نتایج جستجو برای: it infrastructure

تعداد نتایج: 2897051  

Journal: :Simulation Modelling Practice and Theory 2012
Ozhan Alper Almaz Tayfur Altiok

This paper deals with simulation modeling of the vessel traffic in Delaware River. The purpose is to study the impact of deepening on the navigational efficiency in the River. In this regard, vessel calls to terminals, lightering and barge operations, tidal and navigational rules in the River, terminal and anchorage properties as well as vessel profiles are considered in the model. The simulati...

2013
Limao Zhang Miroslaw J. Skibniewski Xianguo Wu Yueqing Chen Qianli Deng

2008
Stefan Sackmann

The economic relevance of IT risks is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and increasing dependability on IT require continuous risk assessment, challenging current methods for risk management. Extending IT risk management by a business process-oriented view is a promising approach for taking the occurring ...

Journal: :First Monday 2002
Rich Ling Kristin Thrane

This paper is an analysis of how Norwegians use television and the Internet in their leisure time. It sets up a taxonomy using the degree of engagement in the mediated information on one axis and the degree of sociability on the other. Within this matrix one can examine the similarities and differences between the two media and also differences between the generations. The analysis is based on ...

2015
Manuel Wiesche Michael Schermann Helmut Krcmar

Although managing information technology (IT) risks is widely regarded as a critical in organizations, stakeholders often question the value provided by IT risk management (ITRM) to an organization. Organizational research suggests the concept of ‘enabling formalization’ to design highly formalized organizational processes. Processes like IT-RM that are designed in an enabling way support organ...

2008
Bastian Schlaak Scott Dynes Lutz Kolbe Ragnar Schierholz

IT security issues and outsourcing of business processes are common but largely disjoint themes in the literature; common consideration is rare even though information security risk becomes a shared risk both through IS-based processes at outsourcing partners and potentially tightly-integrated IS systems. This paper explores this lack of an integrated model combining IT risk management view wit...

2005
Stefanie Jahner Helmut Krcmar

Increasing numbers of security incidents such as malware or hacker attacks prompt companies to spend billions of dollars on protecting their information systems. In this context IT risk management (ITRM) has become an important organizational function to control internal and external risks associated with IT. Much effort has been put on mitigating IT risks by means of physical, procedural, and ...

2011
Wen-Hsien Tsai

The implementation team problem is one of the critical elements lead to ERP project failure. The purpose of this research is to explore the relationship between team risk factors and IT governance. The IT governance includes five important domains, that is, IT strategic alignment, IT value delivery, IT resource management, IT risk management, and IT performance management. Our research results ...

2014

Take a strip of paper with ‘once upon a time there’ written on one side and ‘was a story that began’ on the other. Twisting the paper and joining the ends produces John Barth’s story Frame-Tale, which prefixes ‘once upon a time there was a story that began’ to itself. In this paper, I argue that the possibility of understanding Frame-Tale cannot be explained by tacit knowledge of a recursive th...

2006
Andriy Panchenko Lexi Pimenidis

There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract therefore difficult to generalize or even identify in real networks. While some papers distinct different attacker types, the usual approach is to present an anonymization technique and then to develop an attacker model for it in order to identify properties o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید