Pub Date : 2007-01-01DOI: 10.1007/S10550-007-0007-7
J. Himmelreich
{"title":"A compliance office for heavily regulated enterprises — a best practice approach to meeting US FDA requirements","authors":"J. Himmelreich","doi":"10.1007/S10550-007-0007-7","DOIUrl":"https://doi.org/10.1007/S10550-007-0007-7","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"25 1","pages":"41-49"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10550-007-0007-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/S10550-007-0010-Z
A. Edmiston
{"title":"The role of systems and applications monitoring in operational risk management","authors":"A. Edmiston","doi":"10.1007/S10550-007-0010-Z","DOIUrl":"https://doi.org/10.1007/S10550-007-0010-Z","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"25 1","pages":"68-78"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10550-007-0010-Z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/S10550-007-0019-3
P. Warren, N. Davies
{"title":"Managing the risks from information — through semantic information management","authors":"P. Warren, N. Davies","doi":"10.1007/S10550-007-0019-3","DOIUrl":"https://doi.org/10.1007/S10550-007-0019-3","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"25 1","pages":"178-191"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10550-007-0019-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/S10550-007-0017-5
B. Azvine, Z. Cui, B. Majeed, M. Spott
{"title":"Operational risk management with real-time business intelligence","authors":"B. Azvine, Z. Cui, B. Majeed, M. Spott","doi":"10.1007/S10550-007-0017-5","DOIUrl":"https://doi.org/10.1007/S10550-007-0017-5","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"25 1","pages":"154-167"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10550-007-0017-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/S10550-007-0013-9
F. Braber, I. Hogganvik, M. S. Lund, K. Stølen, F. Vraalsen
{"title":"Model-based security analysis in seven steps — a guided tour to the CORAS method","authors":"F. Braber, I. Hogganvik, M. S. Lund, K. Stølen, F. Vraalsen","doi":"10.1007/S10550-007-0013-9","DOIUrl":"https://doi.org/10.1007/S10550-007-0013-9","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"25 1","pages":"101-117"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10550-007-0013-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/S10550-007-0014-8
V. Page, M. Dixon, I. Choudhury
{"title":"Security risk mitigation for information systems","authors":"V. Page, M. Dixon, I. Choudhury","doi":"10.1007/S10550-007-0014-8","DOIUrl":"https://doi.org/10.1007/S10550-007-0014-8","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"142 1","pages":"118-127"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10550-007-0014-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/s10550-007-0015-7
A. Baldwin, Y. Beres, S. Shiu
{"title":"Using assurance models to aid the risk and governance life cycle","authors":"A. Baldwin, Y. Beres, S. Shiu","doi":"10.1007/s10550-007-0015-7","DOIUrl":"https://doi.org/10.1007/s10550-007-0015-7","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"25 1","pages":"128-140"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s10550-007-0015-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/S10550-007-0008-6
B. Ashford
{"title":"How benchmarking can mitigate risk in business transformation","authors":"B. Ashford","doi":"10.1007/S10550-007-0008-6","DOIUrl":"https://doi.org/10.1007/S10550-007-0008-6","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"25 1","pages":"50-57"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10550-007-0008-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/S10550-007-0011-Y
C. Colwill, A. Gray
{"title":"Creating an effective security risk model for outsourcing decisions","authors":"C. Colwill, A. Gray","doi":"10.1007/S10550-007-0011-Y","DOIUrl":"https://doi.org/10.1007/S10550-007-0011-Y","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"1 1","pages":"79-87"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10550-007-0011-Y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52025172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-01-01DOI: 10.1007/s10550-007-0067-8
A. Cameron, D. Thorne, K. T. Foster, S. Fisher
{"title":"Fixed access network technologies","authors":"A. Cameron, D. Thorne, K. T. Foster, S. Fisher","doi":"10.1007/s10550-007-0067-8","DOIUrl":"https://doi.org/10.1007/s10550-007-0067-8","url":null,"abstract":"","PeriodicalId":50725,"journal":{"name":"Bt Technology Journal","volume":"33 1","pages":"121-131"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s10550-007-0067-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52026239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}