Computer related risks
Software architecture: perspectives on an emerging discipline
Software architecture: perspectives on an emerging discipline
Supporting shared information systems: boundary objects, communities, and brokering
ICIS '00 Proceedings of the twenty first international conference on Information systems
Architecture-based approach to reliability assessment of software systems
Performance Evaluation
Distributed component technologies and their software engineering implications
Proceedings of the 24th International Conference on Software Engineering
Managing Information Security Risks: The Octave Approach
Managing Information Security Risks: The Octave Approach
Scenarios in System Development: Current Practice
IEEE Software
Communication and Trust in Global Virtual Teams
Organization Science
Software Architecture in Practice
Software Architecture in Practice
ISSRE '01 Proceedings of the 12th International Symposium on Software Reliability Engineering
Reliability Prediction and Sensitivity Analysis Based on Software Architecture
ISSRE '02 Proceedings of the 13th International Symposium on Software Reliability Engineering
Risk assessment for large heterogeneous systems
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Denial-of-service resilience in peer-to-peer file sharing systems
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Architecture based analysis of performance, reliability and security of software systems
Proceedings of the 5th international workshop on Software and performance
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Reflections on Web-Oriented Architectures for Risk Management
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Risk assessment in work environments: modeling and simulation
Concurrency and Computation: Practice & Experience
Hi-index | 0.00 |
As organizations increasingly operate, compete, and cooperate in a global context, business processes are also becoming global to propagate the benefits from coordination and standardization across geographical boundaries. In this context, security has gained significance due to increased threats, as well as legislation and compliance issues. This article presents a framework for assessing the security of Internet technology components that support a globally distributed workplace. Four distinct information flow and design architectures are identified based on location sensitivities and placements of the infrastructure components. Using a combination of scenarios, architectures, and technologies, the article presents the framework of a development tool for information security officers to evaluate the security posture of an information system. To aid managers in better understanding their options to improve security of the system, we also propose a three-dimensional representation, based on the framework, for embedding solution alternatives. To demonstrate its use in a real-world context, the article also applies the framework to assess a globally distributed workforce application at a northeast financial institution.