Sciweavers

119 search results - page 16 / 24
» Organisational Information Security: A Viable System Perspec...
Sort
View
HICSS
2006
IEEE
153views Biometrics» more  HICSS 2006»
14 years 3 months ago
IT Governance: Reviewing 17 IT Governance Tools and Analysing the Case of Novozymes A/S
Complexity in information technology architectures and infrastructures, and an increasing need for executives to verify and secure value generation processes in private as well as...
Michael Holm Larsen, Mogens Kühn Pedersen, Ki...
ECIS
2003
13 years 11 months ago
Assessing the performance of an electronic marketplace: a conceptual model and case study
Theories of inter-organisational co-ordination propose that information processing capabilities (structure, process and technology) must be aligned with information processing nee...
Philip O'Reilly, Pat Finnegan
ESSOS
2009
Springer
14 years 4 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
ISI
2007
Springer
14 years 4 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
WWW
2006
ACM
14 years 10 months ago
Archiving web site resources: a records management view
In this paper, we propose the use of records management principles to identify and manage Web site resources with enduring value as records. Current Web archiving activities, coll...
Maureen Pennock, Brian Kelly