|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2129 occurrences of 1291 keywords
|
|
|
Results
Found 6267 publication records. Showing 6267 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
107 | Peter G. Neumann |
Risks to the public in computers and related systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 29(5), pp. 13-18, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
81 | Judy E. Scott |
Measuring dimensions of perceived e-business risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. E Bus. Manag. ![In: Inf. Syst. E Bus. Manag. 2(1), pp. 31-56, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust, uncertainty, control, e-business, risk |
65 | Janne Ropponen, Kalle Lyytinen |
Components of Software Development Risk: How to Address Them? A Project Manager Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 26(2), pp. 98-112, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
software development, project management, risk management, process improvement, Software risk, system failures |
62 | Torsten Grzebiela |
Insurability of Electronic Commerce Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 185, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet risks, multilateral security, protection goals, risk management |
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 34(2), pp. 15-24, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 34(1), pp. 17-26, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 33(5), 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 33(6), pp. 15-24, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 33(4), pp. 17-26, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 32(2), pp. 18-23, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 32(6), pp. 20-27, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 32(1), pp. 15-20, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(6), pp. 21-37, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(4), pp. 25-37, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(5), pp. 16-21, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(2), pp. 6-16, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(1), pp. 14-19, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public in computers and related systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(1), pp. 9, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 19-35, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the Public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(2), pp. 17-25, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(3), pp. 22-37, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Peter G. Neumann |
Risks to the public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(6), pp. 14-25, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Hazel Taylor |
The move to outsourced IT projects: key risks from the provider perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research 2005, Atlanta, Georgia, USA, April 14-16, 2005, pp. 149-154, 2005, ACM, 1-59593-011-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IT project risk management, software packages, risk factors |
56 | Haiyan Yan, Bo Xu, Chen Wang |
Study on the Optimization Measures of Reducing Supply Chain Cooperation Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 109-113, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cooperation risks, Optimization measures, Supply chain |
55 | Shabareesh Ajitkumar, Deborah Bunker, Stephen Smith 0001, Donald Winchester |
A Study of the Risks in an Information System Outsourcing Partnership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open IT-Based Innovation ![In: Open IT-Based Innovation: Moving Towards Cooperative IT Transfer and Knowledge Diffusion, IFIP TC8 WG 8.6 International Working Conference, October 22-24, 2008, Madrid, Spain, pp. 403-422, 2008, Springer, 978-0-387-87502-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
shared risk, Information technology, partnerships, IT outsourcing |
52 | Pei Wang, Pei-Luen Patrick Rau, Gavriel Salvendy |
A Survey Study of Chinese Drivers' Inconsistent Risk Perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (17) ![In: Engineering Psychology and Cognitive Ergonomics, 8th International Conference, EPCE 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 471-476, 2009, Springer, 978-3-642-02727-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Chineses driver, risk perception, risk domains |
49 | Haixia Tan, Jianfeng Guo |
Some methods to depress the risks of the online transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 217-220, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
alternative dispute resolution, privacy strategies, risks of the online transactions, security strategies, reputation systems |
43 | Melissa de Andrade Souza, Jairo S. Dornelas |
The role of perceived risks among heavy users in e-commerce: a research in Pernambuco, Brazil. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2008 Euro American conference on Telematics and Information Systems, EATIS 2008, Aracaju, Brazil, September 10-12, 2008, 2008, 978-1-59593-988-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
internet knowledge, internet literacy, e-commerce, consumer behavior, perceived risks |
43 | Rattikorn Hewett |
Security and Business Risks from Early Design of Web-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEBIST (Selected Papers) ![In: Web Information Systems and Technologies, Third International Conference, WEBIST 2007, Barcelona, Spain, March 3-6, 2007, Revised Selected Papers, pp. 45-59, 2007, Springer, 978-3-540-68257-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Software risk assessment, business risks, internet-based system, software architecture, software security |
43 | Helen Parker, Mike Holcombe |
Campus-based industrial software projects: risks and rewards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 4th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 1999, Cracow, Poland, 27-30 June, 1999, pp. 189, 1999, ACM, 1-58113-087-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
industrial projects, software engineering, risks |
42 | Akemi Takeoka Chatfield, Padmaharsha Wanninayaka |
IT Offshoring Risks and Governance Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 436, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Wonseok Oh 0001, Michael Gallivan |
An Empirical Assessment of Transaction Risks of IT Outsourcing Arrangements: An Event Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Robert L. Glass |
How to handle real project risks, while filing gaps in the risk theory literature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 33(2), pp. 7-8, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Isaac J. Gabriel, Easwar A. Nyshadham |
A Cognitive Map of People's Online Risk Perceptions and Attitudes: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 274, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Jerome A. Rolia, Ludmila Cherkasova, Richard J. Friedrich |
Performance engineering for EA systems in next generation data centresPerformance engineering for EA systems in next generation data centres. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSP ![In: Proceedings of the 6th International Workshop on Software and Performance, WOSP 2007, Buenes Aires, Argentina, February 5-8, 2007, pp. 50-53, 2007, ACM, 1-59593-297-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
model-driven management, software performance engineering, enterprise applications |
39 | Tokuro Matsuo |
A New Pooled Buying Method Based on Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: New Trends in Applied Artificial Intelligence, 20th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2007, Kyoto, Japan, June 26-29, 2007, Proceedings, pp. 953-962, 2007, Springer, 978-3-540-73322-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Marco Torchiano, Maurizio Morisio, Christian Bunse |
Preliminary Results from a State-of-the-Practice Survey on Risk Management in Off-the-Shelf Component-Based Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCBSS ![In: COTS-Based Software Systems, 4th International Conference, ICCBSS 2005, Bilbao, Spain, February 7-11, 2005, Proceedings, pp. 278-288, 2005, Springer, 3-540-24548-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | U. S. Bhatt, David E. Newman, Benjamin A. Carreras, Ian Dobson |
Understanding the Effect of Risk Aversion on Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Sjur Didrik Flåm |
Pooling, pricing and trading of risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 165(1), pp. 145-160, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Transferable utility, Mutual insurance, Contingent prices, Bilateral exchange, Supergradients, Risks, Core, Stochastic approximation, Cooperative game |
37 | George O. M. Yee, Larry Korba, Ronggong Song |
Cooperative Visualization of Privacy Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDVE ![In: Cooperative Design, Visualization, and Engineering, 5th International Conference, CDVE 2008, Calvià, Mallorca, Spain, September 21-25, 2008, Proceedings, pp. 45-53, 2008, Springer, 978-3-540-88010-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy risks, privacy legislation, privacy compliance, security, e-services, Cooperative visualization |
36 | Barry W. Boehm, Jesal Bhuta |
Balancing Opportunities and Risks in Component-Based Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 25(6), pp. 56-63, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Dominique Guyonnet, Gaël Bellenfant, Olivier Bouc |
Soft Methods for Treating Uncertainties: Applications in the Field of Environmental Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMPS ![In: Soft Methods for Handling Variability and Imprecision, Selected papers from the 4th International Conference on Soft Methods in Probability and Statistics, SMPS 2008, Toulouse, France, September 8-10, 2008, pp. 16-26, 2008, Springer, 978-3-540-85026-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Yumiko Nara |
Information Literacy and Everyday Life Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 942-949, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
everyday life risk, risk management, information, literacy |
36 | Yi Ding, Nannette P. Napier |
Measurement Framework for Assessing Risks in Component-Based Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Kanta Matsuura |
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 90-94, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Guijun Wang, Georgina Cone |
A Method to Reduce Risks in Building Distributed Enterprise Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 5th International Enterprise Distributed Object Computing Conference (EDOC 2001), 4-7 September 2001, Seattle, WA, USA, Proceedings, pp. 164-168, 2001, IEEE Computer Society, 0-7695-1345-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Ayad Ali Keshlaf, Khairuddin Hashim |
A Model and Prototype Tool to Manage Software Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APAQS ![In: 1st Asia-Pacific Conference on Quality Software (APAQS 2000), 30-31 October 2000, Hong Kong, China, Proceedings, pp. 297-305, 2000, IEEE Computer Society, 0-7695-0825-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Software Process Models and Software Engineering Tools, Software Risk Management |
32 | Julia F. Varnell-Sarjeant |
Managing a man-rated software development program via risk mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 33(4), 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Stig Ole Johnsen, Rune Ask, Randi Roisli |
Reducing Risk in Oil and Gas Production Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 83-95, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Oil and gas production, human factors, information security, remote operations |
32 | Aristotelis B. Alexopoulos, Nikolaos Konstantopoulos |
New elements in international maritime standards: Developing a safety case approach for the treatment of tanker incidents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Oper. Res. ![In: Oper. Res. 6(1), pp. 55-68, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Tanker incidents, risk-based techniques, new rule-making culture, safety case approach |
32 | Mark Keil 0001, Lei Li 0021, Lars Mathiassen, Guangzhi Zheng |
The Influence of Checklists and Roles on Software Practitioner Risk Perception and Decision-Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Anne-Françoise Rutkowski, Bartel A. Van de Walle, Gerd Van Den Eede |
The Effect of Group Support Systems on the Emergence of Unique Information in a Risk Management Process: A Field Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Yuan-Sheng Huang, Jian-xun Qi, Jun-hua Zhou |
Method of Risk Discernment in Technological Innovation Based on Path Graph and Variable Weight Fuzzy Synthetic Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (1) ![In: Fuzzy Systems and Knowledge Discovery, Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part I, pp. 635-644, 2005, Springer, 3-540-28312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Aristotelis B. Alexopoulos, Nikolaos Konstantopoulos |
New elements in international maritime standards: Developing a safety case approach for the treatment of tanker incidents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Oper. Res. ![In: Oper. Res. 4(3), pp. 333-346, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Tanker incidents, risk-based techniques, new rule-making culture, safety case approach |
32 | Martin S. Feather |
Towards a Unified Approach to the Representation of, and Reasoning with, Probabilistic Risk Information about Software and Its System Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2-5 November 2004, Saint-Malo, Bretagne, France, pp. 391-402, 2004, IEEE Computer Society, 0-7695-2215-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
FMECA, SFMECA, FTA, PRA, Risk-informed decision-making, Cost-benefit tradeoffs, Probabilistic Risk Reduction, FMEA, Failure Modes |
32 | Alan Weatherall, Frank Hailstones |
Risk Identification and Analysis Using a Group Support System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 20, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Nancy J. Wahl |
Responsibility for unreliable software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ethics in Computer Age ![In: Proceedings of the Conference on Ethics in Computer Age, Galtinburg, Tennessee, USA, November 11-13, 1994, pp. 175-177, 1994, ACM, 0-89791-644-1. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
30 | Donald Gotterbarn, Keith W. Miller 0001 |
Unmasking Your Software's Ethical Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 27(1), pp. 12-13, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ethics code, stakeholder rights, Ethics, risks |
30 | Alastair McKinlay |
Emerging EMF technologies action on possible health risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 63(1-2), pp. 5-9, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Health risks, European projects, Exposure, Electromagnetic fields |
30 | J. Richard Newman, Sharon L. Rohde |
Managing system technical risks using a process-based, integration infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), November 6-10, 1995, Fort Lauderdale, Florida, USA, pp. 112-115, 1995, IEEE Computer Society, 0-8186-7123-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
system technical risks management, integration infrastructure, process-based infrastructure, system engineering automation, Catalyst, process-based integration infrastructure, technical performance measurement, systems analysis, risk management, risk management, systems engineering, systems engineers, safety-critical software |
29 | Yeni Yuqin Li Helgesson |
Managing Risks on Critical IT Systems in Public Service Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 470-475, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Odd Petter N. Slyngstad, Reidar Conradi, Muhammad Ali Babar 0001, Viktor Clerc, Hans van Vliet |
Risks and Risk Management in Software Architecture Evolution: An Industrial Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 3-5 December 2008, Beijing, China, pp. 101-108, 2008, IEEE Computer Society, 978-0-7695-3446-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | M. Eric Johnson, Dan McGuire, Nicholas D. Willey |
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 383, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Ammar M. Sarhan |
Analysis of Incomplete, Censored Data in Competing Risks Models With Generalized Exponential Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 56(1), pp. 132-138, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Grant Lewison |
The reporting of the risks from genetically modified organisms in the mass media, 2002-2004. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 72(3), pp. 439-458, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sandeep Purao, Sharoda Paul, Steven Smith |
Understanding enterprise integration project risks: A focus group study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 850-854, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, Marco Salvato |
Model-Based Mitigation of Availability Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BDIM ![In: Proceedings of BDIM 2007, 2nd IEEE/IFIP International Workshop on Business-Driven IT Management, May 21, 2007, Munich, Germany, pp. 75-83, 2007, IEEE, 1-4244-1295-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Diana Kirk, Ewan D. Tempero |
Identifying Risks in XP Projects through Process Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWEC ![In: 17th Australian Software Engineering Conference (ASWEC 2006), 18-21 April 2006, Sydney, Australia, pp. 411-420, 2006, IEEE Computer Society, 0-7695-2551-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XP, risk management, software development process |
29 | David Bahn, Dan Dressel |
Liability and Control Risks with Open Source Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITRE ![In: ITRE 2006 - 4th International Conference on Information Technology: Research and Education, October 17-18, 2006, Tel Aviv, Israel, Proceedings, pp. 242-245, 2006, IEEE, 1-4244-0858-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Peter G. Neumann |
Risks of Untrustworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 321-328, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Imhoi Koo, Rhee Man Kil |
Confidence Intervals for the Risks of Regression Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (1) ![In: Neural Information Processing, 13th International Conference, ICONIP 2006, Hong Kong, China, October 3-6, 2006, Proceedings, Part I, pp. 755-764, 2006, Springer, 3-540-46479-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Chanseok Park |
Parameter estimation of incomplete data in competing risks using the EM algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 54(2), pp. 282-290, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Robert Schaefer |
The risks of large organizations in developing complex systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(5), pp. 1-3, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Yasunobu Maeda, Norio Kurita, Saburo Ikeda |
An Early Warning Support System for Food Safety Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI Workshops ![In: New Frontiers in Artificial Intelligence, Joint JSAI 2005 Workshop Post-Proceedings, pp. 446-457, 2005, Springer, 3-540-35470-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Chris Armen, Ralph A. Morelli |
Teaching about the risks of electronic voting technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 10th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2005, Caparica, Portugal, June 27-29, 2005, pp. 227-231, 2005, ACM, 1-59593-024-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
electronic voting |
29 | Ulrich Faisst, Oliver Prokein |
An Optimization Model for the Management of Security Risks in Banking Companies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 266-273, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Ko Ishiyama, Shusuke Komuro, Hideki Tanuma, Yusuke Koyama, Hiroshi Deguchi |
Evaluation of Transaction Risks of Mean Variance Model Under Identical Variance of the Rate of Return - Simulation in Artificial Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS ![In: Artificial Intelligence and Simulation, 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 42-49, 2004, Springer, 3-540-24476-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Batya Friedman, W. David Hurley, Daniel C. Howe, Helen Nissenbaum, Edward W. Felten |
Users' conceptions of risks and harms on the web: a comparative study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, CHI 2002, Minneapolis, Minnesota, USA, April 20-25, 2002, pp. 614-615, 2002, ACM, 1-58113-454-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
children on the internet, cross-cultural differences, user differences, security, internet, privacy, diversity, web security, value-sensitive design, www, user conceptions |
29 | Päivi Kallio, Tuomas Ihme |
Evolution of the Use and Risks of Commercial Software Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 28th EUROMICRO Conference 2002, 4-6 September 2002, Dortmund, Germany, pp. 55-61, 2002, IEEE Computer Society, 0-7695-1787-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Klaus Schmid |
An Assessment Approach To Analyzing Benefits and Risks of Product Lines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 525-530, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Eric K. Clemons, Michael C. Row, Matt E. Thatcher |
An integrative framework for identifying and managing risks associated with large scale reengineering efforts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 960-969, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
large scale reengineering efforts, functionality risk, political risk, uncertain future strategic needs, information systems, risk management, risk management, economics, failure, business data processing, systems re-engineering, organizational change, management information systems, strategic planning, management of change, integrative framework, commerce, risk identification |
26 | Ken Layng |
Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the ACM SIGUCCS Fall Conference on User Services 2009, St. Louis, Missouri, USA, October 11-14, 2009, pp. 223-228, 2009, ACM, 978-1-60558-477-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PII, non-technical, management, efficiency, encryption, project, risks, strategy, sensitive, scanning, data, team, remediation, mitigate |
26 | Neal Leavitt |
Instant Messaging: A New Target for Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(7), pp. 20-23, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security risks, instant messaging, phishing, malicious code |
26 | Samuel Patton, David Doss, William Yurcik |
Open Source Versus Commercial Firewalls: Functional Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 223-224, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
corporate applications, commercial firewalls, security risks, Cisco, IOS firewall feature set, Internet, Internet, open source, open source software, open systems, network operating systems, authorisation, telecommunication security, virtual private network, business communication, Linux operating system |
26 | Josef Kisting |
The challenge of the Year 2000 problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 1st Euromicro Working Conference on Software Maintenance and Reengineering (CSMR '97), 17-19 March 1997, Berlin, Germany, pp. 89-92, 1997, IEEE Computer Society, 0-8186-7892-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
data processing systems compliance, quantity, unknown risks, data integrity, technology, activities management, Year 2000 problem |
26 | Sharon R. Lewis, Simon R. Wiseman |
Securing an Object Relational Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 59-68, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
bject-oriented databases, object relational database security, Trojan Horse software, business constraints, accounting information, risks, COTS, commercial off the shelf, data access, security labelling |
26 | Alvaro Rendón, Juan C. Dueñas, Miguel A. de Miguel, Jyrki Leskela, Juan Antonio de la Puente, Gonzalo León, Alejandro Alonso 0001 |
Animation of heterogeneous prototypes of real-time systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), November 6-10, 1995, Fort Lauderdale, Florida, USA, pp. 47-54, 1995, IEEE Computer Society, 0-8186-7123-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
heterogeneous prototypes animation, heterogeneous prototyping, internal architecture, heterogeneous prototypes, real-time systems, real-time systems, computational complexity, complexity, computer animation, software prototyping, risks reduction, global model |
26 | Yi Peng 0001, Gang Kou, Yong Shi 0001 |
Knowledge-Rich Data Mining in Financial Risk Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (2) ![In: Computational Science - ICCS 2009, 9th International Conference, Baton Rouge, LA, USA, May 25-27, 2009, Proceedings, Part II, pp. 534-542, 2009, Springer, 978-3-642-01972-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
knowledge-rich data mining, financial risk detection, classification, risk analysis, chance discovery |
26 | Janice Hill, Daniel Victor |
The Product Engineering Class in the Software Safety Risk Taxonomy for Building Safety-Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 19th Australian Software Engineering Conference (ASWEC 2008), March 25-28, 2008, Perth, Australia, pp. 617-626, 2008, IEEE Computer Society, 978-0-7695-3100-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software safety requirements, software safety risk taxonomy, legacy systems, safety-critical, safety case |
26 | Jean-Chrysostome Bolot, Marc Lelarge |
A New Perspective on Internet Security using Insurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1948-1956, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Guy Paré, Claude Sicotte, Mirou Jaana, David Girouard |
Prioritizing Clinical Information System Project Risk Factors: A Delphi Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 242, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Zikai Wang, Haitao Song |
Towards an Optimal Information Security Investment Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 756-761, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Suvajit Gupta, Joel Winstead |
Using Attack Graphs to Design Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(4), pp. 80-83, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Idongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan E. Gilbert |
Quantitative software security risk assessment model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 31-33, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
quantitative risk assessment, empirical software engineering, software security |
26 | Ricardo J. Rejas-Muslera, Juan Jose Cuadrado-Gallego, Daniel Rodríguez 0001 |
Defining a Legal Risk Management Strategy: Process, Legal Risk and Lifecycle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSPI ![In: Software Process Improvement, 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007, Proceedings, pp. 118-123, 2007, Springer, 978-3-540-74765-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Legal Risk, ISO 15504, Software Process, Software Systems, CMMI, Software Lifecycle |
26 | Andrzej Zalewski |
Beyond ATAM: Architecture Analysis in the Development of Large Scale Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECSA ![In: Software Architecture, First European Conference, ECSA 2007, Aranjuez, Spain, September 24-26, 2007, Proceedings, pp. 92-105, 2007, Springer, 978-3-540-75131-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Poornima Ramachandra, Haeng-Kon Kim, Byeongdo Kang, Yan Ha, Roger Y. Lee |
Risk Management through Architecture Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: Fourth International Conference on Software Engineering, Research, Management and Applications (SERA 2006), 9-11 August 2006, Seattle, Washington, USA, pp. 386-395, 2006, IEEE Computer Society, 0-7695-2656-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Zaid Dwaikat, Francesco Parisi-Presicce |
Risky trust: risk-based analysis of software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trust, risk analysis, distrust |
26 | Michael zur Muehlen, Danny Ting-Yi Ho |
Risk Management in the BPM Lifecycle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops ![In: Business Process Management Workshops, BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Nancy, France, September 5, 2005, Revised Selected Papers, pp. 454-466, 2005, 3-540-32595-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Tom DeMarco, Tim Lister |
Risk Management during Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 20(5), pp. 99-101, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 6267 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|