Sciweavers

197 search results - page 12 / 40
» Risk Assessment in Multi-disciplinary (Software ) Engineerin...
Sort
View
SIGSOFT
1998
ACM
14 years 5 days ago
Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method
CT This paper describes experiences from two organizations that have used the Riskit method for risk management in their software projects. This paper presents the Riskit method, t...
Jyrki Kontio, Gerhard Getto, Dieter Landes
RE
2010
Springer
13 years 2 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
ICSE
2012
IEEE-ACM
11 years 10 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
CSREAEEE
2006
103views Business» more  CSREAEEE 2006»
13 years 9 months ago
Software Engineering Employee Motivational Capital Model: SE-EMCM
The business world has been reinventing the human. Employee participative transition projects for management strategies are becoming more important in IT organizations day by day....
Serdar Turkeli
ICSE
2003
IEEE-ACM
14 years 8 months ago
Cost Estimation for Web Applications
In this paper, we investigate the application of the COBRATM method (Cost Estimation, Benchmarking, and Risk Assessment) in a new application domain, the area of web development. ...
Melanie Ruhe, D. Ross Jeffery, Isabella Wieczorek