Sciweavers

3149 search results - page 22 / 630
» IT security risk management
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Designing for different levels of social inference risk
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
CCS
2005
ACM
14 years 1 months ago
Risk assessment in distributed authorization
Peter C. Chapin, Christian Skalka, Xiaoyang Sean W...
IEEEARES
2007
IEEE
14 years 1 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
ICSM
2005
IEEE
14 years 1 months ago
A Risk Taxonomy Proposal for Software Maintenance
There can be no doubt that risk management is an important activity in the software engineering area. One proof of this is the large body of work existing in this area. However, w...
Kenia P. Batista Webster, Káthia Març...
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Effect of Group Support Systems on the Emergence of Unique Information in a Risk Management Process: A Field Study
The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
Anne-Françoise Rutkowski, Bartel Van de Wal...