Socio-technical risk management in the age of digital transformation-identification and analysis of existing approaches

JS Menzefricke, I Wiederkehr, C Koldewey… - Procedia CIRP, 2021 - Elsevier
The digital transformation opens up a wide range of potentials to design value creation
processes more efficiently. However, performing the digital transformation requires far …

Revisiting information security risk management challenges: a practice perspective

E Bergström, M Lundgren, Å Ericson - Information & Computer …, 2019 - emerald.com
Purpose The study aims to revisit six previously defined challenges in information security
risk management to provide insights into new challenges based on current practices …

Identifying usability risk: A survey study

JTS Moorthy, S bin Ibrahim… - 2014 8th. Malaysian …, 2014 - ieeexplore.ieee.org
As defined in various quality models, usability is recognized as an important attribute of
software quality. Failing to address usability requirements in a software product could lead to …

The role of digital infrastructures in performances of organizational agility

F Allwein - 2017 - etheses.lse.ac.uk
Organizational agility has received much attention from practitioners and researchers in
Information Systems. Existing research on agility, however, often conceptualizes information …

Enhancing dotProject to support Risk Management aligned with PMBOK in the context of SMEs

RQ Gonçalves, E de Freitas Kühlkamp… - Transportation …, 2015 - igi-global.com
Many problems in software development projects are due to risks and could be avoided or
minimized if identified and treated pro-actively. In this context, software tools to support risk …

A Conceptual Investigation: Towards an Integrative Perspective of Risks in Information Systems Development & Usage

J Samuel - Samuel, J.(2013). A Conceptual Investigation: Towards …, 2020 - papers.ssrn.com
A review of existing literature in academia and in profession, along with real cases, reveals a
fragmented approach to risk identification and management in information systems …

[PDF][PDF] Information & Computer Security

E Bergström, M Lundgren, Å Ericson - researchgate.net
Purpose–The study aims to revisit six previously defined challenges in information security
risk management to provide insights into new challenges based on current practices …

[引用][C] Towards a Theory of Generative Architectures. A Longitudinal Study of eHealth Infrastructures in Norway

LK Johannesen