Sciweavers

3149 search results - page 51 / 630
» IT security risk management
Sort
View
24
Voted
IAW
2003
IEEE
14 years 1 months ago
Methodology of Risk Assessment in Mobile Agent System Design
Ingo McLean, Boleslaw K. Szymanski, Alan Bivens
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
14 years 8 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
ECIS
2003
13 years 9 months ago
Assessing the business consequences of systems risk
Both public media and IS research have produced a detailed view of different risks associated with computers. Measures to prevent systems risks from occurring are also well docume...
Hannu Salmela
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen
WSC
2004
13 years 9 months ago
Simulation of Coherent Risk Measures
In financial risk management, a coherent risk measure equals the maximum expected loss under several different probability measures, which are analogous to systems in ranking and ...
Vadim Lesnevski, Barry L. Nelson, Jeremy Staum