نتایج جستجو برای: keywords it system
تعداد نتایج: 5678161 فیلتر نتایج به سال:
We present a framework for dependability consensus building and in-operation assurance for information systems, and show the current prototype implementation. Today, information systems are ever changing systems: they are always modified and updated to satisfy user’s changing requirements and deal with environmental changes. Furthermore, information systems must cope with system failures and co...
This paper outlines an approach to the identification of IT-related risk. The risk is identified from the perspective of the services provided by a software system to the users. The approach assumes the investigation of the service failures with the use of failure mode keywords. The service-based risk identification is supplemented with checklists extracted from standards and classical techniqu...
Risk analysis is the identification and documentation of risks with respect to an organisation or a target system. Established risk analysis methods and guidelines typically focus on a particular system configuration at a particular point in time. The resulting risk picture is then valid only at that point in time and under the assumptions made when it was derived. However, systems and their en...
In this paper, we propose a model for enabling users to search RDF data via keywords, thus, allowing them to discover relevant information without using complicated queries or knowing the underlying ontology or vocabulary. We aim at exploiting the characteristics of the RDF data to increase the quality of the ranked query results. We consider different dimensions for evaluating the value of res...
In a constantly changing job market, Information Technology (IT) practitioners must keep their skills up-to-date. Educational institutions with Informational Technology curricula must also keep current in course offerings and programs of study. One way to maintain relevance is to examine and identify what IT skills and competencies are in demand. Job positions, indicating current expertise need...
The objective of this study is to explore the criteria of effective information technology governance processes employed in universities and their impact on the diffusion of appropriate technology to the base level users. From this analysis, we hope to develop a set of best practice guidelines for IT governance and related processes in respect of universities. This will realize significant bene...
Shadow IT is relatively new and emerging phenomenon which is bringing number of concerns and risks to the organizational security. Past literature has mostly explored the “negative” effects of the Shadow IT phenomenon, including, for example, the security aspect where Shadow systems are said to undermine the official systems and endanger organizational data flows. But, they are also said to inc...
Information Technology (IT) used for business processes is not only provided by the organization’s IT department. Business departments and users autonomously implement IT solutions, which are not embedded in the organizational IT service management. This increasingly occurring phenomenon is called Shadow IT. The various opportunities and risks of Shadow IT challenge organizations and call for a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید