نتایج جستجو برای: it

تعداد نتایج: 2839407  

Journal: :IJNGC 2013
Victor Chang

This paper presents Business Integration as a Service (BIaaS) which enables connections between services operating in the Cloud. BIaaS integrates different services and business activities to achieve a streamline process. We illustrate this integration using two services; Return on Investment (ROI) Measurement as a Service (RMaaS) and Risk Analysis as a Service (RAaaS) including small and mediu...

2015

This chapter presents a guided tour of the CORAS method. As illustrated by Fig. 3.1, the CORAS method is divided into eight steps. The first four of these steps are introductory in the sense that we use them to establish a common understanding of the target of the analysis, and to make the target description that will serve as a basis for the subsequent risk identification. The introductory ste...

Journal: :Information Systems Frontiers 2011
Stefan Strecker David Heise Ulrich Frank

Stakeholder involvement and participation are widely recognized as being key success factors for IT risk assessment. A particular challenge facing current IT risk assessment methods is to provide accessible abstractions on matters of IT risk that attend to both managerial and technical perspectives of the stakeholders involved. In this paper, we investigate whether a conceptual modeling method ...

Journal: :JoWUA 2013
Yutaka Matsuno Shuichiro Yamamoto

We present a framework for dependability consensus building and in-operation assurance for information systems, and show the current prototype implementation. Today, information systems are ever changing systems: they are always modified and updated to satisfy user’s changing requirements and deal with environmental changes. Furthermore, information systems must cope with system failures and co...

Journal: :IJOPCD 2013
Cheng-Mei Hsu

The purpose of this study is to construct a web-based learning platform of Computer Support for Collaborative Design (CSCD) based on theories related to a constructivist learning environment model, mind mapping and computer-supported collaborative learning. The platform conforms to the needs of design students and provides effective tools for interaction and collaborative learning by integratin...

2005
Jakub Miler

This paper outlines an approach to the identification of IT-related risk. The risk is identified from the perspective of the services provided by a software system to the users. The approach assumes the investigation of the service failures with the use of failure mode keywords. The service-based risk identification is supplemented with checklists extracted from standards and classical techniqu...

2011
Mass Soldal Lund Bjørnar Solhaug Ketil Stølen

Risk analysis is the identification and documentation of risks with respect to an organisation or a target system. Established risk analysis methods and guidelines typically focus on a particular system configuration at a particular point in time. The resulting risk picture is then valid only at that point in time and under the assumptions made when it was derived. However, systems and their en...

2005
Åke J. Holmgren

This paper discusses various approaches to risk analysis of infrastructure systems. The discussion is applied to electric power delivery systems, i.e. transmission and distribution of electric power, with an emphasis on the electric power grid in Sweden. In reviewing a number of the methods of risk analysis, it is concluded that methods from the systems safety and reliability discipline can to ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1389

the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم اجتماعی و اقتصادی 1388

از اصلی ترین روش های کسب اطمینان از برقراری همراستایی کسب و کار و it ، استقرار و پیاده سازی کارت امتیازی متوازن فناوری اطلاعات است. تحقیق حاضر با هدف ارائه مدلی انجام شده است که مکانیزمی را برای تحقق این امر پیشنهاد دهد. در طراحی این مکانیزم ضمن بررسی دو مفهوم «همراستایی» و «حاکمیت it» مدل ها و ابزارهای پیاده سازی آنها نیز بررسی شده و بر آن اساس مدلی عمومی تأمین همراستایی طراحی شده است. از چارچ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید