Evaluation of EIdM Investments

作者: Denis Royer

DOI: 10.1007/978-3-642-35040-5_4

关键词: BusinessRisk analysis (engineering)Evaluation methodsDecision maker

摘要: As initially noted, the origin of discussion with regard to ex-ante evaluation IT and security (ITS) investments can be traced back late 1980s, has been addressed consequently ever since.

参考文章(167)
Karl Flieder, Identity- und Access-Management mit EAI-Konzepten und -Technologien Datenschutz Und Datensicherheit - Dud. ,vol. 32, pp. 532- 536 ,(2008) , 10.1007/S11623-008-0126-4
Matthias Meyer, Rüdiger Zarnekow, Lutz M. Kolbe, IT-Governance Begriff, Status quo und Bedeutung Wirtschaftsinformatik und Angewandte Informatik. ,vol. 45, pp. 445- 448 ,(2003) , 10.1007/BF03250909
Maris Martinsons, Robert Davison, Dennis Tse, The balanced scorecard: a foundation for the strategic management of information systems decision support systems. ,vol. 25, pp. 71- 88 ,(1999) , 10.1016/S0167-9236(98)00086-4
H. Sharp, A. Finkelstein, G. Galal, Stakeholder identification in the requirements engineering process database and expert systems applications. pp. 387- 391 ,(1999) , 10.1109/DEXA.1999.795198
Denis Royer, Kai Rannenberg, Mobilität, mobile Technologie und Identität Datenschutz und Datensicherheit - DuD. ,vol. 30, pp. 571- 575 ,(2006) , 10.1007/S11623-006-0146-X
Julie Smith David, David Schuff, Robert St. Louis, Managing your total IT cost of ownership Communications of The ACM. ,vol. 45, pp. 101- 106 ,(2002) , 10.1145/502269.502273
Rebecca T. Mercuri, Analyzing security costs Communications of The ACM. ,vol. 46, pp. 15- 18 ,(2003) , 10.1145/777313.777327
Detlef Hühnlein, Identitätsmanagement: Eine visualisierte Begriffsbestimmung Datenschutz Und Datensicherheit. ,vol. 32, pp. 161- 163 ,(2008) , 10.1007/S11623-008-0023-X