-
3
-
-
2942517999
-
Management of risks in information technology projects
-
Baccarini, D., Salm, G. and Love, P.E.D. (2004), "Management of risks in information technology projects", Industrial Management & Data Systems, Vol. 104 No. 4, pp. 286-95.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.4
, pp. 286-295
-
-
Baccarini, D.1
Salm, G.2
Love, P.E.D.3
-
4
-
-
0004025223
-
-
Addison-Wesley Boston, MA
-
Bass, L., Clements, P. and Kazman, R. (1997), Software Architecture in Practice, Addison-Wesley, Boston, MA.
-
(1997)
Software Architecture in Practice
-
-
Bass, L.1
Clements, P.2
Kazman, R.3
-
5
-
-
0003718889
-
Security in open system networks: A tutorial survey
-
Bayle, A.J. (1988), "Security in open system networks: a tutorial survey", Information Age, Vol. 10 No. 3, pp. 131-45.
-
(1988)
Information Age
, vol.10
, Issue.3
, pp. 131-145
-
-
Bayle, A.J.1
-
7
-
-
0003547470
-
-
Addison-Wesley Boston, MA
-
Booch, G., Rumbaugh, J. and Jacobson, I. (1999), The UML Modeling Language User Guide, Addison-Wesley, Boston, MA.
-
(1999)
The UML Modeling Language User Guide
-
-
Booch, G.1
Rumbaugh, J.2
Jacobson, I.3
-
8
-
-
0031265425
-
Strategy under uncertainty
-
Courtney, H., Kirkland, J. and Viguerie, P. (1997), "Strategy under uncertainty", Harvard Business Review, Vol. 75 No. 6, pp. 67-79.
-
(1997)
Harvard Business Review
, vol.75
, Issue.6
, pp. 67-79
-
-
Courtney, H.1
Kirkland, J.2
Viguerie, P.3
-
10
-
-
0003716768
-
-
Wiley New York, NY
-
Deise, M.V., Nowikow, C., King, P. and Wright, A. (2000), Executive's Guide to E-business: from Tactics to Strategy, Wiley, New York, NY.
-
(2000)
Executive's Guide to E-business: From Tactics to Strategy
-
-
Deise, M.V.1
Nowikow, C.2
King, P.3
Wright, A.4
-
11
-
-
3242706589
-
Selection and application of risk management tools and techniques for build-operate-transfer projects
-
Dey, P.K. and Ogunlana, S.O. (2004), "Selection and application of risk management tools and techniques for build-operate-transfer projects", Industrial Management & Data Systems, Vol. 104 No. 4, pp. 334-46.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.4
, pp. 334-346
-
-
Dey, P.K.1
Ogunlana, S.O.2
-
13
-
-
2842562928
-
-
Computer Science Press Rockville, MD
-
Fites, P.E., Kratz, M.P.J. and Brebner, A.F. (1989), Controls and Security of Computer Information Systems, Computer Science Press, Rockville, MD.
-
(1989)
Controls and Security of Computer Information Systems
-
-
Fites, P.E.1
Kratz, M.P.J.2
Brebner, A.F.3
-
14
-
-
2342421093
-
New technologies and future trends in computer security
-
Forcht, K.A. and Pierson, J. (1994), "New technologies and future trends in computer security", Industrial Management & Data Systems, Vol. 94 No. 8, pp. 30-6.
-
(1994)
Industrial Management & Data Systems
, vol.94
, Issue.8
, pp. 30-36
-
-
Forcht, K.A.1
Pierson, J.2
-
15
-
-
9144256179
-
Assessing risk in ERP projects: Identify and prioritize the factors
-
Huang, S., Chang, I., Li, S. and Lin, M. (2004), "Assessing risk in ERP projects: identify and prioritize the factors", Industrial Management & Data Systems, Vol. 104 No. 8, pp. 681-8.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.8
, pp. 681-688
-
-
Huang, S.1
Chang, I.2
Li, S.3
Lin, M.4
-
16
-
-
0003535126
-
-
Addison-Wesley Boston, MA
-
Jazayeri, M., Ran, A. and Linden, F.V.D. (2000), Software Architecture for Product Families: Principles and Practice, Addison-Wesley, Boston, MA.
-
(2000)
Software Architecture for Product Families: Principles and Practice
-
-
Jazayeri, M.1
Ran, A.2
Linden, F.V.D.3
-
17
-
-
25144446709
-
Enterprise engineering: A discipline for integrating people, processes and technologies in the knowledge era
-
Johnson, M. and Whitman, L. (1998), "Enterprise engineering: a discipline for integrating people, processes and technologies in the knowledge era", Proceedings of the Business Process and Knowledge Management Conference 1998, Orlando, FL.
-
(1998)
Proceedings of the Business Process and Knowledge Management Conference 1998, Orlando, FL
-
-
Johnson, M.1
Whitman, L.2
-
18
-
-
18844408845
-
An information engineering methodology for the security strategy planning
-
Kim, S. and Leem, C.S. (2004), "An information engineering methodology for the security strategy planning", Lecture Notes in Computer Science, Vol. 3043, pp. 597-607.
-
(2004)
Lecture Notes in Computer Science
, vol.3043
, pp. 597-607
-
-
Kim, S.1
Leem, C.S.2
-
19
-
-
18844441444
-
Security of the internet-based instant messenger: Risks and safeguards
-
Kim, S. and Leem, C.S. (2005), "Security of the internet-based instant messenger: risks and safeguards", Internet Research: Electronic Networking Applications and Policy, Vol. 15 No. 1, pp. 88-98.
-
(2005)
Internet Research: Electronic Networking Applications and Policy
, vol.15
, Issue.1
, pp. 88-98
-
-
Kim, S.1
Leem, C.S.2
-
21
-
-
18844448912
-
-
EDP Auditors Foundation Carol Stream, IL
-
Li, D.H. (1983), Controls in a Computer Environment: Objectives, Guidelines, and Audit Procedures, EDP Auditors Foundation, Carol Stream, IL.
-
(1983)
Controls in A Computer Environment: Objectives, Guidelines, and Audit Procedures
-
-
Li, D.H.1
-
22
-
-
25144510099
-
-
Gartner Inc. Stamford, CT
-
Mack, R., Gerrard, M. and Frey, N. (2002), An IS Perspective on Mergers and Acquisitions: A Six-Stage Handbook, Gartner Inc., Stamford, CT.
-
(2002)
An IS Perspective on Mergers and Acquisitions: A Six-Stage Handbook
-
-
Mack, R.1
Gerrard, M.2
Frey, N.3
-
23
-
-
0018012506
-
Management policies and procedures needed for effective computer security
-
Madnick, S.E. (1978), "Management policies and procedures needed for effective computer security", Sloan Management Review, Vol. 19 No. 3, pp. 61-74.
-
(1978)
Sloan Management Review
, vol.19
, Issue.3
, pp. 61-74
-
-
Madnick, S.E.1
-
24
-
-
25144448067
-
-
Crown Business New York, NY
-
Meyer, C. and Davis, S. (2003), It's Alive, Crown Business, New York, NY.
-
(2003)
It's Alive
-
-
Meyer, C.1
Davis, S.2
-
27
-
-
55249117122
-
A stochastic dominance approach to risk analysis of computer systems
-
Post, G.V. and Diltz, J.D. (1986), "A stochastic dominance approach to risk analysis of computer systems", MIS Quarterly, Vol. 10 No. 4, pp. 363-75.
-
(1986)
MIS Quarterly
, vol.10
, Issue.4
, pp. 363-375
-
-
Post, G.V.1
Diltz, J.D.2
-
28
-
-
70449846056
-
Risk analysis for information technology
-
Rainer, R.K., Snyder, C.A. and Carr, H.H. (1991), "Risk analysis for information technology", Journal of Management Information Systems, Vol. 8 No. 1, pp. 129-47.
-
(1991)
Journal of Management Information Systems
, vol.8
, Issue.1
, pp. 129-147
-
-
Rainer, R.K.1
Snyder, C.A.2
Carr, H.H.3
-
37
-
-
0032623840
-
A framework for information systems architecture
-
Zachman, J.A. (1999), "A framework for information systems architecture", IBM Systems Journal, Vol. 38 Nos 2/3, pp. 450-70.
-
(1999)
IBM Systems Journal
, vol.38
, Issue.23
, pp. 450-470
-
-
Zachman, J.A.1
-
38
-
-
0036262983
-
Business process reengineering for flexibility and innovation in manufacturing
-
Zhang, Q. and Cao, M. (2002), "Business process reengineering for flexibility and innovation in manufacturing", Industrial Management & Data Systems, Vol. 102 No. 3, pp. 146-52.
-
(2002)
Industrial Management & Data Systems
, vol.102
, Issue.3
, pp. 146-152
-
-
Zhang, Q.1
Cao, M.2
|