Sciweavers

3149 search results - page 73 / 630
» IT security risk management
Sort
View
HICSS
2007
IEEE
162views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value-at-Risk in IT Services Contracts
As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, a...
Robert J. Kauffman, Ryan Sougstad
IPPS
2007
IEEE
14 years 3 months ago
Integrated Risk Analysis for a Commercial Computing Service
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs w...
Chee Shin Yeo, Rajkumar Buyya
EUSFLAT
2009
196views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
Organizational Risk Assessment using Adaptive Neuro-Fuzzy Inference System
In this paper a fuzzy model based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is introduced for calculating the level of risk in managerial problems. In this model, affecting ...
Javad J. Jassbi, Sohrab Khanmohammadi
IJMI
2007
134views more  IJMI 2007»
13 years 9 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
PET
2010
Springer
14 years 28 days ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol