Results 31 to 40 of about 38,949 (266)

Analysis of academic service cybersecurity in university based on framework COBIT 5 using CMMI

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
A secure academic information system is part of the college. The security of academic information systems is very important to maintain information optimally and safely.
I. Riadi, I. R. Yanto, Eko Handoyo
semanticscholar   +1 more source

A Service based Development Environment on Web 2.0 Platforms [PDF]

open access: yes, 2008
Governments are investing on the IT adoption and promoting the socalled e-economies as a way to improve competitive advantages. One of the main government’s actions is to provide internet access to the most part of the population, people and ...
Fernandez, Rafael   +4 more
core   +2 more sources

Seeking process maturity with DSDM atern

open access: yesComputational Science and Techniques, 2013
It is important for an organization to know what capability/maturity of the process a chosen methodology could ensure. This paper is focused on DSDM Atern process maturity by CMMI.
Stasys Peldžius   +2 more
doaj   +1 more source

Metode Penilaian Kematangan Infrastruktur Informasi Geospasial Pemerintah Daerah di Indonesia Menggunakan Capability Maturity Model Integration (CMMI) dan Geospatial Maturity Assessment Ordnance Survey (GMA OS)

open access: yesJournal of Geospatial Information Science and Engineering, 2023
Penilaian kematangan Infrastruktur Informasi Geospasial (IIG) dilakukan untuk mengetahui tingkat efektivitas pengelolaan Informasi Geospasial (IG). Saat ini penilaian IIG pemerintah daerah di Indonesia masih pada penilaian performa IIG yang tertuang ...
Asyfi'na Shofiyal Izza, Diyono Diyono
doaj   +1 more source

CMMI for Development

open access: yes, 2017
Mukund Chaudhary, Abhishek Chopra
openaire   +2 more sources

Effective Systems Engineering Training [PDF]

open access: yes, 2007
The need for systems engineering training is steadily increasing, as both the defense and commercial markets take on more complex "systems of systems" work.
Hefner, Rick
core   +1 more source

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

Cultivating knowledge sharing through the relationship management maturity model [PDF]

open access: yes, 2005
Purpose - The purpose of this paper is to present the development of the relationship management maturity model (RMMM), the output of an initiative aimed at bridging the gap between business units and the IT organisation.
Hatzakis, T   +3 more
core   +1 more source

High-Resolution Scanning Coded-Mask-Based X-ray Multi-Contrast Imaging and Tomography

open access: yesJournal of Imaging, 2021
Near-field X-ray speckle tracking has been used in phase-contrast imaging and tomography as an emerging technique, providing higher contrast images than traditional absorption radiography.
Zhi Qiao   +3 more
doaj   +1 more source

Software Reuse in Agile Development Organizations - A Conceptual Management Tool [PDF]

open access: yes, 2011
The reuse of knowledge is considered a major factor for increasing productivity and quality. In the software industry knowledge is embodied in software assets such as code components, functional designs and test cases.
Iacob, Maria   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy