Showing 1 - 8 of 8
The starting point of this research essay is a critical review of two methods to conduct a quantitative analysis of information systems security risks: 1) Management of Risk: Guidance for Practitioners and 2) a cost model based on annual loss expectancy. We are focusing on these methods with a...
Persistent link: https://www.econbiz.de/10013026191
In a world of information and people mobility, Lotus suite provided by IBM is able to provide benefits for its users. The portal solution is a collection of technologies that work together to aggregate selected information into a central location and reflects the vision about the way in which...
Persistent link: https://www.econbiz.de/10014057903
The enterprise applications have more and more importance in the present conditions of globalization and economic competition. Many companies understand the importance of integration to tie together their systems and the systems of their customers, partners and suppliers. Application integration...
Persistent link: https://www.econbiz.de/10014057913
The tone of our paper oscillates between pessimism and optimism as, although we will attempt to outline the necessity for this field of activity, we will not omit the sad state of technological growth/development in the Romanian businesses, all within the context of an accelerated/rapid...
Persistent link: https://www.econbiz.de/10014057915
The business environment of the new millennium is responsive, dynamic, and competitive and is in a constant state of customer-centres change. It has been argued that effective Information Technology/Information System (IT/IS) project implementation requires a clear business vision, which...
Persistent link: https://www.econbiz.de/10014057926
The tone of out paper oscillates between pessimism and optimism as, although we will attempt to outline the necessity for this field of activity, we will not omit the sad state of technological development in the Romanian businesses, all within the context of an accelerated technological growth...
Persistent link: https://www.econbiz.de/10005669023
This paper presents main security risk assessment methodologies used in information technology. The author starts from [Sherer and Alter, 2004] and [Ma and Pearson, 2005] research, bringing realworld examples as to underline limitations of the two risk assessment models. After a critical review...
Persistent link: https://www.econbiz.de/10012752150
Purpose This study aims to argue that in the case of quantitative security risk assessment, individuals do not estimate probabilities as a likelihood measure of event occurrence. Design/methodology/approach The study uses the most commonly used quantitative assessment approach, the annualized...
Persistent link: https://www.econbiz.de/10014754776