Sciweavers

669 search results - page 14 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ICDIM
2010
IEEE
13 years 5 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
IEEEARES
2008
IEEE
14 years 1 months ago
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
The analysis of business solutions is one of critical issues in industry. Risk is one of the most preeminent and accepted metrics for the evaluation of business solutions. Not sur...
Yudistira Asnar, Rocco Moretti, Maurizio Sebastian...
AIM
2006
13 years 8 months ago
Quality evaluation in information systems outsourcing
: The aim of this study is to assess quality perception of information system (IS) services outsourced by a large Brazilian bank, both from a technical (results) as well as from a ...
Luis Kalb Roses, Norberto Hoppen, Bernard Ballaz, ...
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 8 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu
SIGITE
2004
ACM
14 years 25 days ago
How information technology professionals keep from being outsourced or offshored
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Ron Fulbright, Richard L. Routh