NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3
hits: 21
1.
  • Identifying Software Projec... Identifying Software Project Risks: An International Delphi Study
    Schmidt, Roy; Lyytinen, Kalle; Keil, Mark ... Journal of management information systems, 03/2001, Volume: 17, Issue: 4
    Journal Article
    Peer reviewed

    Advocates of software risk management claim that by identifying and analyzing threats to success (i.e., risks) action can be taken to reduce the chance of failure of a project. The first step in the ...
Full text
2.
  • Academic IS Risk Management... Academic IS Risk Management using OCTAVE Allegro in Educational Institution
    Gerardo, Vincentius; Fajar, Ahmad Nurul Journal of information systems and informatics (Palembang.Online), 09/2022, Volume: 4, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Today, the use of technology is a common thing that is used to support everyday life. However, this technology also carries risks that can compromise the security of information in organizations. ...
Full text
3.
  • Exploring Risks Transferred... Exploring Risks Transferred from Cloud-Based Information Systems: A Quantitative and Longitudinal Model
    Bouaynaya, Wafa; Lyu, Hongbo; Zhang, Zuopeng Justin Sensors, 10/2018, Volume: 18, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    With the growing popularity of Internet of Things (IoT) and Cyber-Physical Systems (CPS), cloud- based systems have assumed a greater important role. However, there lacks formal approaches to ...
Full text

PDF
4.
  • Managing Risks: Post-Merger... Managing Risks: Post-Merger Integration of Information Systems
    Alaranta, Maria; Mathiassen, Lars IT professional, 2014-Jan.-Feb., 2014-01-00, 20140101, Volume: 16, Issue: 1
    Journal Article
    Peer reviewed

    Mergers and acquisitions (M&A) require organizations to blend together different information system (IS) configurations. Unfortunately, less than 50 percent of M&A's achieve their goals, with IS ...
Full text
5.
  • A framework for ex ante pro... A framework for ex ante project risk assessment based on absorptive capacity
    Cuellar, Michael J.; Gallivan, Michael J. European journal of operational research, 09/2006, Volume: 173, Issue: 3
    Journal Article
    Peer reviewed

    This paper explores the applicability of the concepts of absorptive capacity and “ ba” to ex ante project risk. We develop a hybrid framework to explain knowledge transfer based on these concepts—one ...
Full text
6.
  • Risk management practices i... Risk management practices in IS outsourcing: an investigation into commercial banks in Nigeria
    Adeleye, Bunmi Cynthia; Annansingh, Fenio; Nunes, Miguel Baptista International journal of information management, 04/2004, Volume: 24, Issue: 2
    Journal Article
    Peer reviewed

    This research work focuses on the risk management practices adopted by Commercial Banks in Nigeria that are related to the outsourcing of information systems (IS). The need for the research emerged ...
Full text
7.
  • Classifying Information Sys... Classifying Information Systems Risks: What Have We Learned So Far?
    Wiesche, M.; Keskinov, H.; Schermann, M. ... 2013 46th Hawaii International Conference on System Sciences, 2013-Jan.
    Conference Proceeding

    Understanding the risks caused by relying on information systems is an enduring research stream in the Information Systems (IS) discipline. With information systems becoming ubiquitous, IS risks ...
Full text
8.
  • Towards the Optimal Securit... Towards the Optimal Security Level: Quantification of Risks in Service-Based Information Systems
    Ackermann, Tobias; Widjaja, Thomas; Buxmann, Peter 2013 46th Hawaii International Conference on System Sciences, 2013-Jan.
    Conference Proceeding

    The increasing frequency and total cost of security incidents require organizations to apply proper IS risk management in order to assess the economically reasonable usage of security measures. In ...
Full text
9.
  • Understanding IT Governance... Understanding IT Governance: A Case of Two Financial Mutuals
    Robb, Alastair; Parent, Michael Journal of global information management, 07/2009, Volume: 17, Issue: 3
    Journal Article
    Peer reviewed

    Legislators, regulators, and shareholders increasingly demand good governance over all aspects of their business. While much is made of financial governance, most legislation and regulation ...
Full text
10.
  • Evaluation Of IS Risk Management Using Octave Allegro In Education Division
    Suroso, Jarot S.; Rahaju, Sri Mumpuni Ngesti; Kusnadi 2018 International Conference on Orange Technologies (ICOT), 2018-Oct.
    Conference Proceeding

    Nowadays, information systems is an important point in supporting business strategies including in education division. Critical assets related to information systems are very susceptible to threats ...
Full text
1 2 3
hits: 21

Load filters