Sciweavers

3149 search results - page 74 / 630
» IT security risk management
Sort
View
IJUFKS
2006
64views more  IJUFKS 2006»
13 years 9 months ago
Cautious Analysis of Project Risks by Interval-Valued Initial Data
One of the most common performance measures in selection and management of projects is the Net Present Value (NPV). In the paper, we study a case when initial data about the NPV p...
Lev V. Utkin
BPM
2008
Springer
164views Business» more  BPM 2008»
13 years 11 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
ACSAC
1999
IEEE
14 years 1 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
ISBI
2008
IEEE
14 years 9 months ago
Supervised shape analysis for risk assessment in osteoporosis
Early diagnosis and treatment of patients at high risk of developing fragility fractures is crucial in the management of osteoporosis. In this paper we propose to estimate the ris...
Marleen de Bruijne, Paola Pettersen
SEAFOOD
2007
Springer
14 years 3 months ago
Questionnaire-Based Risk Assessment Scheme for Japanese Offshore Software Outsourcing
Abstract. As the volumes of software development increase and the cost reduction is required, most Japanese IT companies are interested in offshore software outsourcing. Although a...
Hiroshi Tsuji, Akito Sakurai, Kenichi Yoshida, Amr...