-
1
-
-
72849140987
-
-
White Paper, June Accessed from
-
Azad, A., Barnard M., and Johnson, K. "The future of IT application development", White Paper, IBM Corporation, June 2007, Accessed from: http://www-935.ibm.com/services/hk/cio/pdf/sourcing-wp-gtw01473-usen-00.pdf
-
(2007)
The Future of IT Application Development
-
-
Azad, A.1
Barnard, M.2
Johnson, K.3
-
2
-
-
78149314889
-
-
BASDA, White Paper, The Business Application Software Developer's Association, Accessed from
-
BASDA, "IT Implications of Sarbanes-Oxley: Challenge or Opportunity", White Paper, The Business Application Software Developer's Association, 2005. Accessed from: http://www.pwc.com/en-LU/lu/it-effectiveness/ docs/pwc-sarbanes-oxley210606.pdf
-
(2005)
IT Implications of Sarbanes-Oxley: Challenge or Opportunity
-
-
-
3
-
-
71049183594
-
A Coordination Risk Analysis Method for Multi-Site Projects: Experience Report
-
Bass, M., Herbsleb, J. D. and Lescher, C., "A Coordination Risk Analysis Method for Multi-Site Projects: Experience Report" in 2009 IEEE International Conference on Global Software Engineering, July, 2009, pp. 31-40
-
2009 IEEE International Conference on Global Software Engineering, July, 2009
, pp. 31-40
-
-
Bass, M.1
Herbsleb, J.D.2
Lescher, C.3
-
4
-
-
24144475007
-
What ERP systems can tell us about Sarbanes-Oxley
-
Brown, W. and Nasuti, F. "What ERP systems can tell us about Sarbanes-Oxley", Information Management & Computer Security, Vol. 13 No. 4, 2005, pp. 311-327
-
(2005)
Information Management & Computer Security
, vol.13
, Issue.4
, pp. 311-327
-
-
Brown, W.1
Nasuti, F.2
-
5
-
-
42749103071
-
Integrating Pattern Concepts and Network Security Architecture
-
Brown, S. G. and Yip, F., "Integrating Pattern Concepts and Network Security Architecture," In Network Operations and Management Symposium, 2006, 10th IEEE/IFIP, 3-7 April 2006, pp. 1-4
-
Network Operations and Management Symposium, 2006, 10th IEEE/IFIP, 3-7 April 2006
, pp. 1-4
-
-
Brown, S.G.1
Yip, F.2
-
6
-
-
47949098002
-
Global Software Development: Are Architecture Rules the Answer?
-
Clerc, V., Lago, P. and Vliet, H. "Global Software Development: Are Architecture Rules the Answer?", in 2007 IEEE International Conference on Global Software Engineering, Aug. 2007, pp. 225-234
-
2007 IEEE International Conference on Global Software Engineering, Aug. 2007
, pp. 225-234
-
-
Clerc, V.1
Lago, P.2
Vliet, H.3
-
8
-
-
56349117736
-
Managing Risks in Global Softwre Engineering: Principles and Practices
-
Ebert, C., Murthy, B. K. and Jha, N. N., "Managing Risks in Global Softwre Engineering: Principles and Practices," in 2008 IEEE International Conference on Global Software Engineering, Aug. 2008, pp. 131-140
-
2008 IEEE International Conference on Global Software Engineering, Aug. 2008
, pp. 131-140
-
-
Ebert, C.1
Murthy, B.K.2
Jha, N.N.3
-
10
-
-
33645587088
-
-
10 October Accessed from
-
Gartner Group, "Sarbanes-Oxley Compliance Demands IS Involvement", 10 October 2003, Accessed from: http://www.gartner.com/ DisplayDocument?id=412275
-
(2003)
Sarbanes-Oxley Compliance Demands IS Involvement
-
-
-
11
-
-
38649089462
-
Global Software Development Challenges: A Case Study on Temporal, Geographical and Socio-Cultural Distance
-
Holmstrom, H., Cochuir, E., Ågerfalk, P. J. and Fitzgerald, B. "Global Software Development Challenges: A Case Study on Temporal, Geographical and Socio-Cultural Distance", in 2006 IEEE International Conference on Global Software Engineering, Oct. 2006, pp. 3-11
-
2006 IEEE International Conference on Global Software Engineering, Oct. 2006
, pp. 3-11
-
-
Holmstrom, H.1
Cochuir, E.2
Ågerfalk, P.J.3
Fitzgerald, B.4
-
12
-
-
78149345231
-
-
White Paper, Feburary Accessed from
-
IBM Global Technology Service, "Outsourcing and Informatino Security," White Paper, Feburary 2009. Accessed from: http://www-935.ibm. com/services/nl/gts/pdf/white-paper-v01.pdf
-
(2009)
Outsourcing and Informatino Security
-
-
-
18
-
-
27544511562
-
Enterprise Architecting: Critical Problems
-
Kaisler, S. H., Armour F. and Valivullah, M., "Enterprise Architecting: Critical Problems", in Proceedings of the 38th Hawaii International Conference on System Sciences, 2005
-
Proceedings of the 38th Hawaii International Conference on System Sciences, 2005
-
-
Kaisler, S.H.1
Armour, F.2
Valivullah, M.3
-
19
-
-
71049190131
-
Critical Success Factors for Offshore Software Development Outsourcing Vendors: A Systematic Literature Review
-
Khan, S. U., Niazi, M. and Ahmad, R., "Critical Success Factors for Offshore Software Development Outsourcing Vendors: A Systematic Literature Review", in 2009 Fourth IEEE International Conference on Global Software Engineering, July 2009, pp.207-216.
-
2009 Fourth IEEE International Conference on Global Software Engineering, July 2009
, pp. 207-216
-
-
Khan, S.U.1
Niazi, M.2
Ahmad, R.3
-
20
-
-
70849124838
-
-
Report for Confederation of Swedish Enterprise, Sweden, September Accessed from
-
Magnusson, C., "Corporate Governance, Internal Control and Compliance - From an Information Security Perspective," Report for Confederation of Swedish Enterprise, Sweden, September 2007, Accessed from: http://www.svensktnaringsliv.se/material/rapporter/corporate-governance- internal-control-and-compliance-from-aninfo-35898.html
-
(2007)
Corporate Governance, Internal Control and Compliance - From An Information Security Perspective
-
-
Magnusson, C.1
-
21
-
-
70449124522
-
Enterprise Information Security Architecture: A Review of Frameworks, Methodology, and Case Studies
-
Oda, S. M., Fu, H. and Zhu, Y., "Enterprise Information Security Architecture: A Review of Frameworks, Methodology, and Case Studies", in Proceeding of the 2009 2nd IEEE International Conference on Computer Science and Information Technology, Beijing, 2009, pp.333-337
-
(2009)
Proceeding of the 2009 2nd IEEE International Conference on Computer Science and Information Technology, Beijing
, pp. 333-337
-
-
Oda, S.M.1
Fu, H.2
Zhu, Y.3
-
22
-
-
14344263049
-
Global Software Development in Practice Lessons Learned
-
October/December
-
Prikladnicki, R., Audy, J. and Evaristo R., "Global Software Development in Practice Lessons Learned," Software Process: Improvement and Practice, vol 8, Issue 4, October/December 2003, pp. 267-281
-
(2003)
Software Process: Improvement and Practice
, vol.8
, Issue.4
, pp. 267-281
-
-
Prikladnicki, R.1
Audy, J.2
Evaristo, R.3
-
23
-
-
34249853217
-
-
San Francisco, CA: CMP Books
-
Sherwood, J., Clark, A. and Lynas, D., "Enterprise Security Architecture: A Business Driven Approach", San Francisco, CA: CMP Books, 2005
-
(2005)
Enterprise Security Architecture: A Business Driven Approach
-
-
Sherwood, J.1
Clark, A.2
Lynas, D.3
-
24
-
-
78149310644
-
S-TRAIS: A Method for Security Requirements Engineering Using a Standards Based Network Security Reference Model
-
Accessed from
-
Stephenson, P. "S-TRAIS: A Method for Security Requirements Engineering Using a Standards Based Network Security Reference Model," in Conference Proceedings from SREIS 2005, Accessed from http://www.sreis.org/old/ 2001/papers/sreis018.pdf
-
Conference Proceedings from SREIS 2005
-
-
Stephenson, P.1
-
25
-
-
78149335888
-
-
Symantec Corporation, White Paper: Enterprise Security, Accessed from
-
Symantec Corporation, "Lessons Learned for SOX Compliance and Other Regulatory Challenges," White Paper: Enterprise Security, 2008, Accessed from: http://ww2.ost-us.com:5051/White%20Papers/Lessons%20Learned%20for%0SOX.pdf
-
(2008)
Lessons Learned for SOX Compliance and Other Regulatory Challenges
-
-
-
27
-
-
0001134191
-
A framework for information systems architecture
-
Zachman, J. A. , "A framework for information systems architecture", IBM Systems Journal, Vol. 26, No 3, 1987, pp. 276-292
-
(1987)
IBM Systems Journal
, vol.26
, Issue.3
, pp. 276-292
-
-
Zachman, J.A.1
|