The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper introduces complex unified approach to formalize and define risks of different kind. It based on a detailed definition of risk factors, assessing possible risk situations and reducing general system problem of risk management to the optimization problem of minimizing the costs for reducing the risk degree, level and aftermath mitigation. The concept is focused on solving dynamic problems...
This paper is an exploratory study on architects' attitudes towards risk and its influences on the architectural decision-making process. A classification of architects' attitude to risk-taking has been developed on the basis of Fowler's Technical Debt Quadrants. The core proposition of the paper is that the well-established concept of 'risk appetite' can be equally well applied to characterise and...
The known information security assessment risk system (developed by authors) is based on processing methods of linguistic variables. Their foundation are reference parametric trapezoidal fuzzy numbers with different plurality of defining terms, the formation of which is associated with the involvement of experts in the relevant subject area. For more efficient use of such system it's necessary to...
Challenges of technical risk assessment is difficult to address, while its success can benefit software organizations appreciably. Classical definition of risk as a "combination of probability and impact of adverse event" appears not working with technical risk assessment. The main reason of this is the nature of adverse event's outcome which is rather continuous than discrete. The objective...
Informatization, the inevitable trend of the enterprise development, has greatly improved the lasting competitive advantage and management level of the enterprises. Although it has become the essential means to improve enterprise core competitiveness, various risks also exist in it, which will be discussed this paper. I will analyze the management methods of the enterprise informatization risks, and...
The environment designers must conquer to realize crewed space-exploration initiatives presents a heavily mass constrained design space coupled with immense consequences given hardware failures. The balance of these two highly dependent design elements throughout the design process requires insights provided through reliability and risk assessments at early stages of system concept development. If...
In market-driven software product development, requirements that can potentially go into a product or a product release represent different kinds of investments. Requirements differ in the type of value that they provide and level of risk associated to investing in them. In this paper we investigate how business risk associated with different requirement types is considered by the decision makers...
Research literature has argued the need for a methodology to measure security assurance levels of a system as vital in order to maintain and improve the overall system security. Building on our close examination of the existing approaches for IT Information assurance, this paper proposes a risk-based security assurance metrics and aggregation techniques to be incorporated in a methodology for the...
If grid computing is to experience widespread commercial adoption, then incorporating risk assessment and management techniques is essential, both during negotiation between service provider and service requester and during run-time. This paper focuses on the role of a resource broker in this context. Specifically, techniques for evaluating the reliability of risk information received from resource...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.