1,283 Hits in 5.3 sec

Security and Trust in IT Business Outsourcing: a Manifesto

Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, A. Yautsiukhin
2007 Electronical Notes in Theoretical Computer Science  
Yet, in current outsourcing practices, clients usually focus primarily on business objectives and security is negotiated only for communication links.  ...  The problem raises a number of related challenges such as: identification of metrics which are more suitable for security-level negotiation, client and contractor perspective and security guarantees in  ...  Related works Only a few works tackle the issue of security requirements in business outsourcing.  ... 
doi:10.1016/j.entcs.2006.08.030 fatcat:smdzj7hqevfibg7eo6oaedjzte

A Library Publishing Manifesto

Paul Royster
2014 Against the Grain  
They have a beginning and an end, and occupy a distinct place; each can be cited and retrieved and experienced in its entirity.  ...  It would certainly not cease to exist, but it would be carried on a different scale and in an altogether different manner.  ... 
doi:10.7771/2380-176x.6951 fatcat:yqyujjlmvfgb7miefz2qkd4nwu

A Manifesto for Future Generation Cloud Computing

Rajkumar Buyya, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio M. Llorente, Sabrina De Capitani Di Vimercati, Pierangela Samarati, Dejan Milojicic, Carlos Varela, Rami Bahsoon, Marcos Dias De Assuncao, Satish Narayana Srirama (+13 others)
2018 ACM Computing Surveys  
ACKNOWLEDGMENTS We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality  ...  We also thank Adam Wierman (California Institute of Technology), Shigeru Imai (Rensselaer Polytechnic Institute) and Arash Shaghaghi (University of New South Wales, Sydney) for their comments and suggestions  ...  SLA is traditionally a business concept, as it specifies contractual financial agreements between parties who engage in business activities.  ... 
doi:10.1145/3241737 fatcat:bgb4qjtm5zgcbbtyy6x6anfeju

Offshore Outsourcing

Georg Erber*, Aida Sayed-Ahmed**
2005 Intereconomics. Review of European Economic Policy  
Article Offshore outsourcing: A global shift in the present IT industry Intereconomics Suggested Citation: Erber, Georg; Sayed-Ahmed, Aida (2005) : Offshore outsourcing: A global shift in the present  ...  Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, gelten abweichend von diesen Nutzungsbedingungen die in der dort genannten  ...  Outsourcing always involves a considerable degree of two-way information exchange, coordination and trust.  ... 
doi:10.1007/s10272-005-0141-8 fatcat:ps5fowhifzexpnjiesishtrapm

Principles of Drawing up Tax Consulting Outsourcing Agreements

Izabela Bagińska
2020 Journal of Education, Health and Sport  
The first part includes a review of the literature in the scope of outsourcing. Then, the results of empirical research are presented.  ...  The basic objective of the article is to indicate the principles of drawing up tax consulting outsourcing agreements, to analyze the scope of such agreements, and identify the benefits and threats resulting  ...  Hammer, Reengineering the Corporation: a manifesto for business revolution, Harper Business, New York 1993, p. 46. M. Matejun, Outsourcing, [in:] K.  ... 
doi:10.12775/jehs.2020.10.06.026 fatcat:hm2jjs5hsnb7jerr6frowq6zoq

A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade [article]

Rajkumar Buyya, Satish Narayana Srirama, Giuliano Casale, Rodrigo Calheiros, Yogesh Simmhan, Blesson Varghese, Erol Gelenbe, Bahman Javadi, Luis Miguel Vaquero, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio M. Llorente (+12 others)
2018 arXiv   pre-print
The proposed manifesto addresses them by identifying the major open challenges in Cloud computing, emerging trends, and impact areas.  ...  Now, it has emerged as the backbone of modern economy by offering subscription-based services anytime, anywhere following a pay-as-you-go model.  ...  Acknowledgement We thank anonymous reviewers, Sartaj Sahni (Editor-in-Chief) and Antonio Corradi (Associate Editor) for their constructive suggestions and guidance on improving the content and quality  ... 
arXiv:1711.09123v2 fatcat:xu3u75e6ind23ite3l6zfqi6hq

P2P and a New Ecosystem of Value Creation [chapter]

2019 Peer to Peer: The Commons Manifesto  
CBPP is a new pathway of value creation and distribution, through which P2P infrastructures allow individuals to communicate, self-organize and, ultimately, co-create non-rivalrous use-value, in the form  ...  of digital commons of knowledge, software, and design.  ...  trust-related issues; retain and protect a formal legal structure and brand, and formulate and execute a business strategy.  ... 
doi:10.16997/book33.b fatcat:wud7y3viq5bi5hcpgjg65he4xm

A Case-Based Model for Assessing the Effectiveness of Information Systems Outsourcing

Erkan Uçar, Semih Bilgen
2013 Journal of IT Cases and Applications  
their outsourcing performance and re-evaluate their business and management strategies.  ...  The objective of the research reported in this paper is to construct a model for assessing the effectiveness of Information Systems (IS) outsourcing.  ...  A high level of trust is needed in an outsourcing relationship since it can be viewed as a strategic partnership.  ... 
doi:10.1080/15228053.2013.10845721 fatcat:lhtciscnrzd33i7r5h6obdzp7y

Guest Editorial: Security and Dependability in SOA and Business Processes

Ernesto Damiani, Seth Proctor, Anoop Singhal
2011 IEEE Transactions on Services Computing  
In this special issue, the paper "Two-Dimensional Trust Rating Aggregations in Service-Oriented Applications" by Yan Wang and Lei Li provides an up-to-date view of the crucial problem of aggregating trust  ...  for outsourced services and processes.  ... 
doi:10.1109/tsc.2011.56 fatcat:h3rl3qj7unczhljkwmkqmyuk6y

Collaboration in Agile Software Development: Concept and Dimensions

Dinesh Batra, Weidong Xia, Mingyu Mingyu "
2017 Communications of the Association for Information Systems  
Based on a grounded theory methodology and using interview data collected from five software development outsourcing vendors in China, we explore the nature and key underlying dimensions of collaboration  ...  assess it.  ...  problems in securing feedback.  ... 
doi:10.17705/1cais.04120 fatcat:5nf4n7of4fgz5m3xaoiwia4mr4

Applying Agile Principles for Distributed Software Development

Rashmi Phalnikar, V.S. Deshpande, S.D. Joshi
2009 2009 International Conference on Advanced Computer Control  
Adapting these practices in a distributed environment can help distributed development tackle the challenges of cultural incompatibility, leadership struggle and lack of trust.  ...  This paper describes the benefits of using Agile process and Scrum the iterative incremental process in Distributed Software development, and proposes two team structures for its implementation.  ...  Agile Manifesto Agile methods are a response to the drastic degree of change in the modern business and IT environments.  ... 
doi:10.1109/icacc.2009.93 fatcat:5c3eob4js5ckvifek5rbboitnq

Cloud Computing Security Issues and Challenges: A Review

Pankaj Gehaloach, Rohit Mahajan
2018 International Journal of Advanced Research in Computer Science and Software Engineering  
Cloud security is a multifaceted and highly complex issue. Today security is main issue in cloud.  ...  Cloud computing is an upcoming uprising in computer science and information technology industry because of its performance, security, accessibility, low cost and many other amenities.  ...  They only have to trust the cloud service provider for data security. When these providers are untrusted then data is unsafe. Data owner cannot trust anyone while outsourcing its data.  ... 
doi:10.23956/ijarcsse.v8i1.526 fatcat:bavefjoe7jbgxpjtbny3ouk7cq

Meet the Contributors [chapter]

Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran
2014 The Privacy Engineer's Manifesto  
And it is trust that grants companies permission to market.  ...  with a minor in Technical and Business Communication.  ... 
doi:10.1007/978-1-4302-6356-2_16 fatcat:sqig6cczm5hx5o3f4zlz6xz2ia

Investigating Agile Requirements Engineering Practices in the South African Software Development Market

Nalindren Naicker, Manoj Maharaj
2020 Journal of Computing and Information Technology  
The study concluded that although Agile Software Development is practiced in the South African software industry, there needs to be stricter adherences to the Agile Manifesto and Agile Security Manifesto  ...  The aim of this research study was to assess Agile RE practices in the South African software development industry and investigate secure Agile RE initiatives towards developing secure products.  ...  I know about pre-written templates for IIS with a plug in. It will check for SQL injection and malicious scripts. Another approach is to outsource security.  ... 
doi:10.20532/cit.2020.1004868 fatcat:l2ye55jwobarbpzigqnz6xbprm

XP Expanded: Distributed Extreme Programming [chapter]

Keith Braithwaite, Tim Joyce
2005 Lecture Notes in Computer Science  
We have found that you can stay true to the principles and not compromise the practices of XP in a distributed environment.  ...  Thus, business can realize both the benefits of distributed and of truly agile development.  ...  Our observation is that such a team can succeed, and win for its business sponsors both the advantages of agile development and of distributed working.  ... 
doi:10.1007/11499053_21 fatcat:tz3ba5z5zjgmpfomjf4l7j4tvy
« Previous Showing results 1 — 15 out of 1,283 results