Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
We present fundamental concepts of risk and propose two methods for risk management of a portfolio in this paper. Moreover, we introduce their novel extensions to trading in multi...
— Requirements changes during software development pose a risk to cost, schedule and quality while at the same time providing an opportunity to add value. Provision of a generic ...
Continuous failures in ERP systems implementation project are today the main challenge in the feasibility of integrated information systems. Failure can be determined by different...
This paper explores the applicability of the concepts of absorptive capacity and ``ba'' to ex ante project risk. We develop a hybrid framework to explain knowledge trans...