Sciweavers

1422 search results - page 16 / 285
» Information security and risk management
Sort
View
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 1 months ago
Situational method engineering for governance, risk and compliance information systems
Against the background of the current financial crisis and an aftermath of increasing regulation, companies enhance and integrate information systems in the areas of risk manageme...
Anke Gericke, Hans-Georg Fill, Dimitris Karagianni...
IEEEARES
2007
IEEE
14 years 3 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
KES
2007
Springer
14 years 2 months ago
Credal Networks for Operational Risk Measurement and Management
According to widely accepted guidelines for self-regulation, the capital requirements of a bank should relate to the level of risk with respect to three different categories. Amon...
Alessandro Antonucci, Alberto Piatti, Marco Zaffal...
SERP
2004
13 years 10 months ago
Using UML in a Risk-Driven Development Process
Risk-driven development focus on identifying and treating risks as an integrated part of the development process. One then obtain an adequate security level by treating security i...
Siv Hilde Houmb, Ørjan Markhus Lillevik
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
14 years 3 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...