Sciweavers

2270 search results - page 201 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
15 years 10 months ago
Understanding CIO Role Effectiveness: The Antecedents and Consequents
This research-in-progress paper describes the development of a research model exploring the antecedents and consequents of CIO role effectiveness. Specifically, we argue that CIO ...
Daniel Q. Chen, David S. Preston
HICSS
2006
IEEE
132views Biometrics» more  HICSS 2006»
15 years 10 months ago
The Impact of Use Situation and Mobility on the Acceptance of Mobile Ticketing Services
This paper presents results from a study of mobile ticketing service acceptance in public transportation. The theoretical background of the study was drawn from technology accepta...
Niina Mallat, Matti Rossi, Virpi Kristiina Tuunain...
ISESE
2005
IEEE
15 years 9 months ago
Risk analysis terminology for IT-systems: does it match intuition?
Many risk specific concepts like “threat”, “consequence” and “risk” belong to the daily language. In a risk analysis one cannot be certain that the participants’ int...
Ida Hogganvik, Ketil Stølen
AGILEDC
2004
IEEE
15 years 7 months ago
An Initial Exploration of the Relationship Between Pair Programming and Brooks' Law
Through his law, "adding manpower to a late software project makes it later," Brooks asserts that the assimilation, training, and intercommunication costs of adding new ...
Laurie A. Williams, Anuja Shukla, Annie I. Ant&oac...
OTM
2010
Springer
15 years 1 months ago
Collaborative Coordination of Activities with Temporal Dependencies
Business process management and systems have been proven mature and highly beneficial in many domains. Recent surveys by leading market analysts say that the next challenge for BPM...
Jörn Franke, François Charoy, Paul El ...