
In this paper we present a concept and an architecture for a location dependent Digital Rights Management system. The solution is based on a trusted hardware which incorporates th...
Thomas Mundt