Showing 1 - 10 of 14
The starting point of this research essay is a critical review of two methods to conduct a quantitative analysis of information systems security risks: 1) Management of Risk: Guidance for Practitioners and 2) a cost model based on annual loss expectancy. We are focusing on these methods with a...
Persistent link: https://www.econbiz.de/10013026191
In a world of information and people mobility, Lotus suite provided by IBM is able to provide benefits for its users. The portal solution is a collection of technologies that work together to aggregate selected information into a central location and reflects the vision about the way in which...
Persistent link: https://www.econbiz.de/10014057903
The enterprise applications have more and more importance in the present conditions of globalization and economic competition. Many companies understand the importance of integration to tie together their systems and the systems of their customers, partners and suppliers. Application integration...
Persistent link: https://www.econbiz.de/10014057913
The tone of our paper oscillates between pessimism and optimism as, although we will attempt to outline the necessity for this field of activity, we will not omit the sad state of technological growth/development in the Romanian businesses, all within the context of an accelerated/rapid...
Persistent link: https://www.econbiz.de/10014057915
The business environment of the new millennium is responsive, dynamic, and competitive and is in a constant state of customer-centres change. It has been argued that effective Information Technology/Information System (IT/IS) project implementation requires a clear business vision, which...
Persistent link: https://www.econbiz.de/10014057926
This paper presents main security risk assessment methodologies used in information technology. The author starts from [Sherer and Alter, 2004] and [Ma and Pearson, 2005] research, bringing realworld examples as to underline limitations of the two risk assessment models. After a critical review...
Persistent link: https://www.econbiz.de/10012752150
Purpose This study aims to argue that in the case of quantitative security risk assessment, individuals do not estimate probabilities as a likelihood measure of event occurrence. Design/methodology/approach The study uses the most commonly used quantitative assessment approach, the annualized...
Persistent link: https://www.econbiz.de/10014754776
An effective business strategy centers on a forceful and efficient use of information technology; for this reason the ERP systems have emerged as the core of successful information management and the backbone of the enterprise information system. A valuable ERP system modernizes business...
Persistent link: https://www.econbiz.de/10013129863
Persistent link: https://www.econbiz.de/10014584121
Over the last 2-3 decades, investments in the new information technology (NIT) have left a deep impression on the life of organisations, that goes beyond ample differences in each organisation’s degree of automatisation. Furthermore, although the generalisation of NIT investment has not...
Persistent link: https://www.econbiz.de/10009416602