نتایج جستجو برای: it wouldn

تعداد نتایج: 2839413  

Journal: :J. of Management Information Systems 1991
R. Kelly Rainer Charles A. Snyder Houston H. Carr

As Information Technology (IT) has become increasingly important to the competitive position of firms, managers have grown more sensitive to their organization's overall IT risk management. Recent publicity concerning losses incurred by companies becauseofproblcms with their sophisticated information systems has focused attention on the importance of these systems to the organization. In an att...

Journal: :CoRR 2013
Sasa Petrovic Miles Osborne Victor Lavrenko

Twitter has become a major source of data for social media researchers. One important aspect of Twitter not previously considered are deletions – removal of tweets from the stream. Deletions can be due to a multitude of reasons such as privacy concerns, rashness or attempts to undo public statements. We show how deletions can be automatically predicted ahead of time and analyse which tweets are...

2014
Janno von Stülpnagel Jens Ortmann Joerg Schoenfisch

We present a solution for modeling the dependencies of an IT infrastructure and determine the availability of components and services therein using Markov logic networks (MLN). MLNs offer a single representation of probability and first-order logic and are well suited to model dependencies and threats. We identify different kinds of dependency and show how they can be translated into an MLN. Th...

2007

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

2010
Manfred Pauli Michael Schermann Helmut Krcmar

A risk inventory provides an integrated view on risk management artifacts, e.g., risks, risk controls, and performance indicators. In this paper, we show how adapting the enterprise architecture management processes (EAM) may provide a foundation for an integrated IT risk inventory. Based on a design research approach, we develop a systematic approach for integrating the disciplines of risk man...

Shirin Rajabzade, Zohre Akhavan Moghaddam,

We encounter with some pronouns in the Holy Quran that are with no reference. Of course this makes mind search for their reference with regard to the verses’ meaning and intention, otherwise it views as subjective interpretation of Quranic text. One of these cases is the pronoun ‘this’ in (7: 43) in which anyone who is in Paradise says: “All praise is due to Allah who gu...

2006
Frank Innerhofer-Oberperfler Ruth Breu

In this paper we propose a novel approach for the systematic assessment and analysis of IT related risks in organisations and projects. The approach is model-driven using an enterprise architecture as the basis for the security management process. Using an enterprise architecture it is possible to provide an integrated description of an organisation’s structure, processes and its underlying IT ...

2008
Lutz Lowis

IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [GLLR06] demonstrates. According to the survey, many companies consider it important to quantify the losses attacks against their IT systems cause but are unable to do so. In service-oriented architectures, we see a promi...

Journal: :Int. Arab J. Inf. Technol. 2016
Morteza Hatefi Mehdi Fasanghari

The use of Information Technology (IT) in organizations is subject to various kinds of potential risks. Risk management is a key component of project management enables an organization to accomplish its mission(s). However, IT projects have often been found to be complex and risky to implement in organizations. The organizational relevance and risk of IT projects make it important for organizat...

Journal: :J. Symb. Log. 2015
Merlin Carl

Exploring further the properties of ITRM -recognizable reals started in [Ca], we provide a detailed analysis of recognizable reals and their distribution in Gödels constructible universe L. In particular, we show that new unrecognizables are generated at every index γ ≥ ω ω . We give a machine-independent characterization of recognizability by proving that a real r is recognizable iff it is Σ1-...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید