Sciweavers

3149 search results - page 52 / 630
» IT security risk management
Sort
View
CSO
2009
IEEE
14 years 2 months ago
Competitive Analysis of Online Price Discount Replacement Problem
When a paid price discount activity occurs, the decisionmaker must decide whether or not and when to pay the additional fees for preferential price in an online fashion. This prob...
Lili Ding, Xinmin Liu, Wanglin Kang
WSC
2004
13 years 9 months ago
Fads and Fallacies in Asset Liability Management for Life Insurance
We shall examine the principles behind contemporary approaches to insurance risk management. Furthermore, we shall consider various methodologies, some successful, that have been ...
Graham Lord
LOCA
2009
Springer
14 years 2 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
AISM
2004
13 years 9 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
KBSE
2005
IEEE
14 years 1 months ago
Automated population of causal models for improved software risk assessment
Recent work in applying causal modeling (Bayesian networks) to software engineering has resulted in improved decision support systems for software project managers. Once the causa...
Peter Hearty, Norman E. Fenton, Martin Neil, Patri...