Sciweavers

378 search results - page 8 / 76
» Security requirement analysis of business processes
Sort
View
ASE
2008
120views more  ASE 2008»
13 years 7 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
CAISE
2003
Springer
14 years 23 days ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen
ECWEB
2004
Springer
177views ECommerce» more  ECWEB 2004»
14 years 28 days ago
Analysis of Mobile Business Processes for the Design of Mobile Information Systems
Abstract. The adoption of mobile technologies into companies frequently follows a technology -driven approach without precise knowledge about the potential benefits that may be rea...
André Köhler, Volker Gruhn
CAISE
2004
Springer
14 years 28 days ago
Impact Analysis for Supporting the Co-Evolution of Business Processes and Supporting Software Systems
The co-evolution of business processes and supporting software systems is needed for keeping them aligned and it requires managerial and technological effort for adequately plannin...
Thierry Bodhuin, Raffaele Esposito, Cristina Pacel...
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
14 years 1 months ago
Organizational Impacts of Cyber Security Provisions: A Sociotechnical Framework
In this paper, we outline a conceptual framework for linking cyber security provisions to business processes. The framework is presented for use in analyzing the cost and performa...
Anthony M. Cresswell, Shahidul Hassan