Sciweavers

1412 search results - page 21 / 283
» The Value of Outsourced Software
Sort
View
CIMCA
2008
IEEE
14 years 3 months ago
Analysing Boundary Objects to Develop Results that Support Business Goals
In this study of eight outsourcing projects, we seek to understand the mechanisms that companies put in place to coordinate knowledge work across their boundaries. We find that m...
María Laura Ponisio, Peter Vruggink
EUROPKI
2005
Springer
14 years 2 months ago
CA-in-a-Box
An enterprise (such as an institute of higher education) wishing to deploy PKI must choose between several options, all expensive and awkward. It might outsource certification to ...
Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshu...
ECIS
2004
13 years 10 months ago
Value-based business modelling for network organizations: lessons learned from the electricity sector
Speed and availability of information, delivered in past years by Internet technologies, made it easier for any company to outsource primary activities, which resulted in unbundli...
Vera Kartseva, Jaap Gordijn, Yao-Hua Tan
AGILEDC
2006
IEEE
14 years 2 months ago
Appropriate Agile Measurement: Using Metrics and Diagnostics to Deliver Business Value
Agile Software Development continually measures both our product and the process used to create it, to allow improvement. With increased popularity, more risk-averse groups are be...
Deborah Hartmann, Robin Dymond
ICSE
2007
IEEE-ACM
14 years 8 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen