Sciweavers

152 search results - page 10 / 31
» Modeling dependencies in security risk management
Sort
View
IJVR
2008
140views more  IJVR 2008»
13 years 9 months ago
Modelling Autonomous Virtual Agent Behaviours in a Virtual Environment for Risk
Our research deals with the design of a training system to support decision-making in the preparation and the management of maintenance interventions in high-risk industries namely...
Lydie Edward, Domitile Lourdeaux, Jean-Paul A. Bar...
IJMI
2007
134views more  IJMI 2007»
13 years 9 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
NSPW
2006
ACM
14 years 3 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
MKWI
2008
246views Business» more  MKWI 2008»
13 years 11 months ago
Assessing the effects of IT changes on IT risk - A business process-oriented view
Abstract: The economic relevance of IT risk is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and risi...
Stefan Sackmann
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 10 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi